Loading...

A Ruby-based tool that creates visual diagrams of AWS EC2 security group configurations to help understand network access patterns and security relationships.

A Ruby-based tool that creates visual diagrams of AWS EC2 security group configurations to help understand network access patterns and security relationships.
aws-security-viz is a visualization tool that generates graphical representations of AWS EC2 security group configurations. The tool analyzes security group ingress rules and creates visual diagrams to help understand network access patterns and security configurations. The tool supports both EC2 Classic and VPC security groups, allowing users to visualize their current AWS security posture. It can output diagrams in multiple formats supported by Graphviz, including SVG and other standard image formats. Users can generate visualizations directly by providing AWS credentials, or by using existing security group data exported from AWS CLI in JSON format. The tool includes a web-based navigator feature that creates interactive HTML visualizations for viewing security group relationships in a browser. Installation requires Ruby gems and Graphviz as dependencies. The tool can be run locally or through Docker containers for users who prefer not to install dependencies directly on their systems.
Common questions about aws-security-viz including features, pricing, alternatives, and user reviews.
aws-security-viz is A Ruby-based tool that creates visual diagrams of AWS EC2 security group configurations to help understand network access patterns and security relationships.. It is a Cloud Security solution designed to help security teams with Visualization, AWS, AWS Security.
An open-source framework that inventories and manages AWS resources across multiple accounts by collecting data via Cross Account Assume Roles and storing it in a centralized S3 bucket for analysis.
A graph-based tool for visualizing AWS access permissions and resource relationships to identify potential attack paths and privilege escalation opportunities.
Get strategic cybersecurity insights in your inbox