{"id":5719,"date":"2019-07-14T12:59:45","date_gmt":"2019-07-14T07:29:45","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=5719"},"modified":"2019-07-14T12:59:45","modified_gmt":"2019-07-14T07:29:45","slug":"cloud-security-audit-aws","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/cloud-security-audit-aws\/","title":{"rendered":"Cloud Security Audit : A Command Line Security Audit Tool For Amazon Web Services"},"content":{"rendered":"\n<p><strong>Cloud Security Audit<\/strong> is a command line tool that scans for vulnerabilities in your AWS Account. In easy way you will be able to identify unsecure parts of your infrastructure and prepare your AWS account for security audit. <\/p>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>Installation<\/strong><\/p>\n\n\n\n<p>Currently it does not support any package managers, but the work is in progress.<\/p>\n\n\n\n<p><a href=\"https:\/\/github.com\/Appliscale\/cloud-security-audit#building-from-sources\"><\/a><strong>Building from sources<\/strong><\/p>\n\n\n\n<p>First of all you need to download it to your GO workspace:<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>$GOPATH $ go get github.com\/Appliscale\/cloud-security-audit <br>$GOPATH $ cd cloud-security-audit<\/strong><\/p>\n\n\n\n<p>Then build and install configuration for the application inside cloud-security-audit directory by executing:<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>cloud-security-audit $ make all<\/strong><\/p>\n\n\n\n<p style=\"text-align:center\"><strong>Also Read &#8211; <a href=\"https:\/\/kalilinuxtutorials.com\/darkscrape\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"DarkScrape : OSINT Tool For Scraping Dark Websites (opens in a new tab)\">DarkScrape : OSINT Tool For Scraping Dark Websites<\/a><\/strong><\/p>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><a href=\"https:\/\/github.com\/Appliscale\/cloud-security-audit#usage\"><\/a><strong>Usage<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/github.com\/Appliscale\/cloud-security-audit#initialising-session\"><\/a><strong>Initialising Session<\/strong><\/p>\n\n\n\n<p>If you&#8217;re using MFA you need to tell it to authenticate you before trying to connect by using flag&nbsp;<code>--mfa<\/code>. Example:<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>$ cloud-security-audit &#8211;service s3 &#8211;mfa &#8211;mfa-duration 3600 <\/strong><\/p>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><a href=\"https:\/\/github.com\/Appliscale\/cloud-security-audit#ec2-scan\"><\/a><strong>EC2 Scan<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/github.com\/Appliscale\/cloud-security-audit#how-to-use\"><\/a><strong>How to use<\/strong><\/p>\n\n\n\n<p>To perform audit on all EC2 instances, type:<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>$ cloud-security-audit &#8211;service ec2 <\/strong><\/p>\n\n\n\n<p>You can narrow the audit to a region, by using the flag&nbsp;<code><strong>-r<\/strong><\/code><strong>&nbsp;or&nbsp;<\/strong><code><strong>--region<\/strong><\/code><strong>. <\/strong>It also supports AWS profiles &#8211; to specify profile use the flag&nbsp;<code><strong>-p<\/strong><\/code><strong>&nbsp;or&nbsp;<\/strong><code><strong>--profile<\/strong><\/code><strong>.<\/strong><\/p>\n\n\n\n<p><strong>Docs<\/strong><\/p>\n\n\n\n<p>You can find more information about encryption in the following documentation:<\/p>\n\n\n\n<p><a href=\"https:\/\/docs.aws.amazon.com\/AWSEC2\/latest\/UserGuide\/EBSEncryption.html\">https:\/\/docs.aws.amazon.com\/AWSEC2\/latest\/UserGuide\/EBSEncryption.html<\/a><\/p>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>S3 Scan<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/github.com\/Appliscale\/cloud-security-audit#how-to-use-1\"><\/a><strong>How to use<\/strong><\/p>\n\n\n\n<p>To perform audit on all S3 buckets, type:<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>$ cloud-security-audit &#8211;service s3 <\/strong><\/p>\n\n\n\n<p>It supports AWS profiles &#8211; to specify profile use the flag&nbsp;<code><strong>-p<\/strong><\/code><strong>&nbsp;or&nbsp;<\/strong><code><strong>--profile<\/strong><\/code><strong>.<\/strong><\/p>\n\n\n\n<p><strong>Docs<\/strong><\/p>\n\n\n\n<p>You can find more about securing your S3&#8217;s in the following documentations:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/docs.aws.amazon.com\/AmazonS3\/latest\/dev\/serv-side-encryption.html\"><strong>https:\/\/docs.aws.amazon.com\/AmazonS3\/latest\/dev\/serv-side-encryption.html<\/strong><\/a><\/li><li><a href=\"http:\/\/ https:\/\/docs.aws.amazon.com\/AmazonS3\/latest\/dev\/ServerLogs.html\"><strong>https:\/\/docs.aws.amazon.com\/AmazonS3\/latest\/dev\/ServerLogs.html<\/strong><\/a><\/li><li><a href=\"http:\/\/ https:\/\/docs.aws.amazon.com\/AmazonS3\/latest\/user-guide\/server-access-logging.html\"><strong>https:\/\/docs.aws.amazon.com\/AmazonS3\/latest\/user-guide\/server-access-logging.html<\/strong><\/a><\/li><\/ul>\n\n\n\n<div class=\"wp-block-button aligncenter is-style-squared\"><a class=\"wp-block-button__link has-background has-vivid-cyan-blue-background-color\" href=\"https:\/\/github.com\/Appliscale\/cloud-security-audit\"><strong>Download<\/strong><\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cloud Security Audit is a command line tool that scans for vulnerabilities in your AWS Account. In easy way you will be able to identify unsecure parts of your infrastructure and prepare your AWS account for security audit. Installation Currently it does not support any package managers, but the work is in progress. Building from [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":15673,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/1.bp.blogspot.com\/-5deRXCojgPk\/XSd1IKF-mbI\/AAAAAAAABT4\/gBUGXvW9ww0hht9RQf4qCd5e8FKFTExBgCLcBGAs\/s1600\/AWS%25282%2529.png","fifu_image_alt":"Cloud Security Audit : A Command Line Security Audit Tool For Amazon Web Services","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[138,305,587],"class_list":["post-5719","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-amazon-web-services","tag-aws","tag-cloud-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cloud Security Audit : A Command Line Security Audit Tool For AWS<\/title>\n<meta name=\"description\" content=\"Cloud Security Audit is a command line tool that scans for vulnerabilities in your AWS Account. In easy way you will be able to identify unsecure parts\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/cloud-security-audit-aws\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cloud Security Audit : A Command Line Security Audit Tool For AWS\" \/>\n<meta property=\"og:description\" content=\"Cloud Security Audit is a command line tool that scans for vulnerabilities in your AWS Account. In easy way you will be able to identify unsecure parts\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/cloud-security-audit-aws\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2019-07-14T07:29:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/-5deRXCojgPk\/XSd1IKF-mbI\/AAAAAAAABT4\/gBUGXvW9ww0hht9RQf4qCd5e8FKFTExBgCLcBGAs\/s1600\/AWS%25282%2529.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/1.bp.blogspot.com\/-5deRXCojgPk\/XSd1IKF-mbI\/AAAAAAAABT4\/gBUGXvW9ww0hht9RQf4qCd5e8FKFTExBgCLcBGAs\/s1600\/AWS%25282%2529.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/cloud-security-audit-aws\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/cloud-security-audit-aws\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Cloud Security Audit : A Command Line Security Audit Tool For Amazon Web Services\",\"datePublished\":\"2019-07-14T07:29:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/cloud-security-audit-aws\/\"},\"wordCount\":293,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/cloud-security-audit-aws\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-5deRXCojgPk\/XSd1IKF-mbI\/AAAAAAAABT4\/gBUGXvW9ww0hht9RQf4qCd5e8FKFTExBgCLcBGAs\/s1600\/AWS%25282%2529.png\",\"keywords\":[\"Amazon Web Services\",\"AWS\",\"Cloud Security\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/cloud-security-audit-aws\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/cloud-security-audit-aws\/\",\"name\":\"Cloud Security Audit : A Command Line Security Audit Tool For AWS\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/cloud-security-audit-aws\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/cloud-security-audit-aws\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-5deRXCojgPk\/XSd1IKF-mbI\/AAAAAAAABT4\/gBUGXvW9ww0hht9RQf4qCd5e8FKFTExBgCLcBGAs\/s1600\/AWS%25282%2529.png\",\"datePublished\":\"2019-07-14T07:29:45+00:00\",\"description\":\"Cloud Security Audit is a command line tool that scans for vulnerabilities in your AWS Account. In easy way you will be able to identify unsecure parts\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/cloud-security-audit-aws\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/cloud-security-audit-aws\/#primaryimage\",\"url\":\"https:\/\/1.bp.blogspot.com\/-5deRXCojgPk\/XSd1IKF-mbI\/AAAAAAAABT4\/gBUGXvW9ww0hht9RQf4qCd5e8FKFTExBgCLcBGAs\/s1600\/AWS%25282%2529.png\",\"contentUrl\":\"https:\/\/1.bp.blogspot.com\/-5deRXCojgPk\/XSd1IKF-mbI\/AAAAAAAABT4\/gBUGXvW9ww0hht9RQf4qCd5e8FKFTExBgCLcBGAs\/s1600\/AWS%25282%2529.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cloud Security Audit : A Command Line Security Audit Tool For AWS","description":"Cloud Security Audit is a command line tool that scans for vulnerabilities in your AWS Account. In easy way you will be able to identify unsecure parts","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/cloud-security-audit-aws\/","og_locale":"en_US","og_type":"article","og_title":"Cloud Security Audit : A Command Line Security Audit Tool For AWS","og_description":"Cloud Security Audit is a command line tool that scans for vulnerabilities in your AWS Account. In easy way you will be able to identify unsecure parts","og_url":"https:\/\/kalilinuxtutorials.com\/cloud-security-audit-aws\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2019-07-14T07:29:45+00:00","og_image":[{"url":"https:\/\/1.bp.blogspot.com\/-5deRXCojgPk\/XSd1IKF-mbI\/AAAAAAAABT4\/gBUGXvW9ww0hht9RQf4qCd5e8FKFTExBgCLcBGAs\/s1600\/AWS%25282%2529.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/1.bp.blogspot.com\/-5deRXCojgPk\/XSd1IKF-mbI\/AAAAAAAABT4\/gBUGXvW9ww0hht9RQf4qCd5e8FKFTExBgCLcBGAs\/s1600\/AWS%25282%2529.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/cloud-security-audit-aws\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/cloud-security-audit-aws\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Cloud Security Audit : A Command Line Security Audit Tool For Amazon Web Services","datePublished":"2019-07-14T07:29:45+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/cloud-security-audit-aws\/"},"wordCount":293,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/cloud-security-audit-aws\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-5deRXCojgPk\/XSd1IKF-mbI\/AAAAAAAABT4\/gBUGXvW9ww0hht9RQf4qCd5e8FKFTExBgCLcBGAs\/s1600\/AWS%25282%2529.png","keywords":["Amazon Web Services","AWS","Cloud Security"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/cloud-security-audit-aws\/","url":"https:\/\/kalilinuxtutorials.com\/cloud-security-audit-aws\/","name":"Cloud Security Audit : A Command Line Security Audit Tool For AWS","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/cloud-security-audit-aws\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/cloud-security-audit-aws\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-5deRXCojgPk\/XSd1IKF-mbI\/AAAAAAAABT4\/gBUGXvW9ww0hht9RQf4qCd5e8FKFTExBgCLcBGAs\/s1600\/AWS%25282%2529.png","datePublished":"2019-07-14T07:29:45+00:00","description":"Cloud Security Audit is a command line tool that scans for vulnerabilities in your AWS Account. In easy way you will be able to identify unsecure parts","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/cloud-security-audit-aws\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/cloud-security-audit-aws\/#primaryimage","url":"https:\/\/1.bp.blogspot.com\/-5deRXCojgPk\/XSd1IKF-mbI\/AAAAAAAABT4\/gBUGXvW9ww0hht9RQf4qCd5e8FKFTExBgCLcBGAs\/s1600\/AWS%25282%2529.png","contentUrl":"https:\/\/1.bp.blogspot.com\/-5deRXCojgPk\/XSd1IKF-mbI\/AAAAAAAABT4\/gBUGXvW9ww0hht9RQf4qCd5e8FKFTExBgCLcBGAs\/s1600\/AWS%25282%2529.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/1.bp.blogspot.com\/-5deRXCojgPk\/XSd1IKF-mbI\/AAAAAAAABT4\/gBUGXvW9ww0hht9RQf4qCd5e8FKFTExBgCLcBGAs\/s1600\/AWS%25282%2529.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":19671,"url":"https:\/\/kalilinuxtutorials.com\/domain-protect\/","url_meta":{"origin":5719,"position":0},"title":"Domain-Protect : Protect Against Subdomain Takeover","author":"R K","date":"October 28, 2021","format":false,"excerpt":"Domain-Protect scans Amazon Route53 across an AWS Organization for domain records vulnerable to takeovervulnerable domains in Google Cloud DNS can be detected by\u00a0Domain Protect for GCP deploy to security audit account scan your entire AWS Organization receive alerts by Slack or email or manually scan from your laptop Subdomain Detection\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEiDCv1BHrBUFEu1Gb5YeSLjQ3F-VqYMGhaHTYib9mKHPM-vGYpMuBeLzE_24nZpXWGV8LakGinNbaOqH9kopsFIToW2XCsYXOy-IV57oT1M1X5NgjBiXK1plY1gbQ4LmMxTbtK8m2nzoYOewtETPL9zgTGgV5KPKnyaVb63bRr7HDsBbKI81hBrGm68=s755","width":350,"height":200,"srcset":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEiDCv1BHrBUFEu1Gb5YeSLjQ3F-VqYMGhaHTYib9mKHPM-vGYpMuBeLzE_24nZpXWGV8LakGinNbaOqH9kopsFIToW2XCsYXOy-IV57oT1M1X5NgjBiXK1plY1gbQ4LmMxTbtK8m2nzoYOewtETPL9zgTGgV5KPKnyaVb63bRr7HDsBbKI81hBrGm68=s755 1x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEiDCv1BHrBUFEu1Gb5YeSLjQ3F-VqYMGhaHTYib9mKHPM-vGYpMuBeLzE_24nZpXWGV8LakGinNbaOqH9kopsFIToW2XCsYXOy-IV57oT1M1X5NgjBiXK1plY1gbQ4LmMxTbtK8m2nzoYOewtETPL9zgTGgV5KPKnyaVb63bRr7HDsBbKI81hBrGm68=s755 1.5x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEiDCv1BHrBUFEu1Gb5YeSLjQ3F-VqYMGhaHTYib9mKHPM-vGYpMuBeLzE_24nZpXWGV8LakGinNbaOqH9kopsFIToW2XCsYXOy-IV57oT1M1X5NgjBiXK1plY1gbQ4LmMxTbtK8m2nzoYOewtETPL9zgTGgV5KPKnyaVb63bRr7HDsBbKI81hBrGm68=s755 2x"},"classes":[]},{"id":27406,"url":"https:\/\/kalilinuxtutorials.com\/lunar-2\/","url_meta":{"origin":5719,"position":1},"title":"Lunar : UNIX Security Auditing Tool","author":"R K","date":"October 5, 2022","format":false,"excerpt":"lunar, Lockdown UNix Auditing and Reporting Version Current version 8.0.5 Refer to lunar.sh and changelog for more up to date version information Introduction This scripts generates a scored audit report of a Unix host's security. It is based on the CIS and other frameworks. Where possible there are references to\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhZOAhn7z1bK94KL4ZL0pLApkgoLipPaDDVR4m46mQUIZI2PV7gVzZBknwfcEzsHr91DcMECYE1UaX3fHvOu7161EB57WjaxryTVlgyP5MjSD7ex-YlipG7VKjIgjuFjRWk1kMQ1OI3PesrfEidB21RQnUg_eRvHKGy6D4UizCUB_seXCzeVMzjvOBe\/s559\/lunar%20%281%29.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhZOAhn7z1bK94KL4ZL0pLApkgoLipPaDDVR4m46mQUIZI2PV7gVzZBknwfcEzsHr91DcMECYE1UaX3fHvOu7161EB57WjaxryTVlgyP5MjSD7ex-YlipG7VKjIgjuFjRWk1kMQ1OI3PesrfEidB21RQnUg_eRvHKGy6D4UizCUB_seXCzeVMzjvOBe\/s559\/lunar%20%281%29.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhZOAhn7z1bK94KL4ZL0pLApkgoLipPaDDVR4m46mQUIZI2PV7gVzZBknwfcEzsHr91DcMECYE1UaX3fHvOu7161EB57WjaxryTVlgyP5MjSD7ex-YlipG7VKjIgjuFjRWk1kMQ1OI3PesrfEidB21RQnUg_eRvHKGy6D4UizCUB_seXCzeVMzjvOBe\/s559\/lunar%20%281%29.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":6642,"url":"https:\/\/kalilinuxtutorials.com\/scout-suite-multi-cloud-security-auditing-tool\/","url_meta":{"origin":5719,"position":2},"title":"Scout Suite : Multi-Cloud Security Auditing Tool","author":"R K","date":"September 28, 2019","format":false,"excerpt":"Scout Suite is an open source multi-cloud security-auditing tool, which enables security posture assessment of cloud environments. Using the APIs exposed by cloud providers, Scout Suite gathers configuration data for manual inspection and highlights risk areas. Rather than going through dozens of pages on the web consoles, Scout Suite presents\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":6234,"url":"https:\/\/kalilinuxtutorials.com\/dow-jones-hammer\/","url_meta":{"origin":5719,"position":3},"title":"Dow Jones Hammer : Protect The Cloud With The Power Of The Cloud(AWS)","author":"R K","date":"August 20, 2019","format":false,"excerpt":"Dow Jones Hammer is a multi-account cloud security tool for AWS. It identifies misconfigurations and insecure data exposures within most popular AWS resources, across all regions and accounts. Dow Jones Hammer has near real-time reporting capabilities (e.g. JIRA, Slack) to provide quick feedback to engineers and can perform auto-remediation of\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":33631,"url":"https:\/\/kalilinuxtutorials.com\/aws-amazon-web-services\/","url_meta":{"origin":5719,"position":4},"title":"\u00a0AWS &#8211; Amazon Web Services","author":"Varshini","date":"July 3, 2024","format":false,"excerpt":"Elastic Kubernetes Service (EKS)\u00a0is a managed kubernetes offering by AWS. Discover how to harness the power of Amazon Web Services (AWS) to deploy a robust, scalable Kubernetes environment. This tutorial guides you through setting up an EKS cluster, configuring essential tools like eksctl, kubectl, and awscli, and deploying the Kubernetes\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjippQZAjatP-xQ7mNOD4VshNcq4zgpcLGNZOtQdoHZIhaNkfqUIZraM3-UAjZ9Gx3YzQjdS_6YNU-ZedyUhibXDjMtJqIn01UEC9VVs6ZXQ39nI75M_6fL0ytJIbSv72LHtkqt0qSarlJGjxrUVmVC9DOblIXqOgM0zhGGr_abbMXb3qaHTMGQbS4v6ezi\/s16000\/_AWS%20-%20Amazon%20Web%20Services.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjippQZAjatP-xQ7mNOD4VshNcq4zgpcLGNZOtQdoHZIhaNkfqUIZraM3-UAjZ9Gx3YzQjdS_6YNU-ZedyUhibXDjMtJqIn01UEC9VVs6ZXQ39nI75M_6fL0ytJIbSv72LHtkqt0qSarlJGjxrUVmVC9DOblIXqOgM0zhGGr_abbMXb3qaHTMGQbS4v6ezi\/s16000\/_AWS%20-%20Amazon%20Web%20Services.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjippQZAjatP-xQ7mNOD4VshNcq4zgpcLGNZOtQdoHZIhaNkfqUIZraM3-UAjZ9Gx3YzQjdS_6YNU-ZedyUhibXDjMtJqIn01UEC9VVs6ZXQ39nI75M_6fL0ytJIbSv72LHtkqt0qSarlJGjxrUVmVC9DOblIXqOgM0zhGGr_abbMXb3qaHTMGQbS4v6ezi\/s16000\/_AWS%20-%20Amazon%20Web%20Services.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjippQZAjatP-xQ7mNOD4VshNcq4zgpcLGNZOtQdoHZIhaNkfqUIZraM3-UAjZ9Gx3YzQjdS_6YNU-ZedyUhibXDjMtJqIn01UEC9VVs6ZXQ39nI75M_6fL0ytJIbSv72LHtkqt0qSarlJGjxrUVmVC9DOblIXqOgM0zhGGr_abbMXb3qaHTMGQbS4v6ezi\/s16000\/_AWS%20-%20Amazon%20Web%20Services.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjippQZAjatP-xQ7mNOD4VshNcq4zgpcLGNZOtQdoHZIhaNkfqUIZraM3-UAjZ9Gx3YzQjdS_6YNU-ZedyUhibXDjMtJqIn01UEC9VVs6ZXQ39nI75M_6fL0ytJIbSv72LHtkqt0qSarlJGjxrUVmVC9DOblIXqOgM0zhGGr_abbMXb3qaHTMGQbS4v6ezi\/s16000\/_AWS%20-%20Amazon%20Web%20Services.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjippQZAjatP-xQ7mNOD4VshNcq4zgpcLGNZOtQdoHZIhaNkfqUIZraM3-UAjZ9Gx3YzQjdS_6YNU-ZedyUhibXDjMtJqIn01UEC9VVs6ZXQ39nI75M_6fL0ytJIbSv72LHtkqt0qSarlJGjxrUVmVC9DOblIXqOgM0zhGGr_abbMXb3qaHTMGQbS4v6ezi\/s16000\/_AWS%20-%20Amazon%20Web%20Services.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":6738,"url":"https:\/\/kalilinuxtutorials.com\/terraform-aws-secure-baseline\/","url_meta":{"origin":5719,"position":5},"title":"Terraform AWS Secure Baseline :  To Set Up Your AWS Account","author":"R K","date":"October 3, 2019","format":false,"excerpt":"Terraform Aws Secure Baseline is a terraform module to set up your AWS account with the secure baseline configuration based on CIS Amazon Web Services Foundations. Terraform Module Registry A terraform module to set up your AWS account with the reasonably secure configuration baseline. Most configurations are based on CIS\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/5719","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=5719"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/5719\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/15673"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=5719"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=5719"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=5719"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}