Compare commits

...

6 Commits

Author SHA1 Message Date
pedrooot
c0166c22f5 fix(kisa): change the way of counting the PASS/FAILED reqs 2025-07-28 15:46:24 +02:00
Jaen-923
1345ae7752 chore: unify subdomain format and update regulations in ISMS-P compliance files (KR/EN)
Co-Authored-By: ghkim583 <203069125+ghkim583@users.noreply.github.com>
2025-07-28 20:01:29 +09:00
Jaen-923
5817db5ea4 Update CHANGELOG.md
Co-Authored-By: ghkim583 <203069125+ghkim583@users.noreply.github.com>
2025-07-28 19:30:25 +09:00
Jaen-923
f8a306babd Update CHANGELOG.md
Co-Authored-By: ghkim583 <203069125+ghkim583@users.noreply.github.com>
2025-07-27 19:31:52 +09:00
Jaen-923
f8ae6b48e0 Update CHANGELOG.md
Co-Authored-By: ghkim583 <203069125+ghkim583@users.noreply.github.com>
2025-07-27 18:18:57 +09:00
Jaen-923
4d158b1757 fix(compliance) : kisa-isms-p_compliance
- Typographical errors have been fixed.
- The linking between the checks and the provisions has been adjusted across the board.

Co-Authored-By: ghkim583 <203069125+ghkim583@users.noreply.github.com>
2025-07-25 20:17:24 +09:00
4 changed files with 4400 additions and 1822 deletions

View File

@@ -11,6 +11,7 @@ All notable changes to the **Prowler SDK** are documented in this file.
### Changed
- Handle some AWS errors as warnings instead of errors [(#8347)](https://github.com/prowler-cloud/prowler/pull/8347)
- Updated policy mapping in ISMS-P compliance file for improved alignment [(#8367)](https://github.com/prowler-cloud/prowler/pull/8367)
### Fixed
- False positives in SQS encryption check for ephemeral queues [(#8330)](https://github.com/prowler-cloud/prowler/pull/8330)

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

View File

@@ -13,6 +13,7 @@ def get_kisa_ismsp_table(
compliance_overview: bool,
):
sections = {}
sections_status = {}
kisa_ismsp_compliance_table = {
"Provider": [],
"Section": [],
@@ -36,7 +37,10 @@ def get_kisa_ismsp_table(
# Check if Section exists
if section not in sections:
sections[section] = {
"Status": f"{Fore.GREEN}PASS{Style.RESET_ALL}",
"Status": {
"PASS": 0,
"FAIL": 0,
},
"Muted": 0,
}
if finding.muted:
@@ -46,14 +50,29 @@ def get_kisa_ismsp_table(
else:
if finding.status == "FAIL" and index not in fail_count:
fail_count.append(index)
sections[section]["Status"]["FAIL"] += 1
elif finding.status == "PASS" and index not in pass_count:
pass_count.append(index)
sections[section]["Status"]["PASS"] += 1
# Add results to table
sections = dict(sorted(sections.items()))
for section in sections:
if sections[section]["Status"]["FAIL"] > 0:
sections_status[section] = (
f"{Fore.RED}FAIL({sections[section]['Status']['FAIL']}){Style.RESET_ALL}"
)
else:
if sections[section]["Status"]["PASS"] > 0:
sections_status[section] = (
f"{Fore.GREEN}PASS({sections[section]['Status']['PASS']}){Style.RESET_ALL}"
)
else:
sections_status[section] = f"{Fore.GREEN}PASS{Style.RESET_ALL}"
for section in sections:
kisa_ismsp_compliance_table["Provider"].append(compliance.Provider)
kisa_ismsp_compliance_table["Section"].append(section)
kisa_ismsp_compliance_table["Status"].append(sections_status[section])
kisa_ismsp_compliance_table["Muted"].append(
f"{orange_color}{sections[section]['Muted']}{Style.RESET_ALL}"
)