readme.md in aws_recon-0.5.15 vs readme.md in aws_recon-0.5.16
- old
+ new
@@ -18,10 +18,31 @@
- More granular resource detail, including nested related resources in the output
- Flexible output (console, JSON lines, plain JSON, file, S3 bucket, and standard out)
- Efficient (multi-threaded, rate limited, automatic retries, and automatic result paging)
- Easy to maintain and extend
+## Awesome companies using AWS Recon**
+
+- [Netflix](https://www.netflix.com/)
+- [Hashicorp](https://www.hashicorp.com/)
+- [Workday](https://www.workday.com/)
+- [Stripe](https://stripe.com/)
+- [PayPal](https://paypal.com/)
+- [Typeform](https://typeform.com/)
+- [Amazon Web Services](https://aws.amazon.com/)
+- [Plaid](https://plaid.com/)
+- [Expel](https://expel.io/)
+- [Mozilla](https://www.mozilla.org/)
+- [Bugcrowd](https://www.bugcrowd.com/)
+- [Dropbox](https://www.dropbox.com/)
+- [Pinterest](https://www.pinterest.com/)
+- [HackerOne](https://www.hackerone.com/)
+- [MuleSoft](https://www.mulesoft.com/)
+- [Drata](https://drata.com/)
+
+> ** usage does not imply endorsement
+
## Setup
### Requirements
AWS Recon needs an AWS account role or credentials with `ReadOnlyAccess`. Full `AdministratorAccess` is over-privileged, but will work as well. The `SecurityAudit` policy is **not** sufficient as it omits access to many services.
@@ -53,17 +74,17 @@
To run locally, first install the gem:
```
$ gem install aws_recon
-Fetching aws_recon-0.5.2.gem
+Fetching aws_recon-0.5.16.gem
Fetching aws-sdk-3.0.1.gem
Fetching parallel-1.20.1.gem
...
Successfully installed aws-sdk-3.0.1
Successfully installed parallel-1.20.1
-Successfully installed aws_recon-0.5.2
+Successfully installed aws_recon-0.5.16
```
Or add it to your Gemfile using `bundle`:
```
@@ -71,11 +92,11 @@
Fetching gem metadata from https://rubygems.org/
Resolving dependencies...
...
Using aws-sdk 3.0.1
Using parallel-1.20.1
-Using aws_recon 0.5.2
+Using aws_recon 0.5.16
```
## Usage
AWS Recon will leverage any AWS credentials (see [requirements](#requirements)) currently available to the environment it runs in. If you are collecting from multiple accounts, you may want to leverage something like [aws-vault](https://github.com/99designs/aws-vault) to manage different credentials.
@@ -257,10 +278,10 @@
Most users will want to limit collection to relevant services and regions. Running without any exclusions will attempt to collect all resources from all regions enabled for the account.
```
$ aws_recon -h
-AWS Recon - AWS Inventory Collector (0.5.2)
+AWS Recon - AWS Inventory Collector (0.5.16)
Usage: aws_recon [options]
-r, --regions [REGIONS] Regions to scan, separated by comma (default: all)
-n, --not-regions [REGIONS] Regions to skip, separated by comma (default: none)
-s, --services [SERVICES] Services to scan, separated by comma (default: all)