Habilidades aws-compliance-checker
📦

aws-compliance-checker

Riesgo bajo ⚙️ Comandos externos🌐 Acceso a red

Check AWS Compliance Against Industry Standards

Manually auditing AWS environments against CIS, PCI-DSS, HIPAA, and SOC 2 benchmarks is time-consuming and error-prone. The AWS Compliance Checker skill automates compliance validation by running AWS API checks and generating detailed compliance reports.

Soporta: Claude Codex Code(CC)
⚠️ 63 Deficiente
1

Descargar el ZIP de la skill

2

Subir en Claude

Ve a Configuración → Capacidades → Skills → Subir skill

3

Activa y empieza a usar

Pruébalo

Usando "aws-compliance-checker". Run CIS AWS Foundations compliance check

Resultado esperado:

CIS IAM Compliance Checks
1.1: Root password last used: 2024-01-15T10:30:00Z
1.2: Root MFA enabled: true
1.3: Checking for unused credentials (>90 days)...
⚠️ user-1: Key AKIAIOSFODNN7EXAMPLE is 120 days old
1.4: Checking access key age...
⚠️ admin-user: Key AKIAJZ7EXAMPLE is 95 days old
1.5-1.11: Checking password policy...
✓ Password policy exists

CIS Logging Compliance Checks
2.1: Checking CloudTrail...
Trail: main-trail
Multi-region: true
Log validation: true
Is logging: true
2.3: Checking CloudTrail S3 bucket access...
✓ my-cloudtrail-bucket: Not public

Score: 85%

Usando "aws-compliance-checker". Check security groups for public access

Resultado esperado:

Security Group Audit Results:
⚠️ sg-0123456789abcdef0: web-server allows SSH from 0.0.0.0/0
⚠️ sg-0abcdef1234567890: database allows RDP from 0.0.0.0/0
✓ default: No overly permissive rules
✓ sg-0fedcba9876543210: api-server restricted to specific CIDR

Summary: 2 security groups with public access issues found

Auditoría de seguridad

Riesgo bajo
v1 • 2/24/2026

Static analysis flagged 83 potential issues but manual review confirms all are false positives. External commands are legitimate AWS CLI invocations for compliance checks. Network patterns are standard CIDR notation (0.0.0.0/0) for security group auditing and legitimate documentation URLs. C2 keywords and weak crypto flags are triggered by normal security compliance terminology. This is a defensive security tool for AWS compliance auditing.

1
Archivos escaneados
517
Líneas analizadas
7
hallazgos
1
Auditorías totales

Problemas de riesgo alto (3)

External Command Execution (False Positive)
42 instances of shell command execution flagged by static analyzer. All are legitimate AWS CLI commands used for compliance auditing. The skill provides example bash scripts that use 'aws' CLI to check IAM, CloudTrail, Security Groups, etc. This is expected functionality for a compliance checking tool.
C2 Keywords Flag (False Positive)
Static analyzer flagged 'C2 keywords' at multiple lines. Manual review shows these are normal security compliance terms like 'check', 'command', 'control', 'console' used in legitimate compliance checking context.
Weak Cryptographic Algorithm Flag (False Positive)
Static analyzer flagged 'weak cryptographic algorithm' at multiple lines. Manual review shows these are recommendations for strong encryption (TLS 1.2+, proper encryption) in compliance checks.
Problemas de riesgo medio (2)
Network URL References
Hardcoded URLs at lines 514-516 point to CIS, AWS Security Hub, and AWS Compliance documentation. These are legitimate reference links, not malicious network activity.
CIDR Notation in Security Group Checks
Lines 277-293 contain 0.0.0.0/0 CIDR notation used to detect overly permissive security groups. This is standard compliance checking practice, not actual hardcoded IPs.
Auditado por: claude

Puntuación de calidad

38
Arquitectura
100
Mantenibilidad
85
Contenido
50
Comunidad
50
Seguridad
78
Cumplimiento de la especificación

Lo que puedes crear

Pre-Audit Compliance Validation

Run full compliance checks before external audits to identify and fix issues proactively.

Continuous Compliance Monitoring

Integrate into CI/CD pipelines or scheduled jobs to maintain ongoing compliance posture.

Multi-Framework Compliance Reporting

Generate unified reports covering CIS, PCI-DSS, HIPAA, and SOC 2 in a single run.

Prueba estos prompts

Run CIS Benchmark Check
Run CIS AWS Foundations compliance check on my AWS account
Generate PCI-DSS Report
Generate a PCI-DSS compliance report for my AWS environment
Check HIPAA Compliance
Check HIPAA compliance for my AWS account, focusing on encryption and access controls
Audit Security Groups
Audit all security groups in my AWS account for overly permissive rules and generate a report

Mejores prácticas

  • Run compliance checks regularly (weekly or monthly) to catch configuration drift early
  • Use AWS Organizations to run checks across all accounts in your organization
  • Document exceptions and remediation plans for any failed checks
  • Integrate with AWS Security Hub for centralized compliance dashboards

Evitar

  • Running checks only once before audits instead of continuously monitoring
  • Ignoring warnings about unused credentials or overly permissive access
  • Relying solely on automated checks without manual security reviews
  • Not maintaining evidence documentation for audit trails

Preguntas frecuentes

What AWS permissions are needed to run these checks?
The skill requires read-only access to IAM, EC2, CloudTrail, CloudWatch, S3, and AWS Config. Use IAM read-only policies or the SecurityAudit AWS managed policy.
Does this skill automatically fix compliance issues?
No, this skill only detects and reports compliance issues. Remediation requires manual action or separate automation scripts.
Which compliance frameworks are supported?
Currently supports CIS AWS Foundations Benchmark, PCI-DSS, HIPAA, and SOC 2. Each framework has representative checks covering key requirements.
Can I run checks across multiple AWS accounts?
Yes, you can use AWS Organizations with cross-account roles or run the checks separately in each account and aggregate results.
How often should compliance checks be run?
Best practice is to run checks at least weekly, with continuous monitoring via AWS Config Rules for production environments.
What happens if AWS API calls fail during a check?
The check will report partial results with error messages indicating which checks could not complete due to permission issues or service unavailability.

Detalles del desarrollador

Estructura de archivos

📄 SKILL.md