Type Here to Get Search Results !

CFRipper – CloudFormation Security Scanning and Auditing Tool

CFRipper – CloudFormation Security Scanning and Auditing Tool

usage: [OPTIONS] [TEMPLATES]…

analyze AWS cloud formation template pass through go through Scope. exit code: –

0 = all template Effective and scanned successfully1 = Mistake / problem exist

scanning exist At least one template2 = exist At least one template Yes no Effective

according to arrive CFRipper (template scanned successfully) – 3 = unknown /

not processed exception exist scanning This template

Options:

Version exhibit This Version and exit.

solve / —Nosolve solve cloud formation variable and

inherent function [default: False]

solveparameter file name JSON/FML document Include keyvalue right

used for solve cloud formation document and

templating parameter. for example, {“ABC”:

“ABC”} will Change all event of

{“refer to”: “ABC”} exist This cloud formation document arrive

“ABC”.

Format [json|txt] output Format [default: txt]

outputfolder content if no exhibit, result will Yes send arrive

stdout

logging [ERROR|WARNING|INFO|DEBUG]

logging grade [default: INFO]

ruleconfiguredocument file name load rule configure document (type: [.py,

                                  .pyc])

rulefilterfolder content

all document exist This folder must Yes of type:

[.py, .pyc]

awsaccountID text One 12number AWS account number For example.

123456789012

awsheadmaster text One commadivided list of AWS headmaster For example.

Arne:aws:I’m::123456789012:root,234567890123,

Arne:aws:I’m::111222333444:user/username

help exhibit This information and exit.



Read More..

Tags

Post a Comment

0 Comments
* Please Don't Spam Here. All the Comments are Reviewed by Admin.

Top Post Ad

Below Post Ad