cloud-security
Compare original and translation side by side
🇺🇸
Original
English🇨🇳
Translation
ChineseCloud Security Assessment
云安全评估
This skill enables comprehensive security testing of AWS, Azure, and GCP cloud environments using industry-standard tools like ScoutSuite, Prowler, and CloudSploit. It covers misconfiguration scanning, IAM analysis, and privilege escalation testing.
此技能可利用ScoutSuite、Prowler和CloudSploit等行业标准工具,对AWS、Azure和GCP云环境进行全面的安全测试,涵盖配置错误扫描、IAM分析和权限提升测试。
When to Use This Skill
何时使用此技能
This skill should be invoked when:
- Performing cloud security assessments
- Scanning for cloud misconfigurations
- Auditing IAM policies and permissions
- Testing storage bucket/blob permissions
- Identifying privilege escalation paths
- Checking CIS benchmark compliance
- Reviewing cloud security posture
在以下场景中应调用此技能:
- 执行云安全评估
- 扫描云配置错误
- 审计IAM策略与权限
- 测试存储桶/Blob权限
- 识别权限提升路径
- 检查CIS基准合规性
- 审查云安全态势
Trigger Phrases
触发短语
- "audit AWS security"
- "scan Azure for misconfigurations"
- "check GCP security"
- "test cloud IAM"
- "find S3 bucket issues"
- "cloud penetration test"
- "CIS benchmark audit"
- "audit AWS security"
- "scan Azure for misconfigurations"
- "check GCP security"
- "test cloud IAM"
- "find S3 bucket issues"
- "cloud penetration test"
- "CIS benchmark audit"
Prerequisites
前提条件
Required Tools
必备工具
| Tool | Purpose | Installation |
|---|---|---|
| ScoutSuite | Multi-cloud security auditing | |
| Prowler | AWS security assessment | |
| CloudSploit | Cloud security scanning | |
| Steampipe | SQL for cloud APIs | steampipe.io download |
| Pacu | AWS exploitation framework | |
| enumerate-iam | IAM enumeration | GitHub |
| S3Scanner | S3 bucket scanner | |
| 工具 | 用途 | 安装方式 |
|---|---|---|
| ScoutSuite | 多云安全审计 | |
| Prowler | AWS安全评估 | |
| CloudSploit | 云安全扫描 | |
| Steampipe | 云API的SQL工具 | steampipe.io 下载 |
| Pacu | AWS渗透框架 | |
| enumerate-iam | IAM枚举 | GitHub |
| S3Scanner | S3桶扫描器 | |
Authentication Setup
认证配置
AWS
AWS
bash
undefinedbash
undefinedConfigure AWS CLI
配置AWS CLI
aws configure
aws configure
Or use environment variables
或使用环境变量
export AWS_ACCESS_KEY_ID="AKIA..."
export AWS_SECRET_ACCESS_KEY="..."
export AWS_DEFAULT_REGION="us-east-1"
export AWS_ACCESS_KEY_ID="AKIA..."
export AWS_SECRET_ACCESS_KEY="..."
export AWS_DEFAULT_REGION="us-east-1"
Assume role for cross-account
跨账号扮演角色
aws sts assume-role --role-arn arn:aws:iam::ACCOUNT:role/ROLE --role-session-name audit
undefinedaws sts assume-role --role-arn arn:aws:iam::ACCOUNT:role/ROLE --role-session-name audit
undefinedAzure
Azure
bash
undefinedbash
undefinedLogin with CLI
使用CLI登录
az login
az login
Service Principal
服务主体登录
az login --service-principal -u CLIENT_ID -p SECRET --tenant TENANT_ID
az login --service-principal -u CLIENT_ID -p SECRET --tenant TENANT_ID
Set subscription
设置订阅
az account set --subscription "SUBSCRIPTION_ID"
undefinedaz account set --subscription "SUBSCRIPTION_ID"
undefinedGCP
GCP
bash
undefinedbash
undefinedApplication default credentials
应用默认凭证
gcloud auth application-default login
gcloud auth application-default login
Service account
服务账号
export GOOGLE_APPLICATION_CREDENTIALS="/path/to/service-account.json"
export GOOGLE_APPLICATION_CREDENTIALS="/path/to/service-account.json"
Set project
设置项目
gcloud config set project PROJECT_ID
---gcloud config set project PROJECT_ID
---Multi-Cloud Security Scanning
多云安全扫描
ScoutSuite (All Clouds)
ScoutSuite(全云支持)
bash
undefinedbash
undefinedAWS Assessment
AWS评估
scout aws --profile default --report-dir ./scout-aws
scout aws --profile default --report-dir ./scout-aws
Azure Assessment
Azure评估
scout azure --cli --report-dir ./scout-azure
scout azure --cli --report-dir ./scout-azure
GCP Assessment
GCP评估
scout gcp --project-id PROJECT_ID --report-dir ./scout-gcp
scout gcp --project-id PROJECT_ID --report-dir ./scout-gcp
Key findings to review:
需要重点查看的结果:
- Danger (red): Critical misconfigurations
- 危险(红色):严重配置错误
- Warning (orange): High-risk issues
- 警告(橙色):高风险问题
- Info: Informational findings
- 信息:参考性发现
undefinedundefinedQuick Start Workflow
快速开始流程
markdown
1. **Credentials Setup**
- Obtain read-only access credentials
- Verify minimum required permissions
2. **Initial Scan**
- Run ScoutSuite for comprehensive view
- Run Prowler/CloudSploit for specific checks
3. **Deep Dive**
- IAM policy analysis
- Storage permissions review
- Network security assessment
- Logging/monitoring verification
4. **Exploitation Testing** (if authorized)
- Privilege escalation attempts
- Lateral movement testing
- Data exfiltration simulation
5. **Reporting**
- Document findings with evidence
- Prioritize by risk and impact
- Provide remediation guidancemarkdown
1. **凭证配置**
- 获取只读访问凭证
- 验证最低所需权限
2. **初始扫描**
- 运行ScoutSuite获取全面视图
- 运行Prowler/CloudSploit进行专项检查
3. **深度分析**
- IAM策略分析
- 存储权限审查
- 网络安全评估
- 日志/监控验证
4. **渗透测试**(需授权)
- 权限提升尝试
- 横向移动测试
- 数据泄露模拟
5. **报告输出**
- 记录发现并附证据
- 按风险和影响优先级排序
- 提供修复指导AWS Security Testing
AWS安全测试
Prowler Assessment
Prowler评估
bash
undefinedbash
undefinedFull assessment
全面评估
prowler aws
prowler aws
Specific checks
专项检查
prowler aws --checks check11,check12,check13
prowler aws --checks check11,check12,check13
CIS Benchmark
CIS基准
prowler aws --compliance cis_2.0_aws
prowler aws --compliance cis_2.0_aws
Output formats
输出格式
prowler aws -M csv,html,json
prowler aws -M csv,html,json
Check categories
检查分类
prowler aws -g group1 # IAM
prowler aws -g group2 # Logging
prowler aws -g group3 # Monitoring
prowler aws -g group4 # Networking
undefinedprowler aws -g group1 # IAM
prowler aws -g group2 # 日志
prowler aws -g group3 # 监控
prowler aws -g group4 # 网络
undefinedIAM Analysis
IAM分析
bash
undefinedbash
undefinedEnumerate IAM permissions
枚举IAM权限
enumerate-iam --access-key AKIA... --secret-key ...
enumerate-iam --access-key AKIA... --secret-key ...
Check for privilege escalation
检查权限提升
Using Pacu
使用Pacu
pacu
import_keys --access-key AKIA... --secret-key ... run iam__enum_permissions run iam__privesc_scan
pacu
import_keys --access-key AKIA... --secret-key ... run iam__enum_permissions run iam__privesc_scan
Manual checks
手动检查
aws iam list-users
aws iam list-roles
aws iam list-policies --scope Local
aws iam get-account-authorization-details
undefinedaws iam list-users
aws iam list-roles
aws iam list-policies --scope Local
aws iam get-account-authorization-details
undefinedS3 Security
S3安全
bash
undefinedbash
undefinedScan for public buckets
扫描公共存储桶
s3scanner --bucket-file buckets.txt
s3scanner --bucket-file buckets.txt
Check bucket policies
检查存储桶策略
aws s3api get-bucket-policy --bucket BUCKET
aws s3api get-bucket-acl --bucket BUCKET
aws s3api get-public-access-block --bucket BUCKET
aws s3api get-bucket-policy --bucket BUCKET
aws s3api get-bucket-acl --bucket BUCKET
aws s3api get-public-access-block --bucket BUCKET
Test bucket permissions
测试存储桶权限
aws s3 ls s3://bucket-name --no-sign-request
aws s3 cp test.txt s3://bucket-name --no-sign-request
undefinedaws s3 ls s3://bucket-name --no-sign-request
aws s3 cp test.txt s3://bucket-name --no-sign-request
undefinedCommon AWS Misconfigurations
AWS常见配置错误
markdown
undefinedmarkdown
undefinedCritical
严重级别
- Public S3 buckets with sensitive data
- IAM users with admin access
- Root account used for daily operations
- No MFA on root or privileged accounts
- Hardcoded credentials in Lambda/EC2
- 包含敏感数据的公共S3桶
- 拥有管理员权限的IAM用户
- 日常操作使用根账号
- 根账号或特权账号未启用MFA
- Lambda/EC2中存在硬编码凭证
High
高风险级别
- Security groups with 0.0.0.0/0 ingress
- RDS instances publicly accessible
- CloudTrail not enabled
- Default VPC in use
- IAM policies with * resources
- 允许0.0.0.0/0入站的安全组
- 可公开访问的RDS实例
- 未启用CloudTrail
- 使用默认VPC
- 包含*资源的IAM策略
Medium
中风险级别
- S3 buckets without versioning
- EBS volumes unencrypted
- Access keys not rotated
- VPC flow logs disabled
- GuardDuty not enabled
undefined- 未启用版本控制的S3桶
- 未加密的EBS卷
- 未轮换的访问密钥
- 禁用的VPC流日志
- 未启用GuardDuty
undefinedAWS Privilege Escalation
AWS权限提升
markdown
undefinedmarkdown
undefinedCommon Paths
常见路径
-
iam:CreatePolicyVersion
- Create new policy version with admin access
- aws iam create-policy-version --policy-arn ARN --policy-document file://admin.json --set-as-default
-
iam:SetDefaultPolicyVersion
- Switch to overly permissive version
-
iam:AttachUserPolicy/AttachRolePolicy
- Attach AdministratorAccess
-
iam:CreateAccessKey
- Create keys for other users
-
iam:PassRole + Lambda/EC2
- Create Lambda with powerful role
- Launch EC2 with powerful role
-
sts:AssumeRole
- Assume more privileged role
-
lambda:UpdateFunctionCode
- Modify Lambda to exfiltrate credentials
-
iam:CreatePolicyVersion
- 创建具有管理员权限的新策略版本
- aws iam create-policy-version --policy-arn ARN --policy-document file://admin.json --set-as-default
-
iam:SetDefaultPolicyVersion
- 切换到权限过度宽松的版本
-
iam:AttachUserPolicy/AttachRolePolicy
- 附加AdministratorAccess权限
-
iam:CreateAccessKey
- 为其他用户创建密钥
-
iam:PassRole + Lambda/EC2
- 创建拥有高权限角色的Lambda
- 启动拥有高权限角色的EC2
-
sts:AssumeRole
- 扮演权限更高的角色
-
lambda:UpdateFunctionCode
- 修改Lambda代码以泄露凭证
Detection
检测方式
- CloudTrail logs
- IAM Access Analyzer
- GuardDuty findings
---- CloudTrail日志
- IAM Access Analyzer
- GuardDuty findings
---Azure Security Testing
Azure安全测试
Azure Security Assessment
Azure安全评估
bash
undefinedbash
undefinedUsing ScoutSuite
使用ScoutSuite
scout azure --cli
scout azure --cli
Azure native tools
Azure原生工具
az security assessment list
az security alert list
az security assessment list
az security alert list
Storage account checks
存储账号检查
az storage account list
az storage account show --name ACCOUNT --query allowBlobPublicAccess
undefinedaz storage account list
az storage account show --name ACCOUNT --query allowBlobPublicAccess
undefinedAzure Misconfigurations
Azure常见配置错误
markdown
undefinedmarkdown
undefinedCritical
严重级别
- Storage accounts with public access
- Key Vault access policies too permissive
- No MFA for privileged accounts
- Service Principal with Owner role
- Exposed management ports (RDP/SSH)
- 允许公共访问的存储账号
- 权限过度宽松的Key Vault访问策略
- 特权账号未启用MFA
- 拥有Owner角色的服务主体
- 暴露的管理端口(RDP/SSH)
High
高风险级别
- Network Security Groups too open
- Azure AD users with Global Admin
- Defender for Cloud disabled
- Diagnostic logs not configured
- Azure Policy not enforced
- 规则过于开放的网络安全组
- 拥有全局管理员权限的Azure AD用户
- 禁用Defender for Cloud
- 未配置诊断日志
- 未强制实施Azure Policy
Medium
中风险级别
- Managed disk encryption disabled
- Activity logs retention < 90 days
- Resource locks not applied
- Azure Bastion not used
- Just-in-time VM access disabled
undefined- 禁用的托管磁盘加密
- 活动日志保留期<90天
- 未应用资源锁
- 未使用Azure Bastion
- 禁用的VM即时访问
undefinedAzure AD / Entra ID Testing
Azure AD / Entra ID测试
bash
undefinedbash
undefinedUsing Azure CLI
使用Azure CLI
az ad user list
az ad group list
az ad app list
az role assignment list
az ad user list
az ad group list
az ad app list
az role assignment list
Check privileged roles
检查特权角色
az role assignment list --role "Owner"
az role assignment list --role "Contributor"
az role assignment list --role "User Access Administrator"
az role assignment list --role "Owner"
az role assignment list --role "Contributor"
az role assignment list --role "User Access Administrator"
Service Principal enumeration
服务主体枚举
az ad sp list --all
undefinedaz ad sp list --all
undefinedAzure Privilege Escalation
Azure权限提升
markdown
undefinedmarkdown
undefinedCommon Paths
常见路径
-
Automation Account RunAs
- Runbooks often have high privileges
- Check for stored credentials
-
Key Vault Access
- Extract secrets/certificates
- Impersonate service principals
-
Managed Identity Abuse
- IMDS endpoint token theft
- curl http://169.254.169.254/metadata/identity/oauth2/token
-
Resource Group Permissions
- Contributor can reset VM passwords
- Can add new users to VMs
-
Azure AD Roles
- Global Admin = full control
- Application Admin can create apps with high privileges
-
Subscription Permissions
- User Access Administrator can grant roles
----
自动化账号RunAs
- 运行手册通常拥有高权限
- 检查存储的凭证
-
Key Vault访问
- 提取密钥/证书
- 模拟服务主体
-
托管身份滥用
- IMDS端点令牌窃取
- curl http://169.254.169.254/metadata/identity/oauth2/token
-
资源组权限
- Contributor可重置VM密码
- 可向VM添加新用户
-
Azure AD角色
- 全局管理员=完全控制
- 应用程序管理员可创建拥有高权限的应用
-
订阅权限
- 用户访问管理员可授予角色
---GCP Security Testing
GCP安全测试
GCP Assessment
GCP评估
bash
undefinedbash
undefinedUsing ScoutSuite
使用ScoutSuite
scout gcp --project-id PROJECT_ID
scout gcp --project-id PROJECT_ID
Using gcloud
使用gcloud
gcloud projects get-iam-policy PROJECT_ID
gcloud compute instances list
gcloud storage buckets list
undefinedgcloud projects get-iam-policy PROJECT_ID
gcloud compute instances list
gcloud storage buckets list
undefinedGCP Misconfigurations
GCP常见配置错误
markdown
undefinedmarkdown
undefinedCritical
严重级别
- Public Cloud Storage buckets
- Service accounts with Owner role
- Default service account in use
- Public GCE instances
- No organization policies
- 公共Cloud Storage桶
- 拥有Owner角色的服务账号
- 使用默认服务账号
- 公共GCE实例
- 无组织策略
High
高风险级别
- Firewall rules too permissive
- Cloud Logging disabled
- No VPC Service Controls
- Compute Engine default encryption
- IAM binding with allUsers
- 规则过于宽松的防火墙
- 禁用Cloud Logging
- 未启用VPC服务控制
- Compute Engine默认加密
- 包含allUsers的IAM绑定
Medium
中风险级别
- Uniform bucket access not enforced
- Cloud Armor not configured
- Binary Authorization disabled
- Container Registry public
- Access Transparency not enabled
undefined- 未强制实施统一桶访问
- 未配置Cloud Armor
- 禁用Binary Authorization
- 公共容器注册表
- 未启用Access Transparency
undefinedGCP IAM Analysis
GCP IAM分析
bash
undefinedbash
undefinedList IAM bindings
列出IAM绑定
gcloud projects get-iam-policy PROJECT_ID --flatten="bindings[].members"
--format="table(bindings.role, bindings.members)"
--format="table(bindings.role, bindings.members)"
gcloud projects get-iam-policy PROJECT_ID --flatten="bindings[].members"
--format="table(bindings.role, bindings.members)"
--format="table(bindings.role, bindings.members)"
Service accounts
服务账号
gcloud iam service-accounts list
gcloud iam service-accounts get-iam-policy SA_EMAIL
gcloud iam service-accounts list
gcloud iam service-accounts get-iam-policy SA_EMAIL
Check for wide permissions
检查宽权限
gcloud asset search-all-iam-policies --scope=projects/PROJECT_ID
--query="resource:*" --flatten="policy.bindings[].members"
--query="resource:*" --flatten="policy.bindings[].members"
undefinedgcloud asset search-all-iam-policies --scope=projects/PROJECT_ID
--query="resource:*" --flatten="policy.bindings[].members"
--query="resource:*" --flatten="policy.bindings[].members"
undefinedGCP Privilege Escalation
GCP权限提升
markdown
undefinedmarkdown
undefinedCommon Paths
常见路径
-
Service Account Key Creation
- iam.serviceAccountKeys.create
- Create key for privileged SA
-
Service Account Impersonation
- iam.serviceAccounts.getAccessToken
- Act as another service account
-
Compute Instance Access
- SSH to instance with service account
- Metadata token extraction
-
Cloud Functions
- cloudfunctions.functions.update
- Modify function code to exfil credentials
-
GKE/Kubernetes
- Access workload identity
- Container escape to node
-
IAM Policy Modification
- resourcemanager.projects.setIamPolicy
- Grant self Owner role
-
服务账号密钥创建
- iam.serviceAccountKeys.create
- 为特权服务账号创建密钥
-
服务账号模拟
- iam.serviceAccounts.getAccessToken
- 扮演其他服务账号
-
计算实例访问
- SSH到带有服务账号的实例
- 元数据令牌提取
-
云函数
- cloudfunctions.functions.update
- 修改函数代码以泄露凭证
-
GKE/Kubernetes
- 访问工作负载身份
- 容器逃逸到节点
-
IAM策略修改
- resourcemanager.projects.setIamPolicy
- 为自己授予Owner角色
Metadata Exploitation
元数据利用
curl -H "Metadata-Flavor: Google"
http://metadata.google.internal/computeMetadata/v1/instance/service-accounts/default/token
http://metadata.google.internal/computeMetadata/v1/instance/service-accounts/default/token
---curl -H "Metadata-Flavor: Google"
http://metadata.google.internal/computeMetadata/v1/instance/service-accounts/default/token
http://metadata.google.internal/computeMetadata/v1/instance/service-accounts/default/token
---Steampipe Queries
Steampipe查询
Installation
安装
bash
undefinedbash
undefinedInstall Steampipe
安装Steampipe
brew install turbot/tap/steampipe
brew install turbot/tap/steampipe
Install plugins
安装插件
steampipe plugin install aws
steampipe plugin install azure
steampipe plugin install gcp
undefinedsteampipe plugin install aws
steampipe plugin install azure
steampipe plugin install gcp
undefinedSecurity Queries
安全查询
sql
-- AWS: Public S3 buckets
SELECT name, acl, policy
FROM aws_s3_bucket
WHERE bucket_policy_is_public = true;
-- AWS: Security groups with 0.0.0.0/0
SELECT group_id, group_name, ip_permissions
FROM aws_vpc_security_group_rule
WHERE cidr_ipv4 = '0.0.0.0/0';
-- AWS: IAM users without MFA
SELECT name, mfa_enabled
FROM aws_iam_user
WHERE mfa_enabled = false;
-- Azure: Storage accounts with public access
SELECT name, allow_blob_public_access
FROM azure_storage_account
WHERE allow_blob_public_access = true;
-- GCP: Service accounts with Owner
SELECT distinct member
FROM gcp_iam_policy_binding
WHERE role = 'roles/owner'
AND member LIKE 'serviceAccount:%';sql
-- AWS: 公共S3桶
SELECT name, acl, policy
FROM aws_s3_bucket
WHERE bucket_policy_is_public = true;
-- AWS: 允许0.0.0.0/0的安全组
SELECT group_id, group_name, ip_permissions
FROM aws_vpc_security_group_rule
WHERE cidr_ipv4 = '0.0.0.0/0';
-- AWS: 未启用MFA的IAM用户
SELECT name, mfa_enabled
FROM aws_iam_user
WHERE mfa_enabled = false;
-- Azure: 允许公共访问的存储账号
SELECT name, allow_blob_public_access
FROM azure_storage_account
WHERE allow_blob_public_access = true;
-- GCP: 拥有Owner角色的服务账号
SELECT distinct member
FROM gcp_iam_policy_binding
WHERE role = 'roles/owner'
AND member LIKE 'serviceAccount:%';CIS Benchmark Compliance
CIS基准合规
AWS CIS Checks
AWS CIS检查
bash
undefinedbash
undefinedUsing Prowler for CIS
使用Prowler进行CIS检查
prowler aws --compliance cis_2.0_aws
prowler aws --compliance cis_2.0_aws
Key CIS controls:
关键CIS控制项:
1.x - Identity and Access Management
1.x - 身份与访问管理
2.x - Storage
2.x - 存储
3.x - Logging
3.x - 日志
4.x - Monitoring
4.x - 监控
5.x - Networking
5.x - 网络
undefinedundefinedCompliance Frameworks
合规框架
| Framework | AWS | Azure | GCP |
|---|---|---|---|
| CIS Benchmark | v2.0 | v2.0 | v2.0 |
| SOC 2 | Prowler | Defender | SCC |
| PCI DSS | Config Rules | Policy | SCC |
| HIPAA | Config Rules | Policy | SCC |
| GDPR | Artifact | Compliance | SCC |
| 框架 | AWS | Azure | GCP |
|---|---|---|---|
| CIS Benchmark | v2.0 | v2.0 | v2.0 |
| SOC 2 | Prowler | Defender | SCC |
| PCI DSS | Config Rules | Policy | SCC |
| HIPAA | Config Rules | Policy | SCC |
| GDPR | Artifact | Compliance | SCC |
Cloud Metadata Services
云元数据服务
SSRF to Cloud Credentials
SSRF获取云凭证
markdown
undefinedmarkdown
undefinedAWS IMDS
AWS IMDS
Azure IMDS (requires header: Metadata: true)
Azure IMDS(需要请求头:Metadata: true)
GCP (requires header: Metadata-Flavor: Google)
GCP(需要请求头:Metadata-Flavor: Google)
Bypass techniques for SSRF filters
SSRF过滤器绕过技巧
http://[::ffff:169.254.169.254]
http://169.254.169.254.nip.io
http://0xA9FEA9FE # Decimal encoding
---http://[::ffff:169.254.169.254]
http://169.254.169.254.nip.io
http://0xA9FEA9FE # 十进制编码
---Reporting Template
报告模板
markdown
undefinedmarkdown
undefinedCloud Security Assessment Report
云安全评估报告
Executive Summary
执行摘要
- Cloud provider(s) assessed
- Assessment period
- Critical findings count
- Overall risk rating
- 评估的云服务商
- 评估周期
- 严重发现数量
- 整体风险评级
Scope
评估范围
- Accounts/subscriptions/projects
- Services in scope
- Testing methodology
- 账号/订阅/项目
- 涵盖的服务
- 测试方法
Findings
发现项
[CRITICAL] Finding Title
[严重] 发现标题
Cloud: AWS/Azure/GCP
Service: S3/IAM/Storage
CIS Control: 2.1.1
Description
Detailed description of the misconfiguration.
Evidence
- Screenshots
- CLI output
- Policy documents
Impact
- Data exposure risk
- Compliance violation
- Attack scenarios
Remediation
- Immediate steps
- Long-term fixes
- Monitoring recommendations
References
- CIS Benchmark
- Cloud documentation
---云服务商: AWS/Azure/GCP
服务: S3/IAM/存储
CIS控制项: 2.1.1
描述
配置错误的详细说明。
证据
- 截图
- CLI输出
- 策略文档
影响
- 数据泄露风险
- 合规违规
- 攻击场景
修复建议
- 立即执行步骤
- 长期修复方案
- 监控建议
参考资料
- CIS基准
- 云服务商文档
---Bundled Resources
附带资源
scripts/
scripts/
- - AWS enumeration automation
aws_enum.py - - Azure enumeration automation
azure_enum.py - - GCP enumeration automation
gcp_enum.py - - Privilege escalation checker
cloud_privesc.py - - Multi-cloud storage scanner
bucket_scanner.py
- - AWS枚举自动化脚本
aws_enum.py - - Azure枚举自动化脚本
azure_enum.py - - GCP枚举自动化脚本
gcp_enum.py - - 权限提升检查脚本
cloud_privesc.py - - 多云存储扫描器
bucket_scanner.py
references/
references/
- - AWS security best practices
aws_security.md - - Azure security best practices
azure_security.md - - GCP security best practices
gcp_security.md - - CIS benchmark mappings
cis_controls.md
- - AWS安全最佳实践
aws_security.md - - Azure安全最佳实践
azure_security.md - - GCP安全最佳实践
gcp_security.md - - CIS基准映射
cis_controls.md
checklists/
checklists/
- - AWS security audit checklist
aws_audit.md - - Azure security audit checklist
azure_audit.md - - GCP security audit checklist
gcp_audit.md
- - AWS安全审计清单
aws_audit.md - - Azure安全审计清单
azure_audit.md - - GCP安全审计清单
gcp_audit.md