AWS Recon Logo

AWS Recon

0
Free
Visit Website

A multi-threaded AWS security-focused inventory collection tool written in Ruby. This tool was created to facilitate efficient collection of a large amount of AWS resource attributes and metadata. It aims to collect nearly everything that is relevant to the security configuration and posture of an AWS environment. Existing tools (e.g. AWS Config) that do some form of resource collection lack the coverage and specificity to accurately measure security posture (e.g. detailed resource attribute data, fully parsed policy documents, and nested resource relationships). AWS Recon handles collection from large accounts by taking advantage of automatic retries (either due to network reliability or API throttling), automatic paging of large responses (> 100 resources per API call), and multi-threading parallel requests to speed up collection. Project Goals: More complete resource coverage than available tools (especially for ECS & EKS), more granular resource detail, including nested related resources in the output, flexible output (console, JSON lines, plain JSON, file, S3 bucket, and standard out), and efficient (multi-threaded, rate limited, automatic retries, and automatic result pagination).

FEATURES

ALTERNATIVES

Multi-account cloud security tool for AWS with real-time reporting and auto-remediation capabilities.

Export Kubernetes events for observability and alerting purposes with flexible routing options.

An open-source framework for testing and validating the security of AWS services and resources.

A command-line tool to get valuable information out of AWS CloudTrail and a general purpose toolbox for working with IAM policies

Open-source cloud-agnostic resource manager for analyzing and managing cloud cost, usage, security, and governance.

A cloud-native security platform that provides asset inventory, vulnerability management, compliance monitoring, and security posture management across multiple cloud providers.

Commercial

A framework for executing attacker actions in the cloud with YAML-based format for defining TTPs and detection properties, deployable via AWS-native CI/CD pipeline.

Docker security audit tool with custom audit profiles and JSON report generation based on CIS Docker 1.6 Benchmark.

PINNED