Vulnsy
Cloud27 items

Cloud Security Assessment Checklist

A thorough security assessment checklist for cloud environments including AWS, Azure, and GCP. Covers identity and access management, storage security, network configuration, compute workloads, and serverless architecture review.

CIS BenchmarksCSA CCMNIST SP 800-144NIST SP 800-115
Progress: 0 of 27 items
0%
Commands
prowler aws --severity critical high
scoutsuite aws
aws iam list-policies --scope Local --query "Policies[*].[PolicyName,Arn]"
Commands
aws iam get-account-summary
aws iam generate-credential-report && aws iam get-credential-report --output text --query Content | base64 -d
Commands
aws iam list-users --query "Users[*].UserName" | xargs -I {} aws iam list-access-keys --user-name {}
Commands
aws iam list-roles --query "Roles[*].[RoleName,AssumeRolePolicyDocument]"
Commands
pacu
pmapper graph create && pmapper query "preset privesc *"
Evidence to capture

PMapper or Pacu output showing the escalation chain (starting principal → final privilege) plus AWS CLI proof of executing one of the escalated actions.

Commands
aws s3api list-buckets --query "Buckets[*].Name" --output text | xargs -I {} aws s3api get-bucket-acl --bucket {}
aws s3api get-public-access-block --bucket <bucket>
Evidence to capture

curl response from the unauthenticated public URL of a bucket object containing sensitive data, plus the bucket ACL showing public-read or public-write.

Commands
aws s3api get-bucket-encryption --bucket <bucket>
aws rds describe-db-instances --query "DBInstances[*].[DBInstanceIdentifier,StorageEncrypted]"
Commands
aws rds describe-db-instances --query "DBInstances[?PubliclyAccessible=='true'].[DBInstanceIdentifier,Endpoint.Address]"
Commands
aws s3api get-bucket-policy --bucket <bucket>
Commands
aws ec2 describe-security-groups --query "SecurityGroups[*].IpPermissions[?IpRanges[?CidrIp=='0.0.0.0/0']]"
Evidence to capture

security group export showing 0.0.0.0/0 on a sensitive port (e.g. 22, 3389, 3306) plus an Nmap scan from an external host confirming the port is reachable.

Commands
aws ec2 describe-instances --query "Reservations[*].Instances[?MetadataOptions.HttpTokens=='optional'].[InstanceId]"
Commands
aws lambda list-functions --query "Functions[*].[FunctionName,Role,Environment]"
Commands
kube-bench run --targets master,node
kube-hunter --remote <cluster_endpoint>
kubectl auth can-i --list
Commands
aws cloudtrail describe-trails
aws guardduty list-detectors

Industries Using This Checklist

Report Vulnerabilities Faster with Vulnsy

Stop rewriting the same findings. Use Vulnsy's reusable templates, collaborative workflows, and professional report generation to deliver pentest reports 10x faster.

Start Free Trial