TrailScraper
TrailScraper is a command-line tool for extracting information from AWS CloudTrail logs and generating IAM policies based on actual API usage patterns.

TrailScraper
TrailScraper is a command-line tool for extracting information from AWS CloudTrail logs and generating IAM policies based on actual API usage patterns.
TrailScraper Description
TrailScraper is a command-line tool designed to extract and analyze information from AWS CloudTrail logs and work with IAM policies. The tool provides functionality to: - Query CloudTrail events using filters through the CloudTrail API - Download and analyze CloudTrail logs from both regular and organizational trails - Search through downloaded CloudTrail logs using various filters - Generate IAM policies based on CloudTrail records and actual API usage patterns - Extend existing IAM policies by analyzing CloudTrail data to identify required permissions - Filter events by parameters such as assumed role ARN, time ranges, and other criteria TrailScraper can be installed via Homebrew on macOS, pip for Python environments, or run directly using Docker. It requires Python 3.5 or higher and appropriate AWS credentials for accessing CloudTrail data. The tool outputs results in JSON format and supports time-based filtering with natural language expressions like "one hour ago" to "now" for specifying date ranges when querying CloudTrail events.
TrailScraper FAQ
Common questions about TrailScraper including features, pricing, alternatives, and user reviews.
TrailScraper is TrailScraper is a command-line tool for extracting information from AWS CloudTrail logs and generating IAM policies based on actual API usage patterns.. It is a Cloud Security solution designed to help security teams with Policy, AWS.