11/12 free views
Tool
CLI
Identity & Access Management (IAM)

cloudsplaining

by salesforce

2.2Kstars
217forks
30watchers
Updated 23 days ago
About

Cloudsplaining is an AWS IAM security assessment tool that detects least privilege violations and generates risk-prioritized HTML reports.

Cloudsplaining is an AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized report.

Primary Use Case

Cloudsplaining is used by security professionals and AWS administrators to audit and assess IAM policies for violations of least privilege, helping to identify risky permissions and prioritize remediation efforts. It is especially useful for penetration testers and cloud security teams to detect privilege escalation paths and overly permissive roles in AWS environments.

Key Features
  • Identifies violations of least privilege in AWS IAM policies
  • Generates risk-prioritized, easy-to-read HTML reports with triage worksheets
  • Scans all IAM policies in an AWS account or individual policy files
  • Flags high-risk permissions related to data exfiltration, infrastructure modification, resource exposure, and privilege escalation
  • Detects IAM roles assumable by AWS Compute Services that may present elevated risk
  • Supports custom exclusions to filter out false positives
  • Provides example reports and detailed documentation

Installation

  • Ensure Python is installed on your system
  • Install Cloudsplaining via pip: pip install cloudsplaining
  • Refer to the official documentation on ReadTheDocs for detailed setup and usage

Usage

>_ cloudsplaining scan aws-account

Scans all IAM policies in the specified AWS account and generates a risk-prioritized HTML report.

>_ cloudsplaining scan policy-file.json

Scans a single IAM policy file to identify least privilege violations and risks.

>_ cloudsplaining scan --exclusions exclusions.yaml

Runs a scan while applying a custom exclusions file to filter out false positives.

Security Frameworks
Reconnaissance
Privilege Escalation
Defense Evasion
Discovery
Collection
Usage Insights
  • Integrate Cloudsplaining into CI/CD pipelines for continuous IAM policy risk assessment.
  • Use Cloudsplaining reports to prioritize remediation efforts based on risk scoring.
  • Combine with AWS CloudTrail logs to correlate risky IAM permissions with actual usage patterns.
  • Leverage the tool during purple team exercises to simulate and detect privilege escalation paths.
  • Customize exclusion filters to reduce false positives and focus on high-impact IAM risks.

Docs Take 2 Hours. AI Takes 10 Seconds.

Ask anything about cloudsplaining. Installation? Config? Troubleshooting? Get answers trained on real docs and GitHub issues—not generic ChatGPT fluff.

3 free chats per tool • Instant responses • No credit card

Security Profile
Red Team80%
Blue Team60%
Purple Team70%
Details
LicenseBSD 3-Clause "New" or "Revised" License
LanguageJavaScript
Open Issues128
Topics
aws
aws-iam
cloud
security
salesforce
aws-security
cloud-security
iam
hacktoberfest