Metadata-Version: 2.1
Name: scp-analyzer
Version: 0.3.1
Summary: Discover and present SCPs applicable to each account in an AWS Organization
Home-page: https://github.com/aws-samples/scp-analyzer
License: MIT-0
Author: Pedro Galvao
Author-email: pgalvao@amazon.co.uk
Requires-Python: >=3.9,<4.0
Classifier: Development Status :: 5 - Production/Stable
Classifier: Intended Audience :: Developers
Classifier: License :: OSI Approved :: MIT No Attribution License (MIT-0)
Classifier: License :: Other/Proprietary License
Classifier: Natural Language :: English
Classifier: Operating System :: OS Independent
Classifier: Programming Language :: Python :: 3
Classifier: Programming Language :: Python :: 3.10
Classifier: Programming Language :: Python :: 3.9
Requires-Dist: boto3 (>=1.17.73,<2.0.0)
Requires-Dist: pandas (>=1.2.4,<2.0.0)
Project-URL: Repository, https://github.com/aws-samples/scp-analyzer
Description-Content-Type: text/markdown

# Service Control Policy Analyzer

This tool collects and presents all the Service Control Policies (SCPs) applicable to each account in an AWS Organization. It's purpose is to help developers and security teams understand how SCPs might be blocking activities in any account of the AWS Organization.

## Sample output

![scp-analyzeroutput](doc/sample-output.png)

## Installation

`pip install scp-analyzer` 

## Use

Obtain AWS CLI credentials to the Organizations Management account or a delegated administration account. Ensure you have Organizations Read Only permissions and run `scp-analyzer` to collect data. The tool will write output to a csv file.

## Security

See [CONTRIBUTING](CONTRIBUTING.md#security-issue-notifications) for more information.

## License

This library is licensed under the MIT-0 License. See the LICENSE file.



