π‘ Need expert help optimizing your AWS infrastructure? Professional consulting services available β
π Identify AWS cost waste and security vulnerabilities across 16 core services with a single command
Save thousands of dollars monthly and improve security posture by finding unused resources, oversized instances, misconfigurations, and compliance issues
π― Quick Start β’ π Documentation β’ π§ Installation β’ π‘ Examples
Not just CLI! Kosty includes a beautiful, modern web dashboard to visualize your optimization results:
β¨ Premium Features: Interactive charts, responsive design, real-time data visualization, and professional reporting.
After years of AWS consulting , I kept finding the same costly patterns:
- Load Balancers with no targets 10K$-30K$/year wasted
- Orphaned EBS volumes: $1,000-2,500/year
- Unused NAT Gateways, oversized instances, old snapshots,...
Every. Single. Time.
So I built Kosty - the tool I wish existed when I started consulting.
- π Scans 16 core AWS services in one command
- π° Quantifies cost savings with real dollar amounts (11 services)
- π Finds oversized instances (EC2, RDS, Lambda)
- π Detects security vulnerabilities (public DBs, unencrypted storage, open ports)
- π‘οΈ Identifies compliance issues (old access keys, public snapshots, weak configurations)
One command. Full audit. Real savings. Free forever.
AWS costs and security risks can spiral out of control quickly. Kosty helps you:
- π Discover unused resources and security vulnerabilities across 16 core AWS services
- π° Quantify cost savings with real dollar amounts ($X/month calculations)
- π Detect security misconfigurations and compliance issues
- β‘ Optimize with prioritized recommendations by financial impact
- π’ Scale across entire AWS Organizations with parallel processing
- π Track ROI with comprehensive cost reporting
# Install Kosty via pip (recommended)
pip install kosty
# Or install from source
git clone https://github.com/kosty-cloud/kosty.git
cd kosty && ./install.sh
# π ONE COMMAND TO RULE THEM ALL - Comprehensive scan
kosty audit --output all
# Organization-wide comprehensive scan with reports
kosty audit --organization --max-workers 20 --output all
# Individual service scans
kosty ec2 audit --cpu-threshold 20
kosty rds audit
kosty s3 audit
# Cost and security audits separately
kosty ec2 cost-audit --cpu-threshold 20
kosty s3 security-audit
kosty iam security-audit
# Individual checks
kosty ec2 check-oversized-instances --cpu-threshold 20
kosty ec2 check-stopped-instances --days 7
kosty s3 check-empty-buckets
kosty rds check-public-databases
# π View results in beautiful dashboard
open dashboard/index.html- Python 3.7+
- AWS CLI configured with appropriate credentials
pip install kostygit clone https://github.com/kosty-cloud/kosty.git
cd kosty
./install.shgit clone https://github.com/kosty-cloud/kosty.git
cd kosty
pip install -e .# Find oversized EC2 instances (potential $280/month per m5.2xlarge)
kosty ec2 check-oversized-instances --cpu-threshold 20
# Find oversized RDS instances (potential $700/month per db.r5.4xlarge)
kosty rds check-oversized-instances --cpu-threshold 20
# Find over-provisioned Lambda functions (memory optimization savings)
kosty lambda check-over-provisioned-memory
# Find orphaned EBS volumes (potential $10/month per 100GB)
kosty ebs check-orphan-volumes
# Find unattached Elastic IPs (potential $3.60/month each)
kosty eip check-unattached-eips
# π° View total potential savings in dashboard
kosty audit --output json && open dashboard/index.html# Storage optimization & security
kosty s3 check-empty-buckets
kosty s3 check-public-read-access
kosty s3 check-encryption-at-rest
kosty ebs check-orphan-volumes
kosty ebs check-unencrypted-orphan
kosty snapshots check-old-snapshots --days 30
kosty snapshots check-public-snapshots
# Database optimization & security
kosty rds check-oversized-instances --cpu-threshold 20
kosty rds check-public-databases
kosty rds check-unencrypted-storage
kosty dynamodb check-idle-tables
# Network optimization & security
kosty lb check-no-healthy-targets
kosty nat check-unused-gateways
kosty sg check-unused-groups
kosty sg check-overly-permissive
# Security & compliance checks
kosty ec2 check-ssh-open
kosty ec2 check-imdsv1
kosty ec2 check-unencrypted-ebs
kosty iam check-root-access-keys
kosty iam check-unused-roles
kosty iam check-old-access-keys# π― ULTIMATE COST AUDIT - All services, all checks
kosty audit --output all
# Organization-wide comprehensive scan (16 services)
kosty audit --organization --max-workers 20 --output json
# Multi-region comprehensive audit
kosty audit --regions us-east-1,eu-west-1,ap-southeast-1 --output csv
# Single region scan
kosty audit --region eu-west-1 --output json
# Quick console summary
kosty audit --output console
# Generate all report formats
kosty audit --organization --output all --max-workers 15
# π Visualize results in dashboard
kosty audit --output json
open dashboard/index.html # Upload the JSON fileKosty offers 3 types of commands for maximum flexibility:
kosty <service> audit # Complete audit (cost + security)
kosty ec2 audit # All EC2 checks
kosty s3 audit # All S3 checkskosty <service> cost-audit # Cost optimization only
kosty <service> security-audit # Security issues only
kosty ec2 cost-audit # EC2 cost issues only
kosty s3 security-audit # S3 security issues only
kosty iam security-audit # IAM security issues onlykosty <service> check-<issue> # Specific check
kosty ec2 check-oversized-instances
kosty ec2 check-stopped-instances
kosty s3 check-empty-buckets
kosty rds check-public-databases
kosty iam check-root-access-keys# Multi-region scanning
kosty audit --regions us-east-1,eu-west-1,ap-southeast-1
kosty ec2 audit --regions us-east-1,eu-west-1
# Organization-wide with multi-region
kosty audit --organization --regions us-east-1,eu-west-1 --max-workers 20
kosty s3 check-public-read-access --organization --regions us-east-1,eu-west-1
# Custom cross-account role for organization scanning
kosty audit --organization --cross-account-role MyCustomRole
# Separate organizational admin account
kosty audit --organization --org-admin-account-id 123456789012
# Combined custom role and admin account
kosty audit --organization --cross-account-role MyRole --org-admin-account-id 123456789012# Run audit on all profiles from config file
kosty audit --profiles --output all
# Control parallel execution (default: 3 profiles at once)
kosty audit --profiles --max-parallel-profiles 5
# Multi-profile with custom config file
kosty audit --config-file /path/to/config.yaml --profiles --output json
# Override settings for all profiles
kosty audit --profiles --max-workers 10 --output csvWhat happens:
- Reads all profiles from your config file
- Runs audits in parallel (default: 3 at a time)
- Generates separate reports per profile:
output/kosty_audit_<profile>_<timestamp>.json - Creates summary report:
output/kosty_summary_<timestamp>.json - Continues on errors (failed profiles don't stop others)
- Shows aggregated totals across all profiles
Kosty provides real monthly and annual savings estimates for these services:
| Service | Cost Calculation | Example Savings |
|---|---|---|
| EBS | Orphaned volumes by size & type | $10.00/month (100GB gp2) |
| EC2 | Stopped instances by type | $280.32/month (m5.2xlarge) |
| EIP | Unattached Elastic IPs | $3.60/month (fixed rate) |
| NAT Gateway | Unused gateways | $32.85/month (per gateway) |
| Load Balancer | ALBs with no targets | $16.43/month (per ALB) |
| S3 | Lifecycle optimization candidates | $2.30/month (100GB) |
| Snapshots | Old EBS snapshots | $5.00/month (100GB) |
| Backup | Empty AWS Backup vaults | $0.00/month (no storage) |
| RDS | Oversized instances (<20% CPU) | $700.80/month (db.r5.4xlarge) |
| Lambda | Over-provisioned memory (>512MB) | $0.68/month (optimization) |
| DynamoDB | Idle tables (low RCU/WCU) | Variable (on-demand savings) |
These services provide security and compliance audits without cost quantification:
- IAM: Security policies, unused roles, compliance
- CloudWatch: Log retention, unused alarms
- Route53: Unused hosted zones, DNS configuration
- API Gateway: Unused APIs, security configuration
- Security Groups: Unused groups, overly permissive rules
Important: Cost estimates are based on AWS Pricing API and standard on-demand rates. Actual costs may vary due to:
- π° Reserved Instance discounts (up to 75% off)
- π° Savings Plans (up to 72% off)
- π° Volume discounts for high usage
- π Regional pricing variations
- π’ Enterprise agreements and custom pricing
- π Spot instance pricing (up to 90% off)
- π Free tier limits and credits
Use estimates for: Relative comparison between issues, optimization prioritization, business case development, and ROI trend analysis.
Verify actual costs in your AWS billing dashboard before making decisions.
| Category | Services | Key Checks |
|---|---|---|
| π» Compute | EC2, Lambda | Oversized instances, unused functions |
| ποΈ Storage | S3, EBS, Snapshots | Empty buckets, orphaned volumes, old snapshots |
| ποΈ Database | RDS, DynamoDB | Idle databases, over-provisioned tables |
| π Network | EIP, LB, NAT, SG, Route53 | Unused resources, no healthy targets |
| π Security | IAM | Unused roles, old access keys, inactive users |
| π Management | CloudWatch, Backup | Unused alarms, expensive logs, empty vaults |
| π Application | API Gateway | Unused APIs, expensive configurations |
| Service | Total Commands | Audit Types | Individual Checks |
|---|---|---|---|
| EC2 | 16 | 3 | 13 checks |
| RDS | 17 | 3 | 14 checks |
| S3 | 14 | 3 | 11 checks |
| IAM | 13 | 3 | 10 checks |
| EBS | 12 | 3 | 9 checks |
| LB | 10 | 3 | 7 checks |
| SG | 9 | 3 | 6 checks |
| Lambda | 8 | 3 | 5 checks |
| EIP | 7 | 3 | 4 checks |
| CloudWatch | 7 | 3 | 4 checks |
| Backup | 6 | 3 | 3 checks |
| NAT | 6 | 3 | 3 checks |
| Snapshots | 6 | 3 | 3 checks |
| API Gateway | 5 | 3 | 2 checks |
| DynamoDB | 5 | 3 | 2 checks |
| Route53 | 5 | 3 | 2 checks |
π Total: 147 commands (1 global + 146 service commands)
EC2 (13 individual checks):
check-oversized-instances- Instances with low CPU utilizationcheck-stopped-instances- Instances stopped for 7+ dayscheck-ssh-open- SSH port open to 0.0.0.0/0check-idle-instances- Instances with <5% CPU usage
S3 (11 individual checks):
check-empty-buckets- Buckets with no objectscheck-public-read-access- Buckets with public read accesscheck-encryption-at-rest- Unencrypted bucketscheck-lifecycle-policy- Buckets needing lifecycle policies
RDS (14 individual checks):
check-public-databases- Publicly accessible databasescheck-oversized-instances- Over-provisioned RDS instancescheck-unused-read-replicas- Unused read replicascheck-unencrypted-storage- Unencrypted RDS storage
IAM (10 individual checks):
check-root-access-keys- Root account access keyscheck-unused-roles- Roles unused for 90+ dayscheck-inactive-users- Inactive users with active keyscheck-wildcard-policies- Policies with wildcard permissions
# π ONE COMMAND TO AUDIT EVERYTHING
kosty audit
# Organization-wide comprehensive audit
kosty audit --organization --max-workers 20
# Generate all report formats
kosty audit --output allWhat kosty audit does:
- Scans 16 core AWS services automatically
- Runs complete audits (cost + security) per service
- Generates comprehensive reports (JSON, CSV, Console)
- Prioritizes issues by severity and impact
- Scales across single account or entire organization
- Modular CLI architecture organized by AWS service
- Powerful command line interface for automation
- Modern React-based web dashboard with interactive charts
- Multiple report formats: Console, JSON, CSV, visual reports
- 16 core AWS services coverage
- Real dollar cost savings for 11 services
- One-command audit scans everything
- Multi-account organization support with configurable roles
- Multi-region scanning with
--regions - Multi-profile parallel execution with
--profiles - Flexible IAM with custom cross-account roles
- Parallel processing with configurable workers
- Issues ranked by financial impact
- Read-only analysis, no resource modifications
- Executive-ready dashboards with cost totals
- Upfront permission checks with clear error messages
Kosty supports YAML configuration files for persistent settings, profiles, and exclusions:
# Create config file from example
cp kosty.yaml.example kosty.yaml
# Use default profile
kosty audit
# Use specific profile
kosty audit --profile customer01
# Run all profiles in parallel
kosty audit --profiles --output all
# Use custom config file
kosty audit --config-file /path/to/config.yaml
# Override config with CLI args
kosty audit --profile customer01 --regions eu-west-1 --max-workers 30- Multiple profiles for different environments
- Exclude specific accounts, regions, services, or ARNs
- Customize thresholds per profile
- AssumeRole with MFA support
- CLI args override config values
exclude:
accounts:
- "123456789012"
services:
- "route53"
arns:
- "arn:aws:ec2:*:*:instance/i-protected*"
thresholds:
ec2_cpu: 20
rds_cpu: 20
stopped_days: 7
default:
organization: true
regions:
- us-east-1
- eu-west-1
max_workers: 20
profiles:
customer01:
regions: [us-east-1]
role_arn: "arn:aws:iam::123456789012:role/MyRole"
mfa_serial: "arn:aws:iam::123456789012:mfa/device"See Configuration Guide for complete documentation.
- Complete Documentation
- Configuration Guide
- Multi-Profile Guide - NEW
- AWS Credentials Setup
- Organization Mode Setup
- Cross-Account Role Configuration
- Visual Dashboard
- CLI Architecture
- Release Notes
- Troubleshooting Guide
We welcome contributions! Here's how you can help:
- π Report Issues - Found a bug? Open an issue
- π‘ Feature Requests - Have an idea? Start a discussion
- π§ Add Services - Implement new AWS service checks
- π Improve Docs - Help make documentation better
- β Star the Repo - Show your support!
# kosty/services/new_service_audit.py
import boto3
from typing import List, Dict, Any
class NewServiceAuditService:
def __init__(self):
self.cost_checks = ['check_unused_resources']
self.security_checks = ['check_public_access']
def audit(self, session: boto3.Session, region: str, **kwargs) -> List[Dict[str, Any]]:
results = []
results.extend(self.cost_audit(session, region, **kwargs))
results.extend(self.security_audit(session, region, **kwargs))
return resultsThis project is licensed under the MIT License - see the LICENSE file for details.
Kosty is free and open-source for self-service optimization. For teams who prefer expert guidance to maximize results and ensure safe implementation, I offer professional audits.
Comprehensive AWS Cost & Security Audit
- Full Kosty scan across all accounts and regions + manual architecture review
- Prioritized optimization roadmap ranked by ROI, effort, and risk
- Security vulnerability assessment (public databases, old IAM keys, overly permissive security groups)
- Implementation guidance and team training
Typical Results:
- β¬1K-30K/year in cost savings (most clients)
- Critical security gaps identified and resolved
- 2-7 day delivery depending on complexity
- Money-back guarantee if savings don't exceed the audit cost
| Tier | AWS Spend | Price | Timeline | What's Included |
|---|---|---|---|---|
| Startup | <β¬2K/mo | β¬500 | 2-3 days | Full scan, action plan, 30-min call, 2 weeks email support |
| Growth | β¬2-10K/mo | β¬1,500 | 3-5 days | Multi-account analysis, detailed roadmap, security report, 1-hour call, Slack support, 30-day follow-up |
| Scale | β¬10K+/mo | Custom | Custom | Everything in Growth + architecture deep-dive, team training, implementation support, quarterly check-ins |
- Built Kosty after 9 years of AWS consulting (seen the same waste patterns repeatedly)
- AWS specialist and FinOps
- Engineer-to-engineer approach: honest technical advice, no sales BS
Free 30-minute assessment: Book a no-commitment call to discuss your AWS setup and whether an audit makes sense.
π
Calendar: https://calendly.com/consulting-kosty/30min
π§ Email: [email protected]
π Website: https://kosty.cloud?utm_source=github&utm_medium=readme-section
If Kosty helped you save money on AWS costs, please:
- β Star this repository
- π¦ Share on Twitter with #AWSCostOptimization
- π¬ Tell your colleagues about cost optimization
- π€ Contribute to make it even better
π° Save money. Optimize AWS. Scale efficiently.