Compare commits

...

4 Commits

Author SHA1 Message Date
HugoPBrito
f6caf51fa0 chore(gcp): update Artifact Registry service metadata to new format
- No broken links found in Artifacts metadata
- Add CHANGELOG entry to [5.19.0] Changed section in alphabetical order
2026-02-13 14:48:07 +01:00
HugoPBrito
0d9f397bba Merge remote-tracking branch 'origin/master' into review_metadata_gcp_artifacts 2026-02-13 14:47:19 +01:00
Rubén De la Torre Vico
98dc2718b9 chore: add gcp/artifacts metadata update to changelog 2025-10-30 11:56:01 +01:00
Rubén De la Torre Vico
b1ebb568b5 chore(gcp/artifacts): adapt metadata to new standarized format 2025-10-30 11:55:55 +01:00
2 changed files with 5 additions and 2 deletions

View File

@@ -25,6 +25,7 @@ All notable changes to the **Prowler SDK** are documented in this file.
- Update Azure Monitor service metadata to new format [(#9622)](https://github.com/prowler-cloud/prowler/pull/9622)
- Parallelize Cloudflare zone API calls with threading to improve scan performance [(#9982)](https://github.com/prowler-cloud/prowler/pull/9982)
- Update GCP API Keys service metadata to new format [(#9637)](https://github.com/prowler-cloud/prowler/pull/9637)
- Update GCP Artifact Registry service metadata to new format [(#9088)](https://github.com/prowler-cloud/prowler/pull/9088)
- Update GCP BigQuery service metadata to new format [(#9638)](https://github.com/prowler-cloud/prowler/pull/9638)
- Update GCP Cloud SQL service metadata to new format [(#9639)](https://github.com/prowler-cloud/prowler/pull/9639)
- Update GCP Cloud Storage service metadata to new format [(#9640)](https://github.com/prowler-cloud/prowler/pull/9640)

View File

@@ -8,7 +8,6 @@
"ResourceIdTemplate": "",
"Severity": "medium",
"ResourceType": "serviceusage.googleapis.com/Service",
"ResourceGroup": "governance",
"Description": "Evaluates whether **Artifact Analysis** (`containeranalysis.googleapis.com`) is enabled at the project level to support **vulnerability scanning** and metadata for container images in Artifact Registry or Container Registry.",
"Risk": "Absent this service, images aren't continuously scanned, leaving known CVEs unnoticed. Attackers can run vulnerable containers, gain code execution, move laterally, and exfiltrate data, eroding the **integrity** and **confidentiality** of workloads and the software supply chain.",
"RelatedUrl": "",
@@ -28,7 +27,10 @@
"Url": "https://hub.prowler.com/check/artifacts_container_analysis_enabled"
}
},
"Categories": [],
"Categories": [
"vulnerabilities",
"software-supply-chain"
],
"DependsOn": [],
"RelatedTo": [],
"Notes": "By default, AR Container Analysis is disabled."