AWSome CIS Checker

AWS-CIS-Checker Blog post

AWS is becoming one of the most prevalent cloud solutions in the world and, as a result, reviewing the configuration of AWS infrastructure is emerging as a necessary and regular assurance exercise for most organisations in the current security landscape.

The AWS configuration in itself entails a multitude of instances, containers, users, network groups, ACLs, etc, and therefore, the process of assessing them against best practice standards often becomes tedious and time-consuming.

AWSome CIS Checker ASCII art

AWSome CIS Checker is a tool which was conceptualised to solve these problems by automating the whole process of checking AWS configurations in accordance with one of the most widely used industry best practice guides: the CIS Benchmarks.

Based on Boto3, an AWS SDK for Python, AWSome CIS Checker uses the set of credentials provided on a local AWS Client configuration to verify if the elements of a certain configuration are compliant with CIS Benchmarks (currently v1.3.0). This covers all the basic checks but also allows for a “deeper” inspection of the configuration by investigating more obscure options which could facilitate further attacks vectors.

In addition, and here is where AWSome CIS Checker provides the most value, rather than generating random unmatched CIS checks as output, the tool also provides smart suggestions about issues by grouping them together into a comprehensive list (Storage, Logging, etc.) of security problems within the environment.

AWSome CIS Checker is dependant on some Python3 packages that can be easily installed by executing the following:

pip3 install -r requirements.txt

After all requirements have been satisfied, it supports multiple running options:

AWSome CIS Checker --cis running option output

AWSome CIS Checker --suggest running option output

You can download this new tool at: SECFORCE's Github repository

You may also be interested in...

Feb. 25, 2013

HTTP session fixation parameter pollution

Session fixation is an issue whereby an attacker is able to set a session token for a victim, and therefore being able to hijack the victim's session. HTTP pollution of a fixated cookie could potentially have devastating consequences.

See more
Dec. 5, 2012

Bring your own device (BYOD) security challenges

BYOD is a business policy which encourages employees to bring their personal devices (laptops, tablets, mobile phones) to the corporate environment and perform business tasks with them.

See more