Run individual configuration, compliance and security controls or full compliance benchmarks for CIS and PCI across all your AWS accounts.
Can you write SQL and HCL? Fork this repo as the basis for your own custom compliance checks!
- Get started →
- Documentation: Controls
- Community: Slack Channel
- Get involved: Issues
Install the AWS plugin with Steampipe:
steampipe plugin install aws
Clone:
git clone git@github.com:turbot/steampipe-mod-aws-compliance
cd steampipe-mod-aws-compliance
Run all benchmarks:
steampipe check all
Run a benchmark:
steampipe check benchmark.cis_v130
Run a specific control:
steampipe check control.cis_v130_2_1_1
Have an idea but aren't sure how to get started? Join our Slack community → Mod developer guide →
Prerequisites:
- Steampipe installed
- Steampipe AWS plugin installed (see above)
Fork: Click on the GitHub Fork Widget. (Don't forget to ⭐ the repo!)
Clone:
- Change the current working directory to the location where you want to put the cloned directory on your local filesystem.
- Type the clone command below inserting your GitHub username instead of
YOUR-USERNAME
:
git clone git@github.com:YOUR-USERNAME/steampipe-mod-aws-compliance
cd steampipe-mod-aws-compliance
View controls and benchmarks:
steampipe query "select resource_name from steampipe_control;"
steampipe query
> select
resource_name
from
steampipe_benchmark
order by
resource_name;
Thanks for getting involved! We would love to have you join our Slack community and hang out with other Mod developers.
Please see the contribution guidelines and our code of conduct. All contributions are subject to the MPL-2.0 open source license.
help wanted
issues: