Selefra
Open-source policy-as-code software for multi-cloud and SaaS environments with GPT model conversations and custom analysis policies.
Uses the AWS Cloud Control API to list resources that are present in a given AWS account and region(s). Discovered resources are written to a JSON output file. Make sure you have AWS credentials configured for your target account. This can either be done using environment variables or by specifying a named profile in the optional --profile argument. Read-only IAM permissions are sufficient. If you run the script against specific regions, it is recommended to also include the us-east-1 region. This ensures that resources of global AWS services are captured as well. Example invocations: pip install -r requirements.txt python aws_list_resources.py --regions us-east-1,eu-central-1 python aws_list_resources.py --regions ALL python aws_list_resources.py --regions ALL --include-resource-types AWS::EC2::*,AWS::DynamoDB::* --exclude-resource-types AWS::EC2::DHCPOptions,AWS::EC2::VPCGatewayAttachment Supported arguments: --exclude-resource-types do not list the specified comma-separated resource types (supports wildcards) --include-resource-types only list the specified comma-separated resource types (supports wildcards)
Open-source policy-as-code software for multi-cloud and SaaS environments with GPT model conversations and custom analysis policies.
A CLI tool and Go library for generating a Software Bill of Materials (SBOM) from container images and filesystems.
Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.
Show the history and changes between configuration versions of AWS resources
Stay up-to-date on the latest trends and developments in AWS Cloud Security with this weekly digest newsletter.
AWS serverless cloud security tool for parsing and alerting on CloudTrail logs using EQL.