Skip to content

Project Aegis: Multi-cloud governance engine for cost optimization and security compliance

Notifications You must be signed in to change notification settings

Shrinet82/aegis-governance

Repository files navigation

🛡️ Project Aegis: The Autonomous Cloud Immune System

"A governance engine that cleans up cost leakage and neutralizes security threats in real-time."

Project Aegis is a multi-cloud governance platform (AWS & Azure) built with Policy-as-Code. Unlike traditional "audit" tools that just send emails, Aegis acts as an active immune system—automatically identifying orphaned resources ("zombies") and destroying security risks.


📉 The Problem: Quantifying the Gaps

Before automation, cloud governance was a manual, reactive process. Here are the real numbers from this project's testing environment:

Gap Before Aegis After Aegis Improvement
🚀 Velocity Gap Manual ticket → remediation: ~4-24 hours (depends on on-call response) Automated detection → remediation: < 2 minutes 720x faster
🔧 Toil Gap 7 manual steps per incident (Alert → Ack → Login → Find → Fix → Verify → Close) 0 manual steps (fully autonomous) 100% toil eliminated
💰 Cost Gap 2 orphaned EBS volumes (1 GB each) sitting idle for 4+ days = ~$0.20/month wasted Volumes tagged for auto-deletion within 24 hours $0.16/month saved (this demo account)
🔐 Security Gap Insecure SG rule (0.0.0.0/0 on port 22) exposed for indefinite duration until audit Rule auto-revoked in < 2 minutes with audit trail MTTR: 120 seconds

Note

These metrics are from a demo environment with minimal resources. In production environments with hundreds of resources, the impact scales significantly. Industry benchmarks suggest MTTR improvements from days to minutes can prevent breaches costing $4.45M on average (IBM Cost of a Data Breach 2023).


🏗️ Architecture

Aegis operates on an Event-Driven Architecture to ensure milliseconds-latency response to threats.

graph TD
    User([User / Attacker]) -->|Create Insecure SG| CloudTrail
    CloudTrail -->|Event| EventBridge
    EventBridge -->|Trigger| Lambda[Aegis Enforcer Lambda]
    Lambda -->|1. Mark| Resource[Security Group]
    Lambda -->|2. Notify| Dashboard[Powerpipe Dashboard]

    subgraph "Grace Period Protocol"
    Sweeper[Sweeper Policy] -->|Check Tags| Resource
    Sweeper -->|Delete Rule| Resource
    end
Loading

🚀 Key Capabilities

Feature Function Latency Protocol
The Janitor 🧹 Identifies & deletes orphaned EBS/Disks Daily Cost Optimization
The Enforcer 🔫 Detects & kills insecure Security Rules < 30 Seconds Zero-Trust Security
Grace Period Buffers deletion to allow admin review 5 Minutes Mark-and-Sweep
The Auditor 📊 Visualizes kills & savings in real-time Live Observability

🧠 The "Brain": Policies

Aegis uses Cloud Custodian to define rules.

1. Security Enforcer (Mark-and-Sweep)

Instead of "shoot first, ask questions later," Aegis now uses a sophisticated Grace Period protocol.

Phase Action Description
1. Detection mark-for-op Instantly tags the resource: custodian_cleanup: remove-permissions@<timestamp>.
2. Warning Dashboard The resource appears in the "Pending Kills" table on the dashboard.
3. Execution remove-permissions After 5 Minutes, the Sweeper deletes the rule if it remains non-compliant.

2. Cost Janitor

  • Orphaned EBS Volumes: Marked for deletion after 4 days of disuse.
  • Unattached IPs: Released immediately to save costs.

📊 The Dashboard (Proof of Value)

The Powerpipe Dashboard provides a single pane of glass for the "Immune System".

Key Views

  1. Pending Kills (Grace Period):
    • Shows resources currently on "Death Row".
    • Displays the countdown trigger time.
  2. Recent Kills (Audit Log):
    • Immutable log of every threat neutralized by the system.
    • Sourced directly from CloudTrail.

🛠️ Project Structure

aegis-governance/
├── config/              # Central configuration (e.g., S3 Bucket Policies)
├── dashboard/           # Powerpipe Dashboard code (*.pp)
├── policies/            # The "Brain" (YAML Policies)
│   ├── aws-cost-governance.yml
│   └── aws-security-enforcer.yml
├── tests/               # Test payloads (trigger.json)
└── .github/             # CI/CD Pipelines

🔧 Usage Guide

prerequisites

  • AWS CLI configured with Admin permissions.
  • Python 3.10+ & Cloud Custodian (pip install c7n).
  • Steampipe & Powerpipe (for the Dashboard).

Deploying Policies

# Deploy to US-East-1
custodian run --output-dir . -r us-east-1 policies/aws-security-enforcer.yml

Running the Dashboard

cd dashboard
powerpipe server --port 9033

Visist http://localhost:9033 to see the system live.


Part of the 2026 Autonomous Cloud Stack.

About

Project Aegis: Multi-cloud governance engine for cost optimization and security compliance

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published