Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/njgibbon/sek

Live Cloud Resource Security Configuration Scanning.
https://github.com/njgibbon/sek

automation aws cli cloud eks k8s kubernetes scan security test tools

Last synced: about 3 hours ago
JSON representation

Live Cloud Resource Security Configuration Scanning.

Awesome Lists containing this project

README

        

![sek](images/sek.png)

Live Cloud Resource Security Configuration Scanning.

# Status
Concept / Dev / Test / Pre-pre-release. Trying things and working out how stuff might fit together.

# Overview
Sek scans live Cloud Resources and looks for Security-related misconfiguration.

Sek is intended for immediate fast security feedback when working with a Cloud Resource. Simplifying complex Spot Checks and providing Continuous Compliance / Testing via Automated Pipelines.

Intitially the focus is only on the Cloud Resource components of AWS EKS.

Cloud Resource Check Sets are informed by community best practises and industry standards like the Center for Internet Security Benchmarks. See the Check documentation section for a comprehensive view.

# Checks
Organisation, structure, content, reasoning and support information for all Checks in Sek.

[checks/readme.md](checks/readme.md)

**Example: AWS - EKS**

[checks/aws/eks/readme.md](checks/aws/eks/readme.md)

# Usage
## Install
```
pip3 install sek --upgrade
```

## Configure
CLI flags are currently the only way to control the tool.
### Authentication
#### AWS
https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-files.html

### Skipping Checks
Find the Check Name(s) / ID(s) in the related Sek Check Document.

Pass the list you would like to Skip as an optional flag like so:
```
--skip a b c
# E.g for AWS - EKS
--skip service-endpoint service-endpoint-firewall
```

## Run
```
sek --cloud=aws --resource=eks --name=name
```

# Permissions
Sek will not utilise any write operations for any check with any cloud provider. Read only access permissions will be sufficient.

# Roadmap
[roadmap.md](roadmap.md)

# Contributing
[contributing.md](contributing.md)

# Related Tools
* Prowler - https://github.com/toniblyx/prowler
* Kube-Bench - https://github.com/aquasecurity/kube-bench
* Checkov - https://github.com/bridgecrewio/checkov
* AWS Security Hub - https://aws.amazon.com/security-hub
* AWS Config - https://aws.amazon.com/config