Listing Thumbnail

    Cloud Security Auditor

     Info
    Deployed on AWS
    The Cloud Security Auditor is a lightweight tool that consolidates and prioritizes security risks from enabled AWS services like GuardDuty, Amazon Inspector, AWS Config, and Access Analyzer into a single report. It leverages Lambda to execute the aggregation task on ECS, identifying threats such as API misuse, IAM misconfigurations, and container vulnerabilities. Findings are compiled into an HTML report, emailed to the user, and stored in S3 with severity rankings and remediation links for efficient risk management. Configuration is streamlined through a CloudFormation stack-just enter an email to receive the report. Alternatively, you can build and run the Docker image manually.

    Overview

    The Cloud Security Auditor is a lightweight solution that consolidates and prioritizes security findings from AWS services like GuardDuty, Amazon Inspector, AWS Config, and Access Analyzer into a single, actionable report. It detects threats such as high-risk API activity, SSH brute-force attacks, IAM misconfigurations, and container vulnerabilities. Deployed via AWS ECR, it runs as a lightweight Docker image and leverages Lambda to execute aggregation tasks on ECS. Findings are compiled into an HTML report, emailed to the user, and stored in Amazon S3 with severity rankings, contextual details, and remediation links for efficient risk management. Configuration is streamlined through a CloudFormation stack-simply enter an email to receive the report. Alternatively, you can build and run the Docker image manually. With one-click deployment and no need for ongoing monitoring, the Cloud Security Auditor simplifies cloud security management for AWS workloads.

    Highlights

    • Actionable Insights & Remediation Links: Provides clear, contextualized risk reports in Amazon S3, complete with affected resources, attacker details, and direct links for quick remediation.
    • Automated Risk Prioritization: Aggregates security findings from GuardDuty, IAM, ECR, and Access Analyzer, ranking them by severity to help teams focus on the most critical threats
    • Flexible Deployment: Easily deploy the Cloud Security Auditor via Cloudformation Stack or Docker Image.

    Details

    Delivery method

    Supported services

    Delivery option
    Cloud Security Auditor Container Image

    Latest version

    Operating system
    Linux

    Deployed on AWS

    Unlock automation with AI agent solutions

    Fast-track AI initiatives with agents, tools, and solutions from AWS Partners.
    AI Agents

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Cloud Security Auditor

     Info
    This product is available free of charge. Free subscriptions have no end date and may be canceled any time.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    Vendor refund policy

    NA

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Cloud Security Auditor Container Image

    Supported services: Learn more 
    • Amazon ECS
    • Amazon EKS
    • Amazon ECS Anywhere
    • Amazon EKS Anywhere
    Container image

    Containers are lightweight, portable execution environments that wrap server application software in a filesystem that includes everything it needs to run. Container applications run on supported container runtimes and orchestration services, such as Amazon Elastic Container Service (Amazon ECS) or Amazon Elastic Kubernetes Service (Amazon EKS). Both eliminate the need for you to install and operate your own container orchestration software by managing and scheduling containers on a scalable cluster of virtual machines.

    Version release notes

    CHANGELOG

    • Fix to aws config rules api call
    • Error catching
    • Report generation formatting

    Additional details

    Usage instructions

    The Cloud Security Auditor is a light security auditing tool that scans your AWS environment for compliance and security findings. It aggregates data from multiple AWS services.

    This tool is available on AWS Marketplace and can be deployed using the AWS Cloudformation Stack template or manually with the Docker container.

    The easiest and fastest option is to launch the Cloudformation template designed to run in us-east-1 region which leverages Lamda to run the Docker image via an ECS task. Select the recipient email and wait for the stack deployment completion to receive your report. Please check your spam folder as you might find the message in there.

    After that, you can delete the stack.

    Alternatively, you can setup the docker image yourself.

    The AWS Security Scanner requires the following IAM permissions to execute successfully:

    { "Effect": "Allow", "Principal": { "Service": "<service>" }, "Action": [ "config:GetComplianceSummaryByConfigRule", "access-analyzer:ListFindings", "access-analyzer:ListAnalyzers", "access-analyzer:CreateAnalyzer", "support:DescribeTrustedAdvisorChecks", "s3:PutObject", "s3:GetObject", "cloudtrail:LookupEvents", "inspector2:ListFindings", "guardduty:GetFindings", "guardduty:ListFindings", "guardduty:ListDetectors", "iam:GenerateCredentialReport", "iam:GetCredentialReport", "ecr:GetAuthorizationToken", "ecr:BatchGetImage", "ecr:BatchCheckLayerAvailability", "logs:CreateLogGroup", "logs:CreateLogStream", "logs:PutLogEvents" ], "Resource": "<resource>" }

    You can run the Docker image locally. To do so, follow below steps:

    1. Authenticate Docker to AWS Marketplace ECR runnning the following command: aws ecr get-login-password --region us-east-1 | docker login --username AWS --password-stdin 709825985650.dkr.ecr.us-east-1.amazonaws.com

    2. Download the image (make sure to select the latest version): docker pull 709825985650.dkr.ecr.us-east-1.amazonaws.com/zircontech/posture-auditor:v0.0.12

    3. Finally, run the image mounting your profile: docker run -it -v ~/.aws:/root/.aws --rm 709825985650.dkr.ecr.us-east-1.amazonaws.com/zircontech/posture-auditor:v0.0.12

    Resources

    Vendor resources

    Support

    Vendor support

    For any inquiries, please contact us at contact@zircon.tech . Our team provides support with a response time of up to 24 hours.

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Similar products

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 AWS reviews
    No customer reviews yet
    Be the first to review this product . We've partnered with PeerSpot to gather customer feedback. You can share your experience by writing or recording a review, or scheduling a call with a PeerSpot analyst.