Get your first compliance scan running in 5 minutes
chmod +x auditkit./auditkit scangit clone https://github.com/guardian-nexus/auditkit
cd auditkit/scanner
go build ./cmd/auditkit
./auditkit scan
# 1. Configure credentials
aws configure
# 2. Run scan
./auditkit scan -provider aws -framework soc2
# 3. Generate PDF
./auditkit scan -provider aws -framework soc2 -format pdf -output report.pdf
# 1. Login to Azure
az login
export AZURE_SUBSCRIPTION_ID="your-subscription-id"
# 2. Run scan
./auditkit scan -provider azure -framework soc2
# 3. Generate PDF
./auditkit scan -provider azure -framework soc2 -format pdf -output report.pdf
# 1. Login to GCP
gcloud auth application-default login
export GOOGLE_CLOUD_PROJECT=your-project-id
# 2. Run scan
./auditkit scan -provider gcp -framework soc2
# 3. Generate PDF
./auditkit scan -provider gcp -framework soc2 -format pdf -output report.pdf
AuditKit SOC2 Compliance Scan Results
=====================================
AWS Account: 123456789012
Scan Time: 2025-10-19 14:30:00
Compliance Score: 72.5%
Controls Passed: 46/64
Critical Issues: 3 (FIX IMMEDIATELY)
High Priority: 6
Medium Priority: 4
CRITICAL - Fix These NOW:
[FAIL] CC6.6 - User MFA Enforcement
[FAIL] CC6.2 - S3 Bucket Public Access
[FAIL] CC6.1 - IAM Key Rotation
What this means:
PDF Report - For auditors and management
./auditkit scan -format pdf -output report.pdf
HTML Report - Interactive, great for teams
./auditkit scan -format html -output report.html
JSON Report - For automation/CI/CD
./auditkit scan -format json -output results.json
AuditKit shows exact commands to fix each issue:
# Generate fix script
./auditkit fix -output fixes.sh
# Review the script
cat fixes.sh
# Run fixes (review first!)
bash fixes.sh
# Show improvement over time
./auditkit progress
# Compare last two scans
./auditkit compare
# PCI-DSS
./auditkit scan -framework pci
# CMMC Level 1
./auditkit scan -framework cmmc
# NIST 800-53
./auditkit scan -framework 800-53
# All frameworks
./auditkit scan -framework all
Goal: Pass SOC2 Type II audit without hiring consultants
Steps:
./auditkit scan -framework soc2Timeline: Most startups fix 80%+ of issues in 2-4 weeks
Goal: Self-assess CMMC Level 1 before C3PAO assessment
Steps:
./auditkit scan -framework cmmcGoal: Single compliance view across AWS + Azure + GCP
# Scan all providers
./auditkit scan -provider aws -framework soc2 -output aws.json
./auditkit scan -provider azure -framework soc2 -output azure.json
./auditkit scan -provider gcp -framework soc2 -output gcp.json
Solution:
aws configure
# Enter your AWS Access Key ID and Secret Access Key
Solution:
az login
az account list # Find your subscription ID
export AZURE_SUBSCRIPTION_ID="your-sub-id"
Solution:
gcloud auth application-default login
gcloud projects list # Find your project ID
export GOOGLE_CLOUD_PROJECT=your-project-id
Common cause: Security services not enabled
Solution: Enable these first:
Then re-scan.
Complete command documentation with all flags and options
Detailed authentication guides for AWS, Azure, and GCP
Answers to common questions and troubleshooting tips