AWS SECURITY TOOLS

33 tools from the Aws Security MCP Server, categorised by risk level.

View the Aws Security policy →

READ TOOLS

26
detect_services Run Security Service Detection security scanner only. Read-only. Does not modify any AWS resources. get_setup_template Returns the CloudFormation StackSet template for deploying the cross-account security audit IAM role. Read-only. list_groups List available scan groups with descriptions. Read-only. list_modules List available security scan modules with descriptions. Read-only. Does not modify any AWS resources. list_org_accounts List all accounts in the AWS Organization. Useful for discovering accounts before multi-account scanning. Read-only. scan_access_analyzer_findings Run Access Analyzer Findings security scanner only. Read-only. Does not modify any AWS resources. scan_all Run all security scanners in parallel (including service detection). Read-only. Does not modify any AWS resources. Supports multi-account org scann... 2/5 scan_and_report Run a full security scan AND generate reports in one step. Avoids large data transfer between tools. Reports are saved to ~/.aws-security/reports/ scan_config_rules_findings Run Config Rules Findings security scanner only. Read-only. Does not modify any AWS resources. scan_disaster_recovery Run Disaster Recovery security scanner only. Read-only. Does not modify any AWS resources. scan_dns_dangling Run Dangling DNS security scanner only. Read-only. Does not modify any AWS resources. scan_group Run a predefined group of security scanners for a specific scenario (e.g., MLPS compliance, network defense). Read-only. Supports multi-account org... scan_guardduty_findings Run GuardDuty Findings security scanner only. Read-only. Does not modify any AWS resources. scan_iam_privilege_escalation Run IAM Privilege Escalation security scanner only. Read-only. Does not modify any AWS resources. scan_idle_resources Run Idle Resources security scanner only. Read-only. Does not modify any AWS resources. scan_imdsv2_enforcement Run IMDSv2 Enforcement security scanner only. Read-only. Does not modify any AWS resources. scan_inspector_findings Run Inspector Findings security scanner only. Read-only. Does not modify any AWS resources. scan_network_reachability Run Network Reachability security scanner only. Read-only. Does not modify any AWS resources. scan_patch_compliance_findings Run Patch Compliance Findings security scanner only. Read-only. Does not modify any AWS resources. scan_public_access_verify Run Public Access Verify security scanner only. Read-only. Does not modify any AWS resources. scan_secret_exposure Run Secret Exposure security scanner only. Read-only. Does not modify any AWS resources. scan_security_hub_findings Run Security Hub Findings security scanner only. Read-only. Does not modify any AWS resources. scan_ssl_certificate Run SSL Certificate security scanner only. Read-only. Does not modify any AWS resources. scan_tag_compliance Run Tag Compliance security scanner only. Read-only. Does not modify any AWS resources. scan_trusted_advisor_findings Run Trusted Advisor Findings security scanner only. Read-only. Does not modify any AWS resources. scan_waf_coverage Run WAF Coverage security scanner only. Read-only. Does not modify any AWS resources.

WRITE TOOLS

7
How many tools does the Aws Security MCP server have? +

The Aws Security MCP server exposes 33 tools across 2 categories: Read, Write.

How do I enforce policies on Aws Security tools? +

Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the Aws Security server.

What risk categories do Aws Security tools fall into? +

Aws Security tools are categorised as Read (26), Write (7). Each category has a recommended default policy.

Enforce policies on Aws Security

Open source. One binary. Zero dependencies.

npx -y @policylayer/intercept
github.com/policylayer/intercept →
// GET IN TOUCH

Have a question or want to learn more? Send us a message.

Message sent.

We'll get back to you soon.