Enforce ownership and data security within AWS
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Permalink
Failed to load latest commit information.
backend
docker
packer Fix backend-config.json format Sep 5, 2018
.gitignore Refactored docker configuration Mar 6, 2018
.travis.yml
LICENSE
Makefile Fix permission issue Sep 5, 2018
README.rst Adding a little more context to the README :) (#197) Oct 5, 2018

README.rst

Introduction

Cloud Inquisitor can be used to improve the security posture of your AWS footprint through:

  • monitoring AWS objects for ownership attribution, notifying account owners of unowned objects, and subsequently removing unowned AWS objects if ownership is not resolved.
  • detecting domain hijacking.
  • verifying security services such as Cloudtrail and VPC Flowlogs.
  • managing IAM policies across multiple accounts.

Please see the official docs here for more information on how to deploy, configure and operate Cloud Inquisitor in your environment.