mirror of
https://github.com/prowler-cloud/prowler.git
synced 2026-01-25 02:08:11 +00:00
55 KiB
55 KiB
Prowler SDK Changelog
All notable changes to the Prowler SDK are documented in this file.
[5.17.0] (Prowler UNRELEASED)
Added
- Add Prowler ThreatScore for the Alibaba Cloud provider (#9511)
compute_instance_group_multiple_zonescheck for GCP provider (#9566)- Support AWS European Sovereign Cloud (#9649)
compute_instance_disk_auto_delete_disabledcheck for GCP provider (#9604)- Bedrock service pagination (#9606)
ResourceGroupfield to all check metadata for resource classification (#9656)
Changed
- Update AWS Step Functions service metadata to new format (#9432)
- Update AWS Route 53 service metadata to new format (#9406)
- Update AWS SQS service metadata to new format (#9429)
- Update AWS Shield service metadata to new format (#9427)
- Update AWS Secrets Manager service metadata to new format (#9408)
- Improve SageMaker service tag retrieval with parallel execution (#9609)
- Update AWS Redshift service metadata to new format (#9385)
[5.16.1] (Prowler v5.16.1)
Fixed
- ZeroDivision error from Prowler ThreatScore (#9653)
[5.16.0] (Prowler v5.16.0)
Added
privilege-escalationandec2-imdsv1categories for AWS checks (#9537)- Supported IaC formats and scanner documentation for the IaC provider (#9553)
Changed
- Update AWS Glue service metadata to new format (#9258)
- Update AWS Kafka service metadata to new format (#9261)
- Update AWS KMS service metadata to new format (#9263)
- Update AWS MemoryDB service metadata to new format (#9266)
- Update AWS Inspector v2 service metadata to new format (#9260)
- Update AWS Service Catalog service metadata to new format (#9410)
- Update AWS SNS service metadata to new format (#9428)
- Update AWS Trusted Advisor service metadata to new format (#9435)
- Update AWS WAF service metadata to new format (#9480)
- Update AWS WAF v2 service metadata to new format (#9481)
Fixed
- Fix typo
trustboundariescategory totrust-boundaries(#9536) - Fix incorrect
bedrock-agentregional availability, now using official AWS docs instead of copying frombedrock - Store MongoDB Atlas provider regions as lowercase (#9554)
- Store GCP Cloud Storage bucket regions as lowercase (#9567)
[5.15.1] (Prowler v5.15.1)
Fixed
- Fix false negative in AWS
apigateway_restapi_logging_enabledcheck by refining stage logging evaluation to ensure logging level is not set to "OFF" (#9304)
[5.15.0] (Prowler v5.15.0)
Added
cloudstorage_uses_vpc_service_controlscheck for GCP provider (#9256)- Alibaba Cloud provider with CIS 2.0 benchmark (#9329)
repository_immutable_releases_enabledcheck for GitHub provider (#9162)compute_instance_preemptible_vm_disabledcheck for GCP provider (#9342)compute_instance_automatic_restart_enabledcheck for GCP provider (#9271)compute_instance_deletion_protection_enabledcheck for GCP provider (#9358)- Add needed changes to AlibabaCloud provider from the API (#9485)
- Update SOC2 - Azure with Processing Integrity requirements (#9463)
- Update SOC2 - GCP with Processing Integrity requirements (#9464)
- Update SOC2 - AWS with Processing Integrity requirements (#9462)
- RBI Cyber Security Framework compliance for Azure provider (#8822)
Changed
- Update AWS Macie service metadata to new format (#9265)
- Update AWS Lightsail service metadata to new format (#9264)
- Update AWS GuardDuty service metadata to new format (#9259)
- Update AWS Network Firewall service metadata to new format (#9382)
- Update AWS MQ service metadata to new format (#9267)
- Update AWS Macie service metadata to new format (#9265)
- Update AWS Lightsail service metadata to new format (#9264)
Fixed
- Fix duplicate requirement IDs in ISO 27001:2013 AWS compliance framework by adding unique letter suffixes
- Removed incorrect threat-detection category from checks metadata (#9489)
- GCP
cloudstorage_uses_vpc_service_controlscheck to handle VPC Service Controls blocked API access (#9478)
[5.14.2] (Prowler v5.14.2)
Fixed
- Custom check folder metadata validation (#9335)
- Pin
alibabacloud-gateway-oss-utilto version 0.0.3 to address missing dependency (#9487)
[5.14.1] (Prowler v5.14.1)
Fixed
sharepoint_external_sharing_managedcheck to handle external sharing disabled at organization level (#9298)- Support multiple Exchange mailbox policies in M365
exchange_mailbox_policy_additional_storage_restrictedcheck (#9241)
[5.14.0] (Prowler v5.14.0)
Added
- GitHub provider check
organization_default_repository_permission_strict(#8785) - Add OCI mapping to scan and check classes (#8927)
codepipeline_project_repo_privatecheck for AWS provider (#5915)cloudstorage_bucket_versioning_enabledcheck for GCP provider (#9014)cloudstorage_bucket_soft_delete_enabledcheck for GCP provider (#9028)cloudstorage_bucket_logging_enabledcheck for GCP provider (#9091)cloudstorage_audit_logs_enabledcheck for GCP provider (#9220)cloudstorage_bucket_sufficient_retention_periodcheck for GCP provider (#9149)- C5 compliance framework for Azure provider (#9081)
- C5 compliance framework for the GCP provider (#9097)
organization_repository_creation_limitedcheck for GitHub provider (#8844)- HIPAA compliance framework for the GCP provider (#8955)
- Support PDF reporting for ENS compliance framework (#9158)
- PDF reporting for NIS2 compliance framework (#9170)
- Add organization ID parameter for MongoDB Atlas provider (#9167)
- Add multiple compliance improvements (#9145)
- Added validation for invalid checks, services, and categories in
load_checks_to_executefunction (#8971) - NIST CSF 2.0 compliance framework for the AWS provider (#9185)
- Add FedRAMP 20x KSI Low for AWS, Azure and GCP (#9198)
- Add verification for provider ID in MongoDB Atlas provider (#9211)
- Add Prowler ThreatScore for the K8S provider (#9235)
- Add
postgresql_flexible_server_entra_id_authentication_enabledcheck for Azure provider (#8764) - Add branch name to IaC provider region (#9296)
Changed
- Update AWS Direct Connect service metadata to new format (#8855)
- Update AWS DRS service metadata to new format (#8870)
- Update AWS DynamoDB service metadata to new format (#8871)
- Update AWS CloudWatch service metadata to new format (#8848)
- Update AWS EMR service metadata to new format (#9002)
- Update AWS EKS service metadata to new format (#8890)
- Update AWS Elastic Beanstalk service metadata to new format (#8934)
- Update AWS ElastiCache service metadata to new format (#8933)
- Update Kubernetes etcd service metadata to new format (#9096)
- Update MongoDB Atlas projects service metadata to new format (#9093)
- Update GitHub Organization service metadata to new format (#9094)
- Update AWS CodeBuild service metadata to new format (#8851)
- Update GCP Artifact Registry service metadata to new format (#9088)
- Update AWS EFS service metadata to new format (#8889)
- Update AWS EventBridge service metadata to new format (#9003)
- Update AWS Firehose service metadata to new format (#9004)
- Update AWS FMS service metadata to new format (#9005)
- Update AWS FSx service metadata to new format (#9006)
- Update AWS Glacier service metadata to new format (#9007)
- Update oraclecloud analytics service metadata to new format (#9114)
- Update AWS ELB service metadata to new format (#8935)
- Update AWS CodeArtifact service metadata to new format (#8850)
- Rename OCI provider to oraclecloud with oci alias (#9126)
- Remove unnecessary tests for M365_PowerShell module (#9204)
- Update AWS ELB v2 service metadata to new format (#9001)
- Update oraclecloud cloudguard service metadata to new format (#9223)
- Update oraclecloud blockstorage service metadata to new format (#9222)
- Update oraclecloud audit service metadata to new format (#9221)
- Raise ASFF output error for non-AWS providers (#9225)
- Update AWS ECR service metadata to new format (#8872)
- Update AWS ECS service metadata to new format (#8888)
- Update AWS Kinesis service metadata to new format (#9262)
- Update AWS DocumentDB service metadata to new format (#8862)
Fixed
- Check
check_namehas noresource_nameerror for GCP provider (#9169) - Depth Truncation and parsing error in PowerShell queries (#9181)
- False negative in
iam_role_cross_service_confused_deputy_preventioncheck (#9213) - Fix M365 Teams
--sp-env-authconnection error and enhanced timeout logging (#9191) - Rename
get_oci_assessment_summarytoget_oraclecloud_assessment_summaryin HTML output (#9200) - Fix Validation and other errors in Azure provider (#8915)
- Update documentation URLs from docs.prowler.cloud to docs.prowler.com (#9240)
- Refresh output report timestamps for each scan (#9272)
- Fix file name parsing for checks on Windows (#9268)
- Remove typo for Prowler ThreatScore - M365 (#9274)
- Point HTML logo to the one present in the Github repository (#9282)
[5.13.1] (Prowler v5.13.1)
Fixed
- Add
resource_namefor checks underloggingfor the GCP provider (#9023) - Fix
ec2_instance_with_outdated_amicheck to handle None AMIs (#9046) - Handle timestamp when transforming compliance findings in CCC (#9042)
- Update
resource_idfor admincenter service and avoid unnecessary msgraph requests (#9019) - Fix
firehose_stream_encrypted_at_restdescription and findings clarity (#9142)
Changed
- Adapt IaC provider to be used in the Prowler App (#8751)
[5.13.0] (Prowler v5.13.0)
Added
- Support for AdditionalURLs in outputs (#8651)
- Support for markdown metadata fields in Dashboard (#8667)
ec2_instance_with_outdated_amicheck for AWS provider (#6910)- LLM provider using
promptfoo(#8555) - Documentation for renaming checks (#8717)
- Add explicit "name" field for each compliance framework and include "FRAMEWORK" and "NAME" in CSV output (#7920)
- Add C5 compliance framework for the AWS provider (#8830)
- Equality validation for CheckID, filename and classname (#8690)
- Improve logging for Security Hub integration (#8608)
- Oracle Cloud provider with CIS 3.0 benchmark (#8893)
- Support for Atlassian Document Format (ADF) in Jira integration (#8878)
- Add Common Cloud Controls for AWS, Azure and GCP (#8000)
- Improve Provider documentation guide (#8430)
cloudstorage_bucket_lifecycle_management_enabledcheck for GCP provider (#8936)
Changed
- Update AWS Neptune service metadata to new format (#8494)
- Update AWS Config service metadata to new format (#8641)
- Update AWS Account service metadata to new format (#8715)
- Update AWS AccessAnalyzer service metadata to new format (#8688)
- Update AWS Api Gateway V2 service metadata to new format (#8719)
- Update AWS AppSync service metadata to new format (#8721)
- Update AWS ACM service metadata to new format (#8716)
- HTML output now properly renders markdown syntax in Risk and Recommendation fields (#8727)
- Update
motodependency from 5.0.28 to 5.1.11 (#7100) - Update AWS AppStream service metadata to new format (#8789)
- Update AWS API Gateway service metadata to new format (#8788)
- Update AWS Athena service metadata to new format (#8790)
- Update AWS CloudTrail service metadata to new format (#8831)
- Update AWS Auto Scaling service metadata to new format (#8824)
- Update AWS Backup service metadata to new format (#8826)
- Update AWS CloudFormation service metadata to new format (#8828)
- Update AWS Lambda service metadata to new format (#8825)
- Update AWS DLM service metadata to new format (#8860)
- Update AWS DMS service metadata to new format (#8861)
- Update AWS Directory Service service metadata to new format (#8859)
- Update AWS CloudFront service metadata to new format (#8829)
- Deprecate user authentication for M365 provider (#8865)
Fixed
- Fix SNS topics showing empty AWS_ResourceID in Quick Inventory output (#8762)
- Fix HTML Markdown output for long strings (#8803)
- Prowler ThreatScore scoring calculation CLI (#8582)
- Add missing attributes for Mitre Attack AWS, Azure and GCP (#8907)
- Fix KeyError in CloudSQL and Monitoring services in GCP provider (#8909)
- Fix Value Errors in Entra service for M365 provider (#8919)
- Fix ResourceName in GCP provider (#8928)
- Fix KeyError in
elb_ssl_listeners_use_acm_certificatecheck and handle None cluster version ineks_cluster_uses_a_supported_versioncheck (#8791) - Fix file extension parsing for compliance reports (#8791)
- Added user pagination to Entra and Admincenter services (#8858)
[5.12.1] (Prowler v5.12.1)
Fixed
- Replaced old check id with new ones for compliance files (#8682)
firehose_stream_encrypted_at_restcheck false positives and new api call in kafka service (#8599)- Replace defender rules policies key to use old name (#8702)
[5.12.0] (Prowler v5.12.0)
Added
- Add more fields for the Jira ticket and handle custom fields errors (#8601)
- Support labels on Jira tickets (#8603)
- Add finding url and tenant info inside Jira tickets (#8607)
- Get Jira Project's metadata (#8630)
- Get Jira projects from test_connection (#8634)
AdditionalUrlsfield in CheckMetadata (#8590)- Support color for MANUAL finidngs in Jira tickets (#8642)
--excluded-checks-fileflag (#8301)- Send finding in Jira integration with the needed values (#8648)
- Add language enforcement for Jira requests (#8674)
- MongoDB Atlas provider with 10 security checks (#8312)
clusters_authentication_enabled- Ensure clusters have authentication enabledclusters_backup_enabled- Ensure clusters have backup enabledclusters_encryption_at_rest_enabled- Ensure clusters have encryption at rest enabledclusters_tls_enabled- Ensure clusters have TLS authentication requiredorganizations_api_access_list_required- Ensure organization requires API access listorganizations_mfa_required- Ensure organization requires MFAorganizations_security_contact_defined- Ensure organization has security contact definedorganizations_service_account_secrets_expiration- Ensure organization has maximum period expiration for service account secretsprojects_auditing_enabled- Ensure database auditing is enabledprojects_network_access_list_exposed_to_internet- Ensure project network access list is not exposed to internet
Changed
- Rename ftp and mongo checks to follow pattern
ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_*(#8293)
Fixed
- Renamed
AdditionalUrlstoAdditionalURLsfield in CheckMetadata (#8639) - TypeError from Python 3.9 in Security Hub module by updating type annotations (#8619)
- KeyError when SecurityGroups field is missing in MemoryDB check (#8666)
- NoneType error in Opensearch, Firehose and Cognito checks (#8670)
[5.11.0] (Prowler v5.11.0)
Added
- Certificate authentication for M365 provider (#8404)
vm_sufficient_daily_backup_retention_periodcheck for Azure provider (#8200)vm_jit_access_enabledcheck for Azure provider (#8202)- Bedrock AgentCore privilege escalation combination for AWS provider (#8526)
- Add User Email and APP name/installations information in GitHub provider (#8501)
- Remove standalone iam:PassRole from privesc detection and add missing patterns (#8530)
- Support session/profile/role/static credentials in Security Hub integration (#8539)
eks_cluster_deletion_protection_enabledcheck for AWS provider (#8536)- ECS privilege escalation patterns (StartTask and RunTask) for AWS provider (#8541)
- Resource Explorer enumeration v2 API actions in
cloudtrail_threat_detection_enumerationcheck (#8557) apim_threat_detection_llm_jackingcheck for Azure provider (#8571)- GCP
--skip-api-checkcommand line flag (#8575)
Changed
- Refine kisa isms-p compliance mapping (#8479)
- Improve AWS Security Hub region check using multiple threads (#8365)
Fixed
- Resource metadata error in
s3_bucket_shadow_resource_vulnerabilitycheck (#8572) - GitHub App authentication through API fails with auth_method validation error (#8587)
- AWS resource-arn filtering (#8533)
- GitHub App authentication for GitHub provider (#8529)
- List all accessible organizations in GitHub provider (#8535)
- Only evaluate enabled accounts in
entra_users_mfa_capablecheck (#8544) - GitHub Personal Access Token authentication fails without
user:emailscope (#8580)
[5.10.2] (Prowler v5.10.2)
Fixed
- Order requirements by ID in Prowler ThreatScore AWS compliance framework (#8495)
- Add explicit resource name to GCP and Azure Defender checks (#8352)
- Validation errors in Azure and M365 providers (#8353)
- Azure
app_http_logs_enabledcheck false positives (#8507) - Azure
storage_geo_redundant_enabledcheck false positives (#8504) - AWS
kafka_cluster_is_publiccheck false positives (#8514) - List all accessible repositories in GitHub (#8522)
- GitHub CIS 1.0 Compliance Reports (#8519)
[5.10.1] (Prowler v5.10.1)
Fixed
- Remove invalid requirements from CIS 1.0 for GitHub provider (#8472)
[5.10.0] (Prowler v5.10.0)
Added
bedrock_api_key_no_administrative_privilegescheck for AWS provider (#8321)bedrock_api_key_no_long_term_credentialscheck for AWS provider (#8396)- Support App Key Content in GitHub provider (#8271)
- CIS 4.0 for the Azure provider (#7782)
vm_desired_sku_sizecheck for Azure provider (#8191)vm_scaleset_not_emptycheck for Azure provider (#8192)- GitHub repository and organization scoping support with
--repository/respositoriesand--organization/organizationsflags (#8329) - GCP provider retry configuration (#8412)
s3_bucket_shadow_resource_vulnerabilitycheck for AWS provider (#8398)- Use
trivyas engine for IaC provider (#8466)
Changed
- Handle some AWS errors as warnings instead of errors (#8347)
- Revert import of
checkovpython library (#8385) - Updated policy mapping in ISMS-P compliance file for improved alignment (#8367)
Fixed
- False positives in SQS encryption check for ephemeral queues (#8330)
- Add protocol validation check in security group checks to ensure proper protocol matching (#8374)
- Add missing audit evidence for controls 1.1.4 and 2.5.5 for ISMS-P compliance. (#8386)
- Use the correct @staticmethod decorator for
set_identityandset_session_configmethods in AwsProvider (#8056) - Use the correct default value for
role_session_nameandsession_durationin AwsSetUpSession (#8056) - Use the correct default value for
role_session_nameandsession_durationin S3 (#8417) - GitHub App authentication fails to generate output files and HTML header sections (#8423)
- S3
test_connectionuses AWS S3 APIHeadBucketinstead ofGetBucketLocation(#8456) - Add more validations to Azure Storage models when some values are None to avoid serialization issues (#8325)
sns_topics_not_publicly_accessiblefalse positive withaws:SourceArnconditions (#8326)- Remove typo from description req 1.2.3 - Prowler ThreatScore m365 (#8384)
- Way of counting FAILED/PASS reqs from
kisa_isms_p_2023_awstable (#8382) - Use default tenant domain instead of first domain in list for Azure and M365 providers (#8402)
- Avoid multiple module error calls in M365 provider (#8353)
- Avoid sending errors to Sentry in M365 provider when user authentication fails (#8420)
- Tweaks from Prowler ThreatScore in order to handle the correct reqs (#8401)
- Make
setup_assumed_sessionstatic for the AWS provider (#8419)
[5.9.2] (Prowler v5.9.2)
Fixed
- Use the correct resource name in
defender_domain_dkim_enabledcheck (#8334)
[5.9.0] (Prowler v5.9.0)
Added
storage_smb_channel_encryption_with_secure_algorithmcheck for Azure provider (#8123)storage_smb_protocol_version_is_latestcheck for Azure provider (#8128)vm_backup_enabledcheck for Azure provider (#8182)vm_linux_enforce_ssh_authenticationcheck for Azure provider (#8149)vm_ensure_using_approved_imagescheck for Azure provider (#8168)vm_scaleset_associated_load_balancercheck for Azure provider (#8181)defender_attack_path_notifications_properly_configuredcheck for Azure provider (#8245)entra_intune_enrollment_sign_in_frequency_every_timecheck for M365 provider (#8223)- Support for remote repository scanning in IaC provider (#8193)
- Add
test_connectionmethod to GitHub provider (#8248)
Changed
- Refactor the Azure Defender get security contact configuration method to use the API REST endpoint instead of the SDK (#8241)
Fixed
- Title & description wording for
iam_user_accesskey_unusedcheck for AWS provider (#8233) - Add GitHub provider to lateral panel in documentation and change -h environment variable output (#8246)
- Show
m365_identity_typeandm365_identity_idin cloud reports (#8247) - Ensure
is_service_roleonly returnsTruefor service roles (#8274) - Update DynamoDB check metadata to fix broken link (#8273)
- Show correct count of findings in Dashboard Security Posture page (#8270)
- Add Check's metadata service name validator (#8289)
- Use subscription ID in Azure mutelist (#8290)
ServiceNamefield in Network Firewall checks metadata (#8280)- Update
entra_users_mfa_capablecheck to use the correct resource name and ID (#8288) - Handle multiple services and severities while listing checks (#8302)
- Handle
tenant_idfor M365 Mutelist (#8306) - Fix error in Dashboard Overview page when reading CSV files (#8257)
[5.8.1] (Prowler v5.8.1)
Fixed
- Detect wildcarded ARNs in sts:AssumeRole policy resources (#8164)
- List all streams and
firehose_stream_encrypted_at_restlogic (#8213) - Allow empty values for http_endpoint in templates (#8184)
- Convert all Azure Storage models to Pydantic models to avoid serialization issues (#8222)
[5.8.0] (Prowler v5.8.0)
Added
storage_geo_redundant_enabledcheck for Azure provider (#7980)storage_cross_tenant_replication_disabledcheck for Azure provider (#7977)- CIS 1.11 compliance framework for Kubernetes (#7790)
- Support
HTTPS_PROXYandK8S_SKIP_TLS_VERIFYin Kubernetes (#7720) - Weight for Prowler ThreatScore scoring (#7795)
entra_users_mfa_capablecheck for M365 provider (#7734)admincenter_organization_customer_lockbox_enabledcheck for M365 provider (#7732)admincenter_external_calendar_sharing_disabledcheck for M365 provider (#7733)- Level for Prowler ThreatScore in the accordion in Dashboard (#7739)
- CIS 4.0 compliance framework for GCP (7785)
repository_has_codeowners_filecheck for GitHub provider (#7752)repository_default_branch_requires_signed_commitscheck for GitHub provider (#7777)repository_inactive_not_archivedcheck for GitHub provider (#7786)repository_dependency_scanning_enabledcheck for GitHub provider (#7771)repository_secret_scanning_enabledcheck for GitHub provider (#7759)repository_default_branch_requires_codeowners_reviewcheck for GitHub provider (#7753)- NIS 2 compliance framework for AWS (#7839)
- NIS 2 compliance framework for Azure (#7857)
- Search bar in Dashboard Overview page (#7804)
- NIS 2 compliance framework for GCP (#7912)
storage_account_key_access_disabledcheck for Azure provider (#7974)storage_ensure_file_shares_soft_delete_is_enabledcheck for Azure provider (#7966)- Make
validate_mutelistmethod static insideMutelistclass (#7811) - Avoid bypassing IAM check using wildcards (#7708)
storage_blob_versioning_is_enablednew check for Azure provider (#7927)- New method to authenticate in AppInsights in check
app_function_application_insights_enabled(#7763) - ISO 27001 2022 for M365 provider (#7985)
codebuild_project_uses_allowed_github_organizationscheck for AWS provider (#7595)- IaC provider (#7852)
- Azure Databricks service integration for Azure provider, including the
databricks_workspace_vnet_injection_enabledcheck (#8008) databricks_workspace_cmk_encryption_enabledcheck for Azure provider (#8017)- Appication auth for PowerShell in M365 provider (#7992)
storage_account_default_to_entra_authorization_enabledcheck for Azure provider (#7981)- Improve overview page from Prowler Dashboard (#8118)
keyvault_ensure_public_network_access_disabledcheck for Azure provider (#8072)monitor_alert_service_health_existscheck for Azure provider (#8067)- Replace
Domain.Read.AllwithDirectory.Read.Allin Azure and M365 docs (#8075) - Refactor IaC provider to use Checkov as Python library (#8093)
- New check
codebuild_project_not_publicly_accessiblefor AWS provider (#8127)
Fixed
- Consolidate Azure Storage file service properties to the account level, improving the accuracy of the
storage_ensure_file_shares_soft_delete_is_enabledcheck (#8087) - Migrate Azure VM service and managed disk logic to Pydantic models for better serialization and type safety, and update all related tests to use the new models and fix UUID handling (#https://github.com/prowler-cloud/prowler/pull/8151)
organizations_scp_check_deny_regionscheck to pass when SCP policies have no statements (#8091)- Fix logic in VPC and ELBv2 checks (#8077)
- Retrieve correctly ECS Container insights settings (#8097)
- Fix correct handling for different accounts-dates in prowler dashboard compliance page (#8108)
- Handling of
block-project-ssh-keysin GCP checkcompute_instance_block_project_wide_ssh_keys_disabled(#8115) - Handle empty name in Azure Defender and GCP checks (#8120)
Changed
- Reworked
S3.test_connectionto match the AwsProvider logic (#8088)
Removed
- OCSF version number references to point always to the latest (#8064)
[5.7.5] (Prowler v5.7.5)
Fixed
- Use unified timestamp for all requirements (#8059)
- Add EKS to service without subservices (#7959)
apiserver_strong_ciphers_onlycheck for K8S provider (#7952)- Handle
0at the start and end of account uids in Prowler Dashboard (#7955) - Typo in PCI 4.0 for K8S provider (#7971)
- AWS root credentials checks always verify if root credentials are enabled (#7967)
- Github provider to
usagesection ofprowler -h: (#7906) network_flow_log_more_than_90_dayscheck to pass when retention policy is 0 days (#7975)- Update SDK Azure call for ftps_state in the App Service (#7923)
- Validate ResourceType in CheckMetadata (#8035)
- Missing ResourceType values in check's metadata (#8028)
- Avoid user requests in setup_identity app context and user auth log enhancement (#8043)
[5.7.3] (Prowler v5.7.3)
Fixed
- Automatically encrypt password in Microsoft365 provider (#7784)
- Remove last encrypted password appearances (#7825)
[5.7.2] (Prowler v5.7.2)
Fixed
m365_powershell test_credentialsto use sanitized credentials (#7761)admincenter_users_admins_reduced_license_footprintcheck logic to pass when admin user has no license (#7779)m365_powershellto close the PowerShell sessions in msgraph services (#7816)defender_ensure_notify_alerts_severity_is_highcheck to accept high or lower severity (#7862)- Replace
Directory.Read.Allpermission withDomain.Read.Allwhich is more restrictive (#7888) - Split calls to list Azure Functions attributes (#7778)
[5.7.0] (Prowler v5.7.0)
Added
- Update the compliance list supported for each provider from docs (#7694)
- Allow setting cluster name in in-cluster mode in Kubernetes (#7695)
- Prowler ThreatScore for M365 provider (#7692)
- GitHub provider (#5787)
repository_default_branch_requires_multiple_approvalscheck for GitHub provider (#6160)repository_default_branch_protection_enabledcheck for GitHub provider (#6161)repository_default_branch_requires_linear_historycheck for GitHub provider (#6162)repository_default_branch_disallows_force_pushcheck for GitHub provider (#6197)repository_default_branch_deletion_disabledcheck for GitHub provider (#6200)repository_default_branch_status_checks_requiredcheck for GitHub provider (#6204)repository_default_branch_protection_applies_to_adminscheck for GitHub provider (#6205)repository_branch_delete_on_merge_enabledcheck for GitHub provider (#6209)repository_default_branch_requires_conversation_resolutioncheck for GitHub provider (#6208)organization_members_mfa_requiredcheck for GitHub provider (#6304)- GitHub provider documentation and CIS v1.0.0 compliance (#6116)
- CIS 5.0 compliance framework for AWS (7766)
Fixed
- Update CIS 4.0 for M365 provider (#7699)
- Update and upgrade CIS for all the providers (#7738)
- Cover policies with conditions with SNS endpoint in
sns_topics_not_publicly_accessible(#7750) - Change severity logic for
ec2_securitygroup_allow_ingress_from_internet_to_all_portscheck (#7764)
[5.6.0] (Prowler v5.6.0)
Added
- SOC2 compliance framework to Azure (#7489)
- Check for unused Service Accounts in GCP (#7419)
- Powershell to Microsoft365 (#7331)
- Service Defender to Microsoft365 with one check for Common Attachments filter enabled in Malware Policies (#7425)
- Check for Outbound Antispam Policy well configured in service Defender for M365 (#7480)
- Check for Antiphishing Policy well configured in service Defender in M365 (#7453)
- Check for Notifications for Internal users enabled in Malware Policies from service Defender in M365 (#7435)
- Support CLOUDSDK_AUTH_ACCESS_TOKEN in GCP (#7495)
- Service Exchange to Microsoft365 with one check for Organizations Mailbox Auditing enabled (#7408)
- Check for Bypass Disable in every Mailbox for service Defender in M365 (#7418)
- New check
teams_external_domains_restricted(#7557) - New check
teams_email_sending_to_channel_disabled(#7533) - New check for External Mails Tagged for service Exchange in M365 (#7580)
- New check for WhiteList not used in Transport Rules for service Defender in M365 (#7569)
- Check for Inbound Antispam Policy with no allowed domains from service Defender in M365 (#7500)
- New check
teams_meeting_anonymous_user_join_disabled(#7565) - New check
teams_unmanaged_communication_disabled(#7561) - New check
teams_external_users_cannot_start_conversations(#7562) - New check for AllowList not used in the Connection Filter Policy from service Defender in M365 (#7492)
- New check for SafeList not enabled in the Connection Filter Policy from service Defender in M365 (#7492)
- New check for DKIM enabled for service Defender in M365 (#7485)
- New check
teams_meeting_anonymous_user_start_disabled(#7567) - New check
teams_meeting_external_lobby_bypass_disabled(#7568) - New check
teams_meeting_dial_in_lobby_bypass_disabled(#7571) - New check
teams_meeting_external_control_disabled(#7604) - New check
teams_meeting_external_chat_disabled(#7605) - New check
teams_meeting_recording_disabled(#7607) - New check
teams_meeting_presenters_restricted(#7613) - New check
teams_security_reporting_enabled(#7614) - New check
defender_chat_report_policy_configured(#7614) - New check
teams_meeting_chat_anonymous_users_disabled(#7579) - Prowler Threat Score Compliance Framework (#7603)
- Documentation for M365 provider (#7622)
- Support for m365 provider in Prowler Dashboard (#7633)
- New check for Modern Authentication enabled for Exchange Online in M365 (#7636)
- New check
sharepoint_onedrive_sync_restricted_unmanaged_devices(#7589) - New check for Additional Storage restricted for Exchange in M365 (#7638)
- New check for Roles Assignment Policy with no AddIns for Exchange in M365 (#7644)
- New check for Auditing Mailbox on E3 users is enabled for Exchange in M365 (#7642)
- New check for SMTP Auth disabled for Exchange in M365 (#7640)
- New check for MailTips full enabled for Exchange in M365 (#7637)
- New check for Comprehensive Attachments Filter Applied for Defender in M365 (#7661)
- Modified check
exchange_mailbox_properties_auditing_enabledto make it configurable (#7662) - snapshots to m365 documentation (#7673)
- support for static credentials for sending findings to Amazon S3 and AWS Security Hub (#7322)
- Prowler ThreatScore for M365 provider (#7692)
- Microsoft User and User Credential auth to reports (#7681)
Fixed
- Package name location in pyproject.toml while replicating for prowler-cloud (#7531)
- Remove cache in PyPI release action (#7532)
- The correct values for logger.info inside iam service (#7526)
- Update S3 bucket naming validation to accept dots (#7545)
- Handle new FlowLog model properties in Azure (#7546)
- Improve compliance and dashboard (#7596)
- Remove invalid parameter
create_file_descriptor(#7600) - Remove first empty line in HTML output (#7606)
- Remove empty files in Prowler (#7627)
- Ensure that ContentType in upload_file matches the uploaded file's format (#7635)
- Incorrect check inside 4.4.1 requirement for Azure CIS 2.0 (#7656)
- Remove muted findings on compliance page from Prowler Dashboard (#7683)
- Remove duplicated findings on compliance page from Prowler Dashboard (#7686)
- Incorrect values for Prowler Threatscore compliance LevelOfRisk inside requirements (#7667)
[5.5.1] (Prowler v5.5.1)
Fixed
- Default name to contacts in Azure Defender (#7483)
- Handle projects without ID in GCP (#7496)
- Restore packages location in PyProject (#7510)