Cloud Security Assessment Checklist
A thorough security assessment checklist for cloud environments including AWS, Azure, and GCP. Covers identity and access management, storage security, network configuration, compute workloads, and serverless architecture review.
prowler aws --severity critical highscoutsuite awsaws iam list-policies --scope Local --query "Policies[*].[PolicyName,Arn]"aws iam get-account-summaryaws iam generate-credential-report && aws iam get-credential-report --output text --query Content | base64 -daws iam list-users --query "Users[*].UserName" | xargs -I {} aws iam list-access-keys --user-name {}aws iam list-roles --query "Roles[*].[RoleName,AssumeRolePolicyDocument]"pacupmapper graph create && pmapper query "preset privesc *"PMapper or Pacu output showing the escalation chain (starting principal → final privilege) plus AWS CLI proof of executing one of the escalated actions.
aws s3api list-buckets --query "Buckets[*].Name" --output text | xargs -I {} aws s3api get-bucket-acl --bucket {}aws s3api get-public-access-block --bucket <bucket>curl response from the unauthenticated public URL of a bucket object containing sensitive data, plus the bucket ACL showing public-read or public-write.
aws s3api get-bucket-encryption --bucket <bucket>aws rds describe-db-instances --query "DBInstances[*].[DBInstanceIdentifier,StorageEncrypted]"aws rds describe-db-instances --query "DBInstances[?PubliclyAccessible=='true'].[DBInstanceIdentifier,Endpoint.Address]"aws s3api get-bucket-policy --bucket <bucket>aws ec2 describe-security-groups --query "SecurityGroups[*].IpPermissions[?IpRanges[?CidrIp=='0.0.0.0/0']]"security group export showing 0.0.0.0/0 on a sensitive port (e.g. 22, 3389, 3306) plus an Nmap scan from an external host confirming the port is reachable.
aws ec2 describe-instances --query "Reservations[*].Instances[?MetadataOptions.HttpTokens=='optional'].[InstanceId]"aws lambda list-functions --query "Functions[*].[FunctionName,Role,Environment]"kube-bench run --targets master,nodekube-hunter --remote <cluster_endpoint>kubectl auth can-i --listaws cloudtrail describe-trailsaws guardduty list-detectors