Habilidades aws-security-audit
🛡️

aws-security-audit

Seguro ⚙️ Comandos externos

Audit AWS Security Posture

Security teams struggle to identify AWS misconfigurations and compliance gaps manually. This skill automates comprehensive security assessments using official AWS CLI commands and industry best practices.

Soporta: Claude Codex Code(CC)
🥉 73 Bronce
1

Descargar el ZIP de la skill

2

Subir en Claude

Ve a Configuración → Capacidades → Skills → Subir skill

3

Activa y empieza a usar

Pruébalo

Usando "aws-security-audit". Run a comprehensive security audit on my AWS account

Resultado esperado:

Security Audit Report showing: 3 users without MFA enabled, 2 security groups with unrestricted inbound access, 5 unencrypted EBS volumes, CloudTrail logging active. Security Score: 65/100. Prioritized remediation steps provided.

Usando "aws-security-audit". Check for IAM security issues

Resultado esperado:

IAM Security Findings: 2 access keys older than 90 days, 1 inactive user with console access, root account has no MFA. Recommendations include rotating old keys and disabling unused users.

Usando "aws-security-audit". Find all unencrypted resources

Resultado esperado:

Unencrypted Resources Report: 5 EBS volumes in us-east-1, 1 RDS instance (postgres-prod), 3 S3 buckets without default encryption. Estimated remediation time and CLI commands provided for each.

Auditoría de seguridad

Seguro
v1 • 2/24/2026

Static analysis flagged 74 patterns but all are false positives. The external_commands are legitimate AWS CLI invocations for security auditing. The '0.0.0.0/0' patterns are CIDR queries detecting open security groups, not hardcoded IPs. URLs reference AWS documentation. No malicious intent detected - this is a legitimate security audit tool.

1
Archivos escaneados
370
Líneas analizadas
1
hallazgos
1
Auditorías totales

Factores de riesgo

⚙️ Comandos externos (1)
Auditado por: claude

Puntuación de calidad

38
Arquitectura
100
Mantenibilidad
87
Contenido
50
Comunidad
100
Seguridad
83
Cumplimiento de la especificación

Lo que puedes crear

Security Engineer Compliance Review

Run weekly security audits to identify misconfigurations before they become vulnerabilities and maintain compliance evidence for auditors.

DevOps Pre-Deployment Check

Validate AWS environment security posture before deploying production applications to ensure no critical gaps exist.

Cloud Consultant Assessment

Generate comprehensive security reports for client AWS environments with prioritized remediation recommendations.

Prueba estos prompts

Basic Security Check
Run the aws-security-audit skill to check my AWS account for basic security issues. Focus on IAM users without MFA and any security groups open to the internet.
Comprehensive Audit
Execute a full AWS security audit using aws-security-audit. Check IAM, network security, data protection, and logging. Calculate my security score and list all issues by priority.
Compliance-Focused Review
Use aws-security-audit to assess my AWS environment against CIS Foundations Benchmark requirements. Highlight any findings that would fail a compliance audit.
Remediation Planning
Run aws-security-audit and generate a remediation plan. Group findings by critical, high, and medium priority with specific AWS CLI commands to fix each issue.

Mejores prácticas

  • Run security audits weekly and store reports for trend analysis
  • Automate audits using EventBridge triggers with Lambda for continuous monitoring
  • Document all exceptions with business justification and compensating controls

Evitar

  • Running audits only once and never reviewing trends over time
  • Ignoring medium-severity findings that can compound into major risks
  • Executing audit commands with overly permissive IAM credentials instead of read-only SecurityAudit policy

Preguntas frecuentes

What IAM permissions does this skill require?
The skill requires read-only permissions. AWS recommends attaching the SecurityAudit managed policy which provides the minimum permissions needed for comprehensive security assessments.
Does this skill make any changes to my AWS resources?
No. This is a read-only audit skill that only queries your AWS environment. It does not modify, create, or delete any resources. All remediation must be performed manually.
How often should I run a security audit?
AWS recommends running comprehensive security audits at least weekly. For high-security environments, consider daily audits with automated alerting on new findings.
Can this skill audit multiple AWS accounts?
Yes. Configure AWS CLI profiles for each account and run the audit against each profile. For organizations with many accounts, consider using AWS Security Hub for centralized visibility.
What compliance frameworks does this skill support?
The audit maps findings to CIS AWS Foundations Benchmark, PCI-DSS, and HIPAA requirements. Custom mappings can be added for organization-specific compliance needs.
How do I fix the issues this skill finds?
The skill provides prioritized remediation guidance with specific AWS CLI commands. Critical issues should be addressed immediately, high-severity within 7 days, and medium within 30 days.

Detalles del desarrollador

Estructura de archivos

📄 SKILL.md