forked from HariSekhon/DevOps-Bash-tools
-
Notifications
You must be signed in to change notification settings - Fork 0
/
aws_account_summary.sh
executable file
·84 lines (62 loc) · 2.66 KB
/
aws_account_summary.sh
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
#!/usr/bin/env bash
# vim:ts=4:sts=4:sw=4:et
#
# Author: Hari Sekhon
# Date: 2020-01-07 15:08:44 +0000 (Tue, 07 Jan 2020)
#
# https://github.com/harisekhon/bash-tools
#
# License: see accompanying Hari Sekhon LICENSE file
#
# If you're using my code you're welcome to connect with me on LinkedIn and optionally send me feedback to help steer this or other code I publish
#
# https://www.linkedin.com/in/harisekhon
#
set -euo pipefail
[ -n "${DEBUG:-}" ] && set -x
srcdir="$(cd "$(dirname "${BASH_SOURCE[0]}")" && pwd)"
# shellcheck disable=SC1090
. "$srcdir/lib/aws.sh"
# shellcheck disable=SC2034,SC2154
usage_description="
Prints AWS account summary in 'key = value' pairs for easy viewing / grepping
Useful information includes whether the root account has MFA enabled and no access keys:
AccountAccessKeysPresent = 0
AccountMFAEnabled = 1
or comparing number of users to number of MFA devices eg.
MFADevices = 6
MFADevicesInUse = 6
...
Users = 14
If you don't have AWS Organizations permissions, you'll probably get an error like this, in which case the account name and root account email won't be printed:
An error occurred (AccessDeniedException) when calling the DescribeAccount operation: You don't have permissions to access this resource.
This may happen for example when you're using an AWS SSO account that doesn't have privileges at the Organization level to describe the account.
This can be safely ignored, the rest of the IAM account summary info containing details such as MFA devices, users and policies etc will be there.
See Also:
aws_users_mfa_active_report.sh (adjacent)
check_aws_root_account.py - in The Advanced Nagios Plugins collection (https://github.com/harisekhon/nagios-plugins)
$usage_aws_cli_required
"
# used by usage() in lib/utils.sh
# shellcheck disable=SC2034
usage_args="[<aws_profile>]"
help_usage "$@"
# XXX: can't set this to account_id as account summary info only works on a profile basis
profile="${1:-}"
if [ -n "$profile" ]; then
export AWS_PROFILE="$profile"
fi
export AWS_DEFAULT_OUTPUT=json
account_id="$(aws sts get-caller-identity --query Account --output text | tr -d '\r')"
echo "AccountID = $account_id"
# XXX: might not have permissions to run this one, skip it if so
account_info="$(aws organizations describe-account --account-id "$account_id" || :)"
if [ -n "$account_info" ]; then
account_name="$(jq -r '.Account.Name' <<< "$account_info")"
echo "AccountName = $account_name"
account_email="$(jq -r '.Account.Email' <<< "$account_info")"
echo "AccountEmail = $account_email"
fi
aws iam get-account-summary |
jq -r '.SummaryMap | to_entries | map(.key + " = " + (.value | tostring)) | .[]' |
sort