Sign in

Managing workspaces and access control

DagKnows Architecture Overview

Managing Proxies

Setting up SSO via Azure AD for Dagknows

All the experts

Enable "Auto Exec" and "Send Execution Result to LLM" in "Adjust Settings" if desired

Add credentials for various integrations

Add a key-value pair

(Optionally) Add ubuntu user to docker group and refresh group membership

Deployment of an EKS Cluster with Worker Nodes in AWS

Adding, Deleting, Listing DagKnows Proxy credentials or key-value pairs

Kubernetes pod issue

Comprehensive AWS Security and Compliance Evaluation Workflow (SOC2 Super Runbook)

AWS EKS Version Update 1.29 to 1.30 via terraform

Instruction to allow WinRM connection

MSP Usecase: User Onboarding Azure + M365

Post a message to a Slack channel

How to debug a kafka cluster and kafka topics?

Docusign Integration Tasks

Open VPN Troubleshooting (Powershell)

Execute a simple task on the proxy

Assign the proxy role to a user

Create roles to access credentials in proxy

Install OpenVPN client on Windows laptop

Setup Kubernetes kubectl and Minikube on Ubuntu 22.04 LTS

Install Prometheus and Grafana on the minikube cluster on EC2 instance in the monitoring namespace

Sample selenium script

update the EKS versions in different clusters

AI agent session 2024-09-12T09:36:14-07:00 by Sarang Dharmapurikar

Install kubernetes on an ec2 instance ubuntu 20.04 using kubeadm and turn this instance into a master node.

Turn an ec2 instance, ubuntu 20.04 into a kubeadm worker node. Install necessary packages and have it join the cluster.

Install Docker

Parse EDN content and give a JSON out

GitHub related tasks

Check whether a user is there on Azure AD and if the user account status is enabled

Get the input parameters of a Jenkins pipeline

Get the console output of last Jenkins job build

List my Jenkins pipelines

Get last build status for a Jenkins job

Trigger a Jenkins job with param values

List all the resource ARNs in a given region

Give me steps to do health checks on a Linux Server

Trigger for tickets which have status new/open, group DevOps, assignee None, and public comment includes a keyword

Process Zendesk Ticket for updating comments (auto reply)

Add a public comment to a Zendesk Ticket

Identify list out IAM users list in AWS using dagknows

Restoring an AWS Redshift Cluster from a Snapshot

Notify about disk space before cleaning up

Set an AWS IAM Password Policy

Enforce Password Change for AWS IAM Users

Comprehensive AWS Security and Compliance Evaluation Workflow (SOC2 Super Runbook)

There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

This workflow involves a thorough evaluation of various AWS services and configurations to ensure compliance with security best practices. It includes checking Amazon S3 buckets for public read access and encryption compliance, as well as auditing AWS IAM user credentials and access keys. The process also assesses IAM policies for overly permissive statements and evaluates password policies. Additionally, it verifies AWS CloudTrail configurations and VPC flow logs, and audits security groups for open SSH ports and inbound traffic restrictions. Overall, the workflow aims to maintain a secure and compliant AWS environment.

  1. 1

    Evaluation of Amazon S3 Buckets for Public Read Access Compliance

    There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

    The workflow involves identifying Amazon S3 buckets that permit public read access. This is achieved by assessing the Block Public Access settings, bucket policies, and Access Control Lists (ACLs). Each bucket is then flagged as either NON_COMPLIANT or COMPLIANT based on the evaluation. The process ensures that only authorized access is allowed, enhancing the security of the stored data. This compliance check is crucial for maintaining data privacy and adhering to security best practices.

    1
    1. 1.1

      List all Amazon S3 buckets in the region us-east-2.

      There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

      This script lists all Amazon S3 buckets in the specified region.

      1.1
    2. 1.2

      Evaluate Block Public Access settings for each S3 bucket in the region us-east-2.

      There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

      This script evaluates Block Public Access settings for each S3 bucket in the specified region and flags them as NON_COMPLIANT or COMPLIANT.

      1.2
    3. 1.3

      Check bucket policies for public read access for each S3 bucket in the region us-east-2.

      There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

      This script checks bucket policies for public read access for each S3 bucket in the specified region and flags them as NON_COMPLIANT or COMPLIANT.

      1.3
    4. 1.4

      Check ACLs for public read access for each S3 bucket in the region us-east-2.

      There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

      This script checks ACLs for public read access for each S3 bucket in the specified region and flags them as NON_COMPLIANT or COMPLIANT.

      1.4
  2. 2

    Compliance Check for S3 Bucket Encryption

    There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

    The workflow involves identifying Amazon S3 buckets that either do not have default encryption enabled or lack a policy explicitly denying unencrypted put-object requests. These buckets are then flagged as NON_COMPLIANT. This process ensures that all S3 buckets adhere to security best practices by enforcing encryption standards. By flagging non-compliant buckets, the workflow helps maintain data security and compliance within the cloud environment. This proactive approach aids in mitigating potential data breaches and unauthorized access.

    2
    1. 2.1

      Identify Amazon S3 buckets that do not have default encryption enabled or lack a policy explicitly denying unencrypted put-object requests, and flag them as NON_COMPLIANT.

      There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

      This script identifies S3 buckets without default encryption or lacking a policy denying unencrypted put-object requests.

      2.1
      1. 2.1.1

        List all Amazon S3 buckets in the AWS account.

        There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

        This script lists all S3 buckets in the AWS account.

        2.1.1
      2. 2.1.2

        Check each S3 bucket for default encryption settings and identify buckets without default encryption enabled.

        There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

        This script checks each S3 bucket for default encryption settings and identifies buckets without default encryption enabled.

        2.1.2
      3. 2.1.3

        Check each S3 bucket for a policy explicitly denying unencrypted put-object requests and identify buckets lacking such a policy.

        There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

        This script checks each S3 bucket for a policy explicitly denying unencrypted put-object requests and identifies buckets lacking such a policy.

        2.1.3
  3. 3

    Audit of AWS S3 Buckets for Server Access Logging

    There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

    The workflow involves checking AWS S3 buckets to determine if Server Access Logging is enabled. The results are organized by region, highlighting the number of buckets lacking this feature. This process helps in identifying potential security and compliance gaps. By tabulating the data, it provides a clear overview of the current logging status across different regions. The outcome aids in prioritizing actions to enable logging where necessary.

    3
    1. 3.1

      List all AWS S3 buckets across all regions.

      There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

      The script lists all AWS S3 buckets using the provided AWS credentials.

      3.1
    2. 3.2

      Check each S3 bucket to determine if Server Access Logging is enabled.

      There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

      The script checks each S3 bucket to determine if Server Access Logging is enabled and outputs the status.

      3.2
  4. 4

    Audit of AWS S3 Buckets for Public Write Access

    There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

    The workflow involves identifying AWS S3 buckets that do not have public write access restrictions in place. This process includes listing each bucket along with its respective region. The goal is to ensure that all S3 buckets are secure and not vulnerable to unauthorized public write access. By auditing these settings, the workflow helps maintain data integrity and security within the AWS environment.

    4
    1. 4.1

      List the number of AWS S3 buckets which do not have public write access prohibited, including their region.

      There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

      This script lists AWS S3 buckets with public write access, grouped by region.

      4.1
  5. 5

    Audit of AWS IAM Users for MFA Compliance

    There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

    The workflow involves listing AWS IAM users who have console passwords and checking if they have Multi-Factor Authentication (MFA) enabled. Users are then categorized based on whether MFA is enabled or not. The categorization helps in identifying users who are compliant with the security rule of having MFA enabled. This process ensures that all users with console access are adhering to security best practices. The outcome is a clear understanding of the current compliance status regarding MFA among IAM users.

    5
    1. 5.1

      List AWS IAM users with console passwords which do not have Multi-Factor Authentication (MFA) enabled, categorize them based on MFA Enabled or not and if they are compliant or not based on this rule.

      There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

      This script lists AWS IAM users with console passwords and checks if they have MFA enabled, categorizing them based on compliance.

      5.1
  6. 6

    AWS Account Compliance Check for Root User Access Key

    There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

    This workflow involves verifying the compliance of an AWS account by checking for the existence of access keys associated with the root user. The process ensures that security best practices are followed by identifying any potential security risks related to root user access keys. By conducting this check, the workflow aims to enhance the overall security posture of the AWS account. It helps in maintaining compliance with organizational policies and industry standards. The outcome of this workflow is a report or alert indicating whether the AWS account is compliant or requires further action.

    6
    1. 6.1

      Check AWS account compliance based on root user access key existence

      There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

      Checks if the AWS account is compliant based on the existence of root user access keys.

      6.1
      1. 6.1.1

        Check if the root user access key exists in the AWS account

        There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

        Checks if the AWS account is compliant based on the existence of root user access keys using account summary.

        6.1.1
  7. 7

    Audit of AWS IAM User Credential Activity

    There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

    The workflow involves evaluating all AWS IAM users to identify any with passwords or active access keys that have not been used within a specified number of days, defaulting to 90 days. If any user credentials are found to be inactive beyond this threshold, they are marked as NON_COMPLIANT. The results of this evaluation are then tabulated for further analysis. This process ensures that only active and necessary credentials are maintained, enhancing security by identifying and addressing potential vulnerabilities.

    7
    1. 7.1

      Evaluate all AWS IAM users and identify any with passwords or active access keys that have not been used within the specified number of days (default: 90 days); return NON_COMPLIANT if any user credentials are inactive beyond this threshold. Tabulate the results.

      There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

      Evaluates AWS IAM users for inactive credentials and tabulates the results.

      7.1
      1. 7.1.1

        List all AWS IAM users and retrieve their last used date for passwords and access keys.

        There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

        Lists all AWS IAM users and retrieves their last used date for passwords and access keys, handling timezone differences.

        7.1.1
      2. 7.1.2

        Identify AWS IAM users with passwords or access keys that have not been used in the last 90 days.

        There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

        Identifies AWS IAM users with passwords or access keys not used in the last 90 days and lists them as non-compliant.

        7.1.2
      3. 7.1.3

        Determine compliance status based on the usage of AWS IAM user credentials, marking as NON_COMPLIANT if any credentials are inactive beyond 90 days.

        There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

        Determines compliance status based on AWS IAM user credentials usage, marking as NON_COMPLIANT if any credentials are inactive beyond 90 days.

        7.1.3
      4. 7.1.4

        Tabulate the results of the compliance evaluation for AWS IAM users.

        There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

        Tabulates the compliance evaluation results for AWS IAM users, marking non-compliant users.

        7.1.4
  8. 8

    AWS IAM Access Key Compliance Evaluation

    There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

    This workflow involves assessing all active AWS IAM access keys to ensure they have been rotated within a specified period, typically 90 days. The process identifies any keys that have not been rotated within this timeframe and flags them as NON_COMPLIANT. The results of this evaluation are then tabulated for further analysis. This helps maintain security by ensuring that access keys are regularly updated to prevent unauthorized access.

    8
    1. 8.1

      Evaluate all active AWS IAM access keys and identify any that have not been rotated within the specified maxAccessKeyAge days (default: 90 days); return NON_COMPLIANT if any key exceeds this age threshold. Tabulate the results.

      There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

      Evaluates IAM access keys for compliance with rotation policy and tabulates results.

      8.1
      1. 8.1.1

        Retrieve a list of all active AWS IAM access keys.

        There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

        Retrieves and prints a list of all active AWS IAM access keys.

        8.1.1
      2. 8.1.2

        For each active AWS IAM access key, determine the last rotation date.

        There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

        Determines the last rotation date for each active AWS IAM access key using the creation date.

        8.1.2
      3. 8.1.3

        Compare the last rotation date of each access key with the specified maxAccessKeyAge (default: 90 days) to identify keys that have not been rotated within this period.

        There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

        Identifies AWS IAM access keys that have not been rotated within the specified maxAccessKeyAge days, fixing datetime comparison issue.

        8.1.3
      4. 8.1.4

        Return NON_COMPLIANT for any access key that exceeds the maxAccessKeyAge threshold.

        There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

        Returns and prints NON_COMPLIANT status for access keys exceeding the maxAccessKeyAge threshold.

        8.1.4
      5. 8.1.5

        Tabulate the results of the compliance check, indicating which keys are compliant and which are non-compliant.

        There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

        Tabulates the compliance check results for IAM access keys, indicating non-compliant keys.

        8.1.5
  9. 9

    Assessment of AWS IAM Users for Directly Attached Policies

    There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

    The workflow involves a comprehensive evaluation of all AWS Identity and Access Management (IAM) users. The primary objective is to identify any users who have policies directly attached to them. This process helps in ensuring that access management is streamlined and adheres to best practices by potentially moving towards role-based access control. Identifying directly attached policies is crucial for maintaining security and compliance within the AWS environment. The outcome of this assessment can guide further actions to optimize policy management.

    9
    1. 9.1

      Evaluate all AWS IAM users and identify any users with directly attached policies

      There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

      Evaluates IAM users for directly attached policies and tabulates the results.

      9.1
  10. 10

    IAM Policy Compliance Check for Overly Permissive Statements

    There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

    The workflow involves identifying and flagging any customer-managed IAM policy statements that include 'Effect': 'Allow' with 'Action': '*' over 'Resource': '*'. Such statements are considered overly permissive and are marked as NON_COMPLIANT. If the policy statement does not meet these criteria, it is marked as COMPLIANT. This process ensures that IAM policies adhere to security best practices by avoiding unrestricted access permissions.

    10
    1. 10.1

      Identify and flag any customer managed IAM policy statement includes 'Effect': 'Allow' with 'Action': '*' over 'Resource': '*' then the rule is NON_COMPLIANT otherwise COMPLIANT.

      There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.
      The script checks IAM policies for non-compliant statements and tabulates the results.
      10.1
      1. 10.1.1

        List all customer managed IAM policies in the AWS region us-east-2.

        There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.
        The script lists all customer managed IAM policies in the specified AWS region.
        10.1.1
      2. 10.1.2

        For each IAM policy, retrieve and analyze the policy statements to identify any statement with 'Effect': 'Allow', 'Action': '*', and 'Resource': '*'.

        There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.
        The script retrieves and analyzes IAM policy statements to identify non-compliant policies with 'Effect': 'Allow', 'Action': '*', and 'Resource': '*'.
        10.1.2
      3. 10.1.3

        Flag policies with such statements as NON_COMPLIANT and others as COMPLIANT.

        There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.
        The script flags IAM policies with overly permissive statements as NON_COMPLIANT and others as COMPLIANT.
        10.1.3
      4. 10.1.4

        Tabulate the compliance results of the IAM policies.

        There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.
        The script tabulates the compliance results of IAM policies.
        10.1.4
  11. 11

    AWS IAM Password Policy Compliance Evaluation

    There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

    The workflow involves evaluating the AWS account password policy for IAM users to ensure it meets specified requirements. If the policy fails to meet all defined criteria, it is marked as NON_COMPLIANT. The results of the evaluation are tabulated for clarity. Additionally, the workflow identifies IAM users who are non-compliant and provides reasons for their non-compliance. This process helps maintain security standards by ensuring all IAM users adhere to the required password policies.

    11
    1. 11.1

      Evaluate the AWS account password policy for IAM users against the specified requirements; return NON_COMPLIANT if the policy does not meet all defined criteria. Tabulate the results.

      There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

      Evaluates AWS IAM password policy against specified criteria and tabulates the results.

      11.1
    2. 11.2

      Identify non-compliant IAM users and reasons for non-compliance

      There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

      Identifies IAM users who are non-compliant with the password policy and lists them.

      11.2
  12. 12

    AWS Account Compliance Status Evaluation

    There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

    This workflow involves assessing the compliance status of an AWS account by examining the configuration of CloudTrail. It specifically checks for the presence of multi-region CloudTrail and ensures that management events, such as those related to AWS KMS and Amazon RDS Data API, are not excluded. Any accounts that do not meet these criteria are flagged as NON_COMPLIANT. This process helps maintain security and operational standards by ensuring comprehensive logging and monitoring across AWS services.

    12
    1. 12.1

      Tell the compliance status for AWS account, such as where there is no multi-region CloudTrail or where CloudTrail excludes management events (e.g., AWS KMS, Amazon RDS Data API) and flag them as NON_COMPLIANT.

      There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

      Checks AWS CloudTrail compliance for multi-region and management events inclusion, flags non-compliance.

      12.1
  13. 13

    AWS CloudTrail Log File Validation Compliance Check

    There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

    The workflow involves evaluating all AWS CloudTrail configurations to ensure that log file validation is enabled. Each trail is assessed, and if any trail lacks log file validation, it is marked as NON_COMPLIANT. The results of this compliance check are then tabulated for further analysis and reporting. This process helps maintain the integrity and security of log files by ensuring that any unauthorized changes are detected.

    13
    1. 13.1

      Evaluate all AWS CloudTrail configurations to verify that log file validation is enabled; return NON_COMPLIANT if any trail does not have log file validation enabled. Tabulate the results.

      There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

      This script evaluates AWS CloudTrail configurations to verify log file validation and tabulates the compliance results.

      13.1
      1. 13.1.1

        Evaluate all AWS CloudTrail configurations to verify that log file validation is enabled; return NON_COMPLIANT if any trail does not have log file validation enabled.

        There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

        This script evaluates AWS CloudTrail configurations to verify log file validation and prints the compliance results.

        13.1.1
      2. 13.1.2

        Tabulate the results of the AWS CloudTrail log file validation evaluation.

        There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

        This script tabulates the results of AWS CloudTrail log file validation compliance evaluation.

        13.1.2
  14. 14

    AWS CloudTrail Configuration and Encryption Verification

    There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

    The workflow involves evaluating all AWS CloudTrail configurations to ensure they are set up correctly. A key focus is on verifying that server-side encryption with AWS Key Management Service (SSE-KMS) is enabled. This ensures that all logs are securely encrypted, enhancing the security and compliance of the AWS environment. The process helps in maintaining the integrity and confidentiality of the log data. By confirming these settings, the workflow supports robust security practices within the AWS infrastructure.

    14
    1. 14.1

      Evaluate all AWS CloudTrail configurations and verify SSE-KMS encryption

      There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

      This script evaluates AWS CloudTrail configurations to verify if SSE-KMS encryption is enabled and tabulates the compliance results.

      14.1
  15. 15

    Compliance Check for VPC Flow Logs in AWS Region

    There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

    The workflow involves evaluating all Amazon VPCs within the AWS region us-east-2 to ensure that VPC Flow Logs are enabled. Each VPC is checked for compliance, and if any VPC lacks Flow Logs, it is marked as NON_COMPLIANT. The results of this compliance check are then tabulated for further analysis. This process helps in maintaining security and monitoring standards across the network infrastructure.

    15
    1. 15.1

      Evaluate all Amazon VPCs and verify that VPC Flow Logs are enabled; return NON_COMPLIANT if at least one VPC does not have Flow Logs enabled. Tabulate these results.

      There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

      The script evaluates all VPCs in the us-east-2 region to check if VPC Flow Logs are enabled and tabulates the compliance status.

      15.1
      1. 15.1.1

        List all Amazon VPCs.

        There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

        The script lists all VPCs in the us-east-2 region using boto3 with credentials.

        15.1.1
      2. 15.1.2

        Check each VPC in the list to verify if VPC Flow Logs are enabled.

        There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

        The script checks each VPC in the list to verify if VPC Flow Logs are enabled and returns their compliance status.

        15.1.2
      3. 15.1.3

        Determine compliance status for each VPC based on whether Flow Logs are enabled. Mark as NON_COMPLIANT if Flow Logs are not enabled.

        There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

        The script determines the overall compliance status for each VPC based on whether Flow Logs are enabled and marks as NON_COMPLIANT if any VPC does not have Flow Logs enabled.

        15.1.3
      4. 15.1.4

        Tabulate the compliance results for all VPCs.

        There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

        The script tabulates the compliance results for all VPCs based on their Flow Logs status.

        15.1.4
  16. 16

    Security Compliance Evaluation of Amazon VPC Default Security Groups

    There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

    The workflow involves assessing all default security groups within each Amazon VPC to ensure they do not permit any inbound or outbound traffic. If any default security group is found to have one or more inbound or outbound rules, it is marked as NON_COMPLIANT. The results of this evaluation are then organized into a tabulated format for easy review and analysis. This process helps maintain the security integrity of the network by ensuring that default security groups adhere to strict traffic control policies.

    16
    1. 16.1

      Evaluate all default security groups in every Amazon VPC and verify that they do not allow any inbound or outbound traffic; return NON_COMPLIANT if any default security group has one or more inbound or outbound rules. Tabulate the results.

      There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

      Evaluates default security groups in all VPCs across all regions for compliance and tabulates the results.

      16.1
      1. 16.1.1

        List all VPCs in the AWS account.

        There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

        Lists all VPCs in the AWS account across all regions.

        16.1.1
      2. 16.1.2

        For each VPC, list all default security groups.

        There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

        Lists all default security groups for each VPC across all regions.

        16.1.2
      3. 16.1.3

        Evaluate each default security group to verify that they do not allow any inbound or outbound traffic.

        There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

        Evaluates each default security group to verify that they do not allow any inbound or outbound traffic and tabulates the compliance results.

        16.1.3
  17. 17

    Audit and Compliance Check for AWS Security Groups with Open SSH Ports

    There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

    The workflow involves identifying AWS security groups that have incoming SSH traffic (port 22) open to the public, specifically to IP addresses 0.0.0.0/0 or ::/0. These security groups are flagged as NON_COMPLIANT due to the potential security risk of unrestricted access. Conversely, security groups that do not have such open access are marked as COMPLIANT. This process ensures that security groups adhere to best practices for network security by restricting unnecessary public access. The outcome is a clear distinction between compliant and non-compliant security configurations, aiding in maintaining a secure AWS environment.

    17
    1. 17.1

      List and Identify AWS security groups where incoming SSH traffic (port 22) is open to 0.0.0.0/0 or ::/0 and flag them as NON_COMPLIANT, while marking others as COMPLIANT.

      There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

      The script lists AWS security groups and checks if SSH access is open to the world, marking them as NON_COMPLIANT or COMPLIANT.

      17.1
  18. 18

    Audit of AWS Security Groups for Compliance with Inbound Traffic Restrictions

    There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

    The workflow involves analyzing AWS security groups across different regions to identify those that are non-compliant with security policies. Specifically, it focuses on security groups that allow inbound TCP traffic from unrestricted sources, such as 0.0.0.0/0 or ::/0. The process includes listing these non-compliant security groups along with the open ports and CIDR ranges that pose a security risk. The final step is to organize the non-compliant security groups into a table, categorizing them by region and compliance status. This helps in visualizing the distribution of security risks across the AWS infrastructure.

    18
    1. 18.1

      Give me the number of AWS security groups by region and identify non-compliant groups where inbound TCP traffic is allowed from unrestricted sources (0.0.0.0/0 or ::/0), listing non-compliant security groups, open ports, and CIDR ranges.

      There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

      This script lists the number of AWS security groups by region and identifies non-compliant groups allowing unrestricted inbound TCP traffic.

      18.1
    2. 18.2

      Tabulate non-compliant security groups based on their regions and compliance

      There was a problem that the LLM was not able to address. Please rephrase your prompt and try again.

      This script tabulates non-compliant security groups by region, listing their details.

      18.2