Cloudsploit Lambda provides an automated way to view security risks in your AWS account. It will create Lambda functions to scan your account (using Cloudsploit Scans) and generate a static website with the output.
- Set your AWS credentials in ~/.aws/credentials or in the environment variables $AWS_ACCESS_KEY_ID and $AWS_SECRET_KEY_ID.
- (Optional) Add your IP address range to generate_cloudsploit.py.
- Run
python3 generate_cloudsploit.py
. This will create the S3 bucket, download the Lambda function code zips, and upload them to the newly-created bucket. It will also generate a Cloudformation template. - Run
cloudsploit-cf/stack-create.sh
. This will use the generated template to create a Cloudformation stack. This stack creates the Lambda functions and schedule. - (Optional) Run
./invoke-lambda.sh
. This will manually run the Lambda so that you have a report immediately. Subsequent reports will be generated daily. - (Optional) Get your report page added to the central list of pages.