Installation

# Quick install (Go required) go install github.com/guardian-nexus/auditkit/scanner/cmd/auditkit@latest # Or build from source git clone https://github.com/guardian-nexus/AuditKit-Community-Edition.git cd auditkit/scanner && go build ./cmd/auditkit # Run your first scan ./auditkit scan -framework soc2 -format pdf -output report.pdf

Requires Go 1.21+ and read-only cloud credentials. See the documentation for cloud-specific setup guides.

See It In Action

$ auditkit scan -provider aws -framework soc2 -verbose # Scanning 64 SOC2 controls across AWS... ✗ FAIL | CC6.6 | MFA Not Enforced Evidence: 3 IAM users without MFA: admin-user, deploy-bot, john.doe Remediation: aws iam enable-mfa-device --user-name admin-user Screenshot: IAM → Users → Security credentials → Show MFA enabled Console URL: https://console.aws.amazon.com/iam/home#/users ✓ PASS | CC6.1 | CloudTrail Logging Enabled Evidence: CloudTrail enabled in all regions, logs encrypted Frameworks: SOC2 (CC6.1), PCI-DSS (10.2.2), CMMC (AU.L2-3.3.1) # Scan complete: 58/64 passing (91%) # PDF report: compliance-report.pdf

Every failed check includes the specific CLI command to fix it, a step-by-step screenshot guide for manual evidence collection, and a direct link to the relevant cloud console page.

Resources

Need CMMC Level 2, evidence packages, or continuous monitoring? AuditKit adds 110 CMMC L2 practices, multi-account scanning, drift detection, and more.