AWS account onboarding
Connect AWS accounts, validate access, and define scan scope with explicit project boundaries.
NightWatch brings AWS scanning, findings review, framework coverage, and tenant-safe operations into one self-hosted codebase you can read, run, and extend.
NightWatch catalog
Current seeded rules, frameworks, and coverage
What it does
Detection, triage, compliance, and delivery — not another tab, just one stack that stays understandable before it stays impressive.
Connect AWS accounts, validate access, and define scan scope with explicit project boundaries.
Run manual or scheduled scans through an ordered worker pipeline instead of hidden background magic.
Filter by severity, service, resource, and rule without exporting raw scanner output to another tool.
See how findings map into framework scorecards and control coverage across every connected account.
Notify, reconcile current findings, and refresh daily aggregates after evaluation completes.
Keep organization data isolated with tenant-scoped services and PostgreSQL row-level security.
Rules
NightWatch ships with a seeded catalog of rules across 83 AWS services. Every rule keeps a stable identifier, a service and severity, and a link back into framework mappings — so findings inherit structure instead of bleeding raw scanner output.
id: check.s3.public_access_blocked name: S3 bucket blocks public access severity: critical service: aws.s3 frameworks: - CIS AWS 2.1.5 - SOC 2 CC6.1 - HIPAA §164.312(a)(1) # Applies to every S3 bucket in project scope resource: aws.s3.bucket assert: - all: - public_access_block.BlockPublicAcls == true - public_access_block.BlockPublicPolicy == true - public_access_block.IgnorePublicAcls == true - public_access_block.RestrictPublicBuckets == true
Findings & compliance
Operators can move from a failing resource to framework impact and trend views without exporting results. Active findings reconcile into framework scorecards so gaps are visible where decisions happen.
Setup
The strongest proof NightWatch offers is the setup path the repo already supports. Install dependencies, start infra, migrate, seed, and run — no hosted SaaS required.
# 1. clone + install $ git clone https://github.com/nixbpe/nightwatch.git $ cd nightwatch $ bun install # 2. start local infra + migrate + seed $ docker compose up -d $ bun run db:migrate $ bun run db:seed # 3. run the stack $ bun run dev → web http://localhost:3000 → api http://localhost:4000/health → mail http://localhost:8025
Self-host NightWatch
NightWatch is open source and self-hosted. Start with the repository, then follow the setup guide to bring the full stack up locally.