Compare commits

...

437 Commits

Author SHA1 Message Date
Daniel Barranquero
c7f6a1c78f fix(cloudfront): fix false positive in s3 origins (#6823)
(cherry picked from commit 914012de2b)

# Conflicts:
#	prowler/providers/aws/services/cloudfront/cloudfront_distributions_origin_traffic_encrypted/cloudfront_distributions_origin_traffic_encrypted.py
#	tests/providers/aws/services/cloudfront/cloudfront_distributions_origin_traffic_encrypted/cloudfront_distributions_origin_traffic_encrypted_test.py
2025-02-05 17:40:09 +00:00
Prowler Bot
5aee8b7880 fix(elasticache): InvalidReplicationGroupStateFault error (#6818)
Co-authored-by: Hugo Pereira Brito <101209179+HugoPBrito@users.noreply.github.com>
Co-authored-by: HugoPBrito <hugopbrit@gmail.com>
2025-02-05 12:38:17 -05:00
Prowler Bot
5261b8a309 fix(directoryservice): handle ClientException (#6826)
Co-authored-by: Daniel Barranquero <74871504+danibarranqueroo@users.noreply.github.com>
2025-02-05 10:47:35 -05:00
Prowler Bot
7fd9fc30b3 chore(regions_update): Changes in regions for AWS services (#6825) 2025-02-05 10:22:53 -05:00
dependabot[bot]
d8f2165ab0 chore(deps): bump pytz from 2024.2 to 2025.1 (#6774)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2025-02-03 14:17:21 -05:00
dependabot[bot]
6d551d7a6d chore(deps-dev): bump pylint from 3.3.3 to 3.3.4 (#6773)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2025-02-03 12:47:49 -05:00
dependabot[bot]
5c738c0e00 chore(deps): bump botocore from 1.35.96 to 1.35.99 (#6775)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2025-02-03 11:38:08 -05:00
dependabot[bot]
99c9489e0c chore(deps-dev): bump moto from 5.0.26 to 5.0.28 (#6793)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2025-02-03 10:38:10 -05:00
dependabot[bot]
f85f2000b5 chore(deps): bump google-api-python-client from 2.157.0 to 2.160.0 (#6777)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Co-authored-by: MrCloudSec <hello@mistercloudsec.com>
2025-02-03 10:08:55 -05:00
dependabot[bot]
cc82d6a58b chore(deps): bump trufflesecurity/trufflehog from 3.88.2 to 3.88.4 (#6768)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2025-02-03 09:27:34 -05:00
Prowler Bot
311c90d2e2 chore(regions_update): Changes in regions for AWS services (#6664) 2025-01-22 10:12:00 -05:00
dependabot[bot]
d9845813b8 chore(deps-dev): bump moto from 5.0.16 to 5.0.26 (#6368)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Co-authored-by: MrCloudSec <hello@mistercloudsec.com>
2025-01-21 18:14:01 -05:00
Prowler Bot
20ac04b2eb chore(regions_update): Changes in regions for AWS services (#6619) 2025-01-20 16:29:14 -05:00
Prowler Bot
d73860bd68 chore(regions_update): Changes in regions for AWS services (#6588) 2025-01-17 08:39:17 -05:00
Prowler Bot
8b9330a4c2 chore(regions_update): Changes in regions for AWS services (#6535) 2025-01-15 09:27:58 -05:00
Prowler Bot
996b3e652a fix(Azure TDE): add filter for master DB (#6512)
Co-authored-by: johannes-engler-mw <132657752+johannes-engler-mw@users.noreply.github.com>
Co-authored-by: MrCloudSec <hello@mistercloudsec.com>
2025-01-14 17:41:21 -05:00
Prowler Bot
be487f62a0 chore(regions_update): Changes in regions for AWS services (#6515)
Co-authored-by: MrCloudSec <hello@mistercloudsec.com>
2025-01-14 15:02:24 -05:00
Prowler Bot
df98155680 chore(regions_update): Changes in regions for AWS services (#6469)
Co-authored-by: MrCloudSec <hello@mistercloudsec.com>
2025-01-13 13:57:22 -05:00
Prowler Bot
2fa1bfbee7 fix(vpc): add new principal wildcard verification (#6464)
Co-authored-by: Rubén De la Torre Vico <rubendltv22@gmail.com>
Co-authored-by: MrCloudSec <hello@mistercloudsec.com>
2025-01-13 11:27:26 -05:00
Prowler Bot
62bd188e30 chore(regions_update): Changes in regions for AWS services (#6451) 2025-01-10 14:21:07 -05:00
dependabot[bot]
f6e0883658 chore(deps): bump setuptools from 75.6.0 to 75.8.0 (#6430)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2025-01-09 18:36:10 -05:00
dependabot[bot]
77a52c1484 chore(deps): bump botocore from 1.35.93 to 1.35.96 (#6441)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2025-01-09 17:28:51 -05:00
dependabot[bot]
234ca1d163 chore(deps): bump pydantic from 1.10.19 to 1.10.20 (#6425)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2025-01-09 16:09:00 -05:00
Prowler Bot
af8d2cd417 chore(regions_update): Changes in regions for AWS services (#6439) 2025-01-09 15:39:05 -05:00
dependabot[bot]
96b41c1955 chore(deps-dev): bump coverage from 7.6.9 to 7.6.10 (#6434)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Co-authored-by: MrCloudSec <hello@mistercloudsec.com>
2025-01-09 11:22:00 -05:00
dependabot[bot]
0df8101a02 chore(deps): bump trufflesecurity/trufflehog from 3.88.0 to 3.88.2 (#6429)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2025-01-09 10:18:53 -05:00
Prowler Bot
730a76c6c4 fix(iam): handle non existing MFA devices (#6406)
Co-authored-by: Sergio Garcia <hello@mistercloudsec.com>
2025-01-09 09:44:24 -05:00
Prowler Bot
b8cec1af4c chore(regions_update): Changes in regions for AWS services (#6397)
Co-authored-by: MrCloudSec <hello@mistercloudsec.com>
2025-01-08 13:20:58 -05:00
dependabot[bot]
77610d56e8 chore(deps): bump microsoft-kiota-abstractions from 1.6.6 to 1.6.8 (#6367)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2025-01-07 11:37:56 -05:00
Prowler Bot
43b1eed342 chore(regions_update): Changes in regions for AWS services (#6305)
Co-authored-by: MrCloudSec <hello@mistercloudsec.com>
2025-01-07 11:07:21 -05:00
dependabot[bot]
a1eb901509 chore(deps): bump azure-mgmt-compute from 33.0.0 to 33.1.0 (#6336)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2025-01-07 11:07:03 -05:00
Prowler Bot
1d657cad2c chore(regions_update): Changes in regions for AWS services (#6387) 2025-01-07 11:06:40 -05:00
dependabot[bot]
9af62d1feb chore(deps): bump msgraph-sdk from 1.14.0 to 1.16.0 (#6366)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2025-01-07 10:39:25 -05:00
dependabot[bot]
2551dd1d44 chore(deps): bump azure-mgmt-network from 28.0.0 to 28.1.0 (#6339)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2025-01-07 09:24:27 -05:00
dependabot[bot]
621b3dfeeb chore(deps-dev): bump pylint from 3.3.2 to 3.3.3 (#6343)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2025-01-06 23:02:06 -05:00
dependabot[bot]
f2d15ba77f chore(deps): bump google-api-python-client from 2.155.0 to 2.157.0 (#6369)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2025-01-06 20:11:59 -05:00
dependabot[bot]
b611c2cc27 chore(deps): bump boto3 from 1.35.76 to 1.35.93 (#6371)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2025-01-06 18:06:42 -05:00
dependabot[bot]
c8350d0aaa chore(deps): bump botocore from 1.35.80 to 1.35.93 (#6370)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2025-01-06 16:05:15 -05:00
Prowler Bot
cc9215c5ee chore(regions_update): Changes in regions for AWS services (#6358)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Co-authored-by: MrCloudSec <hello@mistercloudsec.com>
2025-01-06 16:04:59 -05:00
dependabot[bot]
e230115726 chore(deps): bump slack-sdk from 3.33.5 to 3.34.0 (#6344)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Co-authored-by: MrCloudSec <hello@mistercloudsec.com>
2025-01-06 15:38:23 -05:00
dependabot[bot]
81b9dbb7fa chore(deps): bump trufflesecurity/trufflehog from 3.86.1 to 3.88.0 (#6345)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2025-01-06 10:19:27 -05:00
Prowler Bot
2d787cb1e9 chore(regions_update): Changes in regions for AWS services (#6290) 2024-12-20 10:14:18 -05:00
Prowler Bot
110648e4e5 chore(regions_update): Changes in regions for AWS services (#6270) 2024-12-19 10:30:20 -05:00
Prowler Bot
cd3a2b8d3b chore(regions_update): Changes in regions for AWS services (#6241) 2024-12-18 09:46:09 -05:00
Prowler Bot
c407ac346d chore(regions_update): Changes in regions for AWS services (#6227) 2024-12-17 10:43:57 -05:00
Prowler Bot
c95128cc54 fix(deploy): temporal fix for the alpine-python segmentation fault (#6178)
Co-authored-by: Adrián Jesús Peña Rodríguez <adrianjpr@gmail.com>
Co-authored-by: Pedro Martín <pedromarting3@gmail.com>
2024-12-13 15:11:55 +01:00
dependabot[bot]
e8a788bbf3 chore(deps): bump google-api-python-client from 2.154.0 to 2.155.0 (#6186)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-12-13 09:08:07 -04:00
dependabot[bot]
1e7a6e16fd chore(deps): bump botocore from 1.35.76 to 1.35.80 (#6188)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-12-13 13:02:02 +01:00
dependabot[bot]
3f4050283f chore(deps): bump trufflesecurity/trufflehog from 3.85.0 to 3.86.1 (#6183)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-12-13 12:24:27 +01:00
Prowler Bot
8e372e97a9 chore(regions_update): Changes in regions for AWS services (#6163) 2024-12-12 09:33:17 -04:00
Prowler Bot
f8eefbc307 chore(regions_update): Changes in regions for AWS services (#6141) 2024-12-11 10:19:23 -04:00
dependabot[bot]
e2a2b80890 chore(deps): bump msgraph-sdk from 1.12.0 to 1.14.0 (#5959)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-12-10 10:37:28 -04:00
dependabot[bot]
f1eae136e4 chore(deps): bump microsoft-kiota-abstractions from 1.6.2 to 1.6.6 (#6035)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-12-10 09:39:22 -04:00
Prowler Bot
afa2d5c505 chore(dependabot): change interval of PRs (#6091)
Co-authored-by: Sergio Garcia <hello@mistercloudsec.com>
2024-12-09 12:31:06 -04:00
dependabot[bot]
f5883ff9d8 chore(deps-dev): bump vulture from 2.13 to 2.14 (#6070)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-12-09 10:14:40 -04:00
dependabot[bot]
e57c6449c7 chore(deps): bump trufflesecurity/trufflehog from 3.84.2 to 3.85.0 (#6055)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-12-09 10:48:50 +01:00
dependabot[bot]
4042ab1142 chore(deps-dev): bump coverage from 7.6.8 to 7.6.9 (#6052)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-12-06 20:29:03 -04:00
dependabot[bot]
fde626872f chore(deps): bump boto3 from 1.35.69 to 1.35.76 (#6050)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-12-06 12:42:01 -04:00
Prowler Bot
5de7bab69f chore(regions_update): Changes in regions for AWS services (#5953)
Co-authored-by: MrCloudSec <hello@mistercloudsec.com>
2024-12-06 12:27:18 -04:00
dependabot[bot]
f325bd0293 chore(deps-dev): bump pytest from 8.3.3 to 8.3.4 (#6010)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-12-06 12:18:52 -04:00
dependabot[bot]
91b3917ced chore(deps-dev): bump pylint from 3.3.1 to 3.3.2 (#6007)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-12-06 11:55:23 -04:00
dependabot[bot]
9e4f13989d chore(deps): bump botocore from 1.35.70 to 1.35.76 (#6036)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-12-06 11:27:02 -04:00
dependabot[bot]
c952773709 chore(deps): bump trufflesecurity/trufflehog from 3.84.1 to 3.84.2 (#5995)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-12-06 10:47:34 -04:00
dependabot[bot]
5f6f1594b0 chore(deps): bump slack-sdk from 3.33.4 to 3.33.5 (#6034)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Co-authored-by: MrCloudSec <hello@mistercloudsec.com>
2024-12-06 10:46:17 -04:00
Prowler Bot
e252e214f6 chore(regions_update): Changes in regions for AWS services (#6043)
Co-authored-by: MrCloudSec <hello@mistercloudsec.com>
2024-12-06 10:46:07 -04:00
Prowler Bot
976af01c52 fix(tests): use datetime.datetime.now() in GCP kms_key_rotation_enabled (#6045) 2024-12-06 09:41:21 -04:00
dependabot[bot]
d75b434ac6 chore(deps-dev): bump bandit from 1.7.10 to 1.8.0 (#5942)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-11-28 09:11:19 -04:00
Prowler Bot
99bb5f562d chore(regions_update): Changes in regions for AWS services (#5927) 2024-11-27 11:23:00 -04:00
dependabot[bot]
f1fe9bec7c chore(deps): bump botocore from 1.35.69 to 1.35.70 (#5917)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-11-27 09:07:09 -04:00
dependabot[bot]
be1d96d03c chore(deps): bump boto3 from 1.35.66 to 1.35.69 (#5900)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-11-26 09:45:00 -04:00
Prowler Bot
dde981c256 chore(regions_update): Changes in regions for AWS services (#5907) 2024-11-26 08:34:45 -04:00
dependabot[bot]
e512e4edf8 chore(deps-dev): bump coverage from 7.6.7 to 7.6.8 (#5889)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-11-26 08:12:03 -04:00
dependabot[bot]
7f31b73123 chore(deps): bump botocore from 1.35.68 to 1.35.69 (#5887)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-11-26 08:19:46 +01:00
Prowler Bot
6c7642708c chore(regions_update): Changes in regions for AWS services (#5876) 2024-11-25 11:20:28 -04:00
dependabot[bot]
2d2949cfc1 chore(deps): bump botocore from 1.35.66 to 1.35.68 (#5869)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-11-25 11:20:14 -04:00
dependabot[bot]
2aa9c6f10b chore(deps): bump trufflesecurity/trufflehog from 3.84.0 to 3.84.1 (#5872)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-11-25 09:02:29 -04:00
dependabot[bot]
ff14ce78af chore(deps): bump azure-mgmt-cosmosdb from 9.6.0 to 9.7.0 (#5832)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-11-22 11:03:19 -04:00
Prowler Bot
7e8e8d8436 chore(regions_update): Changes in regions for AWS services (#5866) 2024-11-22 10:58:32 -04:00
dependabot[bot]
d000fead5a chore(deps): bump trufflesecurity/trufflehog from 3.83.7 to 3.84.0 (#5861)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-11-22 10:35:12 -04:00
dependabot[bot]
9c2def34f0 chore(deps): bump boto3 from 1.35.65 to 1.35.66 (#5859)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-11-22 10:34:02 -04:00
dependabot[bot]
3ed8caebb6 chore(deps): bump botocore from 1.35.65 to 1.35.66 (#5849)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-11-21 10:34:22 -04:00
dependabot[bot]
dbebd0d2fe chore(deps): bump setuptools from 75.5.0 to 75.6.0 (#5847)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-11-21 09:47:24 -04:00
dependabot[bot]
1b466bf35a chore(deps): bump google-api-python-client from 2.153.0 to 2.154.0 (#5848)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-11-21 09:22:52 -04:00
dependabot[bot]
cdfe5030c9 chore(deps): bump boto3 from 1.35.63 to 1.35.65 (#5844)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-11-20 10:25:06 -04:00
dependabot[bot]
1c3ae55433 chore(deps): bump slack-sdk from 3.33.3 to 3.33.4 (#5833)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-11-20 10:00:07 -04:00
Prowler Bot
4e16ae6dae chore(regions_update): Changes in regions for AWS services (#5843) 2024-11-20 10:00:00 -04:00
dependabot[bot]
0888b6e9e6 chore(deps): bump botocore from 1.35.64 to 1.35.65 (#5830)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-11-20 09:29:13 -04:00
Prowler Bot
6271a9fa71 chore(regions_update): Changes in regions for AWS services (#5827) 2024-11-19 09:46:14 -04:00
dependabot[bot]
538626e757 chore(deps): bump trufflesecurity/trufflehog from 3.83.6 to 3.83.7 (#5820)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-11-19 09:24:35 -04:00
dependabot[bot]
76462b66c7 chore(deps): bump botocore from 1.35.63 to 1.35.64 (#5817)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-11-19 09:53:13 +01:00
dependabot[bot]
ed99673b53 chore(deps): bump boto3 from 1.35.60 to 1.35.63 (#5810)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-11-18 11:02:00 -04:00
dependabot[bot]
c617439a7d chore(deps): bump botocore from 1.35.62 to 1.35.63 (#5800)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-11-18 10:01:14 -04:00
Prowler Bot
95cbd9d1ad chore(regions_update): Changes in regions for AWS services (#5806) 2024-11-18 10:00:26 -04:00
dependabot[bot]
156e9f2c53 chore(deps-dev): bump coverage from 7.6.5 to 7.6.7 (#5798)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-11-18 09:37:41 -04:00
Prowler Bot
07ae511b43 chore(regions_update): Changes in regions for AWS services (#5791) 2024-11-15 10:16:52 -05:00
dependabot[bot]
3c9866f9e5 chore(deps): bump botocore from 1.35.60 to 1.35.62 (#5792)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-11-15 10:16:29 -05:00
dependabot[bot]
dc84e0f4eb chore(deps): bump codecov/codecov-action from 4 to 5 (#5778)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-11-15 09:35:56 -05:00
dependabot[bot]
3a743bdd2f chore(deps-dev): bump coverage from 7.6.4 to 7.6.5 (#5782)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-11-15 09:33:02 -05:00
dependabot[bot]
c804b9982a chore(deps): bump azure-storage-blob from 12.23.1 to 12.24.0 (#5762)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-11-14 12:01:17 -05:00
dependabot[bot]
97f344b43e chore(deps): bump google-api-python-client from 2.152.0 to 2.153.0 (#5761)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-11-14 09:54:08 -05:00
Prowler Bot
47997b3713 chore(regions_update): Changes in regions for AWS services (#5775) 2024-11-14 09:53:58 -05:00
dependabot[bot]
3f15c67f18 chore(deps): bump setuptools from 75.4.0 to 75.5.0 (#5764)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-11-14 08:57:01 -05:00
dependabot[bot]
0b001ae33f chore(deps): bump boto3 from 1.35.58 to 1.35.60 (#5769)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-11-13 19:38:28 -05:00
dependabot[bot]
5a9a3532f0 chore(deps): bump botocore from 1.35.59 to 1.35.60 (#5760)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-11-13 19:11:01 -05:00
Prowler Bot
f582b539a4 chore(ec2): add name from image information to status_extended (#5757)
Co-authored-by: Rubén De la Torre Vico <rubendltv22@gmail.com>
2024-11-13 14:56:22 -05:00
Prowler Bot
86a0ade4dd fix(ec2): add default value to Name key for image information (#5753)
Co-authored-by: Rubén De la Torre Vico <rubendltv22@gmail.com>
2024-11-13 10:04:02 -05:00
Prowler Bot
1a6b20e3e7 chore(regions_update): Changes in regions for AWS services (#5750) 2024-11-13 08:38:02 -05:00
dependabot[bot]
26ef13481e chore(deps): bump google-api-python-client from 2.151.0 to 2.152.0 (#5738)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-11-12 18:16:45 -05:00
dependabot[bot]
54f69ada1a chore(deps): bump botocore from 1.35.58 to 1.35.59 (#5739)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-11-12 17:47:17 -05:00
dependabot[bot]
4bf01bd430 chore(deps): bump azure-mgmt-network from 27.0.0 to 28.0.0 (#5616)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Co-authored-by: Rubén De la Torre Vico <ruben@prowler.com>
Co-authored-by: Sergio <sergio@prowler.com>
2024-11-12 13:11:57 -05:00
dependabot[bot]
a16fecca15 chore(deps): bump azure-mgmt-containerservice from 32.1.0 to 33.0.0 (#5699)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-11-12 11:43:02 -05:00
dependabot[bot]
57a1cf67cd chore(deps): bump msgraph-sdk from 1.11.0 to 1.12.0 (#5725)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-11-12 10:26:18 -05:00
Prowler Bot
fcc0ce0ddd chore(regions_update): Changes in regions for AWS services (#5734) 2024-11-12 09:53:43 -05:00
dependabot[bot]
8596a278a8 chore(deps): bump setuptools from 75.3.0 to 75.4.0 (#5728)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-11-12 09:25:15 -05:00
dependabot[bot]
c66d60b7c4 chore(deps): bump microsoft-kiota-abstractions from 1.6.0 to 1.6.2 (#5727)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-11-12 13:46:00 +01:00
dependabot[bot]
510f3f5c45 chore(deps): bump boto3 from 1.35.56 to 1.35.58 (#5730)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-11-12 09:26:43 +01:00
dependabot[bot]
ee744f241b chore(deps): bump trufflesecurity/trufflehog from 3.83.5 to 3.83.6 (#5729)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-11-12 09:26:22 +01:00
dependabot[bot]
2c93498057 chore(deps): bump botocore from 1.35.57 to 1.35.58 (#5726)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-11-11 19:32:03 -05:00
Prowler Bot
59f1c9b496 chore(regions_update): Changes in regions for AWS services (#5718) 2024-11-11 09:21:06 -05:00
dependabot[bot]
c74c43ee1c chore(deps): bump botocore from 1.35.56 to 1.35.57 (#5700)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-11-11 08:50:26 -05:00
dependabot[bot]
9dd2688b8d chore(deps): bump trufflesecurity/trufflehog from 3.83.4 to 3.83.5 (#5701)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-11-11 10:15:11 +01:00
Prowler Bot
cbeb3156e0 chore(regions_update): Changes in regions for AWS services (#5696) 2024-11-08 11:18:24 -05:00
dependabot[bot]
a53f8ba91a chore(deps): bump boto3 from 1.35.54 to 1.35.56 (#5693)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-11-08 11:18:15 +01:00
dependabot[bot]
929e5417c8 chore(deps): bump botocore from 1.35.55 to 1.35.56 (#5691)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-11-08 09:04:39 +01:00
Prowler Bot
708a301c08 chore(regions_update): Changes in regions for AWS services (#5669)
Co-authored-by: Sergio <sergio@prowler.com>
2024-11-07 09:06:01 -05:00
dependabot[bot]
c7e1ba70d6 chore(deps): bump pydantic from 1.10.18 to 1.10.19 (#5651)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-11-07 08:50:37 -05:00
dependabot[bot]
d2554ad266 chore(deps): bump botocore from 1.35.54 to 1.35.55 (#5652)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-11-07 08:24:43 -05:00
dependabot[bot]
8d850e0fa0 chore(deps): bump trufflesecurity/trufflehog from 3.83.3 to 3.83.4 (#5654)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-11-07 08:24:01 -05:00
dependabot[bot]
6881df7144 chore(deps): bump trufflesecurity/trufflehog from 3.83.2 to 3.83.3 (#5646)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-11-06 10:13:19 +01:00
dependabot[bot]
a4a231faab chore(deps): bump azure-identity from 1.18.0 to 1.19.0 (#5343)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-11-05 11:34:03 -05:00
dependabot[bot]
d0ab389d6f chore(deps): bump boto3 from 1.35.51 to 1.35.54 (#5626)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-11-04 11:17:17 -05:00
Prowler Bot
94accd9a63 chore: add dependabot labels (#5625)
Co-authored-by: Pepe Fagoaga <pepe@prowler.com>
Co-authored-by: Sergio Garcia <38561120+sergargar@users.noreply.github.com>
2024-11-04 10:54:49 -05:00
Prowler Bot
f58512aefd chore(regions_update): Changes in regions for AWS services (#5623) 2024-11-04 10:43:31 -05:00
dependabot[bot]
0878c978ef chore(deps): bump google-api-python-client from 2.149.0 to 2.151.0 (#5609)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-11-04 10:25:21 -05:00
dependabot[bot]
884177576a chore(deps): bump botocore from 1.35.51 to 1.35.54 (#5615)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-11-04 09:54:38 -05:00
dependabot[bot]
b3aaec4bd0 chore(deps): bump trufflesecurity/trufflehog from 3.82.13 to 3.83.2 (#5610)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-11-04 08:51:03 -05:00
dependabot[bot]
2411884782 chore(deps): bump slack-sdk from 3.33.2 to 3.33.3 (#5597)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-11-04 08:48:11 -05:00
Prowler Bot
d0819323ff chore(azure): deprecate AzureGermanCloud (#5564)
Co-authored-by: Rubén De la Torre Vico <rubendltv22@gmail.com>
2024-11-04 08:45:03 -05:00
Prowler Bot
c7ead0d960 fix(gcp): enforce correct severity levels in CloudSQL PostgreSQL log_min_messages (#5587)
Co-authored-by: Sergio Garcia <38561120+sergargar@users.noreply.github.com>
Co-authored-by: Sergio <sergio@prowler.com>
2024-10-30 10:10:36 -05:00
Prowler Bot
bc9e8b5ab0 chore(regions_update): Changes in regions for AWS services (#5586) 2024-10-30 09:40:38 -05:00
dependabot[bot]
8a829abbc0 chore(deps-dev): bump pytest-cov from 5.0.0 to 6.0.0 (#5573)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-30 09:09:05 -05:00
dependabot[bot]
912caf3980 chore(deps): bump setuptools from 75.2.0 to 75.3.0 (#5575)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-30 08:40:14 -05:00
dependabot[bot]
e120e717a7 chore(deps): bump boto3 from 1.35.49 to 1.35.51 (#5576)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-30 12:32:18 +01:00
dependabot[bot]
326024ddb5 chore(deps): bump botocore from 1.35.50 to 1.35.51 (#5574)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-30 08:14:02 +01:00
dependabot[bot]
dceddb176b chore(deps): bump microsoft-kiota-abstractions from 1.5.0 to 1.6.0 (#5554)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-29 12:19:36 -05:00
dependabot[bot]
fac6771c7d chore(deps): bump botocore from 1.35.49 to 1.35.50 (#5556)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-29 10:17:13 -05:00
Prowler Bot
d1353a789d chore(regions_update): Changes in regions for AWS services (#5566) 2024-10-29 09:17:41 -05:00
dependabot[bot]
e2dfee9217 chore(deps): bump alive-progress from 3.1.5 to 3.2.0 (#5557)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-29 08:55:27 -05:00
dependabot[bot]
a118faea73 chore(deps): bump boto3 from 1.35.48 to 1.35.49 (#5555)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-29 09:40:00 +01:00
dependabot[bot]
362b53f935 chore(deps): bump azure-mgmt-resource from 23.1.1 to 23.2.0 (#5527)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-28 13:50:11 -05:00
dependabot[bot]
05d2f6d157 chore(deps): bump botocore from 1.35.48 to 1.35.49 (#5539)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-28 13:24:24 -05:00
dependabot[bot]
34b22dc9ac chore(deps-dev): bump pytest-randomly from 3.15.0 to 3.16.0 (#5538)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-28 12:45:30 -05:00
dependabot[bot]
9d9bfa8274 chore(deps): bump slack-sdk from 3.33.1 to 3.33.2 (#5536)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-28 11:19:24 -05:00
dependabot[bot]
82a0410f67 chore(deps-dev): bump safety from 3.2.8 to 3.2.9 (#5537)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-28 10:31:26 -05:00
dependabot[bot]
79ed16fb32 chore(deps): bump boto3 from 1.35.47 to 1.35.48 (#5535)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-28 10:06:52 -05:00
Prowler Bot
808c71365d chore(regions_update): Changes in regions for AWS services (#5544) 2024-10-28 15:28:23 +01:00
Prowler Bot
08fc7f20a0 chore(regions_update): Changes in regions for AWS services (#5534) 2024-10-25 09:38:27 -07:00
dependabot[bot]
eba1fe5492 chore(deps): bump botocore from 1.35.47 to 1.35.48 (#5529)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-24 18:20:49 -07:00
dependabot[bot]
a738dbccc0 chore(deps): bump trufflesecurity/trufflehog from 3.82.12 to 3.82.13 (#5530)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-24 16:13:52 -07:00
dependabot[bot]
863e0e75fa chore(deps): bump boto3 from 1.35.44 to 1.35.47 (#5528)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-24 16:13:34 -07:00
Prowler Bot
c01c2238b0 chore(regions_update): Changes in regions for AWS services (#5521) 2024-10-24 10:30:51 -07:00
dependabot[bot]
0361d670ac chore(deps): bump botocore from 1.35.44 to 1.35.47 (#5516)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-24 07:54:18 -07:00
Prowler Bot
f3d36b853d chore(regions_update): Changes in regions for AWS services (#5512) 2024-10-23 08:36:45 -07:00
dependabot[bot]
4a7ae4ca90 chore(deps-dev): bump mkdocs-git-revision-date-localized-plugin from 1.2.9 to 1.3.0 (#5505)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-23 07:54:47 -07:00
dependabot[bot]
172413b3c4 chore(deps): bump microsoft-kiota-abstractions from 1.4.6 to 1.5.0 (#5507)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-22 16:23:13 -07:00
dependabot[bot]
d3db24f7a6 chore(deps): bump trufflesecurity/trufflehog from 3.82.11 to 3.82.12 (#5504)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-22 15:37:42 -07:00
Prowler Bot
c019908890 chore(regions_update): Changes in regions for AWS services (#5501) 2024-10-22 08:16:26 -07:00
dependabot[bot]
bb07263ba6 chore(deps-dev): bump coverage from 7.6.3 to 7.6.4 (#5496)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-22 07:54:05 -07:00
Prowler Bot
fa80f26b9d chore(regions_update): Changes in regions for AWS services (#5487) 2024-10-21 08:15:34 -07:00
dependabot[bot]
1bb0db2835 chore(deps): bump azure-keyvault-keys from 4.9.0 to 4.10.0 (#5476)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-21 07:58:46 -07:00
dependabot[bot]
3d142738e9 chore(deps): bump microsoft-kiota-abstractions from 1.4.5 to 1.4.6 (#5473)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-21 07:27:16 -07:00
dependabot[bot]
0f006d33e0 chore(deps): bump boto3 from 1.35.42 to 1.35.44 (#5485)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-21 06:59:59 -07:00
dependabot[bot]
85ba5e2c67 chore(deps): bump botocore from 1.35.43 to 1.35.44 (#5474)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-21 06:35:54 -07:00
dependabot[bot]
1dd45da56d chore(deps): bump botocore from 1.35.42 to 1.35.43 (#5456)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-18 09:16:59 -04:00
dependabot[bot]
ae4b29f323 chore(deps): bump msgraph-sdk from 1.10.0 to 1.11.0 (#5457)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-18 09:52:10 +02:00
dependabot[bot]
86c343f973 chore(deps): bump trufflesecurity/trufflehog from 3.82.9 to 3.82.11 (#5459)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-18 09:29:56 +02:00
dependabot[bot]
c77dc9326a chore(deps): bump boto3 from 1.35.41 to 1.35.42 (#5455)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-18 08:22:41 +02:00
dependabot[bot]
3565b79f10 chore(deps): bump microsoft-kiota-abstractions from 1.4.0 to 1.4.5 (#5438)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-17 10:22:57 -04:00
dependabot[bot]
6a11d7ee85 chore(deps): bump botocore from 1.35.41 to 1.35.42 (#5440)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-17 09:38:24 -04:00
Prowler Bot
04ac7cd4ab chore(regions_update): Changes in regions for AWS services (#5449) 2024-10-17 09:19:45 -04:00
dependabot[bot]
f272658f88 chore(deps): bump boto3 from 1.35.40 to 1.35.41 (#5439)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-17 09:14:18 -04:00
dependabot[bot]
154ca4d18f chore(deps): bump setuptools from 75.1.0 to 75.2.0 (#5441)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-17 08:49:56 -04:00
dependabot[bot]
1d8ca8a2e4 chore(deps): bump trufflesecurity/trufflehog from 3.82.8 to 3.82.9 (#5423)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-16 09:04:15 -04:00
dependabot[bot]
7544262f12 chore(deps): bump botocore from 1.35.40 to 1.35.41 (#5422)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-16 09:03:31 -04:00
dependabot[bot]
c49d6a8c90 chore(deps): bump microsoft-kiota-abstractions from 1.3.3 to 1.4.0 (#5405)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-15 10:35:40 -04:00
dependabot[bot]
d42bb9b0d8 chore(deps): bump boto3 from 1.35.38 to 1.35.40 (#5410)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-15 08:08:40 -04:00
Prowler Bot
ca3b8ad9cd chore(regions_update): Changes in regions for AWS services (#5418) 2024-10-15 08:03:51 -04:00
dependabot[bot]
6df82aaa27 chore(deps-dev): bump coverage from 7.6.2 to 7.6.3 (#5407)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-15 07:40:33 -04:00
dependabot[bot]
a07cd662a3 chore(deps): bump botocore from 1.35.39 to 1.35.40 (#5408)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-15 08:03:20 +02:00
Prowler Bot
fced762fcf fix(iam): update AWS Support policy (#5402)
Co-authored-by: Sergio Garcia <38561120+sergargar@users.noreply.github.com>
Co-authored-by: Sergio <sergio@prowler.com>
2024-10-14 14:28:44 -04:00
dependabot[bot]
1f066f3762 chore(deps): bump msgraph-sdk from 1.9.0 to 1.10.0 (#5351)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-14 11:20:01 -04:00
dependabot[bot]
38d91a486e chore(deps): bump azure-mgmt-containerservice from 32.0.0 to 32.1.0 (#5388)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-14 09:16:06 -04:00
dependabot[bot]
93a17ebd2b chore(deps): bump botocore from 1.35.38 to 1.35.39 (#5387)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-14 09:10:12 +02:00
Prowler Bot
6559af4d4c chore(regions_update): Changes in regions for AWS services (#5382) 2024-10-11 10:11:55 -04:00
dependabot[bot]
25069c6079 chore(deps): bump boto3 from 1.35.36 to 1.35.38 (#5383)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-11 10:09:46 -04:00
dependabot[bot]
18372b04f3 chore(deps): bump botocore from 1.35.37 to 1.35.38 (#5372)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-11 09:28:57 -04:00
dependabot[bot]
4006b99a5b chore(deps): bump trufflesecurity/trufflehog from 3.82.7 to 3.82.8 (#5374)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-11 09:45:56 +02:00
dependabot[bot]
365a2b0d0d chore(deps): bump google-api-python-client from 2.148.0 to 2.149.0 (#5354)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-10 11:44:26 -04:00
dependabot[bot]
ecb84d8c9c chore(deps-dev): bump coverage from 7.6.1 to 7.6.2 (#5355)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-10 09:45:53 -04:00
dependabot[bot]
e7ed7a76fc chore(deps): bump botocore from 1.35.36 to 1.35.37 (#5353)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-10 09:08:48 -04:00
dependabot[bot]
20ee90f0d1 chore(deps): bump boto3 from 1.35.35 to 1.35.36 (#5352)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-10 13:52:16 +02:00
dependabot[bot]
9d055b0ea8 chore(deps): bump botocore from 1.35.35 to 1.35.36 (#5342)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-09 11:12:21 +02:00
Prowler Bot
754e86a219 chore(regions_update): Changes in regions for AWS services (#5338) 2024-10-08 14:35:00 -04:00
dependabot[bot]
0b09062496 chore(deps): bump google-api-python-client from 2.147.0 to 2.148.0 (#5320)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-08 11:16:11 -04:00
dependabot[bot]
32f379a5f0 chore(deps-dev): bump black from 24.8.0 to 24.10.0 (#5317) 2024-10-08 09:38:23 -04:00
dependabot[bot]
59f421ef9f chore(deps): bump msgraph-sdk from 1.8.0 to 1.9.0 (#5290)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-08 09:01:28 -04:00
dependabot[bot]
7df31e899a chore(deps): bump boto3 from 1.35.33 to 1.35.35 (#5329)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-08 08:37:12 -04:00
dependabot[bot]
a89628f60c chore(deps): bump trufflesecurity/trufflehog from 3.82.6 to 3.82.7 (#5319)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-08 08:13:39 -04:00
dependabot[bot]
655c453f10 chore(deps): bump botocore from 1.35.34 to 1.35.35 (#5316)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-08 08:11:15 -04:00
Prowler Bot
bd124347a0 chore(regions_update): Changes in regions for AWS services (#5309) 2024-10-07 13:04:43 -04:00
dependabot[bot]
d82eb362db chore(deps): bump botocore from 1.35.33 to 1.35.34 (#5301)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-07 08:49:02 +02:00
dependabot[bot]
6596be4044 chore(deps): bump boto3 from 1.35.31 to 1.35.33 (#5296)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-04 11:23:24 -04:00
dependabot[bot]
5fd89d3446 chore(deps-dev): bump vulture from 2.12 to 2.13 (#5279)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-04 10:59:27 -04:00
dependabot[bot]
bdefc340d3 chore(deps): bump botocore from 1.35.32 to 1.35.33 (#5288)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Co-authored-by: Sergio <sergio@prowler.com>
2024-10-04 10:24:40 -04:00
dependabot[bot]
33a51d8516 chore(deps): bump botocore from 1.35.31 to 1.35.32 (#5278)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-03 09:00:34 -04:00
Prowler Bot
29a7e4e143 chore(regions_update): Changes in regions for AWS services (#5273) 2024-10-02 09:24:00 -04:00
Prowler Bot
36ea70326a chore(regions_update): Changes in regions for AWS services (#5264) 2024-10-02 09:23:29 -04:00
dependabot[bot]
2ec3f8aa7c chore(deps): bump boto3 from 1.35.28 to 1.35.31 (#5274)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-02 09:22:53 -04:00
dependabot[bot]
b5fac691e3 chore(deps): bump botocore from 1.35.29 to 1.35.31 (#5266)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-02 08:49:23 -04:00
dependabot[bot]
2a99475883 chore(deps-dev): bump moto from 5.0.15 to 5.0.16 (#5253)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-10-01 14:10:02 -04:00
dependabot[bot]
a3deb5b828 chore(deps): bump azure-storage-blob from 12.23.0 to 12.23.1 (#5237)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-30 09:38:23 -04:00
dependabot[bot]
7fd089cacd chore(deps): bump botocore from 1.35.28 to 1.35.29 (#5235)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-30 08:57:35 -04:00
dependabot[bot]
0e6f2922ad chore(deps-dev): bump safety from 3.2.7 to 3.2.8 (#5236)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-30 08:28:48 -04:00
Prowler Bot
c3256f4538 chore(regions_update): Changes in regions for AWS services (#5227) 2024-09-27 09:04:53 -04:00
dependabot[bot]
3b614ffcb2 chore(deps): bump boto3 from 1.35.26 to 1.35.28 (#5223)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-27 09:17:07 +02:00
dependabot[bot]
b12a62cb23 chore(deps): bump trufflesecurity/trufflehog from 3.82.5 to 3.82.6 (#5221)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-27 08:42:25 +02:00
dependabot[bot]
cda8ea25f7 chore(deps): bump botocore from 1.35.27 to 1.35.28 (#5217)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-27 08:20:50 +02:00
Prowler Bot
7b5d1e540c chore(regions_update): Changes in regions for AWS services (#5211) 2024-09-26 08:56:07 -04:00
dependabot[bot]
bc7d317bca chore(deps): bump botocore from 1.35.26 to 1.35.27 (#5200)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-26 10:51:48 +02:00
dependabot[bot]
52d35c4d0c chore(deps): bump azure-mgmt-network from 26.0.0 to 27.0.0 (#5198)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-26 10:06:23 +02:00
dependabot[bot]
872636affa chore(deps): bump trufflesecurity/trufflehog from 3.82.3 to 3.82.5 (#5196)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-26 10:05:58 +02:00
Prowler Bot
fa34ffb197 chore(regions_update): Changes in regions for AWS services (#5193) 2024-09-25 09:30:46 -04:00
dependabot[bot]
b214898ff6 chore(deps-dev): bump pylint from 3.3.0 to 3.3.1 (#5180)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-25 14:20:18 +02:00
dependabot[bot]
3cc2473649 chore(deps): bump google-api-python-client from 2.146.0 to 2.147.0 (#5182)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-25 09:49:25 +02:00
dependabot[bot]
c0b6940576 chore(deps): bump boto3 from 1.35.24 to 1.35.26 (#5188)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-25 09:12:20 +02:00
dependabot[bot]
d142564006 chore(deps): bump botocore from 1.35.25 to 1.35.26 (#5179)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-25 08:41:43 +02:00
dependabot[bot]
9129aaacdf chore(deps): bump trufflesecurity/trufflehog from 3.82.2 to 3.82.3 (#5178)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-25 08:41:14 +02:00
Prowler Bot
0d1215ca44 fix(aws): always use audited partition (#5176)
Co-authored-by: Sergio Garcia <38561120+sergargar@users.noreply.github.com>
2024-09-24 12:09:32 -04:00
Prowler Bot
135b494d22 chore(regions_update): Changes in regions for AWS services (#5170) 2024-09-24 08:55:36 -04:00
Prowler Bot
bfaed3916d chore(bot): Use bot Token (#5164)
Co-authored-by: Pepe Fagoaga <pepe@prowler.com>
2024-09-24 08:20:52 -04:00
dependabot[bot]
1594a13764 chore(deps-dev): bump bandit from 1.7.9 to 1.7.10 (#5162)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-24 13:02:41 +02:00
dependabot[bot]
f500b490fe chore(deps): bump botocore from 1.35.24 to 1.35.25 (#5161)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-24 12:33:56 +02:00
dependabot[bot]
dfd235c8c6 chore(deps-dev): bump moto from 5.0.14 to 5.0.15 (#5160)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-24 11:04:29 +02:00
dependabot[bot]
5482474d6a chore(deps): bump boto3 from 1.35.23 to 1.35.24 (#5159)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-24 10:31:48 +02:00
dependabot[bot]
b32ffcbf70 chore(deps-dev): bump pylint from 3.2.7 to 3.3.0 (#5136)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-23 09:40:40 +02:00
Sergio Garcia
371c941bf7 fix(v3): solve pypi-release action (#5130) 2024-09-23 09:31:20 +02:00
dependabot[bot]
2fdd0f1d4c chore(deps): bump botocore from 1.35.23 to 1.35.24 (#5135)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-23 08:28:57 +02:00
Sergio Garcia
073effccb1 chore(version): update Prowler version (#5131) 2024-09-23 08:27:57 +02:00
Sergio Garcia
a952d1d08e chore(version): update Prowler version 3 (#5127) 2024-09-20 12:41:42 -04:00
Sergio Garcia
9ffefba979 fix(v3): remove not supported checks (#5126) 2024-09-20 12:25:07 -04:00
Prowler Bot
f3863e9f34 fix(gcp): solve errors in GCP services (#5123)
Co-authored-by: Sergio Garcia <38561120+sergargar@users.noreply.github.com>
2024-09-20 11:48:51 -04:00
Prowler Bot
85d5f19bdf fix(vpc): check all routes tables in subnet (#5121)
Co-authored-by: Sergio Garcia <38561120+sergargar@users.noreply.github.com>
2024-09-20 11:00:34 -04:00
dependabot[bot]
a32d99495a chore(deps): bump azure-identity from 1.17.1 to 1.18.0 (#5105)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-20 15:43:28 +02:00
Prowler Bot
a7e237cbbc chore(ssm): add trusted accounts variable to ssm check (#5117)
Co-authored-by: Sergio Garcia <38561120+sergargar@users.noreply.github.com>
2024-09-20 09:36:14 -04:00
dependabot[bot]
69bb82498a chore(deps): bump boto3 from 1.35.21 to 1.35.23 (#5114)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-20 09:12:09 -04:00
dependabot[bot]
670fd5776a chore(deps): bump slack-sdk from 3.33.0 to 3.33.1 (#5104)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-20 14:08:47 +02:00
dependabot[bot]
6b431dfa4e chore(deps): bump azure-mgmt-cosmosdb from 9.5.1 to 9.6.0 (#5103)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-20 13:29:25 +02:00
dependabot[bot]
723a967621 chore(deps): bump msgraph-sdk from 1.7.0 to 1.8.0 (#5102)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-20 11:58:04 +02:00
dependabot[bot]
c3f0f098c5 chore(deps): bump botocore from 1.35.22 to 1.35.23 (#5101)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-20 09:40:37 +02:00
Prowler Bot
e4148908d2 chore(docs): change ResourceType link of Security Hub (#5096)
Co-authored-by: Sergio Garcia <38561120+sergargar@users.noreply.github.com>
2024-09-19 07:34:39 -04:00
dependabot[bot]
b39ca8a98e chore(deps): bump botocore from 1.35.21 to 1.35.22 (#5093)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-19 12:46:26 +02:00
dependabot[bot]
46f389674a chore(deps): bump boto3 from 1.35.20 to 1.35.21 (#5091)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-19 12:12:13 +02:00
dependabot[bot]
cde828976a chore(deps-dev): bump pytest-env from 1.1.4 to 1.1.5 (#5092)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-19 10:13:43 +02:00
dependabot[bot]
a84b01ed9d chore(deps): bump slack-sdk from 3.32.0 to 3.33.0 (#5074)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-18 12:42:19 -04:00
dependabot[bot]
506ac2e27d chore(deps): bump azure-storage-blob from 12.22.0 to 12.23.0 (#5078)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-18 12:03:10 -04:00
Prowler Bot
2cd4e66205 chore(regions_update): Changes in regions for AWS services (#5083) 2024-09-18 12:02:41 -04:00
dependabot[bot]
2cfb34d692 chore(deps): bump botocore from 1.35.20 to 1.35.21 (#5077)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-18 11:33:30 -04:00
dependabot[bot]
beab0eb9f3 chore(deps): bump boto3 from 1.35.19 to 1.35.20 (#5076)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-18 10:49:51 -04:00
dependabot[bot]
7d6e9e175a chore(deps-dev): bump vulture from 2.11 to 2.12 (#5075)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-18 09:51:04 -04:00
dependabot[bot]
6a691242e7 chore(deps): bump google-api-python-client from 2.145.0 to 2.146.0 (#5079)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-18 09:24:10 -04:00
Prowler Bot
7c3a0a00e5 fix(inspector2): Ensure Inspector2 is enabled for ECR, EC2, Lambda and Lambda Code (#5066)
Co-authored-by: Mario Rodriguez Lopez <101330800+MarioRgzLpz@users.noreply.github.com>
Co-authored-by: Sergio <sergio@prowler.com>
2024-09-17 16:40:52 -04:00
Prowler Bot
e57a460bae chore(AWS): match all AWS resource types with SecurityHub supported types in metadata (#5064)
Co-authored-by: Rubén De la Torre Vico <rubendltv22@gmail.com>
2024-09-17 12:15:34 -04:00
Prowler Bot
15f51a9ac1 chore(regions_update): Changes in regions for AWS services (#5065) 2024-09-17 12:15:15 -04:00
dependabot[bot]
b8b9ed3521 chore(deps): bump botocore from 1.35.19 to 1.35.20 (#5055)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-17 09:32:53 -04:00
dependabot[bot]
1801c341b4 chore(deps): bump boto3 from 1.35.18 to 1.35.19 (#5056)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-17 09:05:13 -04:00
dependabot[bot]
05d33fd5f0 chore(deps): bump setuptools from 74.1.2 to 75.1.0 (#5054)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-17 08:41:14 -04:00
dependabot[bot]
ee2e8c0721 chore(deps): bump trufflesecurity/trufflehog from 3.82.1 to 3.82.2 (#5051)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-17 08:36:39 -04:00
Prowler Bot
e99d8e00bd chore(regions_update): Changes in regions for AWS services (#5050) 2024-09-16 14:32:44 -04:00
dependabot[bot]
e7953949a3 chore(deps): bump azure-mgmt-containerservice from 31.0.0 to 32.0.0 (#5040)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-16 09:07:25 -04:00
dependabot[bot]
957587259d chore(deps): bump botocore from 1.35.18 to 1.35.19 (#5039)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-16 08:16:32 -04:00
dependabot[bot]
d991357bcf chore(deps): bump boto3 from 1.35.17 to 1.35.18 (#5038)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-14 07:33:12 +02:00
Prowler Bot
d56c2947d5 chore(regions_update): Changes in regions for AWS services (#5032) 2024-09-13 11:06:12 -04:00
dependabot[bot]
e05a6663b4 chore(deps): bump botocore from 1.35.17 to 1.35.18 (#5018)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-13 09:23:35 -04:00
dependabot[bot]
3f995cda50 chore(deps): bump trufflesecurity/trufflehog from 3.81.10 to 3.82.1 (#5017)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-13 09:00:17 -04:00
dependabot[bot]
efde27459c chore(deps-dev): bump mkdocs-git-revision-date-localized-plugin from 1.2.8 to 1.2.9 (#5020)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-13 08:59:57 -04:00
dependabot[bot]
b3236f5b31 chore(deps): bump boto3 from 1.35.16 to 1.35.17 (#5019)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-13 09:41:34 +02:00
dependabot[bot]
59e89311a1 chore(deps): bump botocore from 1.35.16 to 1.35.17 (#5009)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-12 14:09:56 +02:00
dependabot[bot]
992e7a4b25 chore(deps): bump boto3 from 1.35.15 to 1.35.16 (#5008)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-12 11:32:34 +02:00
dependabot[bot]
18805140e5 chore(deps): bump pytz from 2024.1 to 2024.2 (#5006)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-12 10:48:57 +02:00
dependabot[bot]
07a04c234b chore(deps): bump msgraph-sdk from 1.6.0 to 1.7.0 (#5007)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-12 09:05:47 +02:00
Prowler Bot
08b9a3a54a chore(regions_update): Changes in regions for AWS services (#5000) 2024-09-11 10:17:40 -04:00
dependabot[bot]
63c9c6fdfd chore(deps): bump google-api-python-client from 2.144.0 to 2.145.0 (#4993)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-11 09:05:27 -04:00
dependabot[bot]
896d9b5554 chore(deps): bump botocore from 1.35.15 to 1.35.16 (#4992)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-11 13:14:41 +02:00
dependabot[bot]
1ee0bc341c chore(deps-dev): bump pytest from 8.3.2 to 8.3.3 (#4994)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-11 08:59:22 +02:00
Prowler Bot
e87f0cc2da chore(dependencies): update boto3 and botocore packages (#4986)
Co-authored-by: Sergio Garcia <38561120+sergargar@users.noreply.github.com>
Co-authored-by: Sergio <sergio@prowler.com>
2024-09-10 16:27:47 -04:00
Prowler Bot
6dfd856b7f chore(regions_update): Changes in regions for AWS services (#4930) 2024-09-10 09:28:01 -04:00
Prowler Bot
5d5cefd1ec chore(regions_update): Changes in regions for AWS services (#4972) 2024-09-10 13:21:11 +02:00
dependabot[bot]
661bdb56ec chore(deps-dev): bump pytest-env from 1.1.3 to 1.1.4 (#4964)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-10 11:14:34 +02:00
dependabot[bot]
cdb68b72ed chore(deps-dev): bump moto from 5.0.13 to 5.0.14 (#4963)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-10 09:56:40 +02:00
dependabot[bot]
fc3d3c5fc7 chore(deps-dev): bump mkdocs-git-revision-date-localized-plugin from 1.2.7 to 1.2.8 (#4962)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-10 09:21:57 +02:00
Prowler Bot
60f5f07ce2 chore(regions_update): Changes in regions for AWS services (#4957) 2024-09-09 11:35:19 +02:00
dependabot[bot]
06f5d858b7 chore(deps): bump msgraph-sdk from 1.5.4 to 1.6.0 (#4944)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-09 11:10:03 +02:00
dependabot[bot]
7b968057b4 chore(deps): bump slack-sdk from 3.31.0 to 3.32.0 (#4954)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-09 09:14:26 +02:00
Prowler Bot
a3fedb3f24 fix(security-groups): remove RFC1918 from ec2_securitygroup_allow_wide_open_public_ipv4 (#4952)
Co-authored-by: Pedro Martín <pedromarting3@gmail.com>
2024-09-06 14:50:41 +02:00
Prowler Bot
a50b238c7f fix(aws): change check metadata ec2_securitygroup_allow_wide_open_public_ipv4 (#4949)
Co-authored-by: Pedro Martín <pedromarting3@gmail.com>
2024-09-06 13:23:47 +02:00
dependabot[bot]
1c52dc5908 chore(deps): bump google-api-python-client from 2.143.0 to 2.144.0 (#4942)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-06 09:01:36 +02:00
dependabot[bot]
0d198dd094 chore(deps): bump setuptools from 74.1.1 to 74.1.2 (#4941)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-06 08:22:19 +02:00
dependabot[bot]
54ce1efef0 chore(deps): bump peter-evans/create-pull-request from 6 to 7 (#4924)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-04 08:54:42 +02:00
dependabot[bot]
16a31fcc48 chore(deps): bump setuptools from 74.1.0 to 74.1.1 (#4925)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-04 08:53:48 +02:00
dependabot[bot]
ca7d7870ae chore(deps-dev): bump pylint from 3.2.6 to 3.2.7 (#4919)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-03 07:53:55 +02:00
dependabot[bot]
a66f626b32 chore(deps): bump setuptools from 74.0.0 to 74.1.0 (#4918)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-09-03 07:21:15 +02:00
Pepe Fagoaga
9f499636e5 chore(aws): Remove token from log line (#4904) 2024-08-30 11:50:28 +02:00
dependabot[bot]
15b8801b4d chore(deps-dev): bump safety from 3.2.6 to 3.2.7 (#4897)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-08-30 09:43:35 +02:00
dependabot[bot]
c65a7472d4 chore(deps): bump trufflesecurity/trufflehog from 3.81.9 to 3.81.10 (#4896)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-08-30 09:43:22 +02:00
dependabot[bot]
87092ee920 chore(deps): bump google-api-python-client from 2.142.0 to 2.143.0 (#4885)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-08-29 07:57:01 +02:00
Prowler Bot
6a244057c3 chore(regions_update): Changes in regions for AWS services (#4881) 2024-08-28 14:58:17 +02:00
dependabot[bot]
746720e8a1 chore(deps): bump setuptools from 73.0.1 to 74.0.0 (#4876)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-08-28 08:28:27 +02:00
Prowler Bot
e33fbb1b13 fix(aws): enchance check cloudformation_stack_outputs_find_secrets (#4861)
Co-authored-by: Pedro Martín <pedromarting3@gmail.com>
2024-08-26 11:00:26 +02:00
dependabot[bot]
47064d9046 chore(deps): bump azure-mgmt-compute from 32.0.0 to 33.0.0 (#4858)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-08-26 08:30:35 +02:00
dependabot[bot]
f68196b5bb chore(deps): bump pydantic from 1.10.17 to 1.10.18 (#4857)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-08-26 08:01:49 +02:00
github-actions[bot]
caf1659381 chore(regions_update): Changes in regions for AWS services. (#4850)
Co-authored-by: Pepe Fagoaga <pepe@prowler.com>
2024-08-23 07:28:24 -04:00
github-actions[bot]
bb4aa6090d chore(regions_update): Changes in regions for AWS services. (#4832)
Co-authored-by: Pepe Fagoaga <pepe@prowler.com>
2024-08-22 09:57:44 -04:00
github-actions[bot]
97a9ee5a3c chore(test): improve iam_root_hardware_mfa_enabled tests (#4834)
Co-authored-by: Sergio Garcia <38561120+sergargar@users.noreply.github.com>
2024-08-22 09:35:15 -04:00
dependabot[bot]
0a0fe10ab9 chore(deps-dev): bump safety from 3.2.5 to 3.2.6 (#4824)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-08-22 08:26:33 +02:00
dependabot[bot]
cea6b4f0a0 chore(deps): bump tj-actions/changed-files from 44 to 45 (#4823)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-08-22 08:26:06 +02:00
github-actions[bot]
56ad891c17 fix(ec2): Manage UnicodeDecodeError when reading user data (#4788)
Co-authored-by: Rubén De la Torre Vico <rubendltv22@gmail.com>
Co-authored-by: Sergio <sergio@prowler.com>
2024-08-21 08:55:05 -04:00
github-actions[bot]
3c0dbac060 chore(regions_update): Changes in regions for AWS services. (#4815)
Co-authored-by: Pepe Fagoaga <pepe@prowler.com>
2024-08-21 08:54:40 -04:00
dependabot[bot]
385e6f6d60 chore(deps): bump setuptools from 70.0.0 to 73.0.1 (#4811)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-08-21 11:11:14 +02:00
dependabot[bot]
18255313cd chore(deps): bump azure-mgmt-web from 7.3.0 to 7.3.1 (#4810)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-08-21 09:07:41 +02:00
dependabot[bot]
8879b6551e chore(deps): bump google-api-python-client from 2.141.0 to 2.142.0 (#4809)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-08-21 08:33:10 +02:00
github-actions[bot]
583f6f2899 chore(azure): Fix CIS 2.1 mapping (#4780)
Co-authored-by: Rubén De la Torre Vico <rubendltv22@gmail.com>
2024-08-20 12:25:37 -04:00
github-actions[bot]
0ece45ab05 chore(awslambda): Enhance function public access check called from other resource (#4793)
Co-authored-by: Rubén De la Torre Vico <rubendltv22@gmail.com>
2024-08-20 06:56:24 -04:00
dependabot[bot]
528cae67e9 chore(deps-dev): bump moto from 5.0.12 to 5.0.13 (#4798)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-08-20 11:19:10 +02:00
dependabot[bot]
89ce26bfc6 chore(deps-dev): bump mkdocs-git-revision-date-localized-plugin from 1.2.6 to 1.2.7 (#4797)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Co-authored-by: pedrooot <pedromarting3@gmail.com>
2024-08-20 09:18:20 +02:00
dependabot[bot]
bfa2c917e4 chore(deps): bump boto3 from 1.34.160 to 1.34.162 (#4779)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-08-19 09:15:02 +02:00
github-actions[bot]
ea17c971e7 chore(version): update version logic in Prowler (#4776)
Co-authored-by: Sergio Garcia <38561120+sergargar@users.noreply.github.com>
2024-08-16 13:25:00 -04:00
github-actions[bot]
2b0c93de5a fix(iam): update logic of Root Hardware MFA check (#4774)
Co-authored-by: Sergio <sergio@prowler.com>
2024-08-16 12:56:48 -04:00
github-actions[bot]
7b29326e1c fix(aws): run Prowler as IAM Root or Federated User (#4772)
Co-authored-by: Sergio Garcia <38561120+sergargar@users.noreply.github.com>
2024-08-16 12:11:37 -04:00
github-actions[bot]
0dcafef971 chore(regions_update): Changes in regions for AWS services. (#4770)
Co-authored-by: Pepe Fagoaga <pepe@prowler.com>
2024-08-16 12:10:54 -04:00
github-actions[bot]
476cb8d935 fix(ecr): change log level of non-scanned images (#4768)
Co-authored-by: Sergio Garcia <38561120+sergargar@users.noreply.github.com>
2024-08-16 12:07:45 -04:00
github-actions[bot]
9e81dd80c7 fix(ecr): handle non-existing findingSeverityCounts key (#4766)
Co-authored-by: Sergio Garcia <38561120+sergargar@users.noreply.github.com>
2024-08-16 12:07:32 -04:00
Sergio Garcia
d93fa7cad6 chore(version): update Prowler version (#4744) 2024-08-16 12:07:10 -04:00
dependabot[bot]
230e2350af chore(deps): bump botocore from 1.34.160 to 1.34.162 (#4757)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-08-16 09:35:24 -04:00
dependabot[bot]
d028d7bd95 chore(deps): bump trufflesecurity/trufflehog from 3.81.8 to 3.81.9 (#4755)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-08-16 09:18:27 -04:00
dependabot[bot]
28a0a8c407 chore(deps): bump google-api-python-client from 2.140.0 to 2.141.0 (#4749)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-08-16 09:10:05 -04:00
dependabot[bot]
b567013dfc chore(deps): bump boto3 from 1.34.158 to 1.34.160 (#4743)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-08-14 10:18:41 -04:00
dependabot[bot]
5c33e7b691 chore(deps): bump botocore from 1.34.159 to 1.34.160 (#4736)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-08-14 09:30:23 -04:00
github-actions[bot]
4a1b639f0a chore(regions_update): Changes in regions for AWS services. (#4741)
Co-authored-by: Pepe Fagoaga <pepe@prowler.com>
2024-08-14 09:29:54 -04:00
Sergio Garcia
8b2659b6ad fix(ecs): use threads for describing task definitions (#4733) 2024-08-13 22:43:15 +02:00
dependabot[bot]
3dceaa8514 chore(deps): bump botocore from 1.34.158 to 1.34.159 (#4729)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-08-13 08:13:15 -04:00
dependabot[bot]
eed8f30aa7 chore(deps): bump boto3 from 1.34.156 to 1.34.158 (#4724)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-08-12 09:45:53 -04:00
dependabot[bot]
3cf23b44c4 chore(deps-dev): bump safety from 3.2.4 to 3.2.5 (#4716)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Co-authored-by: Sergio <sergio@prowler.com>
2024-08-12 09:06:30 -04:00
dependabot[bot]
d63b1e0c2f chore(deps): bump trufflesecurity/trufflehog from 3.81.7 to 3.81.8 (#4718)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-08-12 08:02:04 -04:00
dependabot[bot]
44f398a88b chore(deps): bump botocore from 1.34.157 to 1.34.158 (#4715)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-08-12 07:59:15 -04:00
github-actions[bot]
2de94df159 fix(iam): handle no arn serial numbers for MFA devices (#4710)
Co-authored-by: Pedro Martín <pedromarting3@gmail.com>
Co-authored-by: Sergio <sergio@prowler.com>
2024-08-09 14:41:29 -04:00
dependabot[bot]
0d56f468de chore(deps): bump botocore from 1.34.156 to 1.34.157 (#4706)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-08-09 10:49:52 +02:00
dependabot[bot]
8830b63280 chore(deps): bump boto3 from 1.34.155 to 1.34.156 (#4705)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-08-09 10:04:05 +02:00
Pedro Martín
2d0a173211 chore(deps): Update certifi version (#4708) 2024-08-09 09:42:07 +02:00
dependabot[bot]
62f43977f6 chore(deps): bump trufflesecurity/trufflehog from 3.81.6 to 3.81.7 (#4691)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-08-08 10:48:15 +02:00
dependabot[bot]
39af2ca3f4 chore(deps): bump botocore from 1.34.155 to 1.34.156 (#4692)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-08-08 10:47:56 +02:00
github-actions[bot]
b7c22d18ab fix(autoscaling): Add exception manage while decoding UserData (#4675)
Co-authored-by: Rubén De la Torre Vico <rubendltv22@gmail.com>
Co-authored-by: Pepe Fagoaga <pepe@prowler.com>
Co-authored-by: Sergio <sergio@prowler.com>
2024-08-07 17:47:48 -04:00
github-actions[bot]
318d2b1e1a fix(aws): only check artifacts that can be scanned for vulnerabilities by ecr_repositories_scan_vulnerabilities_in_latest_image (#4677)
Co-authored-by: Kay Agahd <kagahd@users.noreply.github.com>
Co-authored-by: Pepe Fagoaga <pepe@prowler.com>
Co-authored-by: Sergio <sergio@prowler.com>
2024-08-07 15:41:27 -04:00
github-actions[bot]
c54227b245 fix(test): solve VPC import in tests (#4674)
Co-authored-by: Sergio <sergio@prowler.com>
2024-08-07 14:12:05 -04:00
github-actions[bot]
cce564b005 chore(backport): chore(regions_update): Changes in regions for AWS services. (#4592) backport for v3 (#4672)
Co-authored-by: Pepe Fagoaga <pepe@prowler.com>
2024-08-07 09:07:25 -04:00
github-actions[bot]
379203dff1 chore(backport): chore(regions_update): Changes in regions for AWS services. (#4607) backport for v3 (#4673)
Co-authored-by: Pepe Fagoaga <pepe@prowler.com>
2024-08-07 14:43:59 +02:00
github-actions[bot]
5b3b2c3252 chore(backport): fix(sns): add condition to sns topics (#4498) backport for v3 (#4676)
Co-authored-by: Pedro Martín <pedromarting3@gmail.com>
Co-authored-by: Pepe Fagoaga <pepe@prowler.com>
2024-08-07 14:35:35 +02:00
github-actions[bot]
ce70f5e740 chore(backport): chore(regions_update): Changes in regions for AWS services. (#4560) backport for v3 (#4671)
Co-authored-by: Pepe Fagoaga <pepe@prowler.com>
2024-08-07 14:32:42 +02:00
github-actions[bot]
8f5548ee64 chore(backport): chore(regions_update): Changes in regions for AWS services. (#4630) backport for v3 (#4670)
Co-authored-by: Pepe Fagoaga <pepe@prowler.com>
2024-08-07 14:18:41 +02:00
dependabot[bot]
5bac8fa0bd chore(deps): bump boto3 from 1.34.152 to 1.34.155 (#4668)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-08-07 11:24:07 +02:00
dependabot[bot]
9e827236bb chore(deps): bump azure-storage-blob from 12.21.0 to 12.22.0 (#4660)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-08-07 10:56:25 +02:00
dependabot[bot]
3219a705c3 chore(deps): bump google-api-python-client from 2.139.0 to 2.140.0 (#4658)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-08-07 10:22:51 +02:00
dependabot[bot]
64e8781bb8 chore(deps): bump trufflesecurity/trufflehog from 3.81.5 to 3.81.6 (#4661)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-08-07 09:01:55 +02:00
dependabot[bot]
023b0546aa chore(deps): bump botocore from 1.34.154 to 1.34.155 (#4657)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-08-07 08:59:57 +02:00
dependabot[bot]
b60bcb95e6 chore(deps-dev): bump flake8 from 7.1.0 to 7.1.1 (#4649)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-08-06 09:19:27 +02:00
dependabot[bot]
7ac676029a chore(deps): bump botocore from 1.34.152 to 1.34.154 (#4647)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-08-06 08:52:59 +02:00
dependabot[bot]
7f21fd4f09 chore(deps-dev): bump coverage from 7.6.0 to 7.6.1 (#4646)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-08-06 08:31:54 +02:00
dependabot[bot]
94b2ebd181 chore(deps-dev): bump moto from 5.0.11 to 5.0.12 (#4648)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-08-06 08:09:14 +02:00
dependabot[bot]
6736d47f53 chore(deps): bump trufflesecurity/trufflehog from 3.81.4 to 3.81.5 (#4644)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-08-06 08:08:18 +02:00
dependabot[bot]
cb2d36a48e chore(deps-dev): bump black from 24.4.2 to 24.8.0 (#4624)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-08-05 10:26:50 +02:00
dependabot[bot]
41755aedeb chore(deps): bump msgraph-sdk from 1.5.3 to 1.5.4 (#4623)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-08-05 09:24:18 +02:00
dependabot[bot]
c4939c2101 chore(deps): bump trufflesecurity/trufflehog from 3.80.5 to 3.81.4 (#4626)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-08-05 08:19:08 +02:00
dependabot[bot]
cb3da2d39d chore(deps): bump boto3 from 1.34.151 to 1.34.152 (#4622)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-08-05 08:15:16 +02:00
dependabot[bot]
8c6ff85657 chore(deps): bump botocore from 1.34.151 to 1.34.152 (#4613)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-08-02 08:04:09 +02:00
dependabot[bot]
c7e5ea3a99 chore(deps): bump trufflesecurity/trufflehog from 3.80.4 to 3.80.5 (#4614)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-08-02 07:57:08 +02:00
dependabot[bot]
fd22df215d chore(deps): bump boto3 from 1.34.150 to 1.34.151 (#4603)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-08-01 08:06:38 +02:00
dependabot[bot]
be4b351cc4 chore(deps): bump trufflesecurity/trufflehog from 3.80.3 to 3.80.4 (#4602)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-08-01 08:06:24 +02:00
dependabot[bot]
394bff978e chore(deps): bump botocore from 1.34.150 to 1.34.151 (#4585)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-07-31 10:10:41 +02:00
dependabot[bot]
a70418d0a9 chore(deps): bump boto3 from 1.34.149 to 1.34.150 (#4584)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-07-31 09:44:06 +02:00
dependabot[bot]
587da907ed chore(deps): bump google-api-python-client from 2.138.0 to 2.139.0 (#4583)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-07-31 09:17:47 +02:00
dependabot[bot]
6e8c324cd6 chore(deps): bump trufflesecurity/trufflehog from 3.80.2 to 3.80.3 (#4582)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-07-31 08:30:53 +02:00
dependabot[bot]
6da6f2917a chore(deps): bump botocore from 1.34.149 to 1.34.150 (#4568)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-07-30 09:47:53 +02:00
Sergio Garcia
db2bc345cd chore(version): update Prowler version (#4561) 2024-07-29 07:54:12 -04:00
dependabot[bot]
56ed3c74b4 chore(deps): bump trufflesecurity/trufflehog from 3.80.1 to 3.80.2 (#4558)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-07-29 08:23:21 +02:00
dependabot[bot]
d34ce86cae chore(deps): bump boto3 from 1.34.148 to 1.34.149 (#4559)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-07-29 08:22:51 +02:00
Sergio Garcia
e74f5fb9f3 chore(backport): update v3 with latest changes (#4555)
Co-authored-by: Pepe Fagoaga <pepe@prowler.com>
Co-authored-by: Rubén De la Torre Vico <rubendltv22@gmail.com>
2024-07-26 12:54:03 -04:00
dependabot[bot]
580eb4c727 chore(deps): bump azure-mgmt-network from 25.4.0 to 26.0.0 (#4545)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-07-26 13:38:26 +02:00
dependabot[bot]
12ada8b09d chore(deps-dev): bump pytest from 8.3.1 to 8.3.2 (#4546)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-07-26 13:01:24 +02:00
dependabot[bot]
3cd725402e chore(deps): bump azure-mgmt-compute from 31.0.0 to 32.0.0 (#4547)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-07-26 12:30:57 +02:00
dependabot[bot]
2e4dddf1d3 chore(deps): bump google-api-python-client from 2.137.0 to 2.138.0 (#4544)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-07-26 09:14:41 +02:00
dependabot[bot]
0a824eeae9 chore(deps): bump botocore from 1.34.148 to 1.34.149 (#4548)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-07-26 08:25:14 +02:00
dependabot[bot]
ba100e62ca chore(deps): bump boto3 from 1.34.146 to 1.34.148 (#4535)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-07-25 09:54:16 +02:00
dependabot[bot]
a8c0c13d85 chore(deps): bump botocore from 1.34.147 to 1.34.148 (#4533)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-07-25 09:29:41 +02:00
dependabot[bot]
3f342220f3 chore(deps): bump azure-mgmt-containerservice from 30.0.0 to 31.0.0 (#4515)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-07-24 11:53:25 +02:00
Pepe Fagoaga
1e32cc415d chore(CODEOWNERS): update team (#4528) 2024-07-24 09:12:53 +02:00
dependabot[bot]
5347a3d61a chore(deps): bump botocore from 1.34.146 to 1.34.147 (#4524)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-07-24 08:08:57 +02:00
dependabot[bot]
2d7be85f3a chore(deps): bump boto3 from 1.34.145 to 1.34.146 (#4523)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-07-24 07:38:41 +02:00
dependabot[bot]
ea1644f335 chore(deps): bump botocore from 1.34.145 to 1.34.146 (#4514)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-07-23 11:02:45 +02:00
dependabot[bot]
dac0d84702 chore(deps): bump boto3 from 1.34.144 to 1.34.145 (#4517)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-07-23 10:12:09 +02:00
Sergio Garcia
e33e379280 chore(version): update Prowler v3 version (#4506) 2024-07-23 09:25:39 +02:00
dependabot[bot]
8e765f7869 chore(deps-dev): bump pytest from 8.2.2 to 8.3.1 (#4518)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-07-23 09:24:05 +02:00
dependabot[bot]
bd050add90 chore(deps-dev): bump pylint from 3.2.5 to 3.2.6 (#4516)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-07-22 18:57:06 -04:00
Sergio Garcia
aa9fde62b2 chore(release): update v3 with latest changes (#4504)
Co-authored-by: Pepe Fagoaga <pepe@prowler.com>
2024-07-22 11:52:52 -04:00
dependabot[bot]
c910514ea6 chore(deps): bump botocore from 1.34.144 to 1.34.145 (#4488)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-07-22 11:51:56 -04:00
Sergio Garcia
af2a38a825 fix(inspector2): add more efficient way to check if any active findings (#4495) 2024-07-22 11:25:33 -04:00
dependabot[bot]
f9ce07d964 chore(deps): bump azure-storage-blob from 12.20.0 to 12.21.0 (#4487)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-07-22 10:18:14 -04:00
Sergio Garcia
3d48516313 chore(dependencies): update vulnerable dependencies (#4496) 2024-07-22 10:28:43 +02:00
dependabot[bot]
c36d242852 chore(deps): bump trufflesecurity/trufflehog from 3.80.0 to 3.80.1 (#4489)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-07-19 11:31:49 +02:00
dependabot[bot]
862540d0f0 chore(deps): bump msgraph-sdk from 1.5.2 to 1.5.3 (#4473)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-07-18 10:40:10 +02:00
dependabot[bot]
667d547550 chore(deps): bump azure-mgmt-keyvault from 10.3.0 to 10.3.1 (#4472)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-07-18 08:38:32 +02:00
dependabot[bot]
f77b5b6d1a chore(deps): bump trufflesecurity/trufflehog from 3.79.0 to 3.80.0 (#4476)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-07-18 08:28:17 +02:00
Rubén De la Torre Vico
e9ff8db4d6 fix(network): solve network client locations KeyError (#4456) 2024-07-16 11:46:22 -04:00
Sergio Garcia
fb2c1ba782 chore(v3): update latest changes from v4 (#4459)
Co-authored-by: Pedro Martín <pedromarting3@gmail.com>
Co-authored-by: Rubén De la Torre Vico <rubendltv22@gmail.com>
2024-07-16 11:23:14 -04:00
dependabot[bot]
cb43afb19a chore(deps): bump msgraph-sdk from 1.4.0 to 1.5.2 (#4430)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-07-16 06:57:58 -04:00
dependabot[bot]
86f2bdabaa chore(deps): bump boto3 from 1.34.143 to 1.34.144 (#4452)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-07-16 08:52:04 +02:00
dependabot[bot]
703e2d26f8 chore(deps): bump botocore from 1.34.143 to 1.34.144 (#4443)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-07-15 09:25:00 +02:00
dependabot[bot]
6d7819dee2 chore(deps-dev): bump coverage from 7.5.4 to 7.6.0 (#4436)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-07-12 09:36:19 +02:00
dependabot[bot]
1b58eeb02a chore(deps): bump boto3 from 1.34.141 to 1.34.143 (#4432)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-07-11 10:04:47 +02:00
dependabot[bot]
845ffd0d56 chore(deps): bump botocore from 1.34.142 to 1.34.143 (#4431)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-07-11 08:48:10 +02:00
dependabot[bot]
35b7aa0dea chore(deps): bump google-api-python-client from 2.136.0 to 2.137.0 (#4418)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-07-10 08:36:28 +02:00
dependabot[bot]
9689ced323 chore(deps): bump botocore from 1.34.141 to 1.34.142 (#4417)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-07-09 19:18:13 -04:00
dependabot[bot]
519c3b88a7 chore(deps): bump boto3 from 1.34.139 to 1.34.141 (#4411)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-07-09 11:55:39 +02:00
dependabot[bot]
1bec2d9cd2 chore(deps-dev): bump moto from 5.0.10 to 5.0.11 (#4408)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-07-09 11:33:14 +02:00
dependabot[bot]
ad6e96ac21 chore(deps): bump botocore from 1.34.140 to 1.34.141 (#4407)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-07-09 09:39:30 +02:00
dependabot[bot]
01182f1402 chore(deps): bump jsonschema from 4.22.0 to 4.23.0 (#4406)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-07-09 09:01:26 +02:00
dependabot[bot]
88a1d55b54 chore(deps): bump botocore from 1.34.139 to 1.34.140 (#4390) 2024-07-05 19:03:44 -04:00
dependabot[bot]
65653b7303 chore(deps-dev): bump safety from 3.2.3 to 3.2.4 (#4382)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-07-05 09:26:11 +02:00
dependabot[bot]
a4c8a2033a chore(deps): bump slack-sdk from 3.30.0 to 3.31.0 (#4381)
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-07-05 08:47:03 +02:00
253 changed files with 5076 additions and 1866 deletions

6
.github/CODEOWNERS vendored
View File

@@ -1 +1,5 @@
* @prowler-cloud/prowler-oss @prowler-cloud/prowler-dev
* @prowler-cloud/sdk @prowler-cloud/detection-and-remediation
# To protect a repository fully against unauthorized changes, you also need to define an owner for the CODEOWNERS file itself.
# https://docs.github.com/en/repositories/managing-your-repositorys-settings-and-features/customizing-your-repository/about-code-owners#codeowners-and-branch-protection
/.github/ @prowler-cloud/sdk

View File

@@ -13,8 +13,67 @@ updates:
labels:
- "dependencies"
- "pip"
- package-ecosystem: "github-actions"
directory: "/"
schedule:
interval: "weekly"
target-branch: master
labels:
- "dependencies"
- "github_actions"
- package-ecosystem: "npm"
directory: "/"
schedule:
interval: "daily"
open-pull-requests-limit: 10
target-branch: master
labels:
- "dependencies"
- "npm"
# v4.6
- package-ecosystem: "pip"
directory: "/"
schedule:
interval: "weekly"
open-pull-requests-limit: 10
target-branch: v4.6
labels:
- "dependencies"
- "pip"
- "v4"
- package-ecosystem: "github-actions"
directory: "/"
schedule:
interval: "weekly"
open-pull-requests-limit: 10
target-branch: v4.6
labels:
- "dependencies"
- "github_actions"
- "v4"
# v3
- package-ecosystem: "pip"
directory: "/"
schedule:
interval: "monthly"
open-pull-requests-limit: 10
target-branch: v3
labels:
- "dependencies"
- "pip"
- "v3"
- package-ecosystem: "github-actions"
directory: "/"
schedule:
interval: "monthly"
open-pull-requests-limit: 10
target-branch: v3
labels:
- "dependencies"
- "github_actions"
- "v3"

View File

@@ -43,7 +43,7 @@ jobs:
runs-on: ubuntu-latest
outputs:
prowler_version_major: ${{ steps.get-prowler-version.outputs.PROWLER_VERSION_MAJOR }}
prowler_version: ${{ steps.update-prowler-version.outputs.PROWLER_VERSION }}
prowler_version: ${{ steps.get-prowler-version.outputs.PROWLER_VERSION }}
env:
POETRY_VIRTUALENVS_CREATE: "false"
@@ -58,13 +58,15 @@ jobs:
- name: Install Poetry
run: |
pipx install poetry
pipx install poetry==1.8.5
pipx inject poetry poetry-bumpversion
- name: Get Prowler version
id: get-prowler-version
run: |
PROWLER_VERSION="$(poetry version -s 2>/dev/null)"
echo "PROWLER_VERSION=${PROWLER_VERSION}" >> "${GITHUB_ENV}"
echo "PROWLER_VERSION=${PROWLER_VERSION}" >> "${GITHUB_OUTPUT}"
# Store prowler version major just for the release
PROWLER_VERSION_MAJOR="${PROWLER_VERSION%%.*}"
@@ -89,15 +91,6 @@ jobs:
;;
esac
- name: Update Prowler version (release)
id: update-prowler-version
if: github.event_name == 'release'
run: |
PROWLER_VERSION="${{ github.event.release.tag_name }}"
poetry version "${PROWLER_VERSION}"
echo "PROWLER_VERSION=${PROWLER_VERSION}" >> "${GITHUB_ENV}"
echo "PROWLER_VERSION=${PROWLER_VERSION}" >> "${GITHUB_OUTPUT}"
- name: Login to DockerHub
uses: docker/login-action@v3
with:
@@ -160,7 +153,7 @@ jobs:
run: |
curl https://api.github.com/repos/${{ secrets.DISPATCH_OWNER }}/${{ secrets.DISPATCH_REPO }}/dispatches \
-H "Accept: application/vnd.github+json" \
-H "Authorization: Bearer ${{ secrets.ACCESS_TOKEN }}" \
-H "Authorization: Bearer ${{ secrets.PROWLER_BOT_ACCESS_TOKEN }}" \
-H "X-GitHub-Api-Version: 2022-11-28" \
--data '{"event_type":"dispatch","client_payload":{"version":"v3-latest", "tag": "${{ env.LATEST_COMMIT_HASH }}"}}'
@@ -169,6 +162,6 @@ jobs:
run: |
curl https://api.github.com/repos/${{ secrets.DISPATCH_OWNER }}/${{ secrets.DISPATCH_REPO }}/dispatches \
-H "Accept: application/vnd.github+json" \
-H "Authorization: Bearer ${{ secrets.ACCESS_TOKEN }}" \
-H "Authorization: Bearer ${{ secrets.PROWLER_BOT_ACCESS_TOKEN }}" \
-H "X-GitHub-Api-Version: 2022-11-28" \
--data '{"event_type":"dispatch","client_payload":{"version":"release", "tag":"${{ needs.container-build-push.outputs.prowler_version }}"}}'

View File

@@ -11,7 +11,7 @@ jobs:
with:
fetch-depth: 0
- name: TruffleHog OSS
uses: trufflesecurity/trufflehog@v3.79.0
uses: trufflesecurity/trufflehog@v3.88.4
with:
path: ./
base: ${{ github.event.repository.default_branch }}

View File

@@ -20,7 +20,7 @@ jobs:
- uses: actions/checkout@v4
- name: Test if changes are in not ignored paths
id: are-non-ignored-files-changed
uses: tj-actions/changed-files@v44
uses: tj-actions/changed-files@v45
with:
files: ./**
files_ignore: |
@@ -33,7 +33,7 @@ jobs:
if: steps.are-non-ignored-files-changed.outputs.any_changed == 'true'
run: |
python -m pip install --upgrade pip
pipx install poetry
pipx install poetry==1.8.5
- name: Set up Python ${{ matrix.python-version }}
if: steps.are-non-ignored-files-changed.outputs.any_changed == 'true'
uses: actions/setup-python@v5
@@ -73,7 +73,7 @@ jobs:
- name: Safety
if: steps.are-non-ignored-files-changed.outputs.any_changed == 'true'
run: |
poetry run safety check --ignore 67599 --ignore 70612
poetry run safety check --ignore 70612
- name: Vulture
if: steps.are-non-ignored-files-changed.outputs.any_changed == 'true'
run: |
@@ -88,6 +88,6 @@ jobs:
poetry run pytest -n auto --cov=./prowler --cov-report=xml tests
- name: Upload coverage reports to Codecov
if: steps.are-non-ignored-files-changed.outputs.any_changed == 'true'
uses: codecov/codecov-action@v4
uses: codecov/codecov-action@v5
env:
CODECOV_TOKEN: ${{ secrets.CODECOV_TOKEN }}

View File

@@ -8,8 +8,6 @@ env:
RELEASE_TAG: ${{ github.event.release.tag_name }}
PYTHON_VERSION: 3.11
CACHE: "poetry"
# TODO: create a bot user for this kind of tasks, like prowler-bot
GIT_COMMITTER_EMAIL: "sergio@prowler.com"
jobs:
release-prowler-job:
@@ -39,8 +37,7 @@ jobs:
- name: Install dependencies
run: |
pipx install poetry
pipx inject poetry poetry-bumpversion
pipx install poetry==1.8.5
- name: Setup Python
uses: actions/setup-python@v5
@@ -48,34 +45,6 @@ jobs:
python-version: ${{ env.PYTHON_VERSION }}
cache: ${{ env.CACHE }}
- name: Update Poetry and config version
run: |
poetry version ${{ env.RELEASE_TAG }}
- name: Import GPG key
uses: crazy-max/ghaction-import-gpg@v6
with:
gpg_private_key: ${{ secrets.GPG_PRIVATE_KEY }}
passphrase: ${{ secrets.GPG_PASSPHRASE }}
git_user_signingkey: true
git_commit_gpgsign: true
- name: Push updated version to the release tag
run: |
# Configure Git
git config user.name "github-actions"
git config user.email "${{ env.GIT_COMMITTER_EMAIL }}"
# Add the files with the version changed
git add prowler/config/config.py pyproject.toml
git commit -m "chore(release): ${{ env.RELEASE_TAG }}" --no-verify -S
# Replace the tag with the version updated
git tag -fa ${{ env.RELEASE_TAG }} -m "chore(release): ${{ env.RELEASE_TAG }}" --sign
# Push the tag
git push -f origin ${{ env.RELEASE_TAG }}
- name: Build Prowler package
run: |
poetry build

View File

@@ -50,7 +50,7 @@ jobs:
# Create pull request
- name: Create Pull Request
uses: peter-evans/create-pull-request@v6
uses: peter-evans/create-pull-request@v7
with:
token: ${{ secrets.PROWLER_ACCESS_TOKEN }}
commit-message: "feat(regions_update): Update regions for AWS services."

View File

@@ -96,7 +96,7 @@ repos:
- id: safety
name: safety
description: "Safety is a tool that checks your installed dependencies for known security vulnerabilities"
entry: bash -c 'safety check --ignore 67599 --ignore 70612'
entry: bash -c 'safety check --ignore 70612'
language: system
- id: vulture

View File

@@ -1,4 +1,4 @@
FROM python:3.12-alpine
FROM python:3.12.8-alpine3.20
LABEL maintainer="https://github.com/prowler-cloud/prowler"

View File

@@ -230,7 +230,7 @@ Each Prowler check has metadata associated which is stored at the same level of
# Severity holds the check's severity, always in lowercase (critical, high, medium, low or informational)
"Severity": "critical",
# ResourceType only for AWS, holds the type from here
# https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-template-resource-type-ref.html
# https://docs.aws.amazon.com/securityhub/latest/userguide/asff-resources.html
"ResourceType": "Other",
# Description holds the title of the check, for now is the same as CheckTitle
"Description": "Ensure there are no EC2 AMIs set as Public.",

View File

@@ -7,7 +7,6 @@ At the time of writing this documentation the available Azure Clouds from differ
- AzureCloud
- AzureChinaCloud
- AzureUSGovernment
- AzureGermanCloud
If you want to change the default one you must include the flag `--azure-region`, i.e.:

View File

@@ -81,6 +81,7 @@ aws:
max_ec2_instance_age_in_days: 180
# AWS VPC Configuration (vpc_endpoint_connections_trust_boundaries, vpc_endpoint_services_allowed_principals_trust_boundaries)
# AWS SSM Configuration (aws.ssm_documents_set_as_public)
# Single account environment: No action required. The AWS account number will be automatically added by the checks.
# Multi account environment: Any additional trusted account number should be added as a space separated list, e.g.
# trusted_account_ids : ["123456789012", "098765432109", "678901234567"]

View File

@@ -36,10 +36,11 @@ If EBS default encyption is not enabled, sensitive information at rest is not pr
- `ec2_ebs_default_encryption`
If your Security groups are not properly configured the attack surface is increased, nonetheless, Prowler will detect those security groups that are being used (they are attached) to only notify those that are being used. This logic applies to the 15 checks related to open ports in security groups and the check for the default security group.
If your Security groups are not properly configured the attack surface is increased, nonetheless, Prowler will detect those security groups that are being used (they are attached) to only notify those that are being used. This logic applies to the 15 checks related to open ports in security groups, the check for the default security group and for the security groups that allow ingress and egress traffic.
- `ec2_securitygroup_allow_ingress_from_internet_to_port_X` (15 checks)
- `ec2_securitygroup_default_restrict_traffic`
- `ec2_securitygroup_allow_wide_open_public_ipv4`
Prowler will also check for used Network ACLs to only alerts those with open ports that are being used.

1245
poetry.lock generated

File diff suppressed because it is too large Load Diff

View File

@@ -3044,7 +3044,7 @@
"Id": "9.4",
"Description": "Ensure that Register with Entra ID is enabled on App Service",
"Checks": [
"app_client_certificates_on"
""
],
"Attributes": [
{
@@ -3066,7 +3066,7 @@
"Id": "9.5",
"Description": "Ensure That 'PHP version' is the Latest, If Used to Run the Web App",
"Checks": [
"app_register_with_identity"
"app_ensure_php_version_is_latest"
],
"Attributes": [
{
@@ -3088,7 +3088,7 @@
"Id": "9.6",
"Description": "Ensure that 'Python version' is the Latest Stable Version, if Used to Run the Web App",
"Checks": [
"app_ensure_php_version_is_latest"
"app_ensure_python_version_is_latest"
],
"Attributes": [
{
@@ -3110,7 +3110,7 @@
"Id": "9.7",
"Description": "Ensure that 'Java version' is the latest, if used to run the Web App",
"Checks": [
"app_ensure_python_version_is_latest"
"app_ensure_java_version_is_latest"
],
"Attributes": [
{
@@ -3132,7 +3132,7 @@
"Id": "9.8",
"Description": "Ensure that 'HTTP Version' is the Latest, if Used to Run the Web App",
"Checks": [
"app_ensure_java_version_is_latest"
"app_ensure_using_http20"
],
"Attributes": [
{
@@ -3154,7 +3154,7 @@
"Id": "9.9",
"Description": "Ensure FTP deployments are Disabled",
"Checks": [
"app_ensure_using_http20"
"app_ftp_deployment_disabled"
],
"Attributes": [
{
@@ -3176,7 +3176,7 @@
"Id": "9.10",
"Description": "Ensure Azure Key Vaults are Used to Store Secrets",
"Checks": [
"app_ftp_deployment_disabled"
""
],
"Attributes": [
{
@@ -3213,66 +3213,6 @@
"References": "https://docs.microsoft.com/en-us/azure/azure-resource-manager/resource-group-lock-resources:https://docs.microsoft.com/en-us/azure/azure-resource-manager/resource-manager-subscription-governance#azure-resource-locks:https://docs.microsoft.com/en-us/azure/governance/blueprints/concepts/resource-locking:https://learn.microsoft.com/en-us/security/benchmark/azure/mcsb-asset-management#am-4-limit-access-to-asset-management"
}
]
},
{
"Id": "9.10",
"Description": "Ensure FTP deployments are Disabled",
"Checks": [],
"Attributes": [
{
"Section": "9. AppService",
"Profile": "Level 1",
"AssessmentStatus": "Automated",
"Description": "By default, Azure Functions, Web, and API Services can be deployed over FTP. If FTP is required for an essential deployment workflow, FTPS should be required for FTP login for all App Service Apps and Functions.",
"RationaleStatement": "Azure FTP deployment endpoints are public. An attacker listening to traffic on a wifi network used by a remote employee or a corporate network could see login traffic in clear-text which would then grant them full control of the code base of the app or service. This finding is more severe if User Credentials for deployment are set at the subscription level rather than using the default Application Credentials which are unique per App.",
"ImpactStatement": "Any deployment workflows that rely on FTP or FTPs rather than the WebDeploy or HTTPs endpoints may be affected.",
"RemediationProcedure": "**From Azure Portal** 1. Go to the Azure Portal 2. Select `App Services` 3. Click on an app 4. Select `Settings` and then `Configuration` 5. Under `General Settings`, for the `Platform Settings`, the `FTP state` should be set to `Disabled` or `FTPS Only` **From Azure CLI** For each out of compliance application, run the following choosing either 'disabled' or 'FtpsOnly' as appropriate: ``` az webapp config set --resource-group <resource group name> --name <app name> --ftps-state [disabled|FtpsOnly] ``` **From PowerShell** For each out of compliance application, run the following: ``` Set-AzWebApp -ResourceGroupName <resource group name> -Name <app name> -FtpsState <Disabled or FtpsOnly> ```",
"AuditProcedure": "**From Azure Portal** 1. Go to the Azure Portal 2. Select `App Services` 3. Click on an app 4. Select `Settings` and then `Configuration` 5. Under `General Settings`, for the `Platform Settings`, the `FTP state` should not be set to `All allowed` **From Azure CLI** List webapps to obtain the ids. ``` az webapp list ``` List the publish profiles to obtain the username, password and ftp server url. ``` az webapp deployment list-publishing-profiles --ids <ids> { publishUrl: <URL_FOR_WEB_APP>, userName: <USER_NAME>, userPWD: <USER_PASSWORD>, } ``` **From PowerShell** List all Web Apps: ``` Get-AzWebApp ``` For each app: ``` Get-AzWebApp -ResourceGroupName <resource group name> -Name <app name> | Select-Object -ExpandProperty SiteConfig ``` In the output, look for the value of **FtpsState**. If its value is **AllAllowed** the setting is out of compliance. Any other value is considered in compliance with this check.",
"AdditionalInformation": "",
"DefaultValue": "[Azure Web Service Deploy via FTP](https://docs.microsoft.com/en-us/azure/app-service/deploy-ftp):[Azure Web Service Deployment](https://docs.microsoft.com/en-us/azure/app-service/overview-security):https://docs.microsoft.com/en-us/security/benchmark/azure/security-controls-v3-data-protection#dp-4-encrypt-sensitive-information-in-transit:https://docs.microsoft.com/en-us/security/benchmark/azure/security-controls-v3-posture-vulnerability-management#pv-7-rapidly-and-automatically-remediate-software-vulnerabilities",
"References": "TA0008, T1570, M1031"
}
]
},
{
"Id": "9.11",
"Description": "Ensure Azure Key Vaults are Used to Store Secrets",
"Checks": [],
"Attributes": [
{
"Section": "9. AppService",
"Profile": "Level 2",
"AssessmentStatus": "Manual",
"Description": "Azure Key Vault will store multiple types of sensitive information such as encryption keys, certificate thumbprints, and Managed Identity Credentials. Access to these 'Secrets' can be controlled through granular permissions.",
"RationaleStatement": "The credentials given to an application have permissions to create, delete, or modify data stored within the systems they access. If these credentials are stored within the application itself, anyone with access to the application or a copy of the code has access to them. Storing within Azure Key Vault as secrets increases security by controlling access. This also allows for updates of the credentials without redeploying the entire application.",
"ImpactStatement": "Integrating references to secrets within the key vault are required to be specifically integrated within the application code. This will require additional configuration to be made during the writing of an application, or refactoring of an already written one. There are also additional costs that are charged per 10000 requests to the Key Vault.",
"RemediationProcedure": "Remediation has 2 steps 1. Setup the Key Vault 2. Setup the App Service to use the Key Vault **Step 1: Set up the Key Vault** **From Azure CLI** ``` az keyvault create --name <name> --resource-group <myResourceGroup> --location myLocation ``` **From Powershell** ``` New-AzKeyvault -name <name> -ResourceGroupName <myResourceGroup> -Location <myLocation> ``` **Step 2: Set up the App Service to use the Key Vault** Sample JSON Template for App Service Configuration: ``` { //... resources: [ { type: Microsoft.Storage/storageAccounts, name: [variables('storageAccountName')], //... }, { type: Microsoft.Insights/components, name: [variables('appInsightsName')], //... }, { type: Microsoft.Web/sites, name: [variables('functionAppName')], identity: { type: SystemAssigned }, //... resources: [ { type: config, name: appsettings, //... dependsOn: [ [resourceId('Microsoft.Web/sites', variables('functionAppName'))], [resourceId('Microsoft.KeyVault/vaults/', variables('keyVaultName'))], [resourceId('Microsoft.KeyVault/vaults/secrets', variables('keyVaultName'), variables('storageConnectionStringName'))], [resourceId('Microsoft.KeyVault/vaults/secrets', variables('keyVaultName'), variables('appInsightsKeyName'))] ], properties: { AzureWebJobsStorage: [concat('@Microsoft.KeyVault(SecretUri=', reference(variables('storageConnectionStringResourceId')).secretUriWithVersion, ')')], WEBSITE_CONTENTAZUREFILECONNECTIONSTRING: [concat('@Microsoft.KeyVault(SecretUri=', reference(variables('storageConnectionStringResourceId')).secretUriWithVersion, ')')], APPINSIGHTS_INSTRUMENTATIONKEY: [concat('@Microsoft.KeyVault(SecretUri=', reference(variables('appInsightsKeyResourceId')).secretUriWithVersion, ')')], WEBSITE_ENABLE_SYNC_UPDATE_SITE: true //... } }, { type: sourcecontrols, name: web, //... dependsOn: [ [resourceId('Microsoft.Web/sites', variables('functionAppName'))], [resourceId('Microsoft.Web/sites/config', variables('functionAppName'), 'appsettings')] ], } ] }, { type: Microsoft.KeyVault/vaults, name: [variables('keyVaultName')], //... dependsOn: [ [resourceId('Microsoft.Web/sites', variables('functionAppName'))] ], properties: { //... accessPolicies: [ { tenantId: [reference(concat('Microsoft.Web/sites/', variables('functionAppName'), '/providers/Microsoft.ManagedIdentity/Identities/default'), '2015-08-31-PREVIEW').tenantId], objectId: [reference(concat('Microsoft.Web/sites/', variables('functionAppName'), '/providers/Microsoft.ManagedIdentity/Identities/default'), '2015-08-31-PREVIEW').principalId], permissions: { secrets: [ get ] } } ] }, resources: [ { type: secrets, name: [variables('storageConnectionStringName')], //... dependsOn: [ [resourceId('Microsoft.KeyVault/vaults/', variables('keyVaultName'))], [resourceId('Microsoft.Storage/storageAccounts', variables('storageAccountName'))] ], properties: { value: [concat('DefaultEndpointsProtocol=https;AccountName=', variables('storageAccountName'), ';AccountKey=', listKeys(variables('storageAccountResourceId'),'2015-05-01-preview').key1)] } }, { type: secrets, name: [variables('appInsightsKeyName')], //... dependsOn: [ [resourceId('Microsoft.KeyVault/vaults/', variables('keyVaultName'))], [resourceId('Microsoft.Insights/components', variables('appInsightsName'))] ], properties: { value: [reference(resourceId('microsoft.insights/components/', variables('appInsightsName')), '2015-05-01').InstrumentationKey] } } ] } ] } ```",
"AuditProcedure": "**From Azure Portal** 1. Login to Azure Portal 2. In the expandable menu on the left go to `Key Vaults` 3. View the Key Vaults listed. **From Azure CLI** To list key vaults within a subscription run the following command: ``` Get-AzKeyVault ``` To list the secrets within these key vaults run the following command: ``` Get-AzKeyVaultSecret [-VaultName] <vault name> ``` **From Powershell** To list key vaults within a subscription run the following command: ``` Get-AzKeyVault ``` To list all secrets in a key vault run the following command: ``` Get-AzKeyVaultSecret -VaultName '<vaultName' ```",
"AdditionalInformation": "",
"DefaultValue": "https://docs.microsoft.com/en-us/azure/app-service/app-service-key-vault-references:https://docs.microsoft.com/en-us/security/benchmark/azure/security-controls-v3-identity-management#im-2-manage-application-identities-securely-and-automatically:https://docs.microsoft.com/en-us/cli/azure/keyvault?view=azure-cli-latest:https://docs.microsoft.com/en-us/cli/azure/keyvault?view=azure-cli-latest",
"References": "TA0006, T1552, M1041"
}
]
},
{
"Id": "10.1",
"Description": "Ensure that Resource Locks are set for Mission-Critical Azure Resources",
"Checks": [],
"Attributes": [
{
"Section": "10. Miscellaneous",
"Profile": "Level 2",
"AssessmentStatus": "Manual",
"Description": "Resource Manager Locks provide a way for administrators to lock down Azure resources to prevent deletion of, or modifications to, a resource. These locks sit outside of the Role Based Access Controls (RBAC) hierarchy and, when applied, will place restrictions on the resource for all users. These locks are very useful when there is an important resource in a subscription that users should not be able to delete or change. Locks can help prevent accidental and malicious changes or deletion.",
"RationaleStatement": "As an administrator, it may be necessary to lock a subscription, resource group, or resource to prevent other users in the organization from accidentally deleting or modifying critical resources. The lock level can be set to to `CanNotDelete` or `ReadOnly` to achieve this purpose. - `CanNotDelete` means authorized users can still read and modify a resource, but they cannot delete the resource. - `ReadOnly` means authorized users can read a resource, but they cannot delete or update the resource. Applying this lock is similar to restricting all authorized users to the permissions granted by the Reader role.",
"ImpactStatement": "There can be unintended outcomes of locking a resource. Applying a lock to a parent service will cause it to be inherited by all resources within. Conversely, applying a lock to a resource may not apply to connected storage, leaving it unlocked. Please see the documentation for further information.",
"RemediationProcedure": "**From Azure Portal** 1. Navigate to the specific Azure Resource or Resource Group 2. For each mission critical resource, click on `Locks` 3. Click `Add` 4. Give the lock a name and a description, then select the type, `Read-only` or `Delete` as appropriate 5. Click OK **From Azure CLI** To lock a resource, provide the name of the resource, its resource type, and its resource group name. ``` az lock create --name <LockName> --lock-type <CanNotDelete/Read-only> --resource-group <resourceGroupName> --resource-name <resourceName> --resource-type <resourceType> ``` **From Powershell** ``` Get-AzResourceLock -ResourceName <Resource Name> -ResourceType <Resource Type> -ResourceGroupName <Resource Group Name> -Locktype <CanNotDelete/Read-only> ```",
"AuditProcedure": "**From Azure Portal** 1. Navigate to the specific Azure Resource or Resource Group 2. Click on `Locks` 3. Ensure the lock is defined with name and description, with type `Read-only` or `Delete` as appropriate. **From Azure CLI** Review the list of all locks set currently: ``` az lock list --resource-group <resourcegroupname> --resource-name <resourcename> --namespace <Namespace> --resource-type <type> --parent ``` **From Powershell** Run the following command to list all resources. ``` Get-AzResource ``` For each resource, run the following command to check for Resource Locks. ``` Get-AzResourceLock -ResourceName <Resource Name> -ResourceType <Resource Type> -ResourceGroupName <Resource Group Name> ``` Review the output of the `Properties` setting. Compliant settings will have the `CanNotDelete` or `ReadOnly` value.",
"AdditionalInformation": "",
"DefaultValue": "https://docs.microsoft.com/en-us/azure/azure-resource-manager/resource-group-lock-resources:https://docs.microsoft.com/en-us/azure/azure-resource-manager/resource-manager-subscription-governance#azure-resource-locks:https://docs.microsoft.com/en-us/azure/governance/blueprints/concepts/resource-locking:https://docs.microsoft.com/en-us/security/benchmark/azure/security-controls-v3-asset-management#am-4-limit-access-to-asset-management",
"References": ""
}
]
}
]
}

View File

@@ -11,7 +11,7 @@ from prowler.lib.logger import logger
timestamp = datetime.today()
timestamp_utc = datetime.now(timezone.utc).replace(tzinfo=timezone.utc)
prowler_version = "3.16.10"
prowler_version = "3.16.18"
html_logo_url = "https://github.com/prowler-cloud/prowler/"
html_logo_img = "https://user-images.githubusercontent.com/3985464/113734260-7ba06900-96fb-11eb-82bc-d4f68a1e2710.png"
square_logo_img = "https://user-images.githubusercontent.com/38561120/235905862-9ece5bd7-9aa3-4e48-807a-3a9035eb8bfb.png"
@@ -61,6 +61,7 @@ html_file_suffix = ".html"
default_config_file_path = (
f"{pathlib.Path(os.path.dirname(os.path.realpath(__file__)))}/config.yaml"
)
encoding_format_utf_8 = "utf-8"
def check_current_version():
@@ -102,8 +103,7 @@ def load_and_validate_config_file(provider: str, config_file_path: str) -> dict:
load_and_validate_config_file reads the Prowler config file in YAML format from the default location or the file passed with the --config-file flag
"""
try:
with open(config_file_path) as f:
config = {}
with open(config_file_path, "r", encoding=encoding_format_utf_8) as f:
config_file = yaml.safe_load(f)
# Not to introduce a breaking change we have to allow the old format config file without any provider keys

View File

@@ -31,6 +31,7 @@ aws:
max_ec2_instance_age_in_days: 180
# AWS VPC Configuration (vpc_endpoint_connections_trust_boundaries, vpc_endpoint_services_allowed_principals_trust_boundaries)
# AWS SSM Configuration (aws.ssm_documents_set_as_public)
# Single account environment: No action required. The AWS account number will be automatically added by the checks.
# Multi account environment: Any additional trusted account number should be added as a space separated list, e.g.
# trusted_account_ids : ["123456789012", "098765432109", "678901234567"]

View File

@@ -12,13 +12,14 @@ from time import mktime
from detect_secrets import SecretsCollection
from detect_secrets.settings import default_settings
from prowler.config.config import encoding_format_utf_8
from prowler.lib.logger import logger
def open_file(input_file: str, mode: str = "r") -> TextIOWrapper:
"""open_file returns a handler to the file using the specified mode."""
try:
f = open(input_file, mode)
f = open(input_file, mode, encoding=encoding_format_utf_8)
except OSError as os_error:
if os_error.strerror == "Too many open files":
logger.critical(
@@ -66,7 +67,7 @@ def file_exists(filename: str):
def hash_sha512(string: str) -> str:
"""hash_sha512 returns the first 9 bytes of the SHA512 representation for the given string."""
return sha512(string.encode("utf-8")).hexdigest()[0:9]
return sha512(string.encode(encoding_format_utf_8)).hexdigest()[0:9]
def detect_secrets_scan(data):

View File

@@ -125,8 +125,7 @@ class AWS_Provider:
token=response["Credentials"]["SessionToken"],
expiry_time=response["Credentials"]["Expiration"].isoformat(),
)
logger.info("Refreshed Credentials:")
logger.info(refreshed_credentials)
logger.info("Refreshed Credentials")
return refreshed_credentials

File diff suppressed because it is too large Load Diff

View File

@@ -45,6 +45,8 @@ def parse_iam_credentials_arn(arn: str) -> ARN:
arn_parsed.resource_type != "role"
and arn_parsed.resource_type != "user"
and arn_parsed.resource_type != "assumed-role"
and arn_parsed.resource_type != "root"
and arn_parsed.resource_type != "federated-user"
):
raise RoleArnParsingInvalidResourceType
elif arn_parsed.resource == "":

View File

@@ -1,5 +1,7 @@
def is_condition_block_restrictive(
condition_statement: dict, source_account: str, is_cross_account_allowed=False
condition_statement: dict,
source_account: str,
is_cross_account_allowed=False,
):
"""
is_condition_block_restrictive parses the IAM Condition policy block and, by default, returns True if the source_account passed as argument is within, False if not.
@@ -15,6 +17,9 @@ def is_condition_block_restrictive(
}
@param source_account: str with a 12-digit AWS Account number, e.g.: 111122223333
@param is_cross_account_allowed: bool to allow cross-account access, e.g.: True
"""
is_condition_valid = False
@@ -90,3 +95,63 @@ def is_condition_block_restrictive(
is_condition_valid = True
return is_condition_valid
def is_condition_block_restrictive_organization(
condition_statement: dict,
):
"""
is_condition_block_restrictive_organization parses the IAM Condition policy block and returns True if the condition_statement is restrictive for the organization, False if not.
@param condition_statement: dict with an IAM Condition block, e.g.:
{
"StringLike": {
"AWS:PrincipalOrgID": "o-111122223333"
}
}
"""
is_condition_valid = False
# The conditions must be defined in lowercase since the context key names are not case-sensitive.
# For example, including the aws:PrincipalOrgID context key is equivalent to testing for AWS:PrincipalOrgID
# https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_elements_condition.html
valid_condition_options = {
"StringEquals": [
"aws:principalorgid",
],
"StringLike": [
"aws:principalorgid",
],
}
for condition_operator, condition_operator_key in valid_condition_options.items():
if condition_operator in condition_statement:
for value in condition_operator_key:
# We need to transform the condition_statement into lowercase
condition_statement[condition_operator] = {
k.lower(): v
for k, v in condition_statement[condition_operator].items()
}
if value in condition_statement[condition_operator]:
# values are a list
if isinstance(
condition_statement[condition_operator][value],
list,
):
is_condition_valid = True
for item in condition_statement[condition_operator][value]:
if item == "*":
is_condition_valid = False
break
# value is a string
elif isinstance(
condition_statement[condition_operator][value],
str,
):
if "*" not in condition_statement[condition_operator][value]:
is_condition_valid = True
return is_condition_valid

View File

@@ -12,7 +12,7 @@
"SubServiceName": "rest_api",
"ResourceIdTemplate": "arn:partition:service:region:account-id:resource-id",
"Severity": "medium",
"ResourceType": "AwsApiGatewayStage",
"ResourceType": "AwsApiGatewayRestApi",
"Description": "Check if API Gateway Stage has client certificate enabled to access your backend endpoint.",
"Risk": "Possible man in the middle attacks and other similar risks.",
"RelatedUrl": "",

View File

@@ -12,7 +12,7 @@
"SubServiceName": "rest_api",
"ResourceIdTemplate": "arn:partition:service:region:account-id:resource-id",
"Severity": "medium",
"ResourceType": "AwsApiGatewayStage",
"ResourceType": "AwsApiGatewayRestApi",
"Description": "Check if API Gateway Stage has logging enabled.",
"Risk": "If not enabled, monitoring of service use is not possible. Real-time monitoring of API calls can be achieved by directing CloudTrail Logs to CloudWatch Logs and establishing corresponding metric filters and alarms.",
"RelatedUrl": "",

View File

@@ -12,7 +12,7 @@
"SubServiceName": "rest_api",
"ResourceIdTemplate": "arn:partition:service:region:account-id:resource-id",
"Severity": "medium",
"ResourceType": "AwsApiGatewayStage",
"ResourceType": "AwsApiGatewayRestApi",
"Description": "Check if API Gateway Stage has a WAF ACL attached.",
"Risk": "Potential attacks and / or abuse of service, more even for even for internet reachable services.",
"RelatedUrl": "",

View File

@@ -11,7 +11,7 @@
"SubServiceName": "",
"ResourceIdTemplate": "arn:partition:appstream:region:account-id:fleet/resource-id",
"Severity": "medium",
"ResourceType": "AppStream",
"ResourceType": "Other",
"Description": "Ensure default Internet Access from your Amazon AppStream fleet streaming instances should remain unchecked.",
"Risk": "Default Internet Access from your fleet streaming instances should be controlled using a NAT gateway in the VPC.",
"RelatedUrl": "https://docs.aws.amazon.com/appstream2/latest/developerguide/set-up-stacks-fleets.html",

View File

@@ -9,7 +9,7 @@
"SubServiceName": "",
"ResourceIdTemplate": "arn:partition:appstream:region:account-id:fleet/resource-id",
"Severity": "medium",
"ResourceType": "AppStream",
"ResourceType": "Other",
"Description": "Ensure user maximum session duration is no longer than 10 hours.",
"Risk": "Having a session duration lasting longer than 10 hours should not be necessary and if running for any malicious reasons provides a greater time for usage than should be allowed.",
"RelatedUrl": "https://docs.aws.amazon.com/appstream2/latest/developerguide/set-up-stacks-fleets.html",

View File

@@ -11,7 +11,7 @@
"SubServiceName": "",
"ResourceIdTemplate": "arn:partition:appstream:region:account-id:fleet/resource-id",
"Severity": "medium",
"ResourceType": "AppStream",
"ResourceType": "Other",
"Description": "Ensure session disconnect timeout is set to 5 minutes or less",
"Risk": "Disconnect timeout in minutes, is the amount of of time that a streaming session remains active after users disconnect.",
"RelatedUrl": "https://docs.aws.amazon.com/appstream2/latest/developerguide/set-up-stacks-fleets.html",

View File

@@ -11,7 +11,7 @@
"SubServiceName": "",
"ResourceIdTemplate": "arn:partition:appstream:region:account-id:fleet/resource-id",
"Severity": "medium",
"ResourceType": "AppStream",
"ResourceType": "Other",
"Description": "Ensure session idle disconnect timeout is set to 10 minutes or less.",
"Risk": "Idle disconnect timeout in minutes is the amount of time that users can be inactive before they are disconnected from their streaming session and the Disconnect timeout in minutes time begins.",
"RelatedUrl": "https://docs.aws.amazon.com/appstream2/latest/developerguide/set-up-stacks-fleets.html",

View File

@@ -9,7 +9,7 @@
"SubServiceName": "",
"ResourceIdTemplate": "arn:partition:athena:region:account-id:workgroup/resource-id",
"Severity": "medium",
"ResourceType": "WorkGroup",
"ResourceType": "AwsAthenaWorkGroup",
"Description": "Ensure that encryption at rest is enabled for Amazon Athena query results stored in Amazon S3 in order to secure data and meet compliance requirements for data-at-rest encryption.",
"Risk": "If not enabled sensitive information at rest is not protected.",
"RelatedUrl": "https://docs.aws.amazon.com/athena/latest/ug/encryption.html",

View File

@@ -9,7 +9,7 @@
"SubServiceName": "",
"ResourceIdTemplate": "arn:partition:athena:region:account-id:workgroup/resource-id",
"Severity": "medium",
"ResourceType": "WorkGroup",
"ResourceType": "AwsAthenaWorkGroup",
"Description": "Ensure that workgroup configuration is enforced so it cannot be overriden by client-side settings.",
"Risk": "If workgroup configuration is not enforced security settings like encryption can be overriden by client-side settings.",
"RelatedUrl": "https://docs.aws.amazon.com/athena/latest/ug/workgroups-settings-override.html",

View File

@@ -9,7 +9,7 @@
"SubServiceName": "",
"ResourceIdTemplate": "arn:partition:autoscaling:region:account-id:autoScalingGroupName/resource-name",
"Severity": "critical",
"ResourceType": "Other",
"ResourceType": "AwsAutoScalingLaunchConfiguration",
"Description": "Find secrets in EC2 Auto Scaling Launch Configuration",
"Risk": "The use of a hard-coded password increases the possibility of password guessing. If hard-coded passwords are used, it is possible that malicious users gain access through the account in question.",
"RelatedUrl": "",

View File

@@ -6,7 +6,9 @@ from base64 import b64decode
from detect_secrets import SecretsCollection
from detect_secrets.settings import default_settings
from prowler.config.config import encoding_format_utf_8
from prowler.lib.check.models import Check, Check_Report_AWS
from prowler.lib.logger import logger
from prowler.providers.aws.services.autoscaling.autoscaling_client import (
autoscaling_client,
)
@@ -25,12 +27,23 @@ class autoscaling_find_secrets_ec2_launch_configuration(Check):
temp_user_data_file = tempfile.NamedTemporaryFile(delete=False)
user_data = b64decode(configuration.user_data)
if user_data[0:2] == b"\x1f\x8b": # GZIP magic number
user_data = zlib.decompress(user_data, zlib.MAX_WBITS | 32).decode(
"utf-8"
try:
if user_data[0:2] == b"\x1f\x8b": # GZIP magic number
user_data = zlib.decompress(
user_data, zlib.MAX_WBITS | 32
).decode(encoding_format_utf_8)
else:
user_data = user_data.decode(encoding_format_utf_8)
except UnicodeDecodeError as error:
logger.warning(
f"{configuration.region} -- Unable to decode user data in autoscaling launch configuration {configuration.name}: {error}"
)
else:
user_data = user_data.decode("utf-8")
continue
except Exception as error:
logger.warning(
f"{configuration.region} -- {error.__class__.__name__}[{error.__traceback__.tb_lineno}]: {error}"
)
continue
temp_user_data_file.write(
bytes(user_data, encoding="raw_unicode_escape")

View File

@@ -7,7 +7,7 @@
"SubServiceName": "",
"ResourceIdTemplate": "arn:partition:autoscaling:region:account-id:autoScalingGroupName/resource-name",
"Severity": "medium",
"ResourceType": "Other",
"ResourceType": "AwsAutoScalingAutoScalingGroup",
"Description": "EC2 Auto Scaling Group should use multiple Availability Zones",
"Risk": "In case of a failure in a single Availability Zone, the Auto Scaling Group will not be able to launch new instances to replace the failed ones.",
"RelatedUrl": "https://docs.aws.amazon.com/autoscaling/ec2/userguide/as-add-availability-zone.html",

View File

@@ -28,7 +28,8 @@ class awslambda_function_invoke_api_operations_cloudtrail_logging_enabled(Check)
for resource in data_event.event_selector["DataResources"]:
if resource["Type"] == "AWS::Lambda::Function" and (
function.arn in resource["Values"]
or "arn:aws:lambda" in resource["Values"]
or f"arn:{awslambda_client.audited_partition}:lambda"
in resource["Values"]
):
lambda_recorded_cloudtrail = True
break

View File

@@ -28,5 +28,5 @@
],
"DependsOn": [],
"RelatedTo": [],
"Notes": ""
"Notes": "It gives a false positive if the function is exposed publicly by an other public resource like an ALB or API Gateway in an AWS Account when an AWS account ID is set as the principal of the policy."
}

View File

@@ -19,20 +19,30 @@ class awslambda_function_not_publicly_accessible(Check):
if function.policy:
for statement in function.policy["Statement"]:
# Only check allow statements
if statement["Effect"] == "Allow":
if (
"*" in statement["Principal"]
or (
"AWS" in statement["Principal"]
and "*" in statement["Principal"]["AWS"]
if statement["Effect"] == "Allow" and (
"*" in statement["Principal"]
or (
isinstance(statement["Principal"], dict)
and (
"*" in statement["Principal"].get("AWS", "")
or "*"
in statement["Principal"].get("CanonicalUser", "")
or ( # Check if function can be invoked by other AWS services
(
".amazonaws.com"
in statement["Principal"].get("Service", "")
)
and (
"*" in statement.get("Action", "")
or "InvokeFunction"
in statement.get("Action", "")
)
)
)
or (
"CanonicalUser" in statement["Principal"]
and "*" in statement["Principal"]["CanonicalUser"]
)
):
public_access = True
break
)
):
public_access = True
break
if public_access:
report.status = "FAIL"

View File

@@ -14,7 +14,6 @@ from prowler.lib.scan_filters.scan_filters import is_resource_filtered
from prowler.providers.aws.lib.service.service import AWSService
################## Lambda
class Lambda(AWSService):
def __init__(self, audit_info):
# Call AWSService's __init__

View File

@@ -11,7 +11,7 @@
"SubServiceName": "",
"ResourceIdTemplate": "arn:partition:service:region:account-id:backup-report-plan:backup-report-plan-id",
"Severity": "low",
"ResourceType": "Other",
"ResourceType": "AwsBackupBackupPlan",
"Description": "This check ensures that there is at least one backup report plan in place.",
"Risk": "Without a backup report plan, an organization may lack visibility into the success or failure of backup operations.",
"RelatedUrl": "https://docs.aws.amazon.com/aws-backup/latest/devguide/create-report-plan-console.html",

View File

@@ -29,7 +29,12 @@ class cloudformation_stack_outputs_find_secrets(Check):
# Store the CloudFormation Stack Outputs into a file
for output in stack.outputs:
temp_output_file.write(f"{output}".encode())
temp_output_file.write(
bytes(
f"{output}\n",
encoding="raw_unicode_escape",
)
)
temp_output_file.close()
# Init detect_secrets
@@ -38,11 +43,17 @@ class cloudformation_stack_outputs_find_secrets(Check):
with default_settings():
secrets.scan_file(temp_output_file.name)
if secrets.json():
report.status = "FAIL"
report.status_extended = (
f"Potential secret found in Stack {stack.name} Outputs."
detect_secrets_output = secrets.json()
# If secrets are found, update the report status
if detect_secrets_output:
secrets_string = ", ".join(
[
f"{secret['type']} in Output {int(secret['line_number'])}"
for secret in detect_secrets_output[temp_output_file.name]
]
)
report.status = "FAIL"
report.status_extended = f"Potential secret found in Stack {stack.name} Outputs -> {secrets_string}."
os.remove(temp_output_file.name)
else:

View File

@@ -0,0 +1,38 @@
from prowler.lib.check.models import Check, Check_Report_AWS
from prowler.providers.aws.services.cloudfront.cloudfront_client import (
cloudfront_client,
)
class cloudfront_distributions_origin_traffic_encrypted(Check):
def execute(self):
findings = []
for distribution in cloudfront_client.distributions.values():
report = Check_Report_AWS(metadata=self.metadata(), resource=distribution)
report.status = "PASS"
report.status_extended = f"CloudFront Distribution {distribution.id} does encrypt traffic to custom origins."
unencrypted_origins = []
for origin in distribution.origins:
if origin.s3_origin_config:
# For S3, only check the viewer protocol policy
if distribution.viewer_protocol_policy == "allow-all":
unencrypted_origins.append(origin.id)
else:
# Regular check for custom origins (ALB, EC2, API Gateway, etc.)
if (
origin.origin_protocol_policy == ""
or origin.origin_protocol_policy == "http-only"
) or (
origin.origin_protocol_policy == "match-viewer"
and distribution.viewer_protocol_policy == "allow-all"
):
unencrypted_origins.append(origin.id)
if unencrypted_origins:
report.status = "FAIL"
report.status_extended = f"CloudFront Distribution {distribution.id} does not encrypt traffic to custom origins {', '.join(unencrypted_origins)}."
findings.append(report)
return findings

View File

@@ -9,7 +9,7 @@
"SubServiceName": "",
"ResourceIdTemplate": "arn:partition:service:region:account-id:resource-id",
"Severity": "low",
"ResourceType": "AwsS3Bucket",
"ResourceType": "AwsCloudTrailTrail",
"Description": "Ensure that all your AWS CloudTrail trails are configured to log Data events in order to record S3 object-level API operations, such as GetObject, DeleteObject and PutObject, for individual S3 buckets or for all current and future S3 buckets provisioned in your AWS account.",
"Risk": "If logs are not enabled, monitoring of service use and threat analysis is not possible.",
"RelatedUrl": "",

View File

@@ -9,7 +9,7 @@
"SubServiceName": "",
"ResourceIdTemplate": "arn:partition:service:region:account-id:resource-id",
"Severity": "low",
"ResourceType": "AwsS3Bucket",
"ResourceType": "AwsCloudTrailTrail",
"Description": "Ensure that all your AWS CloudTrail trails are configured to log Data events in order to record S3 object-level API operations, such as GetObject, DeleteObject and PutObject, for individual S3 buckets or for all current and future S3 buckets provisioned in your AWS account.",
"Risk": "If logs are not enabled, monitoring of service use and threat analysis is not possible.",
"RelatedUrl": "",

View File

@@ -9,7 +9,7 @@
"SubServiceName": "",
"ResourceIdTemplate": "arn:partition:cloudwatch:region:account-id:certificate/resource-id",
"Severity": "medium",
"ResourceType": "AwsCloudTrailTrail",
"ResourceType": "AwsCloudWatchAlarm",
"Description": "Ensure a log metric filter and alarm exist for changes to Network Access Control Lists (NACL).",
"Risk": "Monitoring unauthorized API calls will help reveal application errors and may reduce time to detect malicious activity.",
"RelatedUrl": "https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudwatch-alarms-for-cloudtrail.html",

View File

@@ -9,7 +9,7 @@
"SubServiceName": "",
"ResourceIdTemplate": "arn:partition:cloudwatch:region:account-id:certificate/resource-id",
"Severity": "medium",
"ResourceType": "AwsCloudTrailTrail",
"ResourceType": "AwsCloudWatchAlarm",
"Description": "Ensure a log metric filter and alarm exist for changes to network gateways.",
"Risk": "Monitoring unauthorized API calls will help reveal application errors and may reduce time to detect malicious activity.",
"RelatedUrl": "https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudwatch-alarms-for-cloudtrail.html",

View File

@@ -9,7 +9,7 @@
"SubServiceName": "",
"ResourceIdTemplate": "arn:partition:cloudwatch:region:account-id:certificate/resource-id",
"Severity": "medium",
"ResourceType": "AwsCloudTrailTrail",
"ResourceType": "AwsCloudWatchAlarm",
"Description": "Real-time monitoring of API calls can be achieved by directing Cloud Trail Logs to CloudWatch Logs, or an external Security information and event management (SIEM)environment, and establishing corresponding metric filters and alarms. Routing tablesare used to route network traffic between subnets and to network gateways. It isrecommended that a metric filter and alarm be established for changes to route tables.",
"Risk": "CloudWatch is an AWS native service that allows you to ob serve and monitor resources and applications. CloudTrail Logs can also be sent to an external Security informationand event management (SIEM) environment for monitoring and alerting.Monitoring changes to route tables will help ensure that all VPC traffic flows through anexpected path and prevent any accidental or intentional modifications that may lead touncontrolled network traffic. An alarm should be triggered every time an AWS API call isperformed to create, replace, delete, or disassociate a Route Table.",
"RelatedUrl": "https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudwatch-alarms-for-cloudtrail.html",

View File

@@ -9,7 +9,7 @@
"SubServiceName": "",
"ResourceIdTemplate": "arn:partition:cloudwatch:region:account-id:certificate/resource-id",
"Severity": "medium",
"ResourceType": "AwsCloudTrailTrail",
"ResourceType": "AwsCloudWatchAlarm",
"Description": "Ensure a log metric filter and alarm exist for VPC changes.",
"Risk": "Monitoring unauthorized API calls will help reveal application errors and may reduce time to detect malicious activity.",
"RelatedUrl": "https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudwatch-alarms-for-cloudtrail.html",

View File

@@ -9,7 +9,7 @@
"SubServiceName": "",
"ResourceIdTemplate": "arn:partition:cloudwatch:region:account-id:certificate/resource-id",
"Severity": "medium",
"ResourceType": "AwsCloudWatch",
"ResourceType": "AwsAccount",
"Description": "Check if CloudWatch has allowed cross-account sharing.",
"Risk": "Cross-Account access to CloudWatch could increase the risk of compromising information between accounts.",
"RelatedUrl": "https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Cross-Account-Cross-Region.html",

View File

@@ -9,7 +9,7 @@
"SubServiceName": "logs",
"ResourceIdTemplate": "arn:partition:cloudwatch:region:account-id:certificate/resource-id",
"Severity": "medium",
"ResourceType": "AwsLogsLogGroup",
"ResourceType": "Other",
"Description": "Check if CloudWatch log groups are protected by AWS KMS.",
"Risk": "Using customer managed KMS to encrypt CloudWatch log group provide additional confidentiality and control over the log data.",
"RelatedUrl": "https://docs.aws.amazon.com/cli/latest/reference/logs/associate-kms-key.html",

View File

@@ -10,7 +10,7 @@
"SubServiceName": "",
"ResourceIdTemplate": "arn:partition:cloudwatch:region:account-id:log-group/resource-id",
"Severity": "medium",
"ResourceType": "AwsCloudTrailLogGroup",
"ResourceType": "Other",
"Description": "Check if secrets exists in CloudWatch logs",
"Risk": "Storing sensitive data in CloudWatch logs could allow an attacker with read-only access to escalate their privileges or gain unauthorised access to systems.",
"RelatedUrl": "https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudwatch-alarms-for-cloudtrail.html",

View File

@@ -9,7 +9,7 @@
"SubServiceName": "",
"ResourceIdTemplate": "arn:partition:cloudwatch:region:account-id:certificate/resource-id",
"Severity": "medium",
"ResourceType": "AwsCloudTrailTrail",
"ResourceType": "AwsCloudWatchAlarm",
"Description": "Ensure a log metric filter and alarm exist for AWS Config configuration changes.",
"Risk": "Monitoring unauthorized API calls will help reveal application errors and may reduce time to detect malicious activity.",
"RelatedUrl": "https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudwatch-alarms-for-cloudtrail.html",

View File

@@ -9,7 +9,7 @@
"SubServiceName": "",
"ResourceIdTemplate": "arn:partition:cloudwatch:region:account-id:certificate/resource-id",
"Severity": "medium",
"ResourceType": "AwsCloudTrailTrail",
"ResourceType": "AwsCloudWatchAlarm",
"Description": "Ensure a log metric filter and alarm exist for CloudTrail configuration changes.",
"Risk": "Monitoring unauthorized API calls will help reveal application errors and may reduce time to detect malicious activity.",
"RelatedUrl": "https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudwatch-alarms-for-cloudtrail.html",

View File

@@ -9,7 +9,7 @@
"SubServiceName": "",
"ResourceIdTemplate": "arn:partition:cloudwatch:region:account-id:certificate/resource-id",
"Severity": "medium",
"ResourceType": "AwsCloudTrailTrail",
"ResourceType": "AwsCloudWatchAlarm",
"Description": "Ensure a log metric filter and alarm exist for AWS Management Console authentication failures.",
"Risk": "Monitoring unauthorized API calls will help reveal application errors and may reduce time to detect malicious activity.",
"RelatedUrl": "https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudwatch-alarms-for-cloudtrail.html",

View File

@@ -9,7 +9,7 @@
"SubServiceName": "",
"ResourceIdTemplate": "arn:partition:cloudwatch:region:account-id:certificate/resource-id",
"Severity": "medium",
"ResourceType": "AwsCloudTrailTrail",
"ResourceType": "AwsCloudWatchAlarm",
"Description": "Ensure a log metric filter and alarm exist for AWS Organizations changes.",
"Risk": "Monitoring unauthorized API calls will help reveal application errors and may reduce time to detect malicious activity.",
"RelatedUrl": "https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudwatch-alarms-for-cloudtrail.html",

View File

@@ -9,7 +9,7 @@
"SubServiceName": "",
"ResourceIdTemplate": "arn:partition:cloudwatch:region:account-id:certificate/resource-id",
"Severity": "medium",
"ResourceType": "AwsCloudTrailTrail",
"ResourceType": "AwsCloudWatchAlarm",
"Description": "Ensure a log metric filter and alarm exist for disabling or scheduled deletion of customer created KMS CMKs.",
"Risk": "Monitoring unauthorized API calls will help reveal application errors and may reduce time to detect malicious activity.",
"RelatedUrl": "https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudwatch-alarms-for-cloudtrail.html",

View File

@@ -9,7 +9,7 @@
"SubServiceName": "",
"ResourceIdTemplate": "arn:partition:cloudwatch:region:account-id:certificate/resource-id",
"Severity": "medium",
"ResourceType": "AwsCloudTrailTrail",
"ResourceType": "AwsCloudWatchAlarm",
"Description": "Ensure a log metric filter and alarm exist for S3 bucket policy changes.",
"Risk": "Monitoring unauthorized API calls will help reveal application errors and may reduce time to detect malicious activity.",
"RelatedUrl": "https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudwatch-alarms-for-cloudtrail.html",

View File

@@ -9,7 +9,7 @@
"SubServiceName": "",
"ResourceIdTemplate": "arn:partition:cloudwatch:region:account-id:certificate/resource-id",
"Severity": "medium",
"ResourceType": "AwsCloudTrailTrail",
"ResourceType": "AwsCloudWatchAlarm",
"Description": "Ensure a log metric filter and alarm exist for IAM policy changes.",
"Risk": "Monitoring unauthorized API calls will help reveal application errors and may reduce time to detect malicious activity.",
"RelatedUrl": "https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudwatch-alarms-for-cloudtrail.html",

View File

@@ -9,7 +9,7 @@
"SubServiceName": "",
"ResourceIdTemplate": "arn:partition:cloudwatch:region:account-id:certificate/resource-id",
"Severity": "medium",
"ResourceType": "AwsCloudTrailTrail",
"ResourceType": "AwsCloudWatchAlarm",
"Description": "Ensure a log metric filter and alarm exist for usage of root account.",
"Risk": "Monitoring unauthorized API calls will help reveal application errors and may reduce time to detect malicious activity.",
"RelatedUrl": "https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudwatch-alarms-for-cloudtrail.html",

View File

@@ -9,7 +9,7 @@
"SubServiceName": "",
"ResourceIdTemplate": "arn:partition:cloudwatch:region:account-id:certificate/resource-id",
"Severity": "medium",
"ResourceType": "AwsCloudTrailTrail",
"ResourceType": "AwsCloudWatchAlarm",
"Description": "Ensure a log metric filter and alarm exist for security group changes.",
"Risk": "Monitoring unauthorized API calls will help reveal application errors and may reduce time to detect malicious activity.",
"RelatedUrl": "https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudwatch-alarms-for-cloudtrail.html",

View File

@@ -9,7 +9,7 @@
"SubServiceName": "",
"ResourceIdTemplate": "arn:partition:cloudwatch:region:account-id:certificate/resource-id",
"Severity": "medium",
"ResourceType": "AwsCloudTrailTrail",
"ResourceType": "AwsCloudWatchAlarm",
"Description": "Ensure a log metric filter and alarm exist for Management Console sign-in without MFA.",
"Risk": "Monitoring unauthorized API calls will help reveal application errors and may reduce time to detect malicious activity.",
"RelatedUrl": "https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudwatch-alarms-for-cloudtrail.html",

View File

@@ -9,7 +9,7 @@
"SubServiceName": "",
"ResourceIdTemplate": "arn:partition:cloudwatch:region:account-id:certificate/resource-id",
"Severity": "medium",
"ResourceType": "AwsCloudTrailTrail",
"ResourceType": "AwsCloudWatchAlarm",
"Description": "Ensure a log metric filter and alarm exist for unauthorized API calls.",
"Risk": "Monitoring unauthorized API calls will help reveal application errors and may reduce time to detect malicious activity.",
"RelatedUrl": "https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudwatch-alarms-for-cloudtrail.html",

View File

@@ -7,7 +7,7 @@
"SubServiceName": "",
"ResourceIdTemplate": "arn:partition:codeartifact:region:account-id:directory/directory-id",
"Severity": "medium",
"ResourceType": "AwsDirectoryService",
"ResourceType": "Other",
"Description": "Directory Service monitoring with CloudWatch logs.",
"Risk": "As a best practice, monitor your organization to ensure that changes are logged. This helps you to ensure that any unexpected change can be investigated and unwanted changes can be rolled back.",
"RelatedUrl": "https://docs.aws.amazon.com/directoryservice/latest/admin-guide/incident-response.html",

View File

@@ -7,7 +7,7 @@
"SubServiceName": "",
"ResourceIdTemplate": "arn:partition:codeartifact:region:account-id:directory/directory-id",
"Severity": "medium",
"ResourceType": "AwsDirectoryService",
"ResourceType": "Other",
"Description": "Directory Service has SNS Notifications enabled.",
"Risk": "As a best practice, monitor status of Directory Service. This helps to avoid late actions to fix Directory Service issues.",
"RelatedUrl": "https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_enable_notifications.html",

View File

@@ -7,7 +7,7 @@
"SubServiceName": "",
"ResourceIdTemplate": "arn:partition:codeartifact:region:account-id:directory/directory-id",
"Severity": "low",
"ResourceType": "AwsDirectoryService",
"ResourceType": "Other",
"Description": "Directory Service Manual Snapshots limit reached.",
"Risk": "A limit reached can bring unwanted results. The maximum number of manual snapshots is a hard limit.",
"RelatedUrl": "https://docs.aws.amazon.com/general/latest/gr/ds_region.html",

View File

@@ -7,7 +7,7 @@
"SubServiceName": "",
"ResourceIdTemplate": "arn:partition:codeartifact:region:account-id:directory/directory-id",
"Severity": "medium",
"ResourceType": "AwsDirectoryService",
"ResourceType": "Other",
"Description": "Directory Service Manual Snapshots limit reached.",
"Risk": "Expired certificates can impact service availability.",
"RelatedUrl": "https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_ldap.html",

View File

@@ -7,7 +7,7 @@
"SubServiceName": "",
"ResourceIdTemplate": "arn:partition:codeartifact:region:account-id:directory/directory-id",
"Severity": "medium",
"ResourceType": "AwsDirectoryService",
"ResourceType": "Other",
"Description": "Ensure Radius server in DS is using the recommended security protocol.",
"Risk": "As a best practice, you might need to configure the authentication protocol between the Microsoft AD DCs and the RADIUS/MFA server. Supported protocols are PAP, CHAP MS-CHAPv1, and MS-CHAPv2. MS-CHAPv2 is recommended because it provides the strongest security of the three options.",
"RelatedUrl": "https://aws.amazon.com/blogs/security/how-to-enable-multi-factor-authentication-for-amazon-workspaces-and-amazon-quicksight-by-using-microsoft-ad-and-on-premises-credentials/",

View File

@@ -108,21 +108,45 @@ class DirectoryService(AWSService):
if directory.region == regional_client.region:
# Operation is not supported for Shared MicrosoftAD directories.
if directory.type != DirectoryType.SharedMicrosoftAD:
describe_event_topics_parameters = {"DirectoryId": directory.id}
event_topics = []
describe_event_topics = regional_client.describe_event_topics(
**describe_event_topics_parameters
)
for event_topic in describe_event_topics["EventTopics"]:
event_topics.append(
EventTopics(
topic_arn=event_topic["TopicArn"],
topic_name=event_topic["TopicName"],
status=event_topic["Status"],
created_date_time=event_topic["CreatedDateTime"],
try:
describe_event_topics_parameters = {
"DirectoryId": directory.id
}
event_topics = []
describe_event_topics = (
regional_client.describe_event_topics(
**describe_event_topics_parameters
)
)
self.directories[directory.id].event_topics = event_topics
for event_topic in describe_event_topics["EventTopics"]:
event_topics.append(
EventTopics(
topic_arn=event_topic["TopicArn"],
topic_name=event_topic["TopicName"],
status=event_topic["Status"],
created_date_time=event_topic[
"CreatedDateTime"
],
)
)
self.directories[directory.id].event_topics = event_topics
except ClientError as error:
if (
"is in Deleting state"
in error.response["Error"]["Message"]
):
logger.warning(
f"{directory.region} -- {error.__class__.__name__}[{error.__traceback__.tb_lineno}]: {error}"
)
else:
logger.error(
f"{regional_client.region} -- {error.__class__.__name__}[{error.__traceback__.tb_lineno}]: {error}"
)
except Exception as error:
logger.error(
f"{regional_client.region} -- {error.__class__.__class__.__name__}[{error.__traceback__.tb_lineno}]: {error}"
)
except Exception as error:
logger.error(
f"{regional_client.region} -- {error.__class__.__name__}[{error.__traceback__.tb_lineno}]: {error}"
@@ -203,6 +227,15 @@ class DirectoryService(AWSService):
"SnapshotLimits"
]["ManualSnapshotsLimitReached"],
)
except ClientError as error:
if "is in Deleting state" in error.response["Error"]["Message"]:
logger.warning(
f"{directory.region} -- {error.__class__.__name__}[{error.__traceback__.tb_lineno}]: {error}"
)
else:
logger.error(
f"{regional_client.region} -- {error.__class__.__name__}[{error.__traceback__.tb_lineno}]: {error}"
)
except Exception as error:
logger.error(
f"{regional_client.region} -- {error.__class__.__name__}[{error.__traceback__.tb_lineno}]: {error}"

View File

@@ -7,7 +7,7 @@
"SubServiceName": "",
"ResourceIdTemplate": "arn:partition:codeartifact:region:account-id:directory/directory-id",
"Severity": "medium",
"ResourceType": "AwsDirectoryService",
"ResourceType": "Other",
"Description": "Ensure Multi-Factor Authentication (MFA) using Radius Server is enabled in DS.",
"Risk": "Multi-Factor Authentication (MFA) adds an extra layer of authentication assurance beyond traditional username and password.",
"RelatedUrl": "https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_mfa.html",

View File

@@ -9,7 +9,7 @@
"SubServiceName": "",
"ResourceIdTemplate": "arn:partition:dynamodb:region:account-id:certificate/resource-id",
"Severity": "medium",
"ResourceType": "AwsDaxCluster",
"ResourceType": "Other",
"Description": "Check if DynamoDB DAX Clusters are encrypted at rest.",
"Risk": "Encryption at rest provides an additional layer of data protection by securing your data from unauthorized access to the underlying storage.",
"RelatedUrl": "https://docs.aws.amazon.com/amazondynamodb/latest/developerguide/DAXEncryptionAtRest.html",

View File

@@ -9,7 +9,7 @@
"SubServiceName": "",
"ResourceIdTemplate": "arn:partition:dynamodb:region:account-id:table/resource-id",
"Severity": "medium",
"ResourceType": "AwsDynamoDBTable",
"ResourceType": "AwsDynamoDbTable",
"Description": "Check if DynamoDB table has encryption at rest enabled using CMK KMS.",
"Risk": "All user data stored in Amazon DynamoDB is fully encrypted at rest. This functionality helps reduce the operational burden and complexity involved in protecting sensitive data.",
"RelatedUrl": "https://docs.aws.amazon.com/amazondynamodbdb/latest/developerguide/EncryptionAtRest.html",

View File

@@ -9,7 +9,7 @@
"SubServiceName": "",
"ResourceIdTemplate": "arn:partition:dynamodb:region:account-id:certificate/resource-id",
"Severity": "medium",
"ResourceType": "AwsDynamoDBTable",
"ResourceType": "AwsDynamoDbTable",
"Description": "Check if DynamoDB tables point-in-time recovery (PITR) is enabled.",
"Risk": "If the DynamoDB Table does not have point-in-time recovery enabled, it is vulnerable to accidental write or delete operations.",
"RelatedUrl": "https://docs.aws.amazon.com/amazondynamodb/latest/developerguide/PointInTimeRecovery_Howitworks.html",

View File

@@ -12,11 +12,12 @@ class ec2_ami_public(Check):
report.resource_arn = image.arn
report.resource_tags = image.tags
report.status = "PASS"
report.status_extended = f"EC2 AMI {image.id} is not public."
report.status_extended = (
f"EC2 AMI {image.name if image.name else image.id} is not public."
)
if image.public:
report.status = "FAIL"
report.status_extended = f"EC2 AMI {image.id} is currently public."
report.resource_id = image.id
report.status_extended = f"EC2 AMI {image.name if image.name else image.id} is currently public."
findings.append(report)

View File

@@ -9,7 +9,7 @@
"SubServiceName": "snapshot",
"ResourceIdTemplate": "arn:partition:service:region:account-id:resource-id",
"Severity": "critical",
"ResourceType": "AwsEc2Snapshot",
"ResourceType": "Other",
"Description": "Ensure there are no EBS Snapshots set as Public.",
"Risk": "When you share a snapshot, you are giving others access to all of the data on the snapshot. Share snapshots only with people with whom you want to share all of your snapshot data.",
"RelatedUrl": "",

View File

@@ -9,7 +9,7 @@
"SubServiceName": "snapshot",
"ResourceIdTemplate": "arn:partition:service:region:account-id:resource-id",
"Severity": "medium",
"ResourceType": "AwsEc2Snapshot",
"ResourceType": "Other",
"Description": "Check if EBS snapshots are encrypted.",
"Risk": "Data encryption at rest prevents data visibility in the event of its unauthorized access or theft.",
"RelatedUrl": "",

View File

@@ -6,7 +6,9 @@ from base64 import b64decode
from detect_secrets import SecretsCollection
from detect_secrets.settings import default_settings
from prowler.config.config import encoding_format_utf_8
from prowler.lib.check.models import Check, Check_Report_AWS
from prowler.lib.logger import logger
from prowler.providers.aws.services.ec2.ec2_client import ec2_client
@@ -23,12 +25,23 @@ class ec2_instance_secrets_user_data(Check):
if instance.user_data:
temp_user_data_file = tempfile.NamedTemporaryFile(delete=False)
user_data = b64decode(instance.user_data)
if user_data[0:2] == b"\x1f\x8b": # GZIP magic number
user_data = zlib.decompress(
user_data, zlib.MAX_WBITS | 32
).decode("utf-8")
else:
user_data = user_data.decode("utf-8")
try:
if user_data[0:2] == b"\x1f\x8b": # GZIP magic number
user_data = zlib.decompress(
user_data, zlib.MAX_WBITS | 32
).decode(encoding_format_utf_8)
else:
user_data = user_data.decode(encoding_format_utf_8)
except UnicodeDecodeError as error:
logger.warning(
f"{instance.region} -- Unable to decode user data in EC2 instance {instance.id}: {error}"
)
continue
except Exception as error:
logger.error(
f"{instance.region} -- {error.__class__.__name__}[{error.__traceback__.tb_lineno}]: {error}"
)
continue
temp_user_data_file.write(
bytes(user_data, encoding="raw_unicode_escape")

View File

@@ -1,7 +1,7 @@
{
"Provider": "aws",
"CheckID": "ec2_securitygroup_allow_wide_open_public_ipv4",
"CheckTitle": "Ensure no security groups allow ingress from wide-open non-RFC1918 address.",
"CheckTitle": "Ensure no security groups allow ingress and egress from wide-open IP address with a mask between 0 and 24.",
"CheckType": [
"Infrastructure Security"
],
@@ -10,7 +10,7 @@
"ResourceIdTemplate": "arn:partition:service:region:account-id:resource-id",
"Severity": "high",
"ResourceType": "AwsEc2SecurityGroup",
"Description": "Ensure no security groups allow ingress from wide-open non-RFC1918 address.",
"Description": "Ensure no security groups allow ingress and egress from ide-open IP address with a mask between 0 and 24.",
"Risk": "If Security groups are not properly configured the attack surface is increased.",
"RelatedUrl": "",
"Remediation": {

View File

@@ -28,7 +28,7 @@ class ec2_securitygroup_allow_wide_open_public_ipv4(Check):
for ingress_rule in security_group.ingress_rules:
for ipv4 in ingress_rule["IpRanges"]:
ip = ipaddress.ip_network(ipv4["CidrIp"])
# Check if IP is public according to RFC1918 and if 0 < prefixlen < 24
# Check if IP is public if 0 < prefixlen < 24
if (
ip.is_global
and ip.prefixlen < cidr_treshold
@@ -42,7 +42,7 @@ class ec2_securitygroup_allow_wide_open_public_ipv4(Check):
for egress_rule in security_group.egress_rules:
for ipv4 in egress_rule["IpRanges"]:
ip = ipaddress.ip_network(ipv4["CidrIp"])
# Check if IP is public according to RFC1918 and if 0 < prefixlen < 24
# Check if IP is public if 0 < prefixlen < 24
if (
ip.is_global
and ip.prefixlen < cidr_treshold

View File

@@ -310,7 +310,7 @@ class EC2(AWSService):
Image(
id=image["ImageId"],
arn=arn,
name=image["Name"],
name=image.get("Name", ""),
public=image.get("Public", False),
region=regional_client.region,
tags=image.get("Tags"),

View File

@@ -10,7 +10,7 @@
"SubServiceName": "",
"ResourceIdTemplate": "arn:partition:ecr:region:account-id:resource-id",
"Severity": "medium",
"ResourceType": "AwsEcrRegistry",
"ResourceType": "Other",
"Description": "Check if ECR Registry has scan on push enabled",
"Risk": "Amazon ECR image scanning helps in identifying software vulnerabilities in your container images. Amazon ECR uses the Common Vulnerabilities and Exposures (CVEs) database from the open-source Clair project and provides a list of scan findings. ",
"RelatedUrl": "",

View File

@@ -15,23 +15,27 @@ class ecr_repositories_scan_vulnerabilities_in_latest_image(Check):
for repository in registry.repositories:
# First check if the repository has images
if len(repository.images_details) > 0:
# We only want to check the latest image pushed
# We only want to check the latest image pushed that is scannable
image = repository.images_details[-1]
report = Check_Report_AWS(self.metadata())
report.region = repository.region
report.resource_id = repository.name
report.resource_arn = repository.arn
report.resource_tags = repository.tags
report.status = "PASS"
report.status_extended = f"ECR repository {repository.name} has imageTag {image.latest_tag} scanned without findings."
status_extended_prefix = f"ECR repository '{repository.name}' has scanned the {image.type} container image with digest '{image.latest_digest}' and tag '{image.latest_tag}' "
report.status_extended = (
status_extended_prefix + "without findings."
)
if not image.scan_findings_status:
report.status = "FAIL"
report.status_extended = f"ECR repository {repository.name} has imageTag {image.latest_tag} without a scan."
report.status_extended = (
status_extended_prefix + "without a scan."
)
elif image.scan_findings_status == "FAILED":
report.status = "FAIL"
report.status_extended = (
f"ECR repository {repository.name} with scan status FAILED."
status_extended_prefix + "with scan status FAILED."
)
elif (
image.scan_findings_status != "FAILED"
@@ -42,20 +46,29 @@ class ecr_repositories_scan_vulnerabilities_in_latest_image(Check):
and image.scan_findings_severity_count.critical
):
report.status = "FAIL"
report.status_extended = f"ECR repository {repository.name} has imageTag {image.latest_tag} scanned with findings: CRITICAL->{image.scan_findings_severity_count.critical}."
report.status_extended = (
status_extended_prefix
+ f"with findings: CRITICAL->{image.scan_findings_severity_count.critical}."
)
elif minimum_severity == "HIGH" and (
image.scan_findings_severity_count.critical
or image.scan_findings_severity_count.high
):
report.status = "FAIL"
report.status_extended = f"ECR repository {repository.name} has imageTag {image.latest_tag} scanned with findings: CRITICAL->{image.scan_findings_severity_count.critical}, HIGH->{image.scan_findings_severity_count.high}."
report.status_extended = (
status_extended_prefix
+ f"with findings: CRITICAL->{image.scan_findings_severity_count.critical}, HIGH->{image.scan_findings_severity_count.high}."
)
elif minimum_severity == "MEDIUM" and (
image.scan_findings_severity_count.critical
or image.scan_findings_severity_count.high
or image.scan_findings_severity_count.medium
):
report.status = "FAIL"
report.status_extended = f"ECR repository {repository.name} has imageTag {image.latest_tag} scanned with findings: CRITICAL->{image.scan_findings_severity_count.critical}, HIGH->{image.scan_findings_severity_count.high}, MEDIUM->{image.scan_findings_severity_count.medium}."
report.status_extended = (
status_extended_prefix
+ f"with findings: CRITICAL->{image.scan_findings_severity_count.critical}, HIGH->{image.scan_findings_severity_count.high}, MEDIUM->{image.scan_findings_severity_count.medium}."
)
findings.append(report)

View File

@@ -17,14 +17,14 @@ class ECR(AWSService):
super().__init__(__class__.__name__, audit_info)
self.registry_id = audit_info.audited_account
self.registries = {}
self.__threading_call__(self.__describe_registries_and_repositories__)
self.__threading_call__(self.__describe_repository_policies__)
self.__threading_call__(self.__get_image_details__)
self.__threading_call__(self.__get_repository_lifecycle_policy__)
self.__threading_call__(self.__get_registry_scanning_configuration__)
self.__threading_call__(self.__list_tags_for_resource__)
self.__threading_call__(self._describe_registries_and_repositories)
self.__threading_call__(self._describe_repository_policies)
self.__threading_call__(self._get_image_details)
self.__threading_call__(self._get_repository_lifecycle_policy)
self.__threading_call__(self._get_registry_scanning_configuration)
self.__threading_call__(self._list_tags_for_resource)
def __describe_registries_and_repositories__(self, regional_client):
def _describe_registries_and_repositories(self, regional_client):
logger.info("ECR - Describing registries and repositories...")
regional_registry_repositories = []
try:
@@ -64,7 +64,7 @@ class ECR(AWSService):
f"{regional_client.region} -- {error.__class__.__name__}[{error.__traceback__.tb_lineno}]: {error}"
)
def __describe_repository_policies__(self, regional_client):
def _describe_repository_policies(self, regional_client):
logger.info("ECR - Describing repository policies...")
try:
if regional_client.region in self.registries:
@@ -91,7 +91,7 @@ class ECR(AWSService):
f"{regional_client.region} -- {error.__class__.__name__}[{error.__traceback__.tb_lineno}]: {error}"
)
def __get_repository_lifecycle_policy__(self, regional_client):
def _get_repository_lifecycle_policy(self, regional_client):
logger.info("ECR - Getting repository lifecycle policy...")
try:
if regional_client.region in self.registries:
@@ -119,7 +119,7 @@ class ECR(AWSService):
f"{regional_client.region} -- {error.__class__.__name__}[{error.__traceback__.tb_lineno}]: {error}"
)
def __get_image_details__(self, regional_client):
def _get_image_details(self, regional_client):
logger.info("ECR - Getting images details...")
try:
if regional_client.region in self.registries:
@@ -139,55 +139,115 @@ class ECR(AWSService):
# The following condition is required since sometimes
# the AWS ECR API returns None using the iterator
if image is not None:
severity_counts = None
last_scan_status = None
if "imageScanStatus" in image:
last_scan_status = image["imageScanStatus"][
"status"
]
if "imageScanFindingsSummary" in image:
severity_counts = FindingSeverityCounts(
critical=0, high=0, medium=0
)
finding_severity_counts = image[
artifact_media_type = image.get(
"artifactMediaType", None
)
tags = image.get("imageTags", [])
if ECR._is_artifact_scannable(
artifact_media_type, tags
):
severity_counts = None
last_scan_status = None
image_digest = image.get("imageDigest")
latest_tag = image.get("imageTags", ["None"])[0]
image_pushed_at = image.get("imagePushedAt")
image_scan_findings_field_name = (
"imageScanFindingsSummary"
]["findingSeverityCounts"]
if "CRITICAL" in finding_severity_counts:
severity_counts.critical = (
finding_severity_counts["CRITICAL"]
)
if "HIGH" in finding_severity_counts:
severity_counts.high = (
finding_severity_counts["HIGH"]
)
if "MEDIUM" in finding_severity_counts:
severity_counts.medium = (
finding_severity_counts["MEDIUM"]
)
latest_tag = "None"
if image.get("imageTags"):
latest_tag = image["imageTags"][0]
repository.images_details.append(
ImageDetails(
latest_tag=latest_tag,
image_pushed_at=image["imagePushedAt"],
latest_digest=image["imageDigest"],
scan_findings_status=last_scan_status,
scan_findings_severity_count=severity_counts,
)
)
# Sort the repository images by date pushed
repository.images_details.sort(
key=lambda image: image.image_pushed_at
)
if "docker" in artifact_media_type:
type = "Docker"
elif "oci" in artifact_media_type:
type = "OCI"
else:
type = ""
# If imageScanStatus is not present or imageScanFindingsSummary is missing,
# we need to call DescribeImageScanFindings because AWS' new version of
# basic scanning does not support imageScanFindingsSummary and imageScanStatus
# in the DescribeImages API.
if "imageScanStatus" not in image:
try:
# use "image" for scan findings to get data the same way as for an image
image = (
client.describe_image_scan_findings(
registryId=self.registries[
regional_client.region
].id,
repositoryName=repository.name,
imageId={
"imageDigest": image_digest
},
)
)
image_scan_findings_field_name = (
"imageScanFindings"
)
except (
client.exceptions.ImageNotFoundException
) as error:
logger.warning(
f"{regional_client.region} -- {error.__class__.__name__}[{error.__traceback__.tb_lineno}]: {error}"
)
continue
except (
client.exceptions.ScanNotFoundException
) as error:
logger.warning(
f"{regional_client.region} -- {error.__class__.__name__}[{error.__traceback__.tb_lineno}]: {error}"
)
continue
except Exception as error:
logger.error(
f"{regional_client.region} -- {error.__class__.__name__}[{error.__traceback__.tb_lineno}]: {error}"
)
continue
if "imageScanStatus" in image:
last_scan_status = image["imageScanStatus"][
"status"
]
if image_scan_findings_field_name in image:
severity_counts = FindingSeverityCounts(
critical=0, high=0, medium=0
)
finding_severity_counts = image[
image_scan_findings_field_name
].get("findingSeverityCounts", {})
severity_counts.critical = (
finding_severity_counts.get(
"CRITICAL", 0
)
)
severity_counts.high = (
finding_severity_counts.get("HIGH", 0)
)
severity_counts.medium = (
finding_severity_counts.get("MEDIUM", 0)
)
repository.images_details.append(
ImageDetails(
latest_tag=latest_tag,
image_pushed_at=image_pushed_at,
latest_digest=image_digest,
scan_findings_status=last_scan_status,
scan_findings_severity_count=severity_counts,
artifact_media_type=artifact_media_type,
type=type,
)
)
# Sort the repository images by date pushed
repository.images_details.sort(
key=lambda image: image.image_pushed_at
)
except Exception as error:
logger.error(
f"{regional_client.region} -- {error.__class__.__name__}[{error.__traceback__.tb_lineno}]: {error}"
)
def __list_tags_for_resource__(self, regional_client):
def _list_tags_for_resource(self, regional_client):
logger.info("ECR - List Tags...")
try:
if regional_client.region in self.registries:
@@ -215,7 +275,7 @@ class ECR(AWSService):
f"{regional_client.region} -- {error.__class__.__name__}[{error.__traceback__.tb_lineno}]: {error}"
)
def __get_registry_scanning_configuration__(self, regional_client):
def _get_registry_scanning_configuration(self, regional_client):
logger.info("ECR - Getting Registry Scanning Configuration...")
try:
if regional_client.region in self.registries:
@@ -251,6 +311,44 @@ class ECR(AWSService):
f"{regional_client.region} -- {error.__class__.__name__}[{error.__traceback__.tb_lineno}]: {error}"
)
@staticmethod
def _is_artifact_scannable(artifact_media_type: str, tags: list[str] = []) -> bool:
"""
Check if an artifact is scannable based on its media type and tags.
Args:
artifact_media_type (str): The media type of the artifact.
tags (list): The list of tags associated with the artifact.
Returns:
bool: True if the artifact is scannable, False otherwise.
"""
try:
if artifact_media_type is None:
return False
# Tools like GoogleContainerTools/jib uses `application/vnd.oci.image.config.v1+json`` also for signatures, which are not scannable.
# Luckily, these are tagged with sha-<HASH-CODE>.sig, so that they can still be easily recognized.
for tag in tags:
if tag.startswith("sha256-") and tag.endswith(".sig"):
return False
scannable_artifact_media_types = [
"application/vnd.docker.container.image.v1+json", # Docker image configuration
"application/vnd.docker.image.rootfs.diff.tar", # Docker image layer as a tar archive
"application/vnd.docker.image.rootfs.diff.tar.gzip", # Docker image layer that is compressed using gzip
"application/vnd.oci.image.config.v1+json", # OCI image configuration, but also used by GoogleContainerTools/jib for signatures
"application/vnd.oci.image.layer.v1.tar", # Uncompressed OCI image layer
"application/vnd.oci.image.layer.v1.tar+gzip", # Compressed OCI image layer
]
return artifact_media_type in scannable_artifact_media_types
except Exception as error:
logger.error(
f"{error.__class__.__name__}[{error.__traceback__.tb_lineno}]: {error}"
)
return False
class FindingSeverityCounts(BaseModel):
critical: int
@@ -264,6 +362,8 @@ class ImageDetails(BaseModel):
image_pushed_at: datetime
scan_findings_status: Optional[str]
scan_findings_severity_count: Optional[FindingSeverityCounts]
artifact_media_type: Optional[str]
type: str
class Repository(BaseModel):

View File

@@ -15,7 +15,9 @@ class ECS(AWSService):
super().__init__(__class__.__name__, audit_info)
self.task_definitions = []
self.__threading_call__(self.__list_task_definitions__)
self.__describe_task_definition__()
self.__threading_call__(
self.__describe_task_definition__, self.task_definitions
)
def __list_task_definitions__(self, regional_client):
logger.info("ECS - Listing Task Definitions...")
@@ -41,32 +43,27 @@ class ECS(AWSService):
f"{regional_client.region} -- {error.__class__.__name__}[{error.__traceback__.tb_lineno}]: {error}"
)
def __describe_task_definition__(self):
def __describe_task_definition__(self, task_definition):
logger.info("ECS - Describing Task Definitions...")
try:
for task_definition in self.task_definitions:
client = self.regional_clients[task_definition.region]
response = client.describe_task_definition(
taskDefinition=task_definition.arn,
include=[
"TAGS",
],
)
container_definitions = response["taskDefinition"][
"containerDefinitions"
]
for container in container_definitions:
if "environment" in container:
for env_var in container["environment"]:
task_definition.environment_variables.append(
ContainerEnvVariable(
name=env_var["name"], value=env_var["value"]
)
client = self.regional_clients[task_definition.region]
response = client.describe_task_definition(
taskDefinition=task_definition.arn,
include=[
"TAGS",
],
)
container_definitions = response["taskDefinition"]["containerDefinitions"]
for container in container_definitions:
if "environment" in container:
for env_var in container["environment"]:
task_definition.environment_variables.append(
ContainerEnvVariable(
name=env_var["name"], value=env_var["value"]
)
task_definition.tags = response.get("tags")
task_definition.network_mode = response["taskDefinition"].get(
"networkMode"
)
)
task_definition.tags = response.get("tags")
task_definition.network_mode = response["taskDefinition"].get("networkMode")
except Exception as error:
logger.error(
f"{error.__class__.__name__}[{error.__traceback__.tb_lineno}]: {error}"

View File

@@ -11,7 +11,7 @@
"SubServiceName": "",
"ResourceIdTemplate": "arn:partition:service:region:account-id:resource-id",
"Severity": "medium",
"ResourceType": "AwsEFSFileSystem",
"ResourceType": "AwsEfsFileSystem",
"Description": "Check if EFS protects sensitive data with encryption at rest",
"Risk": "EFS should be encrypted at rest to prevent exposure of sensitive data to bad actors",
"RelatedUrl": "",

View File

@@ -11,7 +11,7 @@
"SubServiceName": "",
"ResourceIdTemplate": "arn:partition:service:region:account-id:resource-id",
"Severity": "medium",
"ResourceType": "AwsEFSFileSystem",
"ResourceType": "AwsEfsFileSystem",
"Description": "Check if EFS File systems have backup enabled",
"Risk": "If backup is not enabled, data is vulnerable. Human error or bad actors could erase or modify data.",
"RelatedUrl": "",

View File

@@ -10,7 +10,7 @@
"SubServiceName": "",
"ResourceIdTemplate": "arn:partition:service:region:account-id:resource-id",
"Severity": "medium",
"ResourceType": "AwsEFSFileSystem",
"ResourceType": "AwsEfsFileSystem",
"Description": "Check if EFS have policies which allow access to any client within the VPC",
"Risk": "Restricting access to EFS file systems is a security best practice. Allowing access to any client within the VPC can lead to unauthorized access to the file system.",
"RelatedUrl": "",

View File

@@ -7,7 +7,7 @@
"SubServiceName": "",
"ResourceIdTemplate": "arn:partition:service:region:account-id:resource-id",
"Severity": "medium",
"ResourceType": "AWSElastiCacheCacheCluster",
"ResourceType": "Other",
"Description": "Ensure Elasticache Cluster is not using a public subnet",
"Risk": "There is a risk of exposing sensitive data if Elasticache Cluster uses a public subnet.",
"RelatedUrl": "https://docs.aws.amazon.com/AmazonElastiCache/latest/red-ug/VPCs.html",

View File

@@ -82,6 +82,13 @@ class ElastiCache(AWSService):
logger.warning(
f"{regional_client.region} -- {error.__class__.__name__}[{error.__traceback__.tb_lineno}]: {error}"
)
if (
error.response["Error"]["Code"]
== "InvalidReplicationGroupStateFault"
):
logger.warning(
f"{regional_client.region} -- {error.__class__.__name__}[{error.__traceback__.tb_lineno}]: {error}"
)
else:
logger.error(
f"{regional_client.region} -- {error.__class__.__name__}[{error.__traceback__.tb_lineno}]: {error}"

View File

@@ -9,7 +9,7 @@
"SubServiceName": "",
"ResourceIdTemplate": "arn:partition:service:region:account-id:resource-id",
"Severity": "medium",
"ResourceType": "AwsElasticLoadBalancingV2LoadBalancer",
"ResourceType": "AwsElbv2LoadBalancer",
"Description": "Check if Elastic Load Balancers have deletion protection enabled.",
"Risk": "If deletion protection is not enabled, the resource is not protected against deletion.",
"RelatedUrl": "",

View File

@@ -9,7 +9,7 @@
"SubServiceName": "",
"ResourceIdTemplate": "arn:partition:service:region:account-id:resource-id",
"Severity": "medium",
"ResourceType": "AwsElasticLoadBalancingV2LoadBalancer",
"ResourceType": "AwsElbv2LoadBalancer",
"Description": "Check whether the Application Load Balancer is configured with strictest desync mitigation mode, if not check if at least is configured with the drop_invalid_header_fields attribute",
"Risk": "HTTP Desync issues can lead to request smuggling and make your applications vulnerable to request queue or cache poisoning, which could lead to credential hijacking or execution of unauthorized commands.",
"RelatedUrl": "https://docs.aws.amazon.com/elasticloadbalancing/latest/application/application-load-balancers.html#desync-mitigation-mode",

View File

@@ -9,7 +9,7 @@
"SubServiceName": "",
"ResourceIdTemplate": "arn:partition:service:region:account-id:resource-id",
"Severity": "medium",
"ResourceType": "AwsElasticLoadBalancingV2LoadBalancer",
"ResourceType": "AwsElbv2LoadBalancer",
"Description": "Check if Elastic Load Balancers have insecure SSL ciphers.",
"Risk": "Using insecure ciphers could affect privacy of in transit information.",
"RelatedUrl": "",

View File

@@ -9,7 +9,7 @@
"SubServiceName": "",
"ResourceIdTemplate": "arn:partition:service:region:account-id:resource-id",
"Severity": "medium",
"ResourceType": "AwsElasticLoadBalancingV2LoadBalancer",
"ResourceType": "AwsElbv2LoadBalancer",
"Description": "Check for internet facing Elastic Load Balancers.",
"Risk": "Publicly accessible load balancers could expose sensitive data to bad actors.",
"RelatedUrl": "",

View File

@@ -9,7 +9,7 @@
"SubServiceName": "",
"ResourceIdTemplate": "arn:partition:service:region:account-id:resource-id",
"Severity": "medium",
"ResourceType": "AwsElasticLoadBalancingV2LoadBalancer",
"ResourceType": "AwsElbv2LoadBalancer",
"Description": "Check if ELBV2 has listeners underneath.",
"Risk": "The rules that are defined for a listener determine how the load balancer routes requests to its registered targets.",
"RelatedUrl": "",

View File

@@ -9,7 +9,7 @@
"SubServiceName": "",
"ResourceIdTemplate": "arn:partition:service:region:account-id:resource-id",
"Severity": "medium",
"ResourceType": "AwsElasticLoadBalancingV2LoadBalancer",
"ResourceType": "AwsElbv2LoadBalancer",
"Description": "Check if Elastic Load Balancers have logging enabled.",
"Risk": "If logs are not enabled monitoring of service use and threat analysis is not possible.",
"RelatedUrl": "",

View File

@@ -9,7 +9,7 @@
"SubServiceName": "",
"ResourceIdTemplate": "arn:partition:service:region:account-id:resource-id",
"Severity": "medium",
"ResourceType": "AwsElasticLoadBalancingV2LoadBalancer",
"ResourceType": "AwsElbv2LoadBalancer",
"Description": "Check if Elastic Load Balancers have SSL listeners.",
"Risk": "Clear text communication could affect privacy of information in transit.",
"RelatedUrl": "",

View File

@@ -9,7 +9,7 @@
"SubServiceName": "",
"ResourceIdTemplate": "arn:partition:service:region:account-id:resource-id",
"Severity": "medium",
"ResourceType": "AwsElasticLoadBalancingV2LoadBalancer",
"ResourceType": "AwsElbv2LoadBalancer",
"Description": "Check if Application Load Balancer has a WAF ACL attached.",
"Risk": "If not WAF ACL is attached risk of web attacks increases.",
"RelatedUrl": "",

View File

@@ -7,7 +7,7 @@
"SubServiceName": "",
"ResourceIdTemplate": "arn:aws:emr:region:account-id",
"Severity": "high",
"ResourceType": "AwsEMR",
"ResourceType": "AwsAccount",
"Description": "EMR Account Public Access Block enabled.",
"Risk": "EMR Clusters must have Account Public Access Block enabled.",
"RelatedUrl": "https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-block-public-access.html",

View File

@@ -7,7 +7,7 @@
"SubServiceName": "",
"ResourceIdTemplate": "arn:aws:emr:region:account-id",
"Severity": "medium",
"ResourceType": "AwsEMR",
"ResourceType": "Other",
"Description": "EMR Cluster without Public IP.",
"Risk": "EMR Cluster should not have Public IP.",
"RelatedUrl": "https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-block-public-access.html",

View File

@@ -7,7 +7,7 @@
"SubServiceName": "",
"ResourceIdTemplate": "arn:aws:emr:region:account-id",
"Severity": "medium",
"ResourceType": "AwsEMR",
"ResourceType": "Other",
"Description": "Publicly accessible EMR Cluster.",
"Risk": "EMR Clusters should not be publicly accessible.",
"RelatedUrl": "https://docs.aws.amazon.com/emr/latest/ManagementGuide/emr-block-public-access.html",

View File

@@ -7,7 +7,7 @@
"SubServiceName": "",
"ResourceIdTemplate": "arn:aws:glacier:region:account-id:vaults/vault-name",
"Severity": "critical",
"ResourceType": "AwsGlacierVault",
"ResourceType": "Other",
"Description": "Ensure CodeArtifact internal packages do not allow external public source publishing.",
"Risk": "Vaults accessible to everyone could expose sensitive data to bad actors.",
"RelatedUrl": "https://docs.aws.amazon.com/amazonglacier/latest/dev/access-control-overview.html",

View File

@@ -9,7 +9,7 @@
"SubServiceName": "",
"ResourceIdTemplate": "arn:partition:glue:region:account-id:certificate/resource-id",
"Severity": "medium",
"ResourceType": "AwsGlue",
"ResourceType": "Other",
"Description": "Check if Glue data catalog settings have encrypt connection password enabled.",
"Risk": "If not enabled sensitive information at rest is not protected.",
"RelatedUrl": "",

Some files were not shown because too many files have changed in this diff Show More