aws-compliance-checker
Check AWS Compliance Against Industry Standards
Manually auditing AWS environments against CIS, PCI-DSS, HIPAA, and SOC 2 benchmarks is time-consuming and error-prone. The AWS Compliance Checker skill automates compliance validation by running AWS API checks and generating detailed compliance reports.
Descargar el ZIP de la skill
Subir en Claude
Ve a Configuración → Capacidades → Skills → Subir skill
Activa y empieza a usar
Pruébalo
Usando "aws-compliance-checker". Run CIS AWS Foundations compliance check
Resultado esperado:
CIS IAM Compliance Checks
1.1: Root password last used: 2024-01-15T10:30:00Z
1.2: Root MFA enabled: true
1.3: Checking for unused credentials (>90 days)...
⚠️ user-1: Key AKIAIOSFODNN7EXAMPLE is 120 days old
1.4: Checking access key age...
⚠️ admin-user: Key AKIAJZ7EXAMPLE is 95 days old
1.5-1.11: Checking password policy...
✓ Password policy exists
CIS Logging Compliance Checks
2.1: Checking CloudTrail...
Trail: main-trail
Multi-region: true
Log validation: true
Is logging: true
2.3: Checking CloudTrail S3 bucket access...
✓ my-cloudtrail-bucket: Not public
Score: 85%
Usando "aws-compliance-checker". Check security groups for public access
Resultado esperado:
Security Group Audit Results:
⚠️ sg-0123456789abcdef0: web-server allows SSH from 0.0.0.0/0
⚠️ sg-0abcdef1234567890: database allows RDP from 0.0.0.0/0
✓ default: No overly permissive rules
✓ sg-0fedcba9876543210: api-server restricted to specific CIDR
Summary: 2 security groups with public access issues found
Auditoría de seguridad
Riesgo bajoStatic analysis flagged 83 potential issues but manual review confirms all are false positives. External commands are legitimate AWS CLI invocations for compliance checks. Network patterns are standard CIDR notation (0.0.0.0/0) for security group auditing and legitimate documentation URLs. C2 keywords and weak crypto flags are triggered by normal security compliance terminology. This is a defensive security tool for AWS compliance auditing.
Problemas de riesgo alto (3)
Problemas de riesgo medio (2)
Factores de riesgo
⚙️ Comandos externos (42)
Puntuación de calidad
Lo que puedes crear
Pre-Audit Compliance Validation
Run full compliance checks before external audits to identify and fix issues proactively.
Continuous Compliance Monitoring
Integrate into CI/CD pipelines or scheduled jobs to maintain ongoing compliance posture.
Multi-Framework Compliance Reporting
Generate unified reports covering CIS, PCI-DSS, HIPAA, and SOC 2 in a single run.
Prueba estos prompts
Run CIS AWS Foundations compliance check on my AWS account
Generate a PCI-DSS compliance report for my AWS environment
Check HIPAA compliance for my AWS account, focusing on encryption and access controls
Audit all security groups in my AWS account for overly permissive rules and generate a report
Mejores prácticas
- Run compliance checks regularly (weekly or monthly) to catch configuration drift early
- Use AWS Organizations to run checks across all accounts in your organization
- Document exceptions and remediation plans for any failed checks
- Integrate with AWS Security Hub for centralized compliance dashboards
Evitar
- Running checks only once before audits instead of continuously monitoring
- Ignoring warnings about unused credentials or overly permissive access
- Relying solely on automated checks without manual security reviews
- Not maintaining evidence documentation for audit trails
Preguntas frecuentes
What AWS permissions are needed to run these checks?
Does this skill automatically fix compliance issues?
Which compliance frameworks are supported?
Can I run checks across multiple AWS accounts?
How often should compliance checks be run?
What happens if AWS API calls fail during a check?
Detalles del desarrollador
Autor
sickn33Licencia
MIT
Repositorio
https://github.com/sickn33/antigravity-awesome-skills/tree/main/skills/security/aws-compliance-checkerRef.
main
Estructura de archivos
📄 SKILL.md