You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Is your feature request related to a problem? Please describe.
Currently, ScoutSuite generates separate reports for different scans within the same AWS environment (e.g., scans of different AWS accounts within an organization). When auditing multiple AWS accounts, this results in a large number of individual reports, making it difficult to get a consolidated overview of the security posture across all accounts. This requires manual effort to collate and compare findings, which is time-consuming and prone to errors. I'm always frustrated when I have to manually combine multiple reports to get a holistic view.
Describe the solution you'd like
I would like ScoutSuite to have the ability to generate a consolidated report that aggregates findings from multiple scans of different AWS accounts. This consolidated report should:
Combine findings: Merge findings from different reports into a single report, with clear identification of the source AWS account for each finding.
Provide a summary overview: Include a summary section that provides a high-level overview of the security posture across all scanned AWS accounts, including key metrics and statistics.
Offer filtering and sorting: Allow users to filter and sort findings based on various criteria, such as severity, AWS service, finding type, and source account.
Support different output formats: Support the same output formats as individual reports (e.g., HTML, JSON, CSV) for the consolidated report.
Ideally, offer the ability to select which reports to consolidate: This would allow for more granular control over the consolidation process, allowing users to combine only specific reports as needed.
Describe alternatives you've considered
Manual consolidation: I've considered manually combining the reports using scripts or spreadsheets. However, this is a time-consuming and error-prone process, especially with a large number of reports.
Additional context
This feature would significantly improve the usability of ScoutSuite for organizations managing multiple AWS accounts. It would provide a much more efficient way to assess overall security posture and identify cross-account security issues. For example, being able to quickly identify where the same critical vulnerability exists across multiple AWS accounts would greatly improve response times. This feature would be especially valuable for security analysts, auditors, and cloud security engineers.
Key changes from the previous suggestion:
Specifically focuses on consolidating reports within the same AWS environment.
Emphasizes the need for consolidating reports from different AWS accounts.
By focusing the request on the AWS context, you increase the likelihood that it will be understood and addressed effectively.
The text was updated successfully, but these errors were encountered:
Is your feature request related to a problem? Please describe.
Currently, ScoutSuite generates separate reports for different scans within the same AWS environment (e.g., scans of different AWS accounts within an organization). When auditing multiple AWS accounts, this results in a large number of individual reports, making it difficult to get a consolidated overview of the security posture across all accounts. This requires manual effort to collate and compare findings, which is time-consuming and prone to errors. I'm always frustrated when I have to manually combine multiple reports to get a holistic view.
Describe the solution you'd like
I would like ScoutSuite to have the ability to generate a consolidated report that aggregates findings from multiple scans of different AWS accounts. This consolidated report should:
Describe alternatives you've considered
Additional context
This feature would significantly improve the usability of ScoutSuite for organizations managing multiple AWS accounts. It would provide a much more efficient way to assess overall security posture and identify cross-account security issues. For example, being able to quickly identify where the same critical vulnerability exists across multiple AWS accounts would greatly improve response times. This feature would be especially valuable for security analysts, auditors, and cloud security engineers.
Key changes from the previous suggestion:
By focusing the request on the AWS context, you increase the likelihood that it will be understood and addressed effectively.
The text was updated successfully, but these errors were encountered: