runbooks certΒΆ
Find | Assess | 4 commands. Auto-generated from Click registry on 2026-03-25.
First time? Set up your AWS profiles
Before running any command, configure your AWS SSO profiles. See the Single Account or Multi-Account Landing Zone tabs below for copy-paste setup blocks.
AWS Profile ConfigurationΒΆ
All runbooks commands support these common options for AWS authentication:
| Option | Scope | When to Use |
|---|---|---|
--profile PROFILE |
Single account | Developer/operator targeting one AWS account |
--all-profiles |
All accounts (Landing Zone) | Platform team β discovers across all SSO profiles |
--region REGION |
Override region | Non-default region (default: ap-southeast-2) |
--dry-run |
Safe mode | Analysis only, no mutations (recommended for first run) |
--output-dir DIR |
Output path | Directory for generated reports (default: output/) |
--format FORMAT |
Output format | table, json, csv, markdown (varies by command) |
Copy and configure:
# =============================================================
# AWS Single Account Configuration
# =============================================================
export AWS_REGION="ap-southeast-2"
export AWS_PROFILE="your-account-profile"
# Authenticate via SSO
aws sso login --profile $AWS_PROFILE
# Verify
aws sts get-caller-identity --profile $AWS_PROFILE
# Run any command
runbooks finops dashboard --profile $AWS_PROFILE
Copy and configure all 4 environment variables:
# =============================================================
# AWS Multi-Account Landing Zone Configuration
# =============================================================
export AWS_REGION="ap-southeast-2"
## Single account (default fallback)
export AWS_PROFILE="your-default-profile"
## FinOps/Billing profile (READ-ONLY access to Cost Explorer)
export AWS_BILLING_PROFILE="your-billing-readonly-profile"
## Management account profile (Organizations, Control Tower)
export AWS_MANAGEMENT_PROFILE="your-management-readonly-profile"
## Centralized Operations account profile (for shared resources)
export AWS_OPERATIONS_PROFILE="your-operations-readonly-profile"
# =============================================================
# Authenticate all profiles
# =============================================================
aws sso login --profile $AWS_BILLING_PROFILE
aws sso login --profile $AWS_MANAGEMENT_PROFILE
aws sso login --profile $AWS_OPERATIONS_PROFILE
# =============================================================
# Verify connectivity
# =============================================================
aws sts get-caller-identity --profile $AWS_BILLING_PROFILE
aws sts get-caller-identity --profile $AWS_MANAGEMENT_PROFILE
# =============================================================
# Run org-wide commands
# =============================================================
runbooks inventory collect --all-profiles --region $AWS_REGION
runbooks finops dashboard --all-profiles --format table
Environment Variables ReferenceΒΆ
| Variable | Required | Purpose |
|---|---|---|
AWS_REGION |
Yes | Target AWS region (default: ap-southeast-2) |
AWS_PROFILE |
Yes | Default profile when --profile is omitted |
AWS_BILLING_PROFILE |
LZ only | Cost Explorer data enrichment |
AWS_MANAGEMENT_PROFILE |
LZ only | Organizations metadata enrichment |
AWS_OPERATIONS_PROFILE |
LZ only | Centralized Operations shared resources |
RUNBOOKS_TEST_MODE |
No | Set to 1 for offline/mock mode (no AWS calls) |
CommandsΒΆ
| Command | Description | Params | API Type |
|---|---|---|---|
expiring |
Show certificates expiring within N days. | 8 | read-only |
inventory |
Discover certificates across AWS accounts and Azure subscriptions. | 13 | read-only |
report |
Generate executive certificate assessment report (Markdown). | 6 | read-only |
triage |
Combined certificate triage: inventory + expiring + executive report. | 12 | read-only |
| ## Command Details |
runbooks cert expiringΒΆ
Show certificates expiring within N days.
All Parameters (8)
| Parameter | Type | Default | Description |
|---|---|---|---|
--days |
INT | 30 |
Show certs expiring within N days |
--profile |
STRING | - | AWS profile name |
--region |
STRING | ap-southeast-2 |
AWS region |
--all-accounts |
BOOL | False |
Scan all Landing Zone accounts via Organizations |
--management-profile |
STRING | - | AWS management account profile for Organizations |
--ops-profile |
STRING | - | AWS profile with Config Aggregator access (P1 org-wide path) |
--export-csv |
PATH | - | Export expiring certificates to CSV file |
--export-json |
PATH | - | Export expiring certificates to JSON file |
runbooks cert inventoryΒΆ
Discover certificates across AWS accounts and Azure subscriptions.
All Parameters (13)
| Parameter | Type | Default | Description |
|---|---|---|---|
--profile |
STRING | - | AWS profile name |
--region |
STRING | ap-southeast-2 |
AWS region |
--all-accounts |
BOOL | False |
Scan all Landing Zone accounts via Organizations |
--management-profile |
STRING | - | AWS management account profile for Organizations (required with --all-accounts) |
--ops-profile |
STRING | - | AWS profile with Config Aggregator access (P1 org-wide path, fastest). |
--azure |
BOOL | False |
Include Azure Key Vault certificates |
--subscription |
STRING | - | Azure subscription ID (required with --azure) |
--export-csv |
PATH | - | Export to CSV file |
--export-json |
PATH | - | Export to JSON file |
--output-dir |
PATH | - | Output directory for reports |
--count-only |
BOOL | False |
Print certificate count only (no detail table) |
--status |
STRING | - | Filter by ACM certificate status (e.g., ISSUED, EXPIRED, PENDING_VALIDATION) |
--in-use-only |
BOOL | False |
Show only in-use certificates (skip unused) |
runbooks cert reportΒΆ
Generate executive certificate assessment report (Markdown).
All Parameters (6)
| Parameter | Type | Default | Description |
|---|---|---|---|
--profile |
STRING | - | AWS profile name |
--region |
STRING | ap-southeast-2 |
AWS region |
--all-accounts |
BOOL | False |
Scan all Landing Zone accounts via Organizations |
--management-profile |
STRING | - | AWS management account profile for Organizations |
--ops-profile |
STRING | - | AWS profile with Config Aggregator access (P1 org-wide path) |
--output-dir |
PATH | . |
Output directory for the Markdown report |
runbooks cert triageΒΆ
Combined certificate triage: inventory + expiring + executive report.
All Parameters (12)
| Parameter | Type | Default | Description |
|---|---|---|---|
--days |
INT | 90 |
Triage window in days |
--profile |
STRING | - | AWS profile name |
--region |
STRING | ap-southeast-2 |
AWS region |
--all-accounts |
BOOL | False |
Scan all Landing Zone accounts |
--management-profile |
STRING | - | AWS management account profile |
--ops-profile |
STRING | - | AWS profile with Config Aggregator access |
--output-dir |
PATH | . |
Output directory for triage report |
--export-csv |
PATH | - | Export triage results to CSV file |
--export-json |
PATH | - | Export triage results to JSON file |
--in-use-only |
BOOL | False |
Show only in-use certificates (skip unused) |
--mode |
CHOICE(cloudops | executive | cto |
--email |
BOOL | False |
Generate stakeholder email template |
Command DetailsΒΆ
runbooks cert inventoryΒΆ
Discover certificates across AWS ACM, IAM server certificates, and optionally Azure Key Vault. Results displayed in colour-coded Rich table with expiry bucket classification.
All Parameters (13)
| Parameter | Type | Default | Description |
|---|---|---|---|
--profile |
string | None | AWS profile name |
--region |
string | ap-southeast-2 | AWS region |
--all-accounts |
flag | false | Scan all Landing Zone accounts via Organizations |
--management-profile |
string | None | Management account profile (required with --all-accounts) |
--ops-profile |
string | None | AWS profile with Config Aggregator access (P1 org-wide path, fastest). Falls back to AWS_OPERATIONS_PROFILE env var. |
--azure |
flag | false | Include Azure Key Vault certificates |
--subscription |
string | None | Azure subscription ID (required with --azure) |
--export-csv |
path | None | Export results to CSV file |
--export-json |
path | None | Export results to JSON file |
--output-dir |
path | None | Output directory for all exports |
--count-only |
flag | false | Print certificate count only (no detail table) |
--status |
string | None | Filter by ACM certificate status (e.g., ISSUED, EXPIRED, PENDING_VALIDATION) |
--in-use-only |
flag | false | Show only in-use certificates (skip unused) |
Output: Rich table with columns: Domain, Status, Expiry, Days, Source, In Use, ManagedBy, Account.
Expiry Buckets:
| Bucket | Criteria | Colour |
|---|---|---|
| EXPIRED | Past expiry date | Red bold |
| CRITICAL_7D | β€7 days | Red |
| WARNING_30D | β€30 days | Yellow |
| ATTENTION_90D | β€90 days | Dim yellow |
| VALID | >90 days | Green |
AWSO Context: AWSO-143 β 21 expired in-use certificates discovered across 31 accounts. Root cause: stale DNS CNAME validation records preventing ACM auto-renewal.
runbooks cert expiringΒΆ
Filter certificate inventory to show only certificates expiring within N days.
All Parameters (8)
| Parameter | Type | Default | Description |
|---|---|---|---|
--days |
int | 30 | Show certs expiring within N days |
--profile |
string | None | AWS profile name |
--region |
string | ap-southeast-2 | AWS region |
--all-accounts |
flag | false | Scan all Landing Zone accounts |
--management-profile |
string | None | Management account profile |
--ops-profile |
string | None | AWS profile with Config Aggregator access (P1 org-wide path) |
--export-csv |
path | None | Export expiring certificates to CSV file |
--export-json |
path | None | Export expiring certificates to JSON file |
runbooks cert reportΒΆ
Generate an executive-level Markdown report with risk assessment, expiry breakdown, and actionable items.
All Parameters (6)
| Parameter | Type | Default | Description |
|---|---|---|---|
--profile |
string | None | AWS profile name |
--region |
string | ap-southeast-2 | AWS region |
--all-accounts |
flag | false | Scan all Landing Zone accounts |
--management-profile |
string | None | Management account profile |
--ops-profile |
string | None | AWS profile with Config Aggregator access (P1 org-wide path) |
--output-dir |
path | . |
Output directory for the Markdown report |
Output: Markdown file at {output-dir}/certificate-assessment-{date}.md containing:
- Executive summary (total, in-use, unused, auto-renewal eligible)
- Expiry risk breakdown (5 buckets)
- Certificates by source (ACM, IAM, Azure)
- Certificates by managed team
- Immediate action table (EXPIRED + CRITICAL_7D items)
runbooks cert triageΒΆ
Combined certificate triage: runs inventory + expiring filter + executive report in a single command. Produces a complete certificate posture snapshot with actionable output.
All Parameters (10)
| Parameter | Type | Default | Description |
|---|---|---|---|
--days |
int | 90 | Triage window in days |
--profile |
string | None | AWS profile name |
--region |
string | ap-southeast-2 | AWS region |
--all-accounts |
flag | false | Scan all Landing Zone accounts |
--management-profile |
string | None | Management account profile |
--ops-profile |
string | None | AWS profile with Config Aggregator access |
--output-dir |
path | None | Output directory for triage report |
--export-csv |
path | None | Export triage results to CSV file |
--export-json |
path | None | Export triage results to JSON file |
--in-use-only |
flag | false | Show only in-use certificates (skip unused) |
Output: Combined Rich console output (inventory table + expiry summary) plus Markdown report file.
JIRA TraceabilityΒΆ
| AWSO Ticket | Command | Automation Status |
|---|---|---|
| AWSO-143 | cert inventory --all-accounts |
CLI implemented, docs created |