Metadata-Version: 2.4
Name: scp-analyzer
Version: 0.8.0
Summary: Discover and present SCPs applicable to each account in an AWS Organization
Project-URL: homepage, https://github.com/aws-samples/scp-analyzer
Project-URL: repository, https://github.com/aws-samples/scp-analyzer
Author-email: Pedro Galvao <pgalvao@amazon.co.uk>
License-Expression: MIT-0
License-File: LICENSE
License-File: NOTICE
Classifier: Development Status :: 5 - Production/Stable
Classifier: Intended Audience :: Developers
Classifier: License :: OSI Approved :: MIT No Attribution License (MIT-0)
Classifier: Natural Language :: English
Classifier: Operating System :: OS Independent
Classifier: Programming Language :: Python :: 3
Requires-Python: >=3.9
Requires-Dist: boto3>=1.39.3
Requires-Dist: pandas>=2.3.1
Requires-Dist: typer>=0.16.0
Description-Content-Type: text/markdown

# Service Control Policy Analyzer

This tool collects and presents all the Service Control Policies (SCPs) applicable to each account in an AWS Organization. It's purpose is to help developers and security teams understand how SCPs might be blocking activities in any account of the AWS Organization.

## Sample output

![scp-analyzeroutput](doc/sample-output.png)

## Installation

`pip install scp-analyzer` 

## Use

Obtain AWS CLI credentials to the Organizations Management account or a delegated administration account. Ensure you have Organizations Read Only permissions and run `scp-analyzer` to collect data. The tool will write output to a csv file.

## Security

See [CONTRIBUTING](CONTRIBUTING.md#security-issue-notifications) for more information.

## License

This library is licensed under the MIT-0 License. See the LICENSE file.


