prowler v3.13 releases: AWS security assessment, auditing and hardening

AWS Security Tool

Prowler: AWS Security Tool

Prowler is a command-line tool for AWS Security Best Practices Assessment, Auditing, Hardening, and Forensics Readiness Tool.

It follows guidelines of the CIS Amazon Web Services Foundations Benchmark (49 checks) and has more than 100 additional checks including those related to GDPR, HIPAA, PCI-DSS, ISO-27001, FFIEC, SOC2, and others.

Read more about CIS Amazon Web Services Foundations Benchmark v1.2.0 – 05-23-2018

Features

+200 checks covering security best practices across all AWS regions and most of AWS services and related to the next groups:

  • Identity and Access Management [group1]
  • Logging [group2]
  • Monitoring [group3]
  • Networking [group4]
  • CIS Level 1 [cislevel1]
  • CIS Level 2 [cislevel2]
  • Extras see Extras section [extras]
  • Forensics related group of checks [forensics-ready]
  • GDPR [gdpr] Read more here
  • HIPAA [hipaa] Read more here
  • Trust Boundaries [trustboundaries] Read more here
  • Secrets
  • Internet exposed resources
  • EKS-CIS
  • Also includes PCI-DSS, ISO-27001, FFIEC, SOC2, ENS (Esquema Nacional de Seguridad of Spain).
  • AWS FTR [FTR] Read more here

With Prowler you can:

  • Get a direct colorful or monochrome report
  • A HTML, CSV, JUNIT, JSON or JSON ASFF format report
  • Send findings directly to Security Hub
  • Run specific checks and groups or create your own
  • Check multiple AWS accounts in parallel or sequentially
  • And more! Read examples below

Changelog v3.13

New features to highlight in this version:

💪🏼 21 New Azure checks

  • Prowler is improving its Azure coverage by including 21 new checks that appears in the CIS Benchmark v2.0.0.
    (Thanks @pedrooot and @puchy22 for their contributions and performance!)

See all the new available checks with prowler azure -l

✅ New CIS AWS Foundations Benchmark v3.0.0 Compliance

  • On Jan 31st, CIS released the new v3.0.0 for Amazon Web Services Foundations and it is now available on Prowler. You can execute the new CIS version with with prowler aws --compliance cis_3.0_aws

📊 New AWS Account Security Onboarding Compliance

  • It is based on the post from Artem Marusov, you can execute this checklist when onboarding new AWS Accounts to existing AWS Organization with prowler aws --compliance aws_account_security_onboarding_aws

🥳 Python 3.12 is now supported!

  • Now you can execute Prowler using Python 3.12. Install Prowler with pip install prowler and that’s all!

📝 Custom Output File in Quick Inventory

  • Support for the already existing options -F (output file) when using the quick inventory feature (-i) on AWS. You can test it with prowler aws -i -F custom-output-file.csv

Features

  • feat(azure): Add 4 new checks related to SQLServer and Vulnerability Assessment by @pedrooot in #3372
  • feat(azure): Add check defender_auto_provisioning_log_analytics_agent_vms_on by @puchy22 in #3322
  • feat(azure): Add check defender_ensure_system_updates_are_applied  and defender_auto_provisioning_vulnerabilty_assessments_machines_on by @puchy22 in #3327
  • feat(azure): Add new Azure check “iam_custom_role_permits_administering_resource_locks” by @pedrooot in #3317
  • feat(azure): Add new check storage_ensure_private_endpoints_in_storage_accounts by @pedrooot in #3326
  • feat(azure): Add new check storage_key_rotation_90_days by @pedrooot in #3323
  • feat(azure): Defender checks related to defender settings by @puchy22 in #3347
  • feat(azure): Defender checks related to security contacts and notifications by @puchy22 in #3344
  • feat(azure): Defender check defender_ensure_iot_hub_defender_is_on by @puchy22 in #3367
  • feat(azure): New Azure SQLServer related check sqlserver_auditing_retention_90_days by @pedrooot in #3345
  • feat(azure): New check related to vulnerability assessment sqlserver_vulnerability_assessment_enabled by @pedrooot in #3349
  • feat(azure): New check storage_ensure_soft_delete_is_enabled by @pedrooot in #3334
  • feat(azure): SQLServer checks related to TDE encryption by @pedrooot in #3343
  • feat(compliance): account security onboarding compliance framework by @pedrooot in #3286
  • feat(defender): New Terraform URL for metadata checks by @puchy22 in #3374
  • feat(python): support Python 3.12 by @sergargar in #3371
  • feat(quick-inventory): custom output file in quick inventory by @Mohsen51 in #3306
  • feat(cis): add new CIS AWS v3.0.0 by @sergargar in #3379

Fixes

  • fix(acm): adding more details on remaining expiration days by @estemendoza in #3293
  • fix(azure): Fix check sqlserver_auditing_retention_90_days by @pedrooot in #3365
  • fix(BadRequest): add BadRequest exception to WellArchitected by @sergargar in #3300
  • fix(defender): Manage 404 exception for “default” security contacts by @puchy22 in #3373
  • fix(GuardDuty): fix class name by @puchy22 in #3337
  • fix(NoSuchEntity): add NoSuchEntity exception to IAM by @sergargar in #3299
  • fix(organizations): Handle non existent policy by @jfagoagas in #3319
  • fix(rds): verify SGs in rds_instance_no_public_access by @sergargar in #3341
  • fix(s3): add s3:Get* case to s3_bucket_policy_public_write_access by @sergargar in #3364
  • fix(storage) Manage None type manage for key_expiration_period_in_days by @puchy22 in #3351
  • fix(azure): Change class names from azure services and fix typing error by @pedrooot in #3350
  • fix(allowlist): Handle tags and resources by @jfagoagas in #3376
  • fix(cis): update CIS AWS v2.0 Section 2.1 refs by @strawp in #3375
  • fix(alias): allow multiple check aliases by @sergargar in #3378

Install & Use

Copyright 2018 Netflix, Inc.

Sourcehttps://github.com/Alfresco/