Skip to content

Cloud Inquisitor - tool to enforce ownership and data security within AWS

License

Notifications You must be signed in to change notification settings

tomvachon/cloud-inquisitor

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

25 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Cloud Inquisitor

docs/images/cloud-inquisitor_logo.png

Introduction

Cloud Inquisitor improves the security posture of an AWS footprint through:

  • monitoring AWS objects for ownership attribution, notifying account owners of unowned objects, and subsequently removing unowned AWS objects if ownership is not resolved.
  • detecting domain hijacking.
  • verifying security services such as Cloudtrail and VPC Flowlogs.
  • managing IAM policies across multiple accounts.

Version

Cloud Inquisitor Latest

Architecture

Typically Cloud Inquisitor runs in a "Security" or "Audit" account with cross-account access through the use of AssumeRole.

Platforms

Cloud Inquisitor works on Python 3.5 or higher and Ubuntu 16.04.

  • Production deployment is done through Packer.
  • Development supports deployment via Docker or Packer.

Please see the Resources section below for further information.

Contact

Any questions or comments regarding this project can be made via the project's Slack Chat Room. If you're not a member of the room, you can auto-join here.

Resources

This project has a docs directory that contains many resources that will help you implement Cloud Inquisitor and contribute to the project.

About

Cloud Inquisitor - tool to enforce ownership and data security within AWS

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages

  • Python 43.4%
  • JavaScript 30.4%
  • HTML 22.3%
  • CSS 2.1%
  • Shell 1.5%
  • Batchfile 0.1%
  • Other 0.2%