Cloud Inquisitor can be used to improve the security posture of your AWS footprint through:
- monitoring AWS objects for ownership attribution, notifying account owners of unowned objects, and subsequently removing unowned AWS objects if ownership is not resolved.
- detecting domain hijacking.
- verifying security services such as Cloudtrail and VPC Flowlogs.
- managing IAM policies across multiple accounts.
Please see the official docs here for more information on how to deploy, configure and operate Cloud Inquisitor in your environment.
If you would like to contribute, please check out our Contributing Guidelines.