workstreet-compliance/cloud-collector
Cloud compliance evidence collectors for AWS, GCP and Azure
0 stars0 forksUpdated Jan 22, 2026
npx skills add workstreet-compliance/cloud-collectorREADME
Cloud Collector
Automated compliance evidence collection for AWS, GCP, and Azure
Installation • Quick Start • Evidence • Frameworks • Contributing
Generate audit-ready evidence packages with automatic mapping to SOC 2, ISO 27001, NIST 800-53, and CIS benchmarks. Outputs structured JSON for GRC tools and formatted Markdown for auditor review.
Installation
Via skills.sh
npx skills add Workstreet-Compliance/Cloud-Collector
Via pip
git clone https://github.com/Workstreet-Compliance/Cloud-Collector.git
cd Cloud-Collector
pip install -r requirements.txt
Quick Start
Using with Claude Code
Just ask naturally:
"Collect SOC 2 evidence from my AWS account"
"Generate ISO 27001 audit documentation for GCP project xyz"
"Check my Azure subscription for NIST 800-53 compliance"
Programmatic Usage
from skills.evidence_collector.scripts.aws_evidence import AWSEvidenceCollector
from skills.evidence_collector.scripts.output_formatter import EvidenceFormatter
# Collect evidence
collector = AWSEvidenceCollector()
package = collector.collect_all()
# Export
EvidenceFormatter.save(package, "./evidence_output") # JSON + Markdown
GCP Example
from skills.evidence_collector.scripts.gcp_evidence import GCPEvidenceCollector
collector = GCPEvidenceCollector(project_id="my-project-id")
package = collector.collect_all()
Azure Example
from skills.evidence_collector.scripts.azure_evidence import AzureEvidenceCollector
collector = AzureEvidenceCollector(subscription_id="your-subscription-id")
package = collector.collect_all()
Evidence Categories
| Category | AWS | GCP | Azure |
|---|---|---|---|
| IAM | Users, roles, policies, MFA | IAM bindings, service accounts | RBAC, custom roles |
| Logging | CloudTrail | Audit logs, sinks | Activity logs, diagnostics |
| Storage | S3 policies, encryption | GCS IAM, public access | Storage account security |
| Security | Security Hub findings | Security Command Center | Defender for Cloud |
| Encryption | KMS keys, rotation | Cloud KMS key rings | Key Vault config |
| Network | VPC, security groups, NACLs | Firewall rules, VPC | NSGs, VNets |
Frameworks
SOC 2Type II CC6.x CC7.x
|
ISO 270012022 Annex A
|
NIST800-53 Rev. 5 AC AU SC
|
CISBenchmarks v2.0 AWS GCP Azure
|
See references/control_mappings.md for complete mapping details.
Prerequisites
AWS Credentials
# Option 1: AWS CLI
aws configure
# Option 2: Environment variables
export AWS_ACCESS_KEY_ID=xxx
export AWS_SECRET_ACCESS_KEY=xxx
Required permissions:
iam:Get*,iam:List*cloudtrail:Describe*,cloudtrail:Get*s3:GetBucket*,s3:ListBucketsecurityhub:Get*kms:Describe*,kms:List*ec2:Describe*
GCP Credentials
# Option 1: Application Default Credentials
gcloud auth application-default login
# Option 2: Service account
export GOOGLE_APPLICATION_CREDENTIALS=/path/to/key.json
Required roles:
roles/iam.securityReviewerroles/logging.viewerroles/storage.objectViewerroles/securitycenter.findingsViewerroles/cloudkms.viewerroles/compute.viewer
Azure Credentials
# Option 1: Azure CLI
az login
# Option 2: Service prin
...
Publisher
Statistics
Stars0
Forks0
Open Issues0
CreatedJan 22, 2026