Cloud Inquisitor is Under Construction
Cloud Inquisitor is currently undergoing a refresh to embrace newer cloud-native technologies while also realigning on its core vision.
You can follow our work in the branch
The project will no longer accept external PRs against the code base and will be grooming and closing any issues we do not believe will be pertanent to Cloud Inquisitors new alignment.
However, we will still accept feature requests in the form of an issue but will prioritize the replacement of target features within Cloud Inquisitor over new features.
Now back to the original Readme
Cloud Inquisitor can be used to improve the security posture of your AWS footprint through:
- monitoring AWS objects for ownership attribution, notifying account owners of unowned objects, and subsequently removing unowned AWS objects if ownership is not resolved.
- detecting domain hijacking.
- verifying security services such as Cloudtrail and VPC Flowlogs.
- managing IAM policies across multiple accounts.
Please see the official docs here for more information on how to deploy, configure and operate Cloud Inquisitor in your environment.
If you would like to contribute, please check out our Contributing Guidelines.