Skip to content
Richard Spindler edited this page Feb 15, 2017 · 3 revisions

AWS

CIS benchmarks:

https://benchmarks.cisecurity.org/downloads/multiform/index.cfm

AWS CIS Page:

https://aws.amazon.com/blogs/security/tag/cis-aws-foundations-benchmark/

AWS Security:

https://aws.amazon.com/blogs/security/

Example usage

List AWS reports:

$ ./lunar.sh -W

AWS Foundation Security Tests:

audit_aws_access_keys
audit_aws_config
audit_aws_creds
audit_aws_iam
audit_aws_iam_policies
audit_aws_keys
audit_aws_logging
audit_aws_mfa
audit_aws_monitoring
audit_aws_password_policy
audit_aws_sns
audit_aws_support_role
audit_aws_vpcs

Perform a specific AWS report:

$ ./lunar.sh -s audit_aws_access_keys

Running:   In audit mode (no changes will be made to system)
           Filesystem checks will not be done

Auditing:  Selecting audit_aws_access_keys

# SYSTEM INFORMATION:

Platform:  i386
Vendor:    Apple
Name:      Darwin
Version:   10.12
Update:    3

Checking:  If node is managed
Notice:    Node is not managed

Secure:    Account spindler has key access enabled and has used their AWS API credentials [1 Passes]
Secure:    Account spindler has key access enabled and has used their AWS API credentials [2 Passes]

Tests:     2
Secure:    2
Warnings:  0

Perform all AWS reports:

$ ./lunar.sh -w
Clone this wiki locally