Skip to content
Enforce ownership and data security within AWS
Python JavaScript HTML CSS Makefile Shell Other
Branch: dev
Clone or download
Latest commit ad0fcd6 Jun 24, 2019
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
.github Documentation Improvements (#227) Jan 18, 2019
backend Bugfixes May 10, 2019
docs Documentation Improvements (#227) Jan 18, 2019
frontend Documentation Improvements (#227) Jan 18, 2019
plugins Bugfixes (#276) Jun 24, 2019
resources Docs improvements (#224) Dec 19, 2018
.gitignore Dev - Master (#219) Dec 13, 2018
.travis.yml Many fixes per testing (#255) Apr 18, 2019
LICENSE Initial release Nov 27, 2017
Makefile Fix installation process Jun 21, 2019
README.md Documentation Improvements (#227) Jan 18, 2019

README.md


License Release Travis CI
master Build Status
dev Build Status

Introduction

Cloud Inquisitor can be used to improve the security posture of your AWS footprint through:

  • monitoring AWS objects for ownership attribution, notifying account owners of unowned objects, and subsequently removing unowned AWS objects if ownership is not resolved.
  • detecting domain hijacking.
  • verifying security services such as Cloudtrail and VPC Flowlogs.
  • managing IAM policies across multiple accounts.

Please see the official docs here for more information on how to deploy, configure and operate Cloud Inquisitor in your environment.

If you would like to contribute, please check out our Contributing Guidelines.

You can’t perform that action at this time.