atmos aws compliance report
Generate compliance posture reports against industry frameworks. Retrieves compliance status from AWS Security Hub enabled standards, maps failing controls to Atmos components, and generates reports with remediation guidance.
Description
The atmos aws compliance report command retrieves compliance status from AWS Security Hub enabled standards, maps failing controls to Atmos components that manage the affected resources, and generates reports. It supports multiple compliance frameworks and produces actionable reports that identify exactly which Terraform components need changes to achieve compliance.
Use it for:
- Compliance Audits: Generate reports showing your posture against specific compliance frameworks
- Remediation Planning: Identify which Atmos components need changes to fix failing controls
- Multi-Framework Assessment: Evaluate your infrastructure against multiple standards simultaneously
- Continuous Compliance: Integrate into CI/CD pipelines to track compliance drift over time
Usage
atmos aws compliance report [flags]
Flags
--stack, -s- Filter compliance results to a specific Atmos stack (e.g.,
prod-us-east-1). --framework- Compliance framework to evaluate against:
cis-aws,pci-dss,soc2,hipaa,nist. When omitted, reports on all enabled frameworks. --format, -f- Output format:
markdown,json,yaml,csv(default:markdown). --file- Write output to a file instead of stdout. Creates parent directories if they don't exist.
--controls- Comma-separated list of specific control IDs to evaluate (e.g.,
CIS.1.1,CIS.1.2). --identity, -i- Atmos Auth identity for AWS credentials (overrides
aws.security.identityconfig). --ai- Enable AI-powered analysis of the compliance report. The global
--aiflag captures the report output and sends it to the configured AI provider for a summary with remediation guidance for each failing control.
Examples
Basic Usage
Output Formats
AI-Powered Analysis
Saving to a File
Targeted Evaluation
CI/CD Integration
Supported Frameworks
cis-aws- CIS AWS Foundations Benchmark. Industry-standard security configuration guidelines for AWS accounts.
pci-dss- Payment Card Industry Data Security Standard. Required for organizations that handle credit card data.
soc2- SOC 2 (Service Organization Control 2). Trust service criteria for security, availability, processing integrity, confidentiality, and privacy.
hipaa- Health Insurance Portability and Accountability Act. Required for organizations handling protected health information (PHI).
nist- NIST 800-53. Security and privacy controls for federal information systems and organizations.
Configuration
Configure the compliance command in your atmos.yaml under the aws.security section:
aws:
security:
enabled: true
identity: "security-readonly" # Atmos Auth identity
region: "us-east-2" # Security Hub aggregation region
frameworks:
- cis-aws
- pci-dss
Related Commands
📄️ atmos aws security analyze
Analyze AWS security findings
📄️ atmos aws eks update-kubeconfig
Update kubeconfig for EKS clusters