aws-cloud-tools

Security Commands

Security auditing and tools for AWS security assessment, compliance checking, and vulnerability detection.

Commands

audit

Perform basic security audit of AWS account.

aws-cloud-utilities security audit

Checks:

Options:

Examples:

# Basic security audit
aws-cloud-utilities security audit

# High severity issues only
aws-cloud-utilities security audit --severity high

# S3 security audit
aws-cloud-utilities security audit --service s3

blue-team-audit

Comprehensive security assessment for blue team operations.

aws-cloud-utilities security blue-team-audit

Enhanced checks:

Options:

Examples:

# Comprehensive audit
aws-cloud-utilities security blue-team-audit

# Detailed report with remediation
aws-cloud-utilities security blue-team-audit --detailed --include-remediation

# Export to JSON
aws-cloud-utilities security blue-team-audit --output json > security-audit.json

public-resources

Find publicly accessible AWS resources.

aws-cloud-utilities security public-resources

Detects:

Options:

Examples:

# All public resources
aws-cloud-utilities security public-resources

# Public S3 buckets only
aws-cloud-utilities security public-resources --service s3

# High-risk exposures
aws-cloud-utilities security public-resources --severity high

compliance

Check compliance against security frameworks.

aws-cloud-utilities security compliance --framework FRAMEWORK

Supported frameworks:

Options:

Examples:

# CIS compliance check
aws-cloud-utilities security compliance --framework cis

# SOC 2 compliance
aws-cloud-utilities security compliance --framework soc2

# Specific control
aws-cloud-utilities security compliance --framework cis --control 1.1

encryption-status

Check encryption status across AWS services.

aws-cloud-utilities security encryption-status

Checks:

Options:

Examples:

# All encryption status
aws-cloud-utilities security encryption-status

# Unencrypted resources only
aws-cloud-utilities security encryption-status --unencrypted-only

# S3 encryption status
aws-cloud-utilities security encryption-status --service s3

network-analysis

Analyze network security configuration.

aws-cloud-utilities security network-analysis

Analysis includes:

Options:

Examples:

# All network analysis
aws-cloud-utilities security network-analysis

# Specific VPC
aws-cloud-utilities security network-analysis --vpc-id vpc-12345678

# Risky rules only
aws-cloud-utilities security network-analysis --risky-rules-only

secrets-scan

Scan for exposed secrets and credentials.

aws-cloud-utilities security secrets-scan

Scans:

Options:

Examples:

# Full secrets scan
aws-cloud-utilities security secrets-scan

# Lambda functions only
aws-cloud-utilities security secrets-scan --service lambda

# Custom pattern
aws-cloud-utilities security secrets-scan --pattern "api[_-]?key"

Global Options

All security commands support:

Examples

Daily Security Check

#!/bin/bash
# Daily security monitoring
echo "=== Security Audit ==="
aws-cloud-utilities security audit --output json > daily-audit-$(date +%Y%m%d).json

echo "=== Public Resources ==="
aws-cloud-utilities security public-resources --output json > public-resources-$(date +%Y%m%d).json

echo "=== Encryption Status ==="
aws-cloud-utilities security encryption-status --unencrypted-only

Comprehensive Security Assessment

#!/bin/bash
# Full security assessment
echo "=== Blue Team Audit ==="
aws-cloud-utilities security blue-team-audit --detailed --include-remediation

echo "=== Compliance Check ==="
aws-cloud-utilities security compliance --framework cis

echo "=== Network Analysis ==="
aws-cloud-utilities security network-analysis

echo "=== Secrets Scan ==="
aws-cloud-utilities security secrets-scan

Incident Response

#!/bin/bash
# Security incident response
echo "=== Public Exposures ==="
aws-cloud-utilities security public-resources --severity high

echo "=== Network Security ==="
aws-cloud-utilities security network-analysis --risky-rules-only

echo "=== Recent Changes ==="
aws-cloud-utilities security audit --severity critical

Common Use Cases

  1. Regular Security Monitoring
    aws-cloud-utilities security audit
    aws-cloud-utilities security public-resources
    
  2. Compliance Reporting
    aws-cloud-utilities security compliance --framework cis --export-report
    aws-cloud-utilities security blue-team-audit --detailed
    
  3. Incident Investigation
    aws-cloud-utilities security public-resources --severity high
    aws-cloud-utilities security network-analysis --risky-rules-only
    
  4. Security Hardening
    aws-cloud-utilities security encryption-status --unencrypted-only
    aws-cloud-utilities security secrets-scan
    

Security Findings Format

Security findings include:

Example output:

{
  "severity": "HIGH",
  "resource": "s3://my-bucket",
  "finding": "S3 bucket allows public read access",
  "remediation": "Remove public read permissions from bucket policy",
  "compliance": ["CIS-2.3", "SOC2-CC6.1"]
}

Integration with Other Tools

Security commands integrate well with: