Skip to main content

AWS Cloud Audit Tool

Project description

CLOUD AUDIT TOOL

Cloud Audit tool helps you to check whether the application built on AWS is following the AWS Well-Architected framework by validating it against various AWS services security requirements and the best practices. Generates report to validate the security requirements and security best practices.

Cloud Audit tool setup

The project basically uses boto client to connect to the aws services.

  1. Update the session credentials in the terminal or give them through the arguments in the command line by specifying --access-key, --secret-key, and --session-token.

  2. While running the program, You can specify the region name, config file path, report file path, and tags through --region, --config-path, -report-path arguments.

  3. If no region is specified us-east-1 is taken as the default region, Similarly if no config file path and report path are given, the current working directory's path is taken as the default path and the audit checks are performed for the default values.

  4. Tags are checked by passing as an argument --tags or updating account tags in the config.json file. Moreover, the tags passed through the argument in the command line take priority.

  5. The format of the tags that are passed through the argument in the command line should be separated using commas (,).

Cloud Audit Tool Execution

Command to Run the audit tool in the command line after installing the package.

cloud-audit-tool

Arguments that can be passed

cloud-audit-tool --region {region-name} --config-path {config-path} --report-path {report-path} --access-key {access-key} --secret-key {secret-key} --session-token {session-token} --tags {tag1,tag2,..}

Final Report

The overall report is provided as a HTML document in the path specified in the report-path argument. If no path is specified report is generated in the current working directory.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

cross43-0.0.6.tar.gz (30.9 kB view details)

Uploaded Source

Built Distribution

cross43-0.0.6-py3-none-any.whl (53.7 kB view details)

Uploaded Python 3

File details

Details for the file cross43-0.0.6.tar.gz.

File metadata

  • Download URL: cross43-0.0.6.tar.gz
  • Upload date:
  • Size: 30.9 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.2 CPython/3.9.6

File hashes

Hashes for cross43-0.0.6.tar.gz
Algorithm Hash digest
SHA256 7f8ad9e57775ca2fa9cd8278de5b4b08b39fe9651762238f9d203a599e677392
MD5 7965e0e0fb6a2887bc7eaa43fbea854b
BLAKE2b-256 a36eea5784e3e9ae1f86a487530aaff0d2ae9eb4855eb5267b73179cb41c5ca5

See more details on using hashes here.

File details

Details for the file cross43-0.0.6-py3-none-any.whl.

File metadata

  • Download URL: cross43-0.0.6-py3-none-any.whl
  • Upload date:
  • Size: 53.7 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.2 CPython/3.9.6

File hashes

Hashes for cross43-0.0.6-py3-none-any.whl
Algorithm Hash digest
SHA256 5de4e6947c40592f591bf8c1c7c654dfe688181553adca9b4c77729a4d5f5d72
MD5 72b41a464285f7bf3a56e87ed557c358
BLAKE2b-256 97d804d69a5937d19b64a58b5bc3b901562e05281a1fec57eb9dd8a75c38f8f3

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page