Enforce ownership and data security within AWS
Cloud Inquisitor is currently undergoing a refresh to embrace newer cloud-native technologies while also realigning on its core vision.
You can follow our work in the branch
The project will no longer accept external PRs against the code base and will be grooming and closing any issues we do not believe will be pertanent to Cloud Inquisitors new alignment.
However, we will still accept feature requests in the form of an issue but will prioritize the replacement of target features within Cloud Inquisitor over new features.
Now back to the original Readme
Cloud Inquisitor can be used to improve the security posture of your AWS footprint through:
Please see the official docs here for more information on how to deploy, configure and operate Cloud Inquisitor in your environment.
If you would like to contribute, please check out our Contributing Guidelines.