AuditClaw Azure:自动化合规证据收集 - Openclaw Skills
作者:互联网
2026-04-14
什么是 AuditClaw Azure?
AuditClaw Azure 是专为 auditclaw-grc 框架设计的配套技能,支持在 Microsoft Azure 订阅中实现自动化安全审计。通过利用一组 12 项只读检查,该技能可以识别存储、网络、身份和计算资源中的配置差距。作为 Openclaw Skills 生态系统的一部分,它简化了 SOC2、ISO 27001 和 HIPAA 等监管框架所需的证据收集流程。
该技能通过仅要求“读者”和“安全读者”角色来优先考虑安全性,确保不会对您的云环境进行任何修改。它与集中式数据库无缝集成,允许安全团队在无需人工干预的情况下保持持续的合规态势。
下载入口:https://github.com/openclaw/skills/tree/main/skills/mailnike/auditclaw-azure
安装与下载
1. ClawHub CLI
从源直接安装技能的最快方式。
npx clawhub@latest install auditclaw-azure
2. 手动安装
将技能文件夹复制到以下位置之一
全局模式~/.openclaw/skills/
工作区
/skills/
优先级:工作区 > 本地 > 内置
3. 提示词安装
将此提示词复制到 OpenClaw 即可自动安装。
请帮我使用 Clawhub 安装 auditclaw-azure。如果尚未安装 Clawhub,请先安装(npm i -g clawhub)。
AuditClaw Azure 应用场景
- Azure 环境中 SOC2、ISO 或 HIPAA 审计的自动化证据收集。
- 持续监控 Azure 存储安全性,包括 TLS 版本和公共访问设置。
- 识别网络安全组 (NSG) 中不受限制的 SSH 或 RDP 访问。
- 验证 Key Vault 保护设置和 SQL Server 加密状态。
- 审计关键订阅资源中的 Microsoft Defender for Cloud 覆盖范围。
- 该技能使用 DefaultAzureCredential 初始化,通过服务主体、Azure CLI 或托管标识进行身份验证。
- 调用后,脚本将执行涵盖七个主要 Azure 服务类别的 12 项针对性检查。
- 收集的元数据和安全发现结果将被解析为标准化的 JSON 格式。
- 结果将自动推送至共享的 Openclaw Skills GRC 数据库 (compliance.sqlite)。
- 详细报告将映射到特定的控制 ID,以便在审计审查期间轻松检索。
AuditClaw Azure 配置指南
要开始使用 Openclaw Skills 库中的此条目,请执行以下步骤:
- 安装依赖项:
pip install -r scripts/requirements.txt
- 创建具有“读者”访问权限的 Azure 服务主体:
az ad sp create-for-rbac --name auditclaw-scanner --role Reader --scopes /subscriptions/
- 分配“安全读者”角色以进行全面扫描:
az role assignment create --assignee --role "Security Reader" --scope /subscriptions/
- 使用生成的凭据(客户端 ID、密钥、租户 ID 和订阅 ID)配置您的环境。
AuditClaw Azure 数据架构与分类体系
数据组织在本地 SQLite 数据库中,确保所有 Openclaw Skills 证据都集中管理。架构包括:
| 列 | 描述 |
|---|---|
| source | 对于此技能的所有发现结果,设置为 "azure" |
| type | 分类为 "automated"(自动化)收集 |
| control_id | 映射到 SOC2、ISO 或 HIPAA 合规框架 |
| file_content | 包含原始 Azure 资源配置的详细 JSON 块 |
| description | 安全发现结果的人类可读摘要 |
name: auditclaw-azure
description: Azure compliance evidence collection for auditclaw-grc. 12 read-only checks across storage, NSG, Key Vault, SQL, compute, App Service, and Defender for Cloud.
version: 1.0.1
user-invocable: true
homepage: https://www.auditclaw.ai
source: https://github.com/avansaber/auditclaw-azure
metadata: {"openclaw":{"type":"executable","install":{"pip":"scripts/requirements.txt"},"requires":{"bins":["python3"],"env":["AZURE_SUBSCRIPTION_ID","AZURE_CLIENT_ID","AZURE_CLIENT_SECRET","AZURE_TENANT_ID"]}}}
AuditClaw Azure
Companion skill for auditclaw-grc. Collects compliance evidence from Azure subscriptions using read-only API calls.
12 checks | Reader + Security Reader roles only | Evidence stored in shared GRC database
Security Model
- Read-only access: Requires only Reader + Security Reader roles (subscription-level). No write/modify permissions.
- Credentials: Uses
DefaultAzureCredential(service principal env vars,az login, or managed identity). No credentials stored by this skill. - Dependencies: Azure SDK packages (all pinned in requirements.txt)
- Data flow: Check results stored as evidence in
~/.openclaw/grc/compliance.sqlitevia auditclaw-grc
Prerequisites
- Azure credentials configured (service principal or
az login) pip install -r scripts/requirements.txt- auditclaw-grc skill installed and initialized
Commands
- "Run Azure evidence sweep": Run all checks, store results in GRC database
- "Check Azure storage security": Run storage-specific checks
- "Check Azure network security": Run NSG checks
- "Check Azure Key Vault": Run Key Vault checks
- "Check Azure SQL compliance": Run SQL Server checks
- "Check Azure VM encryption": Run compute checks
- "Check Azure App Service": Run App Service checks
- "Check Azure Defender": Run Defender for Cloud checks
- "Show Azure integration health": Last sync, errors, evidence count
Usage
All evidence is stored in the shared GRC database at ~/.openclaw/grc/compliance.sqlite via the auditclaw-grc skill's db_query.py script.
To run a full evidence sweep:
python3 scripts/azure_evidence.py --db-path ~/.openclaw/grc/compliance.sqlite --all
To run specific checks:
python3 scripts/azure_evidence.py --db-path ~/.openclaw/grc/compliance.sqlite --checks storage,network,keyvault
To list available checks:
python3 scripts/azure_evidence.py --list-checks
Check Categories (7 files, 12 findings)
| Check | What It Verifies |
|---|---|
| storage | HTTPS-only transfer, TLS 1.2+, public blob access disabled, network default deny |
| network | NSG no unrestricted SSH (port 22), no unrestricted RDP (port 3389) |
| keyvault | Soft delete + purge protection enabled |
| sql | Server auditing enabled, TDE encryption on all databases |
| compute | VM disk encryption (encryption at host) |
| appservice | HTTPS-only + TLS 1.2+ |
| defender | Defender plans enabled (Standard tier) for critical resource types |
Authentication
Uses DefaultAzureCredential from azure-identity. Supports:
- Service principal:
AZURE_CLIENT_ID+AZURE_TENANT_ID+AZURE_CLIENT_SECRET - Azure CLI:
az login - Managed identity (when running in Azure)
Minimum roles: Reader + Security Reader (subscription-level)
Evidence Storage
Each check produces evidence items stored with:
source: "azure"type: "automated"control_id: Mapped to relevant SOC2/ISO/HIPAA controlsdescription: Human-readable finding summaryfile_content: JSON details of the check result
Setup Guide
When a user asks to set up Azure integration, guide them through these steps:
Step 1: Create Service Principal
az ad sp create-for-rbac --name auditclaw-scanner --role Reader --scopes /subscriptions/
Step 2: Add Security Reader Role
az role assignment create --assignee --role "Security Reader" --scope /subscriptions/
Only 2 roles needed: Reader + Security Reader (subscription-level).
Step 3: Configure Credentials
Set environment variables from the service principal output:
- AZURE_CLIENT_ID (appId)
- AZURE_CLIENT_SECRET (password)
- AZURE_TENANT_ID (tenant)
- AZURE_SUBSCRIPTION_ID
Step 4: Verify Connection
Run: python3 {baseDir}/scripts/azure_evidence.py --test-connection
The exact roles are documented in scripts/azure-roles.json. Show with: python3 {baseDir}/../auditclaw-grc/scripts/db_query.py --action show-policy --provider azure
相关推荐
专题
+ 收藏
+ 收藏
+ 收藏
+ 收藏
+ 收藏
+ 收藏
最新数据
相关文章
面向 AI 代理的 UniFi Site Manager API 集成 - Openclaw Skills
云备份:AI 智能体 S3 存储与恢复 - Openclaw Skills
Poe API 编排器:自主多模型路由 - Openclaw Skills
OpenClaw 团队:安全零知识协作 - Openclaw 技能
Reminder Research:AI驱动的Apple提醒事项自动化 - Openclaw Skills
Clup:自动化 ClickUp 任务管理 - Openclaw Skills
Polymarket 新闻监控器:实时警报与 API 状态 - Openclaw Skills
服务器监控:实时系统性能追踪 - Openclaw Skills
Firecracker:轻量级 MicroVM 编排 - Openclaw Skills
Nag:AI 编程智能体的持续提醒系统 - Openclaw Skills
AI精选
从 Prompt 到 Harness:AI 工程的三重进化,你在哪一层?
这本 LLM 应用书,我翻了 5 遍:RAG 与 Agent 开发实战指南
现在面试 AI 相关问题,不把底层原理扒得明明白白,真的分分钟被问麻 | 沸点周刊 4.16
无人机拍叶片→AI找缺陷:CEA-DETR改进RT-DETR做风电叶片表面缺陷检测,mAP50达89.4%
学习编辑自己的 Skill:如何书写一个合格的 AI 工作流指令
替你筛完70个Skills!手把手教你调教Hermes Agent!
踩坑3天后,我把公司的AI接口全换成了多模型路由——GPT-6和Claude Opus 4.7同时上线的这周
一个问题,GPT-6是否值得期待???
