CARVIEW |
Select Language
HTTP/2 200
date: Tue, 14 Oct 2025 06:41:14 GMT
content-type: text/html; charset=utf-8
vary: X-PJAX, X-PJAX-Container, Turbo-Visit, Turbo-Frame, X-Requested-With,Accept-Encoding, Accept, X-Requested-With
etag: W/"36e30a1806da3346bfb230cacf7dc946"
cache-control: max-age=0, private, must-revalidate
strict-transport-security: max-age=31536000; includeSubdomains; preload
x-frame-options: deny
x-content-type-options: nosniff
x-xss-protection: 0
referrer-policy: origin-when-cross-origin, strict-origin-when-cross-origin
content-security-policy: default-src 'none'; base-uri 'self'; child-src github.githubassets.com github.com/assets-cdn/worker/ github.com/assets/ gist.github.com/assets-cdn/worker/; connect-src 'self' uploads.github.com www.githubstatus.com collector.github.com raw.githubusercontent.com api.github.com github-cloud.s3.amazonaws.com github-production-repository-file-5c1aeb.s3.amazonaws.com github-production-upload-manifest-file-7fdce7.s3.amazonaws.com github-production-user-asset-6210df.s3.amazonaws.com *.rel.tunnels.api.visualstudio.com wss://*.rel.tunnels.api.visualstudio.com github.githubassets.com objects-origin.githubusercontent.com copilot-proxy.githubusercontent.com proxy.individual.githubcopilot.com proxy.business.githubcopilot.com proxy.enterprise.githubcopilot.com *.actions.githubusercontent.com wss://*.actions.githubusercontent.com productionresultssa0.blob.core.windows.net/ productionresultssa1.blob.core.windows.net/ productionresultssa2.blob.core.windows.net/ productionresultssa3.blob.core.windows.net/ productionresultssa4.blob.core.windows.net/ productionresultssa5.blob.core.windows.net/ productionresultssa6.blob.core.windows.net/ productionresultssa7.blob.core.windows.net/ productionresultssa8.blob.core.windows.net/ productionresultssa9.blob.core.windows.net/ productionresultssa10.blob.core.windows.net/ productionresultssa11.blob.core.windows.net/ productionresultssa12.blob.core.windows.net/ productionresultssa13.blob.core.windows.net/ productionresultssa14.blob.core.windows.net/ productionresultssa15.blob.core.windows.net/ productionresultssa16.blob.core.windows.net/ productionresultssa17.blob.core.windows.net/ productionresultssa18.blob.core.windows.net/ productionresultssa19.blob.core.windows.net/ github-production-repository-image-32fea6.s3.amazonaws.com github-production-release-asset-2e65be.s3.amazonaws.com insights.github.com wss://alive.github.com wss://alive-staging.github.com api.githubcopilot.com api.individual.githubcopilot.com api.business.githubcopilot.com api.enterprise.githubcopilot.com; font-src github.githubassets.com; form-action 'self' github.com gist.github.com copilot-workspace.githubnext.com objects-origin.githubusercontent.com; frame-ancestors 'none'; frame-src viewscreen.githubusercontent.com notebooks.githubusercontent.com; img-src 'self' data: blob: github.githubassets.com media.githubusercontent.com camo.githubusercontent.com identicons.github.com avatars.githubusercontent.com private-avatars.githubusercontent.com github-cloud.s3.amazonaws.com objects.githubusercontent.com release-assets.githubusercontent.com secured-user-images.githubusercontent.com/ user-images.githubusercontent.com/ private-user-images.githubusercontent.com opengraph.githubassets.com marketplace-screenshots.githubusercontent.com/ copilotprodattachments.blob.core.windows.net/github-production-copilot-attachments/ github-production-user-asset-6210df.s3.amazonaws.com customer-stories-feed.github.com spotlights-feed.github.com objects-origin.githubusercontent.com *.githubusercontent.com; manifest-src 'self'; media-src github.com user-images.githubusercontent.com/ secured-user-images.githubusercontent.com/ private-user-images.githubusercontent.com github-production-user-asset-6210df.s3.amazonaws.com gist.github.com; script-src github.githubassets.com; style-src 'unsafe-inline' github.githubassets.com; upgrade-insecure-requests; worker-src github.githubassets.com github.com/assets-cdn/worker/ github.com/assets/ gist.github.com/assets-cdn/worker/
server: github.com
content-encoding: gzip
accept-ranges: bytes
set-cookie: _gh_sess=UFLfSq2JSIHcUj7RWn%2Ftm%2Fl%2B7IUQG5WAV3UGlS855lgOYBE1OVF7MQoc01kHeZfzPykqr1DQwS3NMTUHEMZkilJTD3H7Wxijt3cNpLTyTAP0oqTEZ4y56ADggnsz5U16ygU19Rd7wbOLPHaFqp6BoX07qOzrIMNRgTGajJ11G6bLjBG58AFkbE1%2FzVrrOZRsNQmDGJjPves34H0K8mEPtxa6jn9U4vn4BgTeT%2B93DgrquTPQp7yURXTJrkExGepOS0y5ljvYWhmVKrP2ydlsYw%3D%3D--%2FJX5pCJsP1hcACsj--aMHVM7So4fhgrnfm0QMwpw%3D%3D; Path=/; HttpOnly; Secure; SameSite=Lax
set-cookie: _octo=GH1.1.725361728.1760424074; Path=/; Domain=github.com; Expires=Wed, 14 Oct 2026 06:41:14 GMT; Secure; SameSite=Lax
set-cookie: logged_in=no; Path=/; Domain=github.com; Expires=Wed, 14 Oct 2026 06:41:14 GMT; HttpOnly; Secure; SameSite=Lax
x-github-request-id: E688:4995D:4E7903:63A005:68EDF08A
SecConfig.py from AWS Re-Invent 2013 (export AWS security configurations) · GitHub
Show Gist options
Save jlevy/cce1b44fc24f94599d0a4b3e613cc15d to your computer and use it in GitHub Desktop.
{{ message }}
Instantly share code, notes, and snippets.
Last active
April 29, 2024 18:42
-
Star
6
(6)
You must be signed in to star a gist -
Fork
1
(1)
You must be signed in to fork a gist
-
Save jlevy/cce1b44fc24f94599d0a4b3e613cc15d to your computer and use it in GitHub Desktop.
SecConfig.py from AWS Re-Invent 2013 (export AWS security configurations)
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#! /usr/bin/python | |
# This script is taken (unmodified except for this comment) from: https://s3.amazonaws.com/reinvent2013-sec402/SecConfig.py | |
# Talk: https://www.slideshare.net/AmazonWebServices/intrusion-detection-in-the-cloud-sec402-aws-reinvent-2013 | |
# Example code to output account security config | |
__author__ = 'Greg Roth' | |
import boto | |
import urllib | |
import hashlib | |
import argparse | |
parser = argparse.ArgumentParser(description='outputs security configuration of an AWS account') | |
parser.add_argument('-a', '--access_key_id', required=True, help='access key id') | |
parser.add_argument('-k', '--secret_access_key', required=True, help='secret access key') | |
parser.add_argument('-t', '--security_token', help='security token (for use with temporary security credentials)') | |
parser.add_argument('-r', '--role', help='role to assume') | |
parser.add_argument('-v', '--verbose', action="store_true", help='enable verbose mode') | |
parser.add_argument('-d', '--debug', action="store_true", help='enable debug mode') | |
args = parser.parse_args() | |
access_key_id = args.access_key_id | |
secret_access_key = args.secret_access_key | |
security_token = args.security_token | |
sts = boto.connect_sts(access_key_id, secret_access_key) | |
if args.role: | |
assumed_role = sts.assume_role(args.role, "SecAudit") | |
access_key_id = assumed_role.credentials.access_key | |
secret_access_key = assumed_role.credentials.secret_key | |
security_token = assumed_role.credentials.session_token | |
def debug(str): | |
if args.debug: | |
print str | |
def verbose(str): | |
if args.verbose or args.debug: | |
print str | |
def sha256(m): | |
return hashlib.sha256(m).hexdigest() | |
def config_line(header, name, detail, data): | |
return header + ", " + name + ", " + detail + ", " + data | |
def config_line_policy(header, name, detail, data): | |
verbose("===== " + header + ": " + name + ": " + detail + "=====") | |
verbose(data) | |
verbose("=========================================================") | |
return config_line(header, name, detail, sha256(data)) | |
def output_lines(lines): | |
lines.sort() | |
for line in lines: | |
print line | |
iam = boto.connect_iam(access_key_id, secret_access_key, security_token=security_token) | |
verbose("Getting account summary:") | |
summary = iam.get_account_summary() | |
debug(summary) | |
output_lines([config_line("iam:accountsummary", "AccountMFAEnabled", "", str(summary["AccountMFAEnabled"]))]) | |
# IAM user info | |
verbose("Getting IAM user info:") | |
user_info = [] | |
users = iam.get_all_users().list_users_response.list_users_result.users | |
debug(users) | |
for user in users: | |
verbose("User: " + user.user_name) | |
# User policies | |
policies = iam.get_all_user_policies(user.user_name) | |
policies = policies.list_user_policies_response.list_user_policies_result.policy_names | |
for policy_name in policies: | |
policy = iam.get_user_policy(user.user_name, policy_name) \ | |
.get_user_policy_response.get_user_policy_result.policy_document | |
policy = urllib.unquote(policy) | |
user_info.append(config_line_policy("iam:userpolicy", user.user_name, policy_name, policy)) | |
# access keys | |
access_keys = iam.get_all_access_keys(user.user_name) | |
access_keys = access_keys.list_access_keys_response.list_access_keys_result.access_key_metadata | |
for access_key in access_keys: | |
user_info.append( | |
config_line("iam:accesskey", access_key.user_name, access_key.status, access_key.access_key_id)) | |
# group membership | |
groups = iam.get_groups_for_user(user.user_name) | |
groups = groups.list_groups_for_user_response.list_groups_for_user_result.groups | |
for group in groups: | |
user_info.append(config_line("iam:useringroup", user.user_name, "", group.group_name)) | |
output_lines(user_info) | |
# IAM groups | |
verbose("Getting IAM group info:") | |
group_policy = [] | |
groups = iam.get_all_groups().list_groups_response.list_groups_result.groups | |
for group in groups: | |
verbose("Group " + group.group_name) | |
# Policies attached to groups | |
policies = iam.get_all_group_policies(group.group_name) | |
policies = policies.list_group_policies_response.list_group_policies_result.policy_names | |
for policy_name in policies: | |
policy = iam.get_group_policy(group.group_name, policy_name) | |
policy = policy.get_group_policy_response.get_group_policy_result.policy_document | |
policy = urllib.unquote(policy) | |
group_policy.append(config_line_policy("iam:grouppolicy", group.group_name, policy_name, policy)) | |
output_lines(group_policy) | |
# IAM Roles | |
verbose("Getting IAM role info:") | |
role_policy = [] | |
roles = iam.list_roles().list_roles_response.list_roles_result.roles | |
for role in roles: | |
verbose("Role: " + role.role_name) | |
# Policy controling use of the role (always present) | |
assume_role_policy = role.assume_role_policy_document | |
assume_role_policy = urllib.unquote(policy) | |
role_policy.append(config_line_policy("iam:assumerolepolicy", role.role_name, role.arn, assume_role_policy)) | |
#Policies around what the assumed role can do | |
policies = iam.list_role_policies(role.role_name) | |
policies = policies.list_role_policies_response.list_role_policies_result.policy_names | |
for policy_name in policies: | |
policy = iam.get_role_policy(role.role_name, policy_name) | |
policy = policy.get_role_policy_response.get_role_policy_result.policy_document | |
policy = urllib.unquote(policy) | |
role_policy.append(config_line_policy("iam:rolepolicy", role.role_name, policy_name, policy)) | |
debug(policies) | |
output_lines(role_policy) | |
# S3 bucket policies | |
verbose("Getting S3 bucket policies:") | |
s3 = boto.connect_s3(access_key_id, secret_access_key, security_token=security_token) | |
bucket_info = [] | |
buckets = s3.get_all_buckets() | |
for bucket in buckets: | |
try: | |
policy = bucket.get_policy() | |
bucket_info.append(config_line_policy("s3:bucketpolicy", bucket.name, "", policy)) | |
except boto.exception.S3ResponseError as e: | |
bucket_info.append(config_line("s3:bucketpolicy", bucket.name, "", e.code)) | |
output_lines(bucket_info) | |
# SQS queue policies | |
verbose("Getting SQS queue policies:") | |
sqs = boto.connect_sqs(access_key_id, secret_access_key, security_token=security_token) | |
queue_info = [] | |
queues = sqs.get_all_queues() | |
for queue in queues: | |
try: | |
policy = sqs.get_queue_attributes(queue, "Policy")["Policy"] | |
queue_info.append(config_line_policy("sqs:queuepolicy", queue.url, "", policy)) | |
except KeyError: | |
queue_info.append(config_line("sqs:queuepolicy", queue.url, "", "NoPolicy")) | |
output_lines(queue_info) | |
# SNS topic policies | |
verbose("Getting SNS topic policies:") | |
sns = boto.connect_sns(access_key_id, secret_access_key, security_token=security_token) | |
topic_info = [] | |
topics = sns.get_all_topics() | |
topics = topics["ListTopicsResponse"]["ListTopicsResult"]["Topics"] | |
for topic in topics: | |
policy = sns.get_topic_attributes(topic["TopicArn"]) | |
policy = policy["GetTopicAttributesResponse"]["GetTopicAttributesResult"]["Attributes"]["Policy"] | |
topic_info.append(config_line_policy("sns:topicpolicy", topic["TopicArn"], "", policy)) | |
output_lines(topic_info) | |
# EC2 security groups | |
sg_info = [] | |
ec2 = boto.connect_ec2(access_key_id, secret_access_key, security_token=security_token) | |
groups = ec2.get_all_security_groups() | |
for group in groups: | |
for rule in group.rules: | |
for grant in rule.grants: | |
sg_info.append(config_line("ec2:security_group", group.name, str(rule), str(grant))) | |
output_lines(sg_info) |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
You can’t perform that action at this time.