Skip to content
/ sek Public

Live Cloud Resource Security Configuration Scanning.

License

Notifications You must be signed in to change notification settings

njgibbon/sek

Repository files navigation

sek

Live Cloud Resource Security Configuration Scanning.

Status

Concept / Dev / Test / Pre-pre-release. Trying things and working out how stuff might fit together.

Overview

Sek scans live Cloud Resources and looks for Security-related misconfiguration.

Sek is intended for immediate fast security feedback when working with a Cloud Resource. Simplifying complex Spot Checks and providing Continuous Compliance / Testing via Automated Pipelines.

Intitially the focus is only on the Cloud Resource components of AWS EKS.

Cloud Resource Check Sets are informed by community best practises and industry standards like the Center for Internet Security Benchmarks. See the Check documentation section for a comprehensive view.

Checks

Organisation, structure, content, reasoning and support information for all Checks in Sek.

checks/readme.md

Example: AWS - EKS

checks/aws/eks/readme.md

Usage

Install

pip3 install sek --upgrade

Configure

CLI flags are currently the only way to control the tool.

Authentication

AWS

https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-files.html

Skipping Checks

Find the Check Name(s) / ID(s) in the related Sek Check Document.

Pass the list you would like to Skip as an optional flag like so:

--skip a b c
# E.g for AWS - EKS
--skip service-endpoint service-endpoint-firewall

Run

sek --cloud=aws --resource=eks --name=name

Permissions

Sek will not utilise any write operations for any check with any cloud provider. Read only access permissions will be sufficient.

Roadmap

roadmap.md

Contributing

contributing.md

Related Tools