Oliver — Security Professional
Oliver is CloudThinker’s security expert, specializing in compliance auditing, vulnerability assessment, threat detection, and identity management across cloud environments.The Problem Oliver Solves
Cloud security posture is invisible until it isn’t. Security groups get opened to0.0.0.0/0 during debugging and never closed. IAM roles accumulate permissions across months of tickets. S3 buckets get misconfigured. Compliance frameworks like SOC 2 and HIPAA require evidence collection that takes security teams weeks to assemble manually.
The result: most teams discover misconfigurations from breach notifications, failed audits, or penetration test reports — not proactive monitoring. And when a compliance audit arrives, engineers spend 2–4 weeks collecting screenshots and writing evidence docs instead of fixing actual security gaps.
How Existing Tools Compare
| Tool | What It Does | What’s Missing |
|---|---|---|
| AWS Security Hub | Aggregates findings from GuardDuty, Inspector, Config | No remediation guidance, no compliance narrative, no cross-cloud |
| Wiz / Orca | Cloud security posture management (CSPM) with risk visualization | Reporting-focused, requires dedicated security analyst to interpret, no AI-driven remediation |
| Prowler / ScoutSuite | Open-source security scanners | Manual runs, raw output, no prioritization or remediation guidance |
| AWS Config | Tracks resource configuration drift against rules | Rules-based, no AI analysis, no compliance framework mapping |
| Lacework / Prisma Cloud | Comprehensive CSPM + CWPP | Expensive, complex, still requires security expertise to act on findings |
How Oliver Works
- Scans continuously — reads IAM policies, security group rules, CloudTrail logs, GuardDuty findings, and resource configurations
- Prioritizes by context — not just severity scores, but actual blast radius: is this finding on a production database or a dev sandbox?
- Maps to frameworks — automatically maps findings to SOC 2 controls, HIPAA requirements, PCI-DSS clauses, or whatever you’re being audited against
- Generates evidence — produces compliance documentation with the exact format auditors need, including timestamps, configurations, and remediation proofs
- Tracks over time — remembers past findings so you can show compliance trend improvement, not just point-in-time snapshots
Capabilities
| Domain | Capabilities |
|---|---|
| Compliance | SOC 2, ISO 27001, GDPR, HIPAA, PCI-DSS auditing and evidence collection |
| Vulnerability Assessment | Security scanning, misconfiguration detection, risk prioritization |
| Threat Detection | Incident investigation, forensics, anomaly detection, security monitoring |
| Identity & Access | IAM policy review, privilege analysis, permission optimization, access audits |
Prompt Patterns
Security Audits
Compliance Assessment
Vulnerability Management
Access Control
Tool Usage
| Tool | Oliver Use Case |
|---|---|
#dashboard | Compliance status, security posture, finding trends |
#report | Audit documentation, compliance evidence, incident analysis |
#recommend | Remediation actions, security hardening, policy changes |
#alert | Security group changes, policy violations, certificate expiration |
#chart | Vulnerability trends, compliance scores, risk distribution |
Examples with Tools
Effective Prompts
Define Scope
Specify Framework
Connection Requirements
Oliver requires cloud and security service access:| Provider | Required Access |
|---|---|
| AWS | IAM, Security Hub, GuardDuty, CloudTrail, Config |
| Azure | Security Center, Azure AD, Policy, Monitor |
| GCP | Security Command Center, IAM, Cloud Audit Logs |
Common Workflows
Security Audit Workflow
Compliance Assessment Workflow
Incident Investigation
What’s Next
CloudKeepers
Configure SecurityOps pilots for continuous 24/7 security guardrails
Assessment
Run a Well-Architected assessment with the Security pillar
Incident Response
How Oliver assists with security incident investigations
Anna
Coordinate Oliver with other agents for enterprise-wide security reviews