Skip to main content

AWS Cloud Audit Tool

Project description

CLOUD AUDIT TOOL

Cloud Audit tool helps you to check whether the application built on AWS is following the AWS Well-Architected framework by validating it against various AWS services security requirements and the best practices. Generates report to validate the security requirements and security best practices.

Cloud Audit tool setup

The project basically uses boto client to connect to the aws services.

  1. Update the session credentials in the terminal or give them through the arguments in the command line by specifying --access-key, --secret-key, and --session-token.

  2. While running the program, You can specify the region name, config file path, report file path, and tags through --region, --config-path, -report-path arguments.

  3. If no region is specified us-east-1 is taken as the default region, Similarly if no config file path and report path are given, the current working directory's path is taken as the default path and the audit checks are performed for the default values.

  4. Tags are checked by passing as an argument --tags or updating account tags in the config.json file. Moreover, the tags passed through the argument in the command line take priority.

  5. The format of the tags that are passed through the argument in the command line should be separated using commas (,).

Cloud Audit Tool Execution

Command to Run the audit tool in the command line after installing the package.

cloud-audit-tool

Arguments that can be passed

cloud-audit-tool --region {region-name} --config-path {config-path} --report-path {report-path} --access-key {access-key} --secret-key {secret-key} --session-token {session-token} --tags {tag1,tag2,..}

Final Report

The overall report is provided as a HTML document in the path specified in the report-path argument. If no path is specified report is generated in the current working directory.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

cloud23-1.0.2.tar.gz (31.0 kB view details)

Uploaded Source

Built Distribution

cloud23-1.0.2-py3-none-any.whl (53.7 kB view details)

Uploaded Python 3

File details

Details for the file cloud23-1.0.2.tar.gz.

File metadata

  • Download URL: cloud23-1.0.2.tar.gz
  • Upload date:
  • Size: 31.0 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.2 CPython/3.9.6

File hashes

Hashes for cloud23-1.0.2.tar.gz
Algorithm Hash digest
SHA256 5d003378ad3aa1f87fc2fc510ba1dde424cffd15ab8123bf872ffaa8ff4766ea
MD5 7fc1f80e4b69ab86e82b1d864480ca0e
BLAKE2b-256 9b865a1466daf8c7a190061da650612f00ae414b7e11d2941b836a0e7a658660

See more details on using hashes here.

File details

Details for the file cloud23-1.0.2-py3-none-any.whl.

File metadata

  • Download URL: cloud23-1.0.2-py3-none-any.whl
  • Upload date:
  • Size: 53.7 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.2 CPython/3.9.6

File hashes

Hashes for cloud23-1.0.2-py3-none-any.whl
Algorithm Hash digest
SHA256 d1d59aa0d5646ea5118b00aea7828df3a6e0950d7fd85d8b8b6b82fb40345365
MD5 db5c277e4ec13b001a764f96cf939897
BLAKE2b-256 787283686b8b7394ef6c2f429dd6317b413d58441f32385e9450cfc7ae50e75c

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page