Skip to main content

A security scanner for AWS resources

Project description

AWS Sentinel

AWS Sentinel is a command-line security scanner for AWS resources. It helps identify common security issues in your AWS account, such as:

  • Public S3 buckets
  • Security groups with port 22 (SSH) open to the public
  • Unencrypted EBS volumes
  • IAM users without Multi-Factor Authentication (MFA)

Usage

You can clone this repo:

git clone https://github.com/rishabkumar7/aws-sentinel

Once clone, you can run AWS Sentinel from the command line:

python main.py --profile your-aws-profile --region your-aws-region

If you don't specify a profile or region, it will use the default profile and us-east-1 region.

Options

  • --profile: AWS profile to use (default: "default")
  • --region: AWS region to check (default: "us-east-1")

Example Output

 █████╗ ██╗    ██╗███████╗    ███████╗███████╗███╗   ██╗████████╗██╗███╗   ██╗███████╗██╗     
██╔══██╗██║    ██║██╔════╝    ██╔════╝██╔════╝████╗  ██║╚══██╔══╝██║████╗  ██║██╔════╝██║     
███████║██║ █╗ ██║███████╗    ███████╗█████╗  ██╔██╗ ██║   ██║   ██║██╔██╗ ██║█████╗  ██║     
██╔══██║██║███╗██║╚════██║    ╚════██║██╔══╝  ██║╚██╗██║   ██║   ██║██║╚██╗██║██╔══╝  ██║     
██║  ██║╚███╔███╔╝███████║    ███████║███████╗██║ ╚████║   ██║   ██║██║ ╚████║███████╗███████╗
╚═╝  ╚═╝ ╚══╝╚══╝ ╚══════╝    ╚══════╝╚══════╝╚═╝  ╚═══╝   ╚═╝   ╚═╝╚═╝  ╚═══╝╚══════╝╚══════╝
                                                                        
                      AWS Security Sentinel

Scanning AWS account using profile: default in region: us-east-1
Initializing security checks...
+-------------------------+
| AWS Security Issues Detected |
+--------+---------------+------------------------------------------+
| Service| Resource      | Issue                                    |
+--------+---------------+------------------------------------------+
| S3     | mybucket      | Public bucket                            |
| EC2    | sg-12345abcde | Security group with port 22 open to public |
| EBS    | vol-67890fghij| Unencrypted volume                       |
| IAM    | alice         | User without MFA                         |
+--------+---------------+------------------------------------------+

Requirements

  • Python 3.9+
  • AWS credentials configured (via AWS CLI or environment variables)

Development

To set up AWS Sentinel for development:

  1. Clone the repository:
git clone https://github.com/yourusername/aws-sentinel.git cd aws-sentinel
  1. Create a virtual environment:
python -m venv venv
source venv/bin/activate # On Windows: venv\Scripts\activate`
  1. Install development dependencies:
pip install -r requirements.txt
  1. Run tests:
python unittest test_aws_sentinel.py

License

MIT License

Contributing

Contributions are welcome! Please feel free to submit a Pull Request.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

aws_sentinel-0.1.0.tar.gz (9.1 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

aws_sentinel-0.1.0-py3-none-any.whl (10.0 kB view details)

Uploaded Python 3

File details

Details for the file aws_sentinel-0.1.0.tar.gz.

File metadata

  • Download URL: aws_sentinel-0.1.0.tar.gz
  • Upload date:
  • Size: 9.1 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.12.5

File hashes

Hashes for aws_sentinel-0.1.0.tar.gz
Algorithm Hash digest
SHA256 0866c2b10e249054efc8a9abf53e7597802c0b936f0465642801a3503545dba4
MD5 e209a636e99766e22affa9d9102bfe99
BLAKE2b-256 51436673bcaaaf7d37a7bd5d178a64db122dce9f35c51cda9d003c41ad4271ae

See more details on using hashes here.

File details

Details for the file aws_sentinel-0.1.0-py3-none-any.whl.

File metadata

  • Download URL: aws_sentinel-0.1.0-py3-none-any.whl
  • Upload date:
  • Size: 10.0 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.12.5

File hashes

Hashes for aws_sentinel-0.1.0-py3-none-any.whl
Algorithm Hash digest
SHA256 f830f5aecb7c90f3753d9635588c714bfbc1f37afe8e95cc5314904f94fd14e7
MD5 96413310e2eac87913ff720dfe57e5cf
BLAKE2b-256 d9cfd3f2cf004b8472fb0eb79b5d8835573afbfc2d88d7c3a464f65d8a3078b0

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page