||1 year ago|
|audit||1 year ago|
|docs||1 year ago|
|.chglog.yml||1 year ago|
|.gitignore||1 year ago|
|LICENSE||1 year ago|
|README.md||1 year ago|
|changelog.yml||1 year ago|
|go.mod||1 year ago|
|go.sum||1 year ago|
|main.go||1 year ago|
|nfpm.yaml||1 year ago|
Security Groups Audit
This command line application will process each Security group and check for unnecessary ports that are open.
- Describe Security Groups
- Describe Security Groups with Filters
- Describe Security Groups of Running Instances
- Check for any 0.0.0.0/0 or ::/0 values other than 80 and 443
- Check for All Traffic open as well, ports 0-65535
There are some options available as of now.
- -csv for printing out in CSV format, this can be helpful for showing it in reports.
- -no-color for disabling the color output.
- -profile and -region for AWS Profile (credentials) and Region to use.
$ sg-audit -h Usage of sg-audit: -csv Output in CSV Format -no-color No Colored output -profile string AWS Profile to use -region string AWS Region to use
- BOLD indicates atleast one instance is attached with this security group
[CRIT]or the line in red indicates the rule is open to internet
[WARN]or the line in yellow indicates the rule is all ports are open to one of the IP
[SKIP]or the line in cyan indicates the rule is marked as skip in Rule Description
[CHCK]or the line in green indicates the rule is marked as checked in Rule Description
There are repositories available for RHEL/Debian based systems. More information can be found on https://repo.dcpri.me and installation is simply
sudo apt install sg-audit # debian # or sudo yum install sg-audit # older RHEL based OS # or sudo dnf install sg-audit # other RHEL based OS
For macOS download the binary from Releases tab. Won't recommend the arm64 build yet.