prowler-cloud 5.12.3__py3-none-any.whl → 5.13.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- dashboard/assets/markdown-styles.css +34 -0
- dashboard/compliance/c5_aws.py +43 -0
- dashboard/compliance/ccc_aws.py +36 -0
- dashboard/compliance/ccc_azure.py +36 -0
- dashboard/compliance/ccc_gcp.py +36 -0
- dashboard/compliance/cis_3_0_oci.py +41 -0
- dashboard/pages/overview.py +66 -16
- prowler/CHANGELOG.md +60 -0
- prowler/__main__.py +128 -14
- prowler/compliance/aws/aws_account_security_onboarding_aws.json +1 -0
- prowler/compliance/aws/aws_audit_manager_control_tower_guardrails_aws.json +1 -0
- prowler/compliance/aws/aws_foundational_security_best_practices_aws.json +2 -1
- prowler/compliance/aws/aws_foundational_technical_review_aws.json +1 -0
- prowler/compliance/aws/aws_well_architected_framework_reliability_pillar_aws.json +1 -0
- prowler/compliance/aws/aws_well_architected_framework_security_pillar_aws.json +1 -0
- prowler/compliance/aws/c5_aws.json +10744 -0
- prowler/compliance/aws/ccc_aws.json +6206 -0
- prowler/compliance/aws/cis_1.4_aws.json +1 -0
- prowler/compliance/aws/cis_1.5_aws.json +1 -0
- prowler/compliance/aws/cis_2.0_aws.json +1 -0
- prowler/compliance/aws/cis_3.0_aws.json +1 -0
- prowler/compliance/aws/cis_4.0_aws.json +1 -0
- prowler/compliance/aws/cis_5.0_aws.json +1 -0
- prowler/compliance/aws/cisa_aws.json +1 -0
- prowler/compliance/aws/ens_rd2022_aws.json +1 -0
- prowler/compliance/aws/fedramp_low_revision_4_aws.json +1 -0
- prowler/compliance/aws/fedramp_moderate_revision_4_aws.json +1 -0
- prowler/compliance/aws/ffiec_aws.json +1 -0
- prowler/compliance/aws/gdpr_aws.json +1 -0
- prowler/compliance/aws/gxp_21_cfr_part_11_aws.json +1 -0
- prowler/compliance/aws/gxp_eu_annex_11_aws.json +1 -0
- prowler/compliance/aws/hipaa_aws.json +1 -0
- prowler/compliance/aws/iso27001_2013_aws.json +1 -0
- prowler/compliance/aws/iso27001_2022_aws.json +1 -0
- prowler/compliance/aws/kisa_isms_p_2023_aws.json +1 -0
- prowler/compliance/aws/kisa_isms_p_2023_korean_aws.json +1 -0
- prowler/compliance/aws/mitre_attack_aws.json +287 -11
- prowler/compliance/aws/nis2_aws.json +1 -0
- prowler/compliance/aws/nist_800_171_revision_2_aws.json +1 -0
- prowler/compliance/aws/nist_800_53_revision_4_aws.json +1 -0
- prowler/compliance/aws/nist_800_53_revision_5_aws.json +1 -0
- prowler/compliance/aws/nist_csf_1.1_aws.json +1 -0
- prowler/compliance/aws/pci_3.2.1_aws.json +2 -1
- prowler/compliance/aws/pci_4.0_aws.json +1 -0
- prowler/compliance/aws/prowler_threatscore_aws.json +1 -0
- prowler/compliance/aws/rbi_cyber_security_framework_aws.json +1 -0
- prowler/compliance/aws/soc2_aws.json +1 -0
- prowler/compliance/azure/ccc_azure.json +6147 -0
- prowler/compliance/azure/cis_2.0_azure.json +1 -0
- prowler/compliance/azure/cis_2.1_azure.json +1 -0
- prowler/compliance/azure/cis_3.0_azure.json +1 -0
- prowler/compliance/azure/cis_4.0_azure.json +1 -0
- prowler/compliance/azure/ens_rd2022_azure.json +1 -0
- prowler/compliance/azure/iso27001_2022_azure.json +1 -0
- prowler/compliance/azure/mitre_attack_azure.json +131 -5
- prowler/compliance/azure/nis2_azure.json +1 -0
- prowler/compliance/azure/pci_4.0_azure.json +1 -0
- prowler/compliance/azure/prowler_threatscore_azure.json +1 -0
- prowler/compliance/azure/soc2_azure.json +1 -0
- prowler/compliance/gcp/ccc_gcp.json +6077 -0
- prowler/compliance/gcp/cis_2.0_gcp.json +1 -0
- prowler/compliance/gcp/cis_3.0_gcp.json +1 -0
- prowler/compliance/gcp/cis_4.0_gcp.json +1 -0
- prowler/compliance/gcp/ens_rd2022_gcp.json +1 -0
- prowler/compliance/gcp/iso27001_2022_gcp.json +1 -0
- prowler/compliance/gcp/mitre_attack_gcp.json +287 -11
- prowler/compliance/gcp/nis2_gcp.json +1 -0
- prowler/compliance/gcp/pci_4.0_gcp.json +1 -0
- prowler/compliance/gcp/prowler_threatscore_gcp.json +1 -0
- prowler/compliance/gcp/soc2_gcp.json +1 -0
- prowler/compliance/github/cis_1.0_github.json +1 -0
- prowler/compliance/kubernetes/cis_1.10_kubernetes.json +1 -0
- prowler/compliance/kubernetes/cis_1.11_kubernetes.json +1 -0
- prowler/compliance/kubernetes/cis_1.8_kubernetes.json +1 -0
- prowler/compliance/kubernetes/iso27001_2022_kubernetes.json +1 -0
- prowler/compliance/kubernetes/pci_4.0_kubernetes.json +1 -0
- prowler/compliance/llm/__init__.py +0 -0
- prowler/compliance/m365/cis_4.0_m365.json +1 -0
- prowler/compliance/m365/iso27001_2022_m365.json +1 -0
- prowler/compliance/m365/prowler_threatscore_m365.json +1 -0
- prowler/compliance/nhn/iso27001_2022_nhn.json +1 -0
- prowler/compliance/oci/__init__.py +0 -0
- prowler/compliance/oci/cis_3.0_oci.json +1141 -0
- prowler/config/config.py +5 -1
- prowler/config/llm_config.yaml +175015 -0
- prowler/config/oraclecloud_mutelist_example.yaml +61 -0
- prowler/lib/check/check.py +9 -1
- prowler/lib/check/compliance.py +1 -0
- prowler/lib/check/compliance_models.py +33 -3
- prowler/lib/check/models.py +96 -8
- prowler/lib/check/utils.py +8 -2
- prowler/lib/cli/parser.py +6 -4
- prowler/lib/outputs/compliance/aws_well_architected/aws_well_architected.py +4 -0
- prowler/lib/outputs/compliance/aws_well_architected/models.py +2 -0
- prowler/lib/outputs/compliance/c5/__init__.py +0 -0
- prowler/lib/outputs/compliance/c5/c5.py +98 -0
- prowler/lib/outputs/compliance/c5/c5_aws.py +92 -0
- prowler/lib/outputs/compliance/c5/models.py +30 -0
- prowler/lib/outputs/compliance/ccc/__init__.py +0 -0
- prowler/lib/outputs/compliance/ccc/ccc_aws.py +95 -0
- prowler/lib/outputs/compliance/ccc/ccc_azure.py +95 -0
- prowler/lib/outputs/compliance/ccc/ccc_gcp.py +95 -0
- prowler/lib/outputs/compliance/ccc/models.py +90 -0
- prowler/lib/outputs/compliance/cis/cis_aws.py +4 -0
- prowler/lib/outputs/compliance/cis/cis_azure.py +4 -0
- prowler/lib/outputs/compliance/cis/cis_gcp.py +4 -0
- prowler/lib/outputs/compliance/cis/cis_github.py +4 -0
- prowler/lib/outputs/compliance/cis/cis_kubernetes.py +4 -0
- prowler/lib/outputs/compliance/cis/cis_m365.py +4 -0
- prowler/lib/outputs/compliance/cis/cis_oci.py +106 -0
- prowler/lib/outputs/compliance/cis/models.py +56 -0
- prowler/lib/outputs/compliance/compliance.py +10 -0
- prowler/lib/outputs/compliance/compliance_output.py +4 -1
- prowler/lib/outputs/compliance/ens/ens_aws.py +4 -0
- prowler/lib/outputs/compliance/ens/ens_azure.py +4 -0
- prowler/lib/outputs/compliance/ens/ens_gcp.py +4 -0
- prowler/lib/outputs/compliance/ens/models.py +6 -0
- prowler/lib/outputs/compliance/generic/generic.py +4 -0
- prowler/lib/outputs/compliance/generic/models.py +2 -0
- prowler/lib/outputs/compliance/iso27001/iso27001_aws.py +4 -0
- prowler/lib/outputs/compliance/iso27001/iso27001_azure.py +4 -0
- prowler/lib/outputs/compliance/iso27001/iso27001_gcp.py +4 -0
- prowler/lib/outputs/compliance/iso27001/iso27001_kubernetes.py +4 -0
- prowler/lib/outputs/compliance/iso27001/iso27001_m365.py +4 -0
- prowler/lib/outputs/compliance/iso27001/iso27001_nhn.py +4 -0
- prowler/lib/outputs/compliance/iso27001/models.py +12 -0
- prowler/lib/outputs/compliance/kisa_ismsp/kisa_ismsp_aws.py +4 -0
- prowler/lib/outputs/compliance/kisa_ismsp/models.py +2 -0
- prowler/lib/outputs/compliance/mitre_attack/mitre_attack_aws.py +4 -0
- prowler/lib/outputs/compliance/mitre_attack/mitre_attack_azure.py +4 -0
- prowler/lib/outputs/compliance/mitre_attack/mitre_attack_gcp.py +4 -0
- prowler/lib/outputs/compliance/mitre_attack/models.py +6 -0
- prowler/lib/outputs/compliance/prowler_threatscore/models.py +8 -0
- prowler/lib/outputs/compliance/prowler_threatscore/prowler_threatscore.py +46 -4
- prowler/lib/outputs/compliance/prowler_threatscore/prowler_threatscore_aws.py +4 -0
- prowler/lib/outputs/compliance/prowler_threatscore/prowler_threatscore_azure.py +4 -0
- prowler/lib/outputs/compliance/prowler_threatscore/prowler_threatscore_gcp.py +4 -0
- prowler/lib/outputs/compliance/prowler_threatscore/prowler_threatscore_m365.py +4 -0
- prowler/lib/outputs/csv/csv.py +3 -0
- prowler/lib/outputs/finding.py +22 -0
- prowler/lib/outputs/html/html.py +192 -7
- prowler/lib/outputs/jira/jira.py +284 -47
- prowler/lib/outputs/ocsf/ocsf.py +1 -4
- prowler/lib/outputs/outputs.py +6 -0
- prowler/lib/outputs/summary_table.py +10 -0
- prowler/providers/aws/aws_regions_by_service.json +221 -44
- prowler/providers/aws/lib/quick_inventory/quick_inventory.py +3 -0
- prowler/providers/aws/lib/security_hub/security_hub.py +12 -2
- prowler/providers/aws/services/accessanalyzer/accessanalyzer_enabled/accessanalyzer_enabled.metadata.json +27 -13
- prowler/providers/aws/services/accessanalyzer/accessanalyzer_enabled_without_findings/accessanalyzer_enabled_without_findings.metadata.json +32 -13
- prowler/providers/aws/services/account/account_maintain_current_contact_details/account_maintain_current_contact_details.metadata.json +23 -11
- prowler/providers/aws/services/account/account_maintain_different_contact_details_to_security_billing_and_operations/account_maintain_different_contact_details_to_security_billing_and_operations.metadata.json +24 -12
- prowler/providers/aws/services/account/account_security_contact_information_is_registered/account_security_contact_information_is_registered.metadata.json +19 -11
- prowler/providers/aws/services/account/account_security_questions_are_registered_in_the_aws_account/account_security_questions_are_registered_in_the_aws_account.metadata.json +14 -10
- prowler/providers/aws/services/acm/acm_certificates_expiration_check/acm_certificates_expiration_check.metadata.json +17 -9
- prowler/providers/aws/services/acm/acm_certificates_transparency_logs_enabled/acm_certificates_transparency_logs_enabled.metadata.json +16 -12
- prowler/providers/aws/services/acm/acm_certificates_with_secure_key_algorithms/acm_certificates_with_secure_key_algorithms.metadata.json +21 -12
- prowler/providers/aws/services/apigateway/apigateway_restapi_authorizers_enabled/apigateway_restapi_authorizers_enabled.metadata.json +23 -16
- prowler/providers/aws/services/apigateway/apigateway_restapi_cache_encrypted/apigateway_restapi_cache_encrypted.metadata.json +22 -12
- prowler/providers/aws/services/apigateway/apigateway_restapi_client_certificate_enabled/apigateway_restapi_client_certificate_enabled.metadata.json +26 -18
- prowler/providers/aws/services/apigateway/apigateway_restapi_logging_enabled/apigateway_restapi_logging_enabled.metadata.json +30 -19
- prowler/providers/aws/services/apigateway/apigateway_restapi_public/apigateway_restapi_public.metadata.json +24 -16
- prowler/providers/aws/services/apigateway/apigateway_restapi_public_with_authorizer/apigateway_restapi_public_with_authorizer.metadata.json +31 -18
- prowler/providers/aws/services/apigateway/apigateway_restapi_tracing_enabled/apigateway_restapi_tracing_enabled.metadata.json +20 -12
- prowler/providers/aws/services/apigateway/apigateway_restapi_waf_acl_attached/apigateway_restapi_waf_acl_attached.metadata.json +24 -18
- prowler/providers/aws/services/apigatewayv2/apigatewayv2_api_access_logging_enabled/apigatewayv2_api_access_logging_enabled.metadata.json +18 -12
- prowler/providers/aws/services/apigatewayv2/apigatewayv2_api_authorizers_enabled/apigatewayv2_api_authorizers_enabled.metadata.json +21 -12
- prowler/providers/aws/services/appstream/appstream_fleet_default_internet_access_disabled/appstream_fleet_default_internet_access_disabled.metadata.json +23 -15
- prowler/providers/aws/services/appstream/appstream_fleet_maximum_session_duration/appstream_fleet_maximum_session_duration.metadata.json +15 -12
- prowler/providers/aws/services/appstream/appstream_fleet_session_disconnect_timeout/appstream_fleet_session_disconnect_timeout.metadata.json +17 -14
- prowler/providers/aws/services/appstream/appstream_fleet_session_idle_disconnect_timeout/appstream_fleet_session_idle_disconnect_timeout.metadata.json +20 -15
- prowler/providers/aws/services/appsync/appsync_field_level_logging_enabled/appsync_field_level_logging_enabled.metadata.json +21 -12
- prowler/providers/aws/services/appsync/appsync_graphql_api_no_api_key_authentication/appsync_graphql_api_no_api_key_authentication.metadata.json +20 -13
- prowler/providers/aws/services/athena/athena_workgroup_encryption/athena_workgroup_encryption.metadata.json +24 -12
- prowler/providers/aws/services/athena/athena_workgroup_enforce_configuration/athena_workgroup_enforce_configuration.metadata.json +20 -13
- prowler/providers/aws/services/athena/athena_workgroup_logging_enabled/athena_workgroup_logging_enabled.metadata.json +21 -12
- prowler/providers/aws/services/autoscaling/autoscaling_find_secrets_ec2_launch_configuration/autoscaling_find_secrets_ec2_launch_configuration.metadata.json +15 -10
- prowler/providers/aws/services/autoscaling/autoscaling_group_capacity_rebalance_enabled/autoscaling_group_capacity_rebalance_enabled.metadata.json +20 -13
- prowler/providers/aws/services/autoscaling/autoscaling_group_elb_health_check_enabled/autoscaling_group_elb_health_check_enabled.metadata.json +20 -12
- prowler/providers/aws/services/autoscaling/autoscaling_group_launch_configuration_no_public_ip/autoscaling_group_launch_configuration_no_public_ip.metadata.json +20 -13
- prowler/providers/aws/services/autoscaling/autoscaling_group_launch_configuration_requires_imdsv2/autoscaling_group_launch_configuration_requires_imdsv2.metadata.json +26 -14
- prowler/providers/aws/services/autoscaling/autoscaling_group_multiple_az/autoscaling_group_multiple_az.metadata.json +22 -13
- prowler/providers/aws/services/autoscaling/autoscaling_group_multiple_instance_types/autoscaling_group_multiple_instance_types.metadata.json +21 -13
- prowler/providers/aws/services/autoscaling/autoscaling_group_using_ec2_launch_template/autoscaling_group_using_ec2_launch_template.metadata.json +19 -12
- prowler/providers/aws/services/autoscaling/autoscaling_service.py +1 -1
- prowler/providers/aws/services/awslambda/awslambda_function_inside_vpc/awslambda_function_inside_vpc.metadata.json +26 -13
- prowler/providers/aws/services/awslambda/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.metadata.json +20 -13
- prowler/providers/aws/services/awslambda/awslambda_function_no_secrets_in_code/awslambda_function_no_secrets_in_code.metadata.json +18 -9
- prowler/providers/aws/services/awslambda/awslambda_function_no_secrets_in_variables/awslambda_function_no_secrets_in_variables.metadata.json +20 -12
- prowler/providers/aws/services/awslambda/awslambda_function_not_publicly_accessible/awslambda_function_not_publicly_accessible.metadata.json +21 -12
- prowler/providers/aws/services/awslambda/awslambda_function_url_cors_policy/awslambda_function_url_cors_policy.metadata.json +24 -13
- prowler/providers/aws/services/awslambda/awslambda_function_url_public/awslambda_function_url_public.metadata.json +22 -12
- prowler/providers/aws/services/awslambda/awslambda_function_using_supported_runtimes/awslambda_function_using_supported_runtimes.metadata.json +24 -13
- prowler/providers/aws/services/awslambda/awslambda_function_vpc_multi_az/awslambda_function_vpc_multi_az.metadata.json +23 -13
- prowler/providers/aws/services/backup/backup_plans_exist/backup_plans_exist.metadata.json +22 -15
- prowler/providers/aws/services/backup/backup_recovery_point_encrypted/backup_recovery_point_encrypted.metadata.json +21 -12
- prowler/providers/aws/services/backup/backup_reportplans_exist/backup_reportplans_exist.metadata.json +19 -15
- prowler/providers/aws/services/backup/backup_vaults_encrypted/backup_vaults_encrypted.metadata.json +24 -13
- prowler/providers/aws/services/backup/backup_vaults_exist/backup_vaults_exist.metadata.json +19 -15
- prowler/providers/aws/services/cloudformation/cloudformation_stack_cdktoolkit_bootstrap_version/cloudformation_stack_cdktoolkit_bootstrap_version.metadata.json +24 -13
- prowler/providers/aws/services/cloudformation/cloudformation_stack_outputs_find_secrets/cloudformation_stack_outputs_find_secrets.metadata.json +22 -12
- prowler/providers/aws/services/cloudformation/cloudformation_stacks_termination_protection_enabled/cloudformation_stacks_termination_protection_enabled.metadata.json +21 -12
- prowler/providers/aws/services/cloudfront/cloudfront_distributions_custom_ssl_certificate/cloudfront_distributions_custom_ssl_certificate.metadata.json +21 -12
- prowler/providers/aws/services/cloudfront/cloudfront_distributions_default_root_object/cloudfront_distributions_default_root_object.metadata.json +19 -12
- prowler/providers/aws/services/cloudfront/cloudfront_distributions_field_level_encryption_enabled/cloudfront_distributions_field_level_encryption_enabled.metadata.json +19 -12
- prowler/providers/aws/services/cloudfront/cloudfront_distributions_geo_restrictions_enabled/cloudfront_distributions_geo_restrictions_enabled.metadata.json +22 -13
- prowler/providers/aws/services/cloudfront/cloudfront_distributions_https_enabled/cloudfront_distributions_https_enabled.metadata.json +21 -12
- prowler/providers/aws/services/cloudfront/cloudfront_distributions_https_sni_enabled/cloudfront_distributions_https_sni_enabled.metadata.json +20 -12
- prowler/providers/aws/services/cloudfront/cloudfront_distributions_logging_enabled/cloudfront_distributions_logging_enabled.metadata.json +22 -13
- prowler/providers/aws/services/cloudfront/cloudfront_distributions_multiple_origin_failover_configured/cloudfront_distributions_multiple_origin_failover_configured.metadata.json +21 -16
- prowler/providers/aws/services/cloudfront/cloudfront_distributions_origin_traffic_encrypted/cloudfront_distributions_origin_traffic_encrypted.metadata.json +27 -14
- prowler/providers/aws/services/cloudfront/cloudfront_distributions_s3_origin_access_control/cloudfront_distributions_s3_origin_access_control.metadata.json +24 -14
- prowler/providers/aws/services/cloudfront/cloudfront_distributions_s3_origin_non_existent_bucket/cloudfront_distributions_s3_origin_non_existent_bucket.metadata.json +18 -11
- prowler/providers/aws/services/cloudfront/cloudfront_distributions_using_deprecated_ssl_protocols/cloudfront_distributions_using_deprecated_ssl_protocols.metadata.json +20 -12
- prowler/providers/aws/services/cloudfront/cloudfront_distributions_using_waf/cloudfront_distributions_using_waf.metadata.json +21 -12
- prowler/providers/aws/services/cloudtrail/cloudtrail_bucket_requires_mfa_delete/cloudtrail_bucket_requires_mfa_delete.metadata.json +16 -11
- prowler/providers/aws/services/cloudtrail/cloudtrail_cloudwatch_logging_enabled/cloudtrail_cloudwatch_logging_enabled.metadata.json +19 -15
- prowler/providers/aws/services/cloudtrail/cloudtrail_insights_exist/cloudtrail_insights_exist.metadata.json +19 -14
- prowler/providers/aws/services/cloudtrail/cloudtrail_kms_encryption_enabled/cloudtrail_kms_encryption_enabled.metadata.json +19 -14
- prowler/providers/aws/services/cloudtrail/cloudtrail_log_file_validation_enabled/cloudtrail_log_file_validation_enabled.metadata.json +20 -13
- prowler/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_access_logging_enabled/cloudtrail_logs_s3_bucket_access_logging_enabled.metadata.json +18 -13
- prowler/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_is_not_publicly_accessible/cloudtrail_logs_s3_bucket_is_not_publicly_accessible.metadata.json +24 -16
- prowler/providers/aws/services/cloudtrail/cloudtrail_multi_region_enabled/cloudtrail_multi_region_enabled.metadata.json +17 -13
- prowler/providers/aws/services/cloudtrail/cloudtrail_multi_region_enabled_logging_management_events/cloudtrail_multi_region_enabled_logging_management_events.metadata.json +19 -12
- prowler/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_read_enabled/cloudtrail_s3_dataevents_read_enabled.metadata.json +22 -12
- prowler/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_write_enabled/cloudtrail_s3_dataevents_write_enabled.metadata.json +21 -11
- prowler/providers/aws/services/cloudtrail/cloudtrail_threat_detection_enumeration/cloudtrail_threat_detection_enumeration.metadata.json +22 -11
- prowler/providers/aws/services/cloudtrail/cloudtrail_threat_detection_llm_jacking/cloudtrail_threat_detection_llm_jacking.metadata.json +25 -12
- prowler/providers/aws/services/cloudtrail/cloudtrail_threat_detection_privilege_escalation/cloudtrail_threat_detection_privilege_escalation.metadata.json +18 -10
- prowler/providers/aws/services/config/config_recorder_all_regions_enabled/config_recorder_all_regions_enabled.metadata.json +20 -12
- prowler/providers/aws/services/config/config_recorder_using_aws_service_role/config_recorder_using_aws_service_role.metadata.json +20 -13
- prowler/providers/aws/services/directoryservice/directoryservice_directory_log_forwarding_enabled/directoryservice_directory_log_forwarding_enabled.metadata.json +20 -11
- prowler/providers/aws/services/directoryservice/directoryservice_directory_monitor_notifications/directoryservice_directory_monitor_notifications.metadata.json +19 -11
- prowler/providers/aws/services/directoryservice/directoryservice_directory_snapshots_limit/directoryservice_directory_snapshots_limit.metadata.json +19 -10
- prowler/providers/aws/services/directoryservice/directoryservice_ldap_certificate_expiration/directoryservice_ldap_certificate_expiration.metadata.json +20 -11
- prowler/providers/aws/services/directoryservice/directoryservice_radius_server_security_protocol/directoryservice_radius_server_security_protocol.metadata.json +23 -12
- prowler/providers/aws/services/directoryservice/directoryservice_supported_mfa_radius_enabled/directoryservice_supported_mfa_radius_enabled.metadata.json +23 -12
- prowler/providers/aws/services/dlm/dlm_ebs_snapshot_lifecycle_policy_exists/dlm_ebs_snapshot_lifecycle_policy_exists.metadata.json +19 -13
- prowler/providers/aws/services/dms/dms_endpoint_mongodb_authentication_enabled/dms_endpoint_mongodb_authentication_enabled.metadata.json +20 -13
- prowler/providers/aws/services/dms/dms_endpoint_neptune_iam_authorization_enabled/dms_endpoint_neptune_iam_authorization_enabled.metadata.json +19 -12
- prowler/providers/aws/services/dms/dms_endpoint_redis_in_transit_encryption_enabled/dms_endpoint_redis_in_transit_encryption_enabled.metadata.json +23 -13
- prowler/providers/aws/services/dms/dms_endpoint_ssl_enabled/dms_endpoint_ssl_enabled.metadata.json +27 -19
- prowler/providers/aws/services/dms/dms_instance_minor_version_upgrade_enabled/dms_instance_minor_version_upgrade_enabled.metadata.json +22 -12
- prowler/providers/aws/services/dms/dms_instance_multi_az_enabled/dms_instance_multi_az_enabled.metadata.json +20 -13
- prowler/providers/aws/services/dms/dms_instance_no_public_access/dms_instance_no_public_access.metadata.json +22 -11
- prowler/providers/aws/services/dms/dms_replication_task_source_logging_enabled/dms_replication_task_source_logging_enabled.metadata.json +21 -13
- prowler/providers/aws/services/dms/dms_replication_task_target_logging_enabled/dms_replication_task_target_logging_enabled.metadata.json +22 -13
- prowler/providers/aws/services/dms/dms_replication_task_target_logging_enabled/dms_replication_task_target_logging_enabled.py +39 -37
- prowler/providers/aws/services/dms/dms_service.py +0 -1
- prowler/providers/aws/services/ec2/ec2_ami_public/ec2_ami_public.py +11 -10
- prowler/providers/aws/services/ec2/ec2_instance_with_outdated_ami/__init__.py +0 -0
- prowler/providers/aws/services/ec2/ec2_instance_with_outdated_ami/ec2_instance_with_outdated_ami.metadata.json +30 -0
- prowler/providers/aws/services/ec2/ec2_instance_with_outdated_ami/ec2_instance_with_outdated_ami.py +52 -0
- prowler/providers/aws/services/ec2/ec2_service.py +26 -14
- prowler/providers/aws/services/efs/efs_access_point_enforce_root_directory/efs_access_point_enforce_root_directory.metadata.json +19 -13
- prowler/providers/aws/services/efs/efs_access_point_enforce_user_identity/efs_access_point_enforce_user_identity.metadata.json +23 -13
- prowler/providers/aws/services/efs/efs_encryption_at_rest_enabled/efs_encryption_at_rest_enabled.metadata.json +23 -13
- prowler/providers/aws/services/efs/efs_have_backup_enabled/efs_have_backup_enabled.metadata.json +20 -14
- prowler/providers/aws/services/efs/efs_mount_target_not_publicly_accessible/efs_mount_target_not_publicly_accessible.metadata.json +18 -12
- prowler/providers/aws/services/efs/efs_multi_az_enabled/efs_multi_az_enabled.metadata.json +21 -13
- prowler/providers/aws/services/efs/efs_not_publicly_accessible/efs_not_publicly_accessible.metadata.json +17 -13
- prowler/providers/aws/services/eks/eks_cluster_uses_a_supported_version/eks_cluster_uses_a_supported_version.py +4 -0
- prowler/providers/aws/services/elb/elb_ssl_listeners_use_acm_certificate/elb_ssl_listeners_use_acm_certificate.py +8 -2
- prowler/providers/aws/services/neptune/neptune_cluster_backup_enabled/neptune_cluster_backup_enabled.metadata.json +23 -13
- prowler/providers/aws/services/neptune/neptune_cluster_copy_tags_to_snapshots/neptune_cluster_copy_tags_to_snapshots.metadata.json +18 -14
- prowler/providers/aws/services/neptune/neptune_cluster_deletion_protection/neptune_cluster_deletion_protection.metadata.json +23 -14
- prowler/providers/aws/services/neptune/neptune_cluster_iam_authentication_enabled/neptune_cluster_iam_authentication_enabled.metadata.json +25 -13
- prowler/providers/aws/services/neptune/neptune_cluster_integration_cloudwatch_logs/neptune_cluster_integration_cloudwatch_logs.metadata.json +22 -14
- prowler/providers/aws/services/neptune/neptune_cluster_multi_az/neptune_cluster_multi_az.metadata.json +20 -12
- prowler/providers/aws/services/neptune/neptune_cluster_public_snapshot/neptune_cluster_public_snapshot.metadata.json +18 -10
- prowler/providers/aws/services/neptune/neptune_cluster_snapshot_encrypted/neptune_cluster_snapshot_encrypted.metadata.json +16 -10
- prowler/providers/aws/services/neptune/neptune_cluster_storage_encrypted/neptune_cluster_storage_encrypted.metadata.json +22 -13
- prowler/providers/aws/services/neptune/neptune_cluster_uses_public_subnet/neptune_cluster_uses_public_subnet.metadata.json +20 -12
- prowler/providers/aws/services/rds/rds_service.py +9 -2
- prowler/providers/aws/services/vpc/vpc_service.py +1 -1
- prowler/providers/azure/services/entra/entra_service.py +54 -25
- prowler/providers/common/arguments.py +16 -2
- prowler/providers/common/provider.py +34 -2
- prowler/providers/gcp/services/cloudsql/cloudsql_service.py +3 -3
- prowler/providers/gcp/services/cloudstorage/cloudstorage_bucket_lifecycle_management_enabled/__init__.py +0 -0
- prowler/providers/gcp/services/cloudstorage/cloudstorage_bucket_lifecycle_management_enabled/cloudstorage_bucket_lifecycle_management_enabled.metadata.json +34 -0
- prowler/providers/gcp/services/cloudstorage/cloudstorage_bucket_lifecycle_management_enabled/cloudstorage_bucket_lifecycle_management_enabled.py +48 -0
- prowler/providers/gcp/services/cloudstorage/cloudstorage_service.py +10 -0
- prowler/providers/gcp/services/compute/compute_project_os_login_enabled/compute_project_os_login_enabled.py +5 -0
- prowler/providers/gcp/services/iam/iam_audit_logs_enabled/iam_audit_logs_enabled.py +5 -0
- prowler/providers/gcp/services/iam/iam_role_kms_enforce_separation_of_duties/iam_role_kms_enforce_separation_of_duties.py +5 -0
- prowler/providers/gcp/services/logging/logging_log_metric_filter_and_alert_for_audit_configuration_changes_enabled/logging_log_metric_filter_and_alert_for_audit_configuration_changes_enabled.py +5 -0
- prowler/providers/gcp/services/logging/logging_log_metric_filter_and_alert_for_bucket_permission_changes_enabled/logging_log_metric_filter_and_alert_for_bucket_permission_changes_enabled.py +5 -0
- prowler/providers/gcp/services/logging/logging_log_metric_filter_and_alert_for_custom_role_changes_enabled/logging_log_metric_filter_and_alert_for_custom_role_changes_enabled.py +5 -0
- prowler/providers/gcp/services/logging/logging_log_metric_filter_and_alert_for_project_ownership_changes_enabled/logging_log_metric_filter_and_alert_for_project_ownership_changes_enabled.py +5 -0
- prowler/providers/gcp/services/logging/logging_log_metric_filter_and_alert_for_sql_instance_configuration_changes_enabled/logging_log_metric_filter_and_alert_for_sql_instance_configuration_changes_enabled.py +5 -0
- prowler/providers/gcp/services/logging/logging_log_metric_filter_and_alert_for_vpc_firewall_rule_changes_enabled/logging_log_metric_filter_and_alert_for_vpc_firewall_rule_changes_enabled.py +5 -0
- prowler/providers/gcp/services/logging/logging_log_metric_filter_and_alert_for_vpc_network_changes_enabled/logging_log_metric_filter_and_alert_for_vpc_network_changes_enabled.py +5 -0
- prowler/providers/gcp/services/logging/logging_log_metric_filter_and_alert_for_vpc_network_route_changes_enabled/logging_log_metric_filter_and_alert_for_vpc_network_route_changes_enabled.py +5 -0
- prowler/providers/gcp/services/logging/logging_sink_created/logging_sink_created.py +5 -0
- prowler/providers/gcp/services/monitoring/monitoring_service.py +30 -2
- prowler/providers/iac/iac_provider.py +1 -1
- prowler/providers/llm/__init__.py +0 -0
- prowler/providers/llm/lib/__init__.py +0 -0
- prowler/providers/llm/lib/arguments/__init__.py +0 -0
- prowler/providers/llm/lib/arguments/arguments.py +13 -0
- prowler/providers/llm/llm_provider.py +518 -0
- prowler/providers/llm/models.py +27 -0
- prowler/providers/m365/exceptions/exceptions.py +0 -55
- prowler/providers/m365/lib/arguments/arguments.py +8 -4
- prowler/providers/m365/lib/powershell/m365_powershell.py +14 -156
- prowler/providers/m365/m365_provider.py +19 -117
- prowler/providers/m365/models.py +0 -3
- prowler/providers/m365/services/admincenter/admincenter_service.py +52 -23
- prowler/providers/m365/services/entra/entra_admin_users_phishing_resistant_mfa_enabled/entra_admin_users_phishing_resistant_mfa_enabled.py +19 -2
- prowler/providers/m365/services/entra/entra_service.py +58 -30
- prowler/providers/m365/services/sharepoint/sharepoint_service.py +24 -3
- prowler/providers/oraclecloud/__init__.py +0 -0
- prowler/providers/oraclecloud/config.py +61 -0
- prowler/providers/oraclecloud/exceptions/__init__.py +0 -0
- prowler/providers/oraclecloud/exceptions/exceptions.py +197 -0
- prowler/providers/oraclecloud/lib/__init__.py +0 -0
- prowler/providers/oraclecloud/lib/arguments/__init__.py +0 -0
- prowler/providers/oraclecloud/lib/arguments/arguments.py +123 -0
- prowler/providers/oraclecloud/lib/mutelist/__init__.py +0 -0
- prowler/providers/oraclecloud/lib/mutelist/mutelist.py +176 -0
- prowler/providers/oraclecloud/lib/service/__init__.py +0 -0
- prowler/providers/oraclecloud/lib/service/service.py +213 -0
- prowler/providers/oraclecloud/models.py +96 -0
- prowler/providers/oraclecloud/oci_provider.py +1038 -0
- prowler/providers/oraclecloud/services/__init__.py +0 -0
- prowler/providers/oraclecloud/services/analytics/__init__.py +0 -0
- prowler/providers/oraclecloud/services/analytics/analytics_client.py +6 -0
- prowler/providers/oraclecloud/services/analytics/analytics_instance_access_restricted/__init__.py +0 -0
- prowler/providers/oraclecloud/services/analytics/analytics_instance_access_restricted/analytics_instance_access_restricted.metadata.json +36 -0
- prowler/providers/oraclecloud/services/analytics/analytics_instance_access_restricted/analytics_instance_access_restricted.py +48 -0
- prowler/providers/oraclecloud/services/analytics/analytics_service.py +99 -0
- prowler/providers/oraclecloud/services/audit/__init__.py +0 -0
- prowler/providers/oraclecloud/services/audit/audit_client.py +4 -0
- prowler/providers/oraclecloud/services/audit/audit_log_retention_period_365_days/__init__.py +0 -0
- prowler/providers/oraclecloud/services/audit/audit_log_retention_period_365_days/audit_log_retention_period_365_days.metadata.json +37 -0
- prowler/providers/oraclecloud/services/audit/audit_log_retention_period_365_days/audit_log_retention_period_365_days.py +46 -0
- prowler/providers/oraclecloud/services/audit/audit_service.py +57 -0
- prowler/providers/oraclecloud/services/blockstorage/__init__.py +0 -0
- prowler/providers/oraclecloud/services/blockstorage/blockstorage_block_volume_encrypted_with_cmk/__init__.py +0 -0
- prowler/providers/oraclecloud/services/blockstorage/blockstorage_block_volume_encrypted_with_cmk/blockstorage_block_volume_encrypted_with_cmk.metadata.json +37 -0
- prowler/providers/oraclecloud/services/blockstorage/blockstorage_block_volume_encrypted_with_cmk/blockstorage_block_volume_encrypted_with_cmk.py +39 -0
- prowler/providers/oraclecloud/services/blockstorage/blockstorage_boot_volume_encrypted_with_cmk/__init__.py +0 -0
- prowler/providers/oraclecloud/services/blockstorage/blockstorage_boot_volume_encrypted_with_cmk/blockstorage_boot_volume_encrypted_with_cmk.metadata.json +36 -0
- prowler/providers/oraclecloud/services/blockstorage/blockstorage_boot_volume_encrypted_with_cmk/blockstorage_boot_volume_encrypted_with_cmk.py +35 -0
- prowler/providers/oraclecloud/services/blockstorage/blockstorage_client.py +6 -0
- prowler/providers/oraclecloud/services/blockstorage/blockstorage_service.py +182 -0
- prowler/providers/oraclecloud/services/cloudguard/__init__.py +0 -0
- prowler/providers/oraclecloud/services/cloudguard/cloudguard_client.py +6 -0
- prowler/providers/oraclecloud/services/cloudguard/cloudguard_enabled/__init__.py +0 -0
- prowler/providers/oraclecloud/services/cloudguard/cloudguard_enabled/cloudguard_enabled.metadata.json +36 -0
- prowler/providers/oraclecloud/services/cloudguard/cloudguard_enabled/cloudguard_enabled.py +39 -0
- prowler/providers/oraclecloud/services/cloudguard/cloudguard_service.py +63 -0
- prowler/providers/oraclecloud/services/compute/__init__.py +0 -0
- prowler/providers/oraclecloud/services/compute/compute_client.py +4 -0
- prowler/providers/oraclecloud/services/compute/compute_instance_in_transit_encryption_enabled/__init__.py +0 -0
- prowler/providers/oraclecloud/services/compute/compute_instance_in_transit_encryption_enabled/compute_instance_in_transit_encryption_enabled.metadata.json +37 -0
- prowler/providers/oraclecloud/services/compute/compute_instance_in_transit_encryption_enabled/compute_instance_in_transit_encryption_enabled.py +38 -0
- prowler/providers/oraclecloud/services/compute/compute_instance_legacy_metadata_endpoint_disabled/__init__.py +0 -0
- prowler/providers/oraclecloud/services/compute/compute_instance_legacy_metadata_endpoint_disabled/compute_instance_legacy_metadata_endpoint_disabled.metadata.json +37 -0
- prowler/providers/oraclecloud/services/compute/compute_instance_legacy_metadata_endpoint_disabled/compute_instance_legacy_metadata_endpoint_disabled.py +37 -0
- prowler/providers/oraclecloud/services/compute/compute_instance_secure_boot_enabled/__init__.py +0 -0
- prowler/providers/oraclecloud/services/compute/compute_instance_secure_boot_enabled/compute_instance_secure_boot_enabled.metadata.json +37 -0
- prowler/providers/oraclecloud/services/compute/compute_instance_secure_boot_enabled/compute_instance_secure_boot_enabled.py +39 -0
- prowler/providers/oraclecloud/services/compute/compute_service.py +136 -0
- prowler/providers/oraclecloud/services/database/__init__.py +0 -0
- prowler/providers/oraclecloud/services/database/database_autonomous_database_access_restricted/__init__.py +0 -0
- prowler/providers/oraclecloud/services/database/database_autonomous_database_access_restricted/database_autonomous_database_access_restricted.metadata.json +36 -0
- prowler/providers/oraclecloud/services/database/database_autonomous_database_access_restricted/database_autonomous_database_access_restricted.py +40 -0
- prowler/providers/oraclecloud/services/database/database_client.py +6 -0
- prowler/providers/oraclecloud/services/database/database_service.py +79 -0
- prowler/providers/oraclecloud/services/events/__init__.py +0 -0
- prowler/providers/oraclecloud/services/events/events_client.py +4 -0
- prowler/providers/oraclecloud/services/events/events_notification_topic_and_subscription_exists/__init__.py +0 -0
- prowler/providers/oraclecloud/services/events/events_notification_topic_and_subscription_exists/events_notification_topic_and_subscription_exists.metadata.json +37 -0
- prowler/providers/oraclecloud/services/events/events_notification_topic_and_subscription_exists/events_notification_topic_and_subscription_exists.py +53 -0
- prowler/providers/oraclecloud/services/events/events_rule_cloudguard_problems/__init__.py +0 -0
- prowler/providers/oraclecloud/services/events/events_rule_cloudguard_problems/events_rule_cloudguard_problems.metadata.json +36 -0
- prowler/providers/oraclecloud/services/events/events_rule_cloudguard_problems/events_rule_cloudguard_problems.py +90 -0
- prowler/providers/oraclecloud/services/events/events_rule_iam_group_changes/__init__.py +0 -0
- prowler/providers/oraclecloud/services/events/events_rule_iam_group_changes/events_rule_iam_group_changes.metadata.json +37 -0
- prowler/providers/oraclecloud/services/events/events_rule_iam_group_changes/events_rule_iam_group_changes.py +67 -0
- prowler/providers/oraclecloud/services/events/events_rule_iam_policy_changes/__init__.py +0 -0
- prowler/providers/oraclecloud/services/events/events_rule_iam_policy_changes/events_rule_iam_policy_changes.metadata.json +37 -0
- prowler/providers/oraclecloud/services/events/events_rule_iam_policy_changes/events_rule_iam_policy_changes.py +67 -0
- prowler/providers/oraclecloud/services/events/events_rule_identity_provider_changes/__init__.py +0 -0
- prowler/providers/oraclecloud/services/events/events_rule_identity_provider_changes/events_rule_identity_provider_changes.metadata.json +37 -0
- prowler/providers/oraclecloud/services/events/events_rule_identity_provider_changes/events_rule_identity_provider_changes.py +67 -0
- prowler/providers/oraclecloud/services/events/events_rule_idp_group_mapping_changes/__init__.py +0 -0
- prowler/providers/oraclecloud/services/events/events_rule_idp_group_mapping_changes/events_rule_idp_group_mapping_changes.metadata.json +37 -0
- prowler/providers/oraclecloud/services/events/events_rule_idp_group_mapping_changes/events_rule_idp_group_mapping_changes.py +67 -0
- prowler/providers/oraclecloud/services/events/events_rule_local_user_authentication/__init__.py +0 -0
- prowler/providers/oraclecloud/services/events/events_rule_local_user_authentication/events_rule_local_user_authentication.metadata.json +38 -0
- prowler/providers/oraclecloud/services/events/events_rule_local_user_authentication/events_rule_local_user_authentication.py +63 -0
- prowler/providers/oraclecloud/services/events/events_rule_network_gateway_changes/__init__.py +0 -0
- prowler/providers/oraclecloud/services/events/events_rule_network_gateway_changes/events_rule_network_gateway_changes.metadata.json +37 -0
- prowler/providers/oraclecloud/services/events/events_rule_network_gateway_changes/events_rule_network_gateway_changes.py +88 -0
- prowler/providers/oraclecloud/services/events/events_rule_network_security_group_changes/__init__.py +0 -0
- prowler/providers/oraclecloud/services/events/events_rule_network_security_group_changes/events_rule_network_security_group_changes.metadata.json +37 -0
- prowler/providers/oraclecloud/services/events/events_rule_network_security_group_changes/events_rule_network_security_group_changes.py +68 -0
- prowler/providers/oraclecloud/services/events/events_rule_route_table_changes/__init__.py +0 -0
- prowler/providers/oraclecloud/services/events/events_rule_route_table_changes/events_rule_route_table_changes.metadata.json +37 -0
- prowler/providers/oraclecloud/services/events/events_rule_route_table_changes/events_rule_route_table_changes.py +68 -0
- prowler/providers/oraclecloud/services/events/events_rule_security_list_changes/__init__.py +0 -0
- prowler/providers/oraclecloud/services/events/events_rule_security_list_changes/events_rule_security_list_changes.metadata.json +37 -0
- prowler/providers/oraclecloud/services/events/events_rule_security_list_changes/events_rule_security_list_changes.py +68 -0
- prowler/providers/oraclecloud/services/events/events_rule_user_changes/__init__.py +0 -0
- prowler/providers/oraclecloud/services/events/events_rule_user_changes/events_rule_user_changes.metadata.json +37 -0
- prowler/providers/oraclecloud/services/events/events_rule_user_changes/events_rule_user_changes.py +69 -0
- prowler/providers/oraclecloud/services/events/events_rule_vcn_changes/__init__.py +0 -0
- prowler/providers/oraclecloud/services/events/events_rule_vcn_changes/events_rule_vcn_changes.metadata.json +37 -0
- prowler/providers/oraclecloud/services/events/events_rule_vcn_changes/events_rule_vcn_changes.py +65 -0
- prowler/providers/oraclecloud/services/events/events_service.py +215 -0
- prowler/providers/oraclecloud/services/events/lib/__init__.py +0 -0
- prowler/providers/oraclecloud/services/events/lib/helpers.py +116 -0
- prowler/providers/oraclecloud/services/filestorage/__init__.py +0 -0
- prowler/providers/oraclecloud/services/filestorage/filestorage_client.py +6 -0
- prowler/providers/oraclecloud/services/filestorage/filestorage_file_system_encrypted_with_cmk/__init__.py +0 -0
- prowler/providers/oraclecloud/services/filestorage/filestorage_file_system_encrypted_with_cmk/filestorage_file_system_encrypted_with_cmk.metadata.json +36 -0
- prowler/providers/oraclecloud/services/filestorage/filestorage_file_system_encrypted_with_cmk/filestorage_file_system_encrypted_with_cmk.py +39 -0
- prowler/providers/oraclecloud/services/filestorage/filestorage_service.py +96 -0
- prowler/providers/oraclecloud/services/identity/__init__.py +0 -0
- prowler/providers/oraclecloud/services/identity/identity_client.py +4 -0
- prowler/providers/oraclecloud/services/identity/identity_iam_admins_cannot_update_tenancy_admins/__init__.py +0 -0
- prowler/providers/oraclecloud/services/identity/identity_iam_admins_cannot_update_tenancy_admins/identity_iam_admins_cannot_update_tenancy_admins.metadata.json +36 -0
- prowler/providers/oraclecloud/services/identity/identity_iam_admins_cannot_update_tenancy_admins/identity_iam_admins_cannot_update_tenancy_admins.py +107 -0
- prowler/providers/oraclecloud/services/identity/identity_instance_principal_used/__init__.py +0 -0
- prowler/providers/oraclecloud/services/identity/identity_instance_principal_used/identity_instance_principal_used.metadata.json +36 -0
- prowler/providers/oraclecloud/services/identity/identity_instance_principal_used/identity_instance_principal_used.py +70 -0
- prowler/providers/oraclecloud/services/identity/identity_no_resources_in_root_compartment/__init__.py +0 -0
- prowler/providers/oraclecloud/services/identity/identity_no_resources_in_root_compartment/identity_no_resources_in_root_compartment.metadata.json +32 -0
- prowler/providers/oraclecloud/services/identity/identity_no_resources_in_root_compartment/identity_no_resources_in_root_compartment.py +51 -0
- prowler/providers/oraclecloud/services/identity/identity_non_root_compartment_exists/__init__.py +0 -0
- prowler/providers/oraclecloud/services/identity/identity_non_root_compartment_exists/identity_non_root_compartment_exists.metadata.json +32 -0
- prowler/providers/oraclecloud/services/identity/identity_non_root_compartment_exists/identity_non_root_compartment_exists.py +39 -0
- prowler/providers/oraclecloud/services/identity/identity_password_policy_expires_within_365_days/__init__.py +0 -0
- prowler/providers/oraclecloud/services/identity/identity_password_policy_expires_within_365_days/identity_password_policy_expires_within_365_days.metadata.json +36 -0
- prowler/providers/oraclecloud/services/identity/identity_password_policy_expires_within_365_days/identity_password_policy_expires_within_365_days.py +67 -0
- prowler/providers/oraclecloud/services/identity/identity_password_policy_minimum_length_14/__init__.py +0 -0
- prowler/providers/oraclecloud/services/identity/identity_password_policy_minimum_length_14/identity_password_policy_minimum_length_14.metadata.json +36 -0
- prowler/providers/oraclecloud/services/identity/identity_password_policy_minimum_length_14/identity_password_policy_minimum_length_14.py +97 -0
- prowler/providers/oraclecloud/services/identity/identity_password_policy_prevents_reuse/__init__.py +0 -0
- prowler/providers/oraclecloud/services/identity/identity_password_policy_prevents_reuse/identity_password_policy_prevents_reuse.metadata.json +36 -0
- prowler/providers/oraclecloud/services/identity/identity_password_policy_prevents_reuse/identity_password_policy_prevents_reuse.py +77 -0
- prowler/providers/oraclecloud/services/identity/identity_service.py +828 -0
- prowler/providers/oraclecloud/services/identity/identity_service_level_admins_exist/__init__.py +0 -0
- prowler/providers/oraclecloud/services/identity/identity_service_level_admins_exist/identity_service_level_admins_exist.metadata.json +32 -0
- prowler/providers/oraclecloud/services/identity/identity_service_level_admins_exist/identity_service_level_admins_exist.py +81 -0
- prowler/providers/oraclecloud/services/identity/identity_tenancy_admin_permissions_limited/__init__.py +0 -0
- prowler/providers/oraclecloud/services/identity/identity_tenancy_admin_permissions_limited/identity_tenancy_admin_permissions_limited.metadata.json +36 -0
- prowler/providers/oraclecloud/services/identity/identity_tenancy_admin_permissions_limited/identity_tenancy_admin_permissions_limited.py +81 -0
- prowler/providers/oraclecloud/services/identity/identity_tenancy_admin_users_no_api_keys/__init__.py +0 -0
- prowler/providers/oraclecloud/services/identity/identity_tenancy_admin_users_no_api_keys/identity_tenancy_admin_users_no_api_keys.metadata.json +36 -0
- prowler/providers/oraclecloud/services/identity/identity_tenancy_admin_users_no_api_keys/identity_tenancy_admin_users_no_api_keys.py +49 -0
- prowler/providers/oraclecloud/services/identity/identity_user_api_keys_rotated_90_days/__init__.py +0 -0
- prowler/providers/oraclecloud/services/identity/identity_user_api_keys_rotated_90_days/identity_user_api_keys_rotated_90_days.metadata.json +37 -0
- prowler/providers/oraclecloud/services/identity/identity_user_api_keys_rotated_90_days/identity_user_api_keys_rotated_90_days.py +73 -0
- prowler/providers/oraclecloud/services/identity/identity_user_auth_tokens_rotated_90_days/__init__.py +0 -0
- prowler/providers/oraclecloud/services/identity/identity_user_auth_tokens_rotated_90_days/identity_user_auth_tokens_rotated_90_days.metadata.json +36 -0
- prowler/providers/oraclecloud/services/identity/identity_user_auth_tokens_rotated_90_days/identity_user_auth_tokens_rotated_90_days.py +52 -0
- prowler/providers/oraclecloud/services/identity/identity_user_customer_secret_keys_rotated_90_days/__init__.py +0 -0
- prowler/providers/oraclecloud/services/identity/identity_user_customer_secret_keys_rotated_90_days/identity_user_customer_secret_keys_rotated_90_days.metadata.json +36 -0
- prowler/providers/oraclecloud/services/identity/identity_user_customer_secret_keys_rotated_90_days/identity_user_customer_secret_keys_rotated_90_days.py +49 -0
- prowler/providers/oraclecloud/services/identity/identity_user_db_passwords_rotated_90_days/__init__.py +0 -0
- prowler/providers/oraclecloud/services/identity/identity_user_db_passwords_rotated_90_days/identity_user_db_passwords_rotated_90_days.metadata.json +36 -0
- prowler/providers/oraclecloud/services/identity/identity_user_db_passwords_rotated_90_days/identity_user_db_passwords_rotated_90_days.py +49 -0
- prowler/providers/oraclecloud/services/identity/identity_user_mfa_enabled_console_access/__init__.py +0 -0
- prowler/providers/oraclecloud/services/identity/identity_user_mfa_enabled_console_access/identity_user_mfa_enabled_console_access.metadata.json +36 -0
- prowler/providers/oraclecloud/services/identity/identity_user_mfa_enabled_console_access/identity_user_mfa_enabled_console_access.py +43 -0
- prowler/providers/oraclecloud/services/identity/identity_user_valid_email_address/__init__.py +0 -0
- prowler/providers/oraclecloud/services/identity/identity_user_valid_email_address/identity_user_valid_email_address.metadata.json +36 -0
- prowler/providers/oraclecloud/services/identity/identity_user_valid_email_address/identity_user_valid_email_address.py +38 -0
- prowler/providers/oraclecloud/services/integration/__init__.py +0 -0
- prowler/providers/oraclecloud/services/integration/integration_client.py +8 -0
- prowler/providers/oraclecloud/services/integration/integration_instance_access_restricted/__init__.py +0 -0
- prowler/providers/oraclecloud/services/integration/integration_instance_access_restricted/integration_instance_access_restricted.metadata.json +36 -0
- prowler/providers/oraclecloud/services/integration/integration_instance_access_restricted/integration_instance_access_restricted.py +48 -0
- prowler/providers/oraclecloud/services/integration/integration_service.py +92 -0
- prowler/providers/oraclecloud/services/kms/__init__.py +0 -0
- prowler/providers/oraclecloud/services/kms/kms_client.py +4 -0
- prowler/providers/oraclecloud/services/kms/kms_key_rotation_enabled/__init__.py +0 -0
- prowler/providers/oraclecloud/services/kms/kms_key_rotation_enabled/kms_key_rotation_enabled.metadata.json +36 -0
- prowler/providers/oraclecloud/services/kms/kms_key_rotation_enabled/kms_key_rotation_enabled.py +37 -0
- prowler/providers/oraclecloud/services/kms/kms_service.py +136 -0
- prowler/providers/oraclecloud/services/logging/__init__.py +0 -0
- prowler/providers/oraclecloud/services/logging/logging_client.py +6 -0
- prowler/providers/oraclecloud/services/logging/logging_service.py +189 -0
- prowler/providers/oraclecloud/services/network/__init__.py +0 -0
- prowler/providers/oraclecloud/services/network/network_client.py +4 -0
- prowler/providers/oraclecloud/services/network/network_default_security_list_restricts_traffic/__init__.py +0 -0
- prowler/providers/oraclecloud/services/network/network_default_security_list_restricts_traffic/network_default_security_list_restricts_traffic.metadata.json +36 -0
- prowler/providers/oraclecloud/services/network/network_default_security_list_restricts_traffic/network_default_security_list_restricts_traffic.py +99 -0
- prowler/providers/oraclecloud/services/network/network_security_group_ingress_from_internet_to_rdp_port/__init__.py +0 -0
- prowler/providers/oraclecloud/services/network/network_security_group_ingress_from_internet_to_rdp_port/network_security_group_ingress_from_internet_to_rdp_port.metadata.json +36 -0
- prowler/providers/oraclecloud/services/network/network_security_group_ingress_from_internet_to_rdp_port/network_security_group_ingress_from_internet_to_rdp_port.py +65 -0
- prowler/providers/oraclecloud/services/network/network_security_group_ingress_from_internet_to_ssh_port/__init__.py +0 -0
- prowler/providers/oraclecloud/services/network/network_security_group_ingress_from_internet_to_ssh_port/network_security_group_ingress_from_internet_to_ssh_port.metadata.json +37 -0
- prowler/providers/oraclecloud/services/network/network_security_group_ingress_from_internet_to_ssh_port/network_security_group_ingress_from_internet_to_ssh_port.py +70 -0
- prowler/providers/oraclecloud/services/network/network_security_list_ingress_from_internet_to_rdp_port/__init__.py +0 -0
- prowler/providers/oraclecloud/services/network/network_security_list_ingress_from_internet_to_rdp_port/network_security_list_ingress_from_internet_to_rdp_port.metadata.json +36 -0
- prowler/providers/oraclecloud/services/network/network_security_list_ingress_from_internet_to_rdp_port/network_security_list_ingress_from_internet_to_rdp_port.py +62 -0
- prowler/providers/oraclecloud/services/network/network_security_list_ingress_from_internet_to_ssh_port/__init__.py +0 -0
- prowler/providers/oraclecloud/services/network/network_security_list_ingress_from_internet_to_ssh_port/network_security_list_ingress_from_internet_to_ssh_port.metadata.json +37 -0
- prowler/providers/oraclecloud/services/network/network_security_list_ingress_from_internet_to_ssh_port/network_security_list_ingress_from_internet_to_ssh_port.py +67 -0
- prowler/providers/oraclecloud/services/network/network_service.py +321 -0
- prowler/providers/oraclecloud/services/network/network_vcn_subnet_flow_logs_enabled/__init__.py +0 -0
- prowler/providers/oraclecloud/services/network/network_vcn_subnet_flow_logs_enabled/network_vcn_subnet_flow_logs_enabled.metadata.json +36 -0
- prowler/providers/oraclecloud/services/network/network_vcn_subnet_flow_logs_enabled/network_vcn_subnet_flow_logs_enabled.py +66 -0
- prowler/providers/oraclecloud/services/objectstorage/__init__.py +0 -0
- prowler/providers/oraclecloud/services/objectstorage/objectstorage_bucket_encrypted_with_cmk/__init__.py +0 -0
- prowler/providers/oraclecloud/services/objectstorage/objectstorage_bucket_encrypted_with_cmk/objectstorage_bucket_encrypted_with_cmk.metadata.json +37 -0
- prowler/providers/oraclecloud/services/objectstorage/objectstorage_bucket_encrypted_with_cmk/objectstorage_bucket_encrypted_with_cmk.py +40 -0
- prowler/providers/oraclecloud/services/objectstorage/objectstorage_bucket_logging_enabled/__init__.py +0 -0
- prowler/providers/oraclecloud/services/objectstorage/objectstorage_bucket_logging_enabled/objectstorage_bucket_logging_enabled.metadata.json +32 -0
- prowler/providers/oraclecloud/services/objectstorage/objectstorage_bucket_logging_enabled/objectstorage_bucket_logging_enabled.py +68 -0
- prowler/providers/oraclecloud/services/objectstorage/objectstorage_bucket_not_publicly_accessible/__init__.py +0 -0
- prowler/providers/oraclecloud/services/objectstorage/objectstorage_bucket_not_publicly_accessible/objectstorage_bucket_not_publicly_accessible.metadata.json +37 -0
- prowler/providers/oraclecloud/services/objectstorage/objectstorage_bucket_not_publicly_accessible/objectstorage_bucket_not_publicly_accessible.py +43 -0
- prowler/providers/oraclecloud/services/objectstorage/objectstorage_bucket_versioning_enabled/__init__.py +0 -0
- prowler/providers/oraclecloud/services/objectstorage/objectstorage_bucket_versioning_enabled/objectstorage_bucket_versioning_enabled.metadata.json +37 -0
- prowler/providers/oraclecloud/services/objectstorage/objectstorage_bucket_versioning_enabled/objectstorage_bucket_versioning_enabled.py +38 -0
- prowler/providers/oraclecloud/services/objectstorage/objectstorage_client.py +6 -0
- prowler/providers/oraclecloud/services/objectstorage/objectstorage_service.py +138 -0
- {prowler_cloud-5.12.3.dist-info → prowler_cloud-5.13.0.dist-info}/METADATA +9 -33
- {prowler_cloud-5.12.3.dist-info → prowler_cloud-5.13.0.dist-info}/RECORD +528 -280
- {prowler_cloud-5.12.3.dist-info → prowler_cloud-5.13.0.dist-info}/LICENSE +0 -0
- {prowler_cloud-5.12.3.dist-info → prowler_cloud-5.13.0.dist-info}/WHEEL +0 -0
- {prowler_cloud-5.12.3.dist-info → prowler_cloud-5.13.0.dist-info}/entry_points.txt +0 -0
|
@@ -1,5 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"Framework": "CIS",
|
|
3
|
+
"Name": "CIS Google Cloud Platform Foundation Benchmark v2.0.0",
|
|
3
4
|
"Version": "2.0",
|
|
4
5
|
"Provider": "GCP",
|
|
5
6
|
"Description": "This CIS Benchmark is the product of a community consensus process and consists of secure configuration guidelines developed for Google Cloud Computing Platform",
|
|
@@ -1,5 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"Framework": "CIS",
|
|
3
|
+
"Name": "CIS Google Cloud Platform Foundation Benchmark v3.0.0",
|
|
3
4
|
"Version": "3.0",
|
|
4
5
|
"Provider": "GCP",
|
|
5
6
|
"Description": "The CIS Google Cloud Platform Foundations Benchmark provides prescriptive guidance for configuring security options for a subset of GCP with an emphasis on foundational, testable, and architecture agnostic settings.",
|
|
@@ -1,5 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"Framework": "CIS",
|
|
3
|
+
"Name": "CIS Google Cloud Platform Foundation Benchmark v4.0.0",
|
|
3
4
|
"Version": "4.0",
|
|
4
5
|
"Provider": "GCP",
|
|
5
6
|
"Description": "The CIS Google Cloud Platform Foundations Benchmark provides prescriptive guidance for configuring security options for a subset of GCP with an emphasis on foundational, testable, and architecture agnostic settings.",
|
|
@@ -1,5 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"Framework": "ENS",
|
|
3
|
+
"Name": "ENS RD 311/2022",
|
|
3
4
|
"Version": "RD2022",
|
|
4
5
|
"Provider": "GCP",
|
|
5
6
|
"Description": "The accreditation scheme of the ENS (National Security Scheme) has been developed by the Ministry of Finance and Public Administrations and the CCN (National Cryptological Center). This includes the basic principles and minimum requirements necessary for the adequate protection of information.",
|
|
@@ -1,5 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"Framework": "ISO27001",
|
|
3
|
+
"Name": "ISO/IEC 27001 Information Security Management Standard 2022",
|
|
3
4
|
"Version": "2022",
|
|
4
5
|
"Provider": "GCP",
|
|
5
6
|
"Description": "ISO (the International Organization for Standardization) and IEC (the International Electrotechnical Commission) form the specialized system for worldwide standardization. National bodies that are members of ISO or IEC participate in the development of International Standards through technical committees established by the respective organization to deal with particular fields of technical activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the work.",
|
|
@@ -1,5 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"Framework": "MITRE-ATTACK",
|
|
3
|
+
"Name": "MITRE ATT&CK compliance framework",
|
|
3
4
|
"Version": "",
|
|
4
5
|
"Provider": "GCP",
|
|
5
6
|
"Description": "MITRE ATT&CK® is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a foundation for the development of specific threat models and methodologies in the private sector, in government, and in the cybersecurity product and service community.",
|
|
@@ -364,7 +365,32 @@
|
|
|
364
365
|
"Description": "Adversaries may abuse serverless computing, integration, and automation services to execute arbitrary code in cloud environments. Many cloud providers offer a variety of serverless resources, including compute engines, application integration services, and web servers.",
|
|
365
366
|
"TechniqueURL": "https://attack.mitre.org/techniques/T1648/",
|
|
366
367
|
"Checks": [],
|
|
367
|
-
"Attributes": [
|
|
368
|
+
"Attributes": [
|
|
369
|
+
{
|
|
370
|
+
"GCPService": "Cloud Audit Logs",
|
|
371
|
+
"Category": "Detect",
|
|
372
|
+
"Value": "Significant",
|
|
373
|
+
"Comment": "Cloud Audit Logs capture all administrative operations including Cloud Functions deployment, Cloud Run service creation, and Workflows execution. This provides Significant detection capability for identifying when serverless resources are created, modified, or invoked, which could indicate adversaries establishing serverless execution capabilities. Admin Activity logs record who performed actions, what resources were affected, and when operations occurred."
|
|
374
|
+
},
|
|
375
|
+
{
|
|
376
|
+
"GCPService": "Cloud Functions",
|
|
377
|
+
"Category": "Protect",
|
|
378
|
+
"Value": "Partial",
|
|
379
|
+
"Comment": "Cloud Functions can be protected through IAM policies, VPC Service Controls, and ingress settings that restrict function invocation. Functions can require authentication and be limited to internal traffic only. However, protection is Partial because authorized users with deployment permissions can still create and execute malicious functions, and security configurations must be explicitly enforced and are not always set by default."
|
|
380
|
+
},
|
|
381
|
+
{
|
|
382
|
+
"GCPService": "Security Command Center",
|
|
383
|
+
"Category": "Detect",
|
|
384
|
+
"Value": "Partial",
|
|
385
|
+
"Comment": "Security Command Center can detect suspicious serverless activity through findings related to unusual function deployments, anomalous Cloud Run executions, and misconfigurations in serverless resources. SCC provides security recommendations and detects known attack patterns. Coverage is Partial as it focuses on misconfigurations and known malicious patterns rather than all possible serverless abuse scenarios."
|
|
386
|
+
},
|
|
387
|
+
{
|
|
388
|
+
"GCPService": "Organization Policy Service",
|
|
389
|
+
"Category": "Protect",
|
|
390
|
+
"Value": "Minimal",
|
|
391
|
+
"Comment": "Organization Policy Service can enforce constraints on serverless resources, such as restricting Cloud Functions deployment regions, requiring VPC connectivity, or limiting service account usage. However, protection is Minimal against serverless execution abuse as policies focus on configuration governance rather than preventing malicious code execution within properly configured serverless resources."
|
|
392
|
+
}
|
|
393
|
+
]
|
|
368
394
|
},
|
|
369
395
|
{
|
|
370
396
|
"Name": "User Execution",
|
|
@@ -748,7 +774,32 @@
|
|
|
748
774
|
"Description": "Adversaries may abuse cloud management services to execute commands within virtual machines or hybrid-joined devices. Resources such as AWS Systems Manager, Azure RunCommand, and Runbooks allow users to remotely run scripts in virtual machines by leveraging installed virtual machine agents. Similarly, in Azure AD environments, Microsoft Endpoint Manager allows Global or Intune Administrators to run scripts as SYSTEM on on-premises devices joined to the Azure AD.",
|
|
749
775
|
"TechniqueURL": "https://attack.mitre.org/techniques/T1651/",
|
|
750
776
|
"Checks": [],
|
|
751
|
-
"Attributes": [
|
|
777
|
+
"Attributes": [
|
|
778
|
+
{
|
|
779
|
+
"GCPService": "Cloud Audit Logs",
|
|
780
|
+
"Category": "Detect",
|
|
781
|
+
"Value": "Significant",
|
|
782
|
+
"Comment": "Cloud Audit Logs capture all OS Login activities, Compute Engine instance operations, and Cloud Workstations command executions. This provides Significant detection capability for identifying remote command execution through GCP management services. Audit logs record detailed information about who executed commands, on which instances, and what actions were performed, enabling effective monitoring of cloud administration command abuse."
|
|
783
|
+
},
|
|
784
|
+
{
|
|
785
|
+
"GCPService": "OS Login",
|
|
786
|
+
"Category": "Protect",
|
|
787
|
+
"Value": "Partial",
|
|
788
|
+
"Comment": "OS Login provides centralized SSH key management and can be protected through IAM policies and organization-level constraints. OS Login can enforce two-factor authentication and manage access to VM instances. However, protection is Partial because authorized administrators with proper IAM permissions can still execute commands on instances, and distinguishing malicious from legitimate administrative activity is challenging."
|
|
789
|
+
},
|
|
790
|
+
{
|
|
791
|
+
"GCPService": "Security Command Center",
|
|
792
|
+
"Category": "Detect",
|
|
793
|
+
"Value": "Partial",
|
|
794
|
+
"Comment": "Security Command Center can detect suspicious patterns related to instance access and unusual command execution through security findings. SCC identifies anomalous SSH access patterns and suspicious instance operations. Coverage is Partial as detection relies on known malicious patterns and baseline behavior, and may not catch all forms of cloud administration command abuse, especially by authorized administrators."
|
|
795
|
+
},
|
|
796
|
+
{
|
|
797
|
+
"GCPService": "VPC Service Controls",
|
|
798
|
+
"Category": "Protect",
|
|
799
|
+
"Value": "Minimal",
|
|
800
|
+
"Comment": "VPC Service Controls can restrict which services and resources can be accessed from specific networks, providing some protection against unauthorized command execution from external networks. However, protection is Minimal against cloud administration command abuse as VPC Service Controls focus on network perimeter security rather than preventing malicious commands from authorized administrators within the perimeter."
|
|
801
|
+
}
|
|
802
|
+
]
|
|
752
803
|
},
|
|
753
804
|
{
|
|
754
805
|
"Name": "Implant Internal Image",
|
|
@@ -1028,7 +1079,32 @@
|
|
|
1028
1079
|
"Description": "Adversaries may create cloud instances in unused geographic service regions in order to evade detection. Access is usually obtained through compromising accounts used to manage cloud infrastructure.",
|
|
1029
1080
|
"TechniqueURL": "https://attack.mitre.org/techniques/T1535/",
|
|
1030
1081
|
"Checks": [],
|
|
1031
|
-
"Attributes": [
|
|
1082
|
+
"Attributes": [
|
|
1083
|
+
{
|
|
1084
|
+
"GCPService": "Organization Policy Service",
|
|
1085
|
+
"Category": "Protect",
|
|
1086
|
+
"Value": "Significant",
|
|
1087
|
+
"Comment": "Organization Policy Service can effectively prevent resource creation in unused or unsupported regions through resource location restrictions. The 'gcp.resourceLocations' constraint can whitelist or blacklist specific regions for resource deployment. This provides Significant protection as organization policies are enforced at the org/folder/project level and cannot be bypassed by individual user permissions."
|
|
1088
|
+
},
|
|
1089
|
+
{
|
|
1090
|
+
"GCPService": "Cloud Audit Logs",
|
|
1091
|
+
"Category": "Detect",
|
|
1092
|
+
"Value": "Significant",
|
|
1093
|
+
"Comment": "Cloud Audit Logs capture all resource creation events across all GCP regions, providing visibility into any resource deployment in unexpected geographic regions. Audit logs include region information for all operations, making it easy to identify and alert on activity in regions that should not be used. This enables Significant detection capability for identifying resources created in unusual locations."
|
|
1094
|
+
},
|
|
1095
|
+
{
|
|
1096
|
+
"GCPService": "Security Command Center",
|
|
1097
|
+
"Category": "Detect",
|
|
1098
|
+
"Value": "Partial",
|
|
1099
|
+
"Comment": "Security Command Center can detect resources created in unexpected regions through asset inventory and security findings. SCC provides visibility into all GCP resources and their locations, enabling detection of anomalous regional deployments. Coverage is Partial as it requires configuration of custom detectors or manual review of asset inventory to identify resources in unexpected regions."
|
|
1100
|
+
},
|
|
1101
|
+
{
|
|
1102
|
+
"GCPService": "Cloud Asset Inventory",
|
|
1103
|
+
"Category": "Detect",
|
|
1104
|
+
"Value": "Partial",
|
|
1105
|
+
"Comment": "Cloud Asset Inventory maintains a comprehensive inventory of all GCP resources including their locations, enabling detection of resources in unused regions. Asset Inventory can be queried to find resources deployed in specific regions. However, this is reactive detection after resources are created, providing only Partial coverage. Real-time alerting requires integration with Cloud Monitoring or other tools."
|
|
1106
|
+
}
|
|
1107
|
+
]
|
|
1032
1108
|
},
|
|
1033
1109
|
{
|
|
1034
1110
|
"Name": "Use Alternate Authentication Material",
|
|
@@ -1247,7 +1323,32 @@
|
|
|
1247
1323
|
"iam_role_sa_enforce_separation_of_duties",
|
|
1248
1324
|
"iam_sa_no_administrative_privileges"
|
|
1249
1325
|
],
|
|
1250
|
-
"Attributes": [
|
|
1326
|
+
"Attributes": [
|
|
1327
|
+
{
|
|
1328
|
+
"GCPService": "Cloud Audit Logs",
|
|
1329
|
+
"Category": "Detect",
|
|
1330
|
+
"Value": "Partial",
|
|
1331
|
+
"Comment": "Cloud Audit Logs capture authentication and authorization events including service account key usage, OAuth token generation, and API key access. These logs can reveal suspicious credential usage patterns that may indicate forged credentials. However, detection is Partial because Cloud Audit Logs record credential usage but cannot directly determine if credentials are legitimate or forged without additional analysis and correlation."
|
|
1332
|
+
},
|
|
1333
|
+
{
|
|
1334
|
+
"GCPService": "Cloud Identity",
|
|
1335
|
+
"Category": "Protect",
|
|
1336
|
+
"Value": "Partial",
|
|
1337
|
+
"Comment": "Cloud Identity provides identity and access management capabilities including enforcement of strong authentication, session management, and credential policies. Cloud Identity can enforce short-lived tokens and require re-authentication. However, protection is Partial as Cloud Identity cannot prevent adversaries with sufficient access from forging valid session tokens or service account credentials if proper secrets management is not enforced."
|
|
1338
|
+
},
|
|
1339
|
+
{
|
|
1340
|
+
"GCPService": "Security Command Center",
|
|
1341
|
+
"Category": "Detect",
|
|
1342
|
+
"Value": "Minimal",
|
|
1343
|
+
"Comment": "Security Command Center can detect some indicators of credential forgery through findings related to anomalous authentication patterns and suspicious service account activities. However, SCC provides only Minimal direct detection of web credential forgery as it focuses on broader security issues rather than specifically identifying forged tokens or session credentials."
|
|
1344
|
+
},
|
|
1345
|
+
{
|
|
1346
|
+
"GCPService": "Identity-Aware Proxy",
|
|
1347
|
+
"Category": "Protect",
|
|
1348
|
+
"Value": "Minimal",
|
|
1349
|
+
"Comment": "Identity-Aware Proxy (IAP) provides application-level access control and can verify user identity before granting access to applications. IAP enforces authentication and authorization policies. However, protection is Minimal against web credential forgery as IAP operates at the application layer and may not detect if credentials presented are legitimate or forged, especially if adversaries have compromised signing keys."
|
|
1350
|
+
}
|
|
1351
|
+
]
|
|
1251
1352
|
},
|
|
1252
1353
|
{
|
|
1253
1354
|
"Name": "Multi-Factor Authentication Request Generation",
|
|
@@ -1269,7 +1370,32 @@
|
|
|
1269
1370
|
"Description": "Adversaries may attempt to bypass multi-factor authentication (MFA) mechanisms and gain access to accounts by generating MFA requests sent to users.",
|
|
1270
1371
|
"TechniqueURL": "https://attack.mitre.org/techniques/T1621/",
|
|
1271
1372
|
"Checks": [],
|
|
1272
|
-
"Attributes": [
|
|
1373
|
+
"Attributes": [
|
|
1374
|
+
{
|
|
1375
|
+
"GCPService": "Cloud Identity Sign-in Logs",
|
|
1376
|
+
"Category": "Detect",
|
|
1377
|
+
"Value": "Significant",
|
|
1378
|
+
"Comment": "Cloud Identity captures all authentication events including MFA challenges and responses through sign-in logs. These logs provide Significant detection capability for MFA fatigue attacks by recording detailed information about repeated MFA prompts, failed MFA attempts, and unusual authentication patterns. Analysis of sign-in logs can reveal MFA bombing attempts where adversaries generate excessive MFA requests."
|
|
1379
|
+
},
|
|
1380
|
+
{
|
|
1381
|
+
"GCPService": "Cloud Identity",
|
|
1382
|
+
"Category": "Protect",
|
|
1383
|
+
"Value": "Partial",
|
|
1384
|
+
"Comment": "Cloud Identity supports various MFA methods including security keys (FIDO2), authenticator apps, and phone prompts. Organizations can enforce MFA policies and use phishing-resistant methods. However, protection is Partial because Cloud Identity cannot prevent adversaries with valid credentials from generating MFA requests, and user awareness remains critical. Push notification fatigue is still a risk with app-based MFA."
|
|
1385
|
+
},
|
|
1386
|
+
{
|
|
1387
|
+
"GCPService": "Security Command Center",
|
|
1388
|
+
"Category": "Detect",
|
|
1389
|
+
"Value": "Partial",
|
|
1390
|
+
"Comment": "Security Command Center can detect unusual authentication patterns through security findings related to repeated MFA attempts and suspicious sign-in activities. SCC identifies anomalous authentication behavior that may indicate MFA fatigue attacks. Coverage is Partial as detection relies on behavioral analytics and may not catch all forms of MFA request generation, especially when patterns are subtle."
|
|
1391
|
+
},
|
|
1392
|
+
{
|
|
1393
|
+
"GCPService": "Context-Aware Access",
|
|
1394
|
+
"Category": "Protect",
|
|
1395
|
+
"Value": "Minimal",
|
|
1396
|
+
"Comment": "Context-Aware Access can enforce additional access controls based on context such as device status, IP address, and other signals beyond just MFA. However, protection is Minimal against MFA request generation attacks as Context-Aware Access evaluates authentication context but cannot prevent adversaries from generating MFA prompts if they have valid credentials. It adds defense in depth but doesn't eliminate MFA fatigue risks."
|
|
1397
|
+
}
|
|
1398
|
+
]
|
|
1273
1399
|
},
|
|
1274
1400
|
{
|
|
1275
1401
|
"Name": "Network Sniffing",
|
|
@@ -1531,7 +1657,32 @@
|
|
|
1531
1657
|
"Description": "Once established within a system or network, an adversary may use automated techniques for collecting internal data. Methods for performing this technique could include use of a Command and Scripting Interpreter to search for and copy information fitting set criteria such as file type, location, or name at specific time intervals. In cloud-based environments, adversaries may also use cloud APIs, command line interfaces, or extract, transform, and load (ETL) services to automatically collect data. This functionality could also be built into remote access tools.",
|
|
1532
1658
|
"TechniqueURL": "https://attack.mitre.org/techniques/T1119/",
|
|
1533
1659
|
"Checks": [],
|
|
1534
|
-
"Attributes": [
|
|
1660
|
+
"Attributes": [
|
|
1661
|
+
{
|
|
1662
|
+
"GCPService": "Cloud Audit Logs",
|
|
1663
|
+
"Category": "Detect",
|
|
1664
|
+
"Value": "Significant",
|
|
1665
|
+
"Comment": "Cloud Audit Logs capture all data access operations across GCP services including Cloud Storage reads, BigQuery queries, and Compute Engine snapshots. This provides Significant detection capability for identifying automated data collection activities through unusual patterns of bulk data access, rapid sequential operations, or anomalous query patterns. Data Access logs record what data was accessed, by whom, and when."
|
|
1666
|
+
},
|
|
1667
|
+
{
|
|
1668
|
+
"GCPService": "Cloud Data Loss Prevention",
|
|
1669
|
+
"Category": "Detect",
|
|
1670
|
+
"Value": "Partial",
|
|
1671
|
+
"Comment": "Cloud Data Loss Prevention (DLP) can detect when sensitive data is being accessed or exfiltrated by scanning data in transit and at rest. DLP identifies patterns of sensitive data access that may indicate automated collection. However, coverage is Partial as DLP requires configuration to scan specific data stores and may not detect all automated collection activities, especially if adversaries target data that isn't classified as sensitive."
|
|
1672
|
+
},
|
|
1673
|
+
{
|
|
1674
|
+
"GCPService": "Security Command Center",
|
|
1675
|
+
"Category": "Detect",
|
|
1676
|
+
"Value": "Partial",
|
|
1677
|
+
"Comment": "Security Command Center can detect unusual data access patterns and bulk operations through security findings. SCC identifies anomalous behavior related to automated data collection such as unusual API call volumes or suspicious data transfers. Coverage is Partial as detection relies on behavioral analytics and may not identify all automated collection activities, especially if performed gradually over time."
|
|
1678
|
+
},
|
|
1679
|
+
{
|
|
1680
|
+
"GCPService": "VPC Service Controls",
|
|
1681
|
+
"Category": "Protect",
|
|
1682
|
+
"Value": "Minimal",
|
|
1683
|
+
"Comment": "VPC Service Controls can limit data exfiltration by restricting which services can be accessed from specific networks and preventing data from leaving authorized perimeters. However, protection is Minimal against automated collection as VPC Service Controls focus on network boundaries and cannot prevent authorized users from collecting data within the security perimeter using legitimate tools and permissions."
|
|
1684
|
+
}
|
|
1685
|
+
]
|
|
1535
1686
|
},
|
|
1536
1687
|
{
|
|
1537
1688
|
"Name": "Data from Cloud Storage",
|
|
@@ -1683,7 +1834,32 @@
|
|
|
1683
1834
|
"Description": "Adversaries may stage collected data in a central location or directory prior to Exfiltration. Data may be kept in separate files or combined into one file through techniques such as Archive Collected Data. Interactive command shells may be used, and common functionality within cmd and bash may be used to copy data into a staging location.",
|
|
1684
1835
|
"TechniqueURL": "https://attack.mitre.org/techniques/T1074/",
|
|
1685
1836
|
"Checks": [],
|
|
1686
|
-
"Attributes": [
|
|
1837
|
+
"Attributes": [
|
|
1838
|
+
{
|
|
1839
|
+
"GCPService": "Cloud Audit Logs",
|
|
1840
|
+
"Category": "Detect",
|
|
1841
|
+
"Value": "Significant",
|
|
1842
|
+
"Comment": "Cloud Audit Logs capture all data movement operations including Cloud Storage uploads, Compute Engine snapshot creation, and data transfers between services. This provides Significant detection capability for identifying data staging activities through patterns of bulk data uploads, snapshot creation, or unusual data aggregation in temporary storage locations. Audit logs reveal who staged data, where, and when."
|
|
1843
|
+
},
|
|
1844
|
+
{
|
|
1845
|
+
"GCPService": "Cloud Storage",
|
|
1846
|
+
"Category": "Detect",
|
|
1847
|
+
"Value": "Partial",
|
|
1848
|
+
"Comment": "Cloud Storage access logs can reveal data staging activities by showing patterns of object uploads, copies, and bucket access. Monitoring for unusual patterns of data being written to staging buckets can indicate adversaries aggregating data before exfiltration. However, detection is Partial because Cloud Storage operations may be legitimate and difficult to distinguish from normal data management activities without additional context."
|
|
1849
|
+
},
|
|
1850
|
+
{
|
|
1851
|
+
"GCPService": "Security Command Center",
|
|
1852
|
+
"Category": "Detect",
|
|
1853
|
+
"Value": "Partial",
|
|
1854
|
+
"Comment": "Security Command Center can detect suspicious data staging activities through findings related to unusual storage access patterns, anomalous bucket creations, and suspicious data transfers. SCC identifies behavioral anomalies that may indicate data staging. Coverage is Partial as it focuses on known malicious patterns and may not detect all forms of data staging, especially when performed gradually or using legitimate services."
|
|
1855
|
+
},
|
|
1856
|
+
{
|
|
1857
|
+
"GCPService": "Cloud Data Loss Prevention",
|
|
1858
|
+
"Category": "Detect",
|
|
1859
|
+
"Value": "Partial",
|
|
1860
|
+
"Comment": "Cloud Data Loss Prevention can help detect data staging by identifying when sensitive data is being aggregated in unusual locations or transferred to temporary storage areas. DLP can scan staged data to determine if sensitive information is being prepared for exfiltration. However, coverage is Partial as DLP requires configuration and may not detect staging of non-sensitive data or encrypted staged content."
|
|
1861
|
+
}
|
|
1862
|
+
]
|
|
1687
1863
|
},
|
|
1688
1864
|
{
|
|
1689
1865
|
"Name": "Data Destruction",
|
|
@@ -1884,7 +2060,32 @@
|
|
|
1884
2060
|
"logging_log_metric_filter_and_alert_for_vpc_network_changes_enabled",
|
|
1885
2061
|
"logging_log_metric_filter_and_alert_for_vpc_network_route_changes_enabled"
|
|
1886
2062
|
],
|
|
1887
|
-
"Attributes": [
|
|
2063
|
+
"Attributes": [
|
|
2064
|
+
{
|
|
2065
|
+
"GCPService": "Cloud Monitoring",
|
|
2066
|
+
"Category": "Detect",
|
|
2067
|
+
"Value": "Significant",
|
|
2068
|
+
"Comment": "Cloud Monitoring provides comprehensive metrics for resource utilization including CPU, memory, network, and API usage across all GCP services. This enables Significant detection of resource hijacking through alerts on unusual resource consumption patterns, unexpected instance launches, or anomalous workload behavior. Monitoring can reveal cryptomining, distributed computing abuse, and other resource hijacking activities."
|
|
2069
|
+
},
|
|
2070
|
+
{
|
|
2071
|
+
"GCPService": "Cloud Billing",
|
|
2072
|
+
"Category": "Detect",
|
|
2073
|
+
"Value": "Significant",
|
|
2074
|
+
"Comment": "Cloud Billing provides detailed cost tracking and budget alerts that can detect resource hijacking through unexpected cost increases, unusual spending patterns, or anomalous resource usage charges. Billing data can reveal unauthorized resource consumption before it becomes financially significant. This provides Significant detection capability as resource hijacking typically causes measurable cost impacts."
|
|
2075
|
+
},
|
|
2076
|
+
{
|
|
2077
|
+
"GCPService": "Security Command Center",
|
|
2078
|
+
"Category": "Detect",
|
|
2079
|
+
"Value": "Partial",
|
|
2080
|
+
"Comment": "Security Command Center can detect resource hijacking through findings related to suspicious instance launches, anomalous API activity, and cryptocurrency mining indicators. SCC identifies known resource hijacking patterns and misconfigurations that could enable abuse. Coverage is Partial as detection focuses on known attack patterns and may not identify all forms of resource hijacking, especially novel or low-volume abuse."
|
|
2081
|
+
},
|
|
2082
|
+
{
|
|
2083
|
+
"GCPService": "Compute Engine",
|
|
2084
|
+
"Category": "Protect",
|
|
2085
|
+
"Value": "Minimal",
|
|
2086
|
+
"Comment": "Compute Engine can be protected through IAM policies, resource quotas, and organization policies that limit instance creation and resource consumption. However, protection is Minimal against resource hijacking as these controls focus on access management rather than preventing abuse by authorized users. Resource quotas can limit impact but don't prevent hijacking if within quotas."
|
|
2087
|
+
}
|
|
2088
|
+
]
|
|
1888
2089
|
},
|
|
1889
2090
|
{
|
|
1890
2091
|
"Name": "Network Denial of Service",
|
|
@@ -2132,7 +2333,32 @@
|
|
|
2132
2333
|
"Description": "An adversary may attempt to enumerate the cloud services running on a system after gaining access. These methods can differ from platform-as-a-service (PaaS), to infrastructure-as-a-service (IaaS), or software-as-a-service (SaaS). Many services exist throughout the various cloud providers and can include Continuous Integration and Continuous Delivery (CI/CD), Lambda Functions, Azure AD, etc. They may also include security services, such as AWS GuardDuty and Microsoft Defender for Cloud, and logging services, such as AWS CloudTrail and Google Cloud Audit Logs.",
|
|
2133
2334
|
"TechniqueURL": "https://attack.mitre.org/techniques/T1526/",
|
|
2134
2335
|
"Checks": [],
|
|
2135
|
-
"Attributes": [
|
|
2336
|
+
"Attributes": [
|
|
2337
|
+
{
|
|
2338
|
+
"GCPService": "Cloud Audit Logs",
|
|
2339
|
+
"Category": "Detect",
|
|
2340
|
+
"Value": "Significant",
|
|
2341
|
+
"Comment": "Cloud Audit Logs capture all service discovery operations including API calls to list resources, enumerate services, and query project configurations. Logs record operations like compute.instances.list, storage.buckets.list, and resourcemanager.projects.get that indicate service discovery activities. This provides Significant detection capability for identifying when adversaries are enumerating cloud infrastructure."
|
|
2342
|
+
},
|
|
2343
|
+
{
|
|
2344
|
+
"GCPService": "Cloud Asset Inventory",
|
|
2345
|
+
"Category": "Detect",
|
|
2346
|
+
"Value": "Partial",
|
|
2347
|
+
"Comment": "Cloud Asset Inventory maintains a comprehensive view of all GCP resources, which is the same information adversaries seek during cloud service discovery. Monitoring Asset Inventory API usage can reveal reconnaissance activities. However, detection is Partial as Asset Inventory access is often legitimate for operational and security purposes, making it difficult to distinguish malicious from normal discovery activities."
|
|
2348
|
+
},
|
|
2349
|
+
{
|
|
2350
|
+
"GCPService": "Security Command Center",
|
|
2351
|
+
"Category": "Detect",
|
|
2352
|
+
"Value": "Partial",
|
|
2353
|
+
"Comment": "Security Command Center can detect suspicious service discovery patterns through findings related to unusual API activity, anomalous resource enumeration, and reconnaissance behavior. SCC identifies patterns that may indicate adversary discovery activities. Coverage is Partial as detection relies on behavioral anomalies and may not catch all service discovery, especially when performed by authorized users or conducted gradually."
|
|
2354
|
+
},
|
|
2355
|
+
{
|
|
2356
|
+
"GCPService": "VPC Service Controls",
|
|
2357
|
+
"Category": "Protect",
|
|
2358
|
+
"Value": "Minimal",
|
|
2359
|
+
"Comment": "VPC Service Controls can restrict access to GCP APIs from specific networks, limiting service discovery capabilities from external or untrusted networks. However, protection is Minimal as VPC Service Controls cannot prevent service discovery by users within the security perimeter, and many legitimate operations require service discovery capabilities, making it difficult to restrict without impacting functionality."
|
|
2360
|
+
}
|
|
2361
|
+
]
|
|
2136
2362
|
},
|
|
2137
2363
|
{
|
|
2138
2364
|
"Name": "Cloud Storage Object Discovery",
|
|
@@ -2272,7 +2498,32 @@
|
|
|
2272
2498
|
"Description": "Adversaries may gather information in an attempt to calculate the geographical location of a victim host. Adversaries may use the information from System Location Discovery during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions.",
|
|
2273
2499
|
"TechniqueURL": "https://attack.mitre.org/techniques/T1614/",
|
|
2274
2500
|
"Checks": [],
|
|
2275
|
-
"Attributes": [
|
|
2501
|
+
"Attributes": [
|
|
2502
|
+
{
|
|
2503
|
+
"GCPService": "Cloud Audit Logs",
|
|
2504
|
+
"Category": "Detect",
|
|
2505
|
+
"Value": "Partial",
|
|
2506
|
+
"Comment": "Cloud Audit Logs capture API calls that reveal location information such as compute.zones.list, compute.regions.list, and metadata server queries. These operations can indicate adversaries attempting to determine the geographic location of GCP resources. However, detection is Partial because Audit Logs capture API-level activities but cannot monitor instance-level metadata queries without additional logging agents."
|
|
2507
|
+
},
|
|
2508
|
+
{
|
|
2509
|
+
"GCPService": "Cloud Monitoring",
|
|
2510
|
+
"Category": "Detect",
|
|
2511
|
+
"Value": "Minimal",
|
|
2512
|
+
"Comment": "Cloud Monitoring can collect logs from Compute Engine instances through the Ops Agent that may capture location discovery commands if properly configured. However, this provides only Minimal detection as it requires agent installation and log forwarding configuration. Adversaries can query location through the metadata server in ways that may not be captured by standard monitoring."
|
|
2513
|
+
},
|
|
2514
|
+
{
|
|
2515
|
+
"GCPService": "Security Command Center",
|
|
2516
|
+
"Category": "Detect",
|
|
2517
|
+
"Value": "Minimal",
|
|
2518
|
+
"Comment": "Security Command Center provides Minimal direct detection for system location discovery activities. SCC focuses on detecting security threats and misconfigurations rather than reconnaissance queries about geographic location. Detection of location discovery would be indirect, potentially through identifying compromised instances that may be performing broader reconnaissance activities."
|
|
2519
|
+
},
|
|
2520
|
+
{
|
|
2521
|
+
"GCPService": "VPC",
|
|
2522
|
+
"Category": "Protect",
|
|
2523
|
+
"Value": "Minimal",
|
|
2524
|
+
"Comment": "VPC provides Minimal protection against system location discovery. While VPC firewall rules and network configurations can restrict network access, adversaries with instance access can still query location information through GCP APIs and the Compute Engine metadata server. Network controls focus on connectivity isolation rather than preventing location enumeration."
|
|
2525
|
+
}
|
|
2526
|
+
]
|
|
2276
2527
|
},
|
|
2277
2528
|
{
|
|
2278
2529
|
"Name": "System Information Discovery",
|
|
@@ -2324,7 +2575,32 @@
|
|
|
2324
2575
|
"Description": "Adversaries may attempt to get a listing of software and software versions that are installed on a system or in a cloud environment. Adversaries may use the information from Software Discovery during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions.",
|
|
2325
2576
|
"TechniqueURL": "https://attack.mitre.org/techniques/T1518/",
|
|
2326
2577
|
"Checks": [],
|
|
2327
|
-
"Attributes": [
|
|
2578
|
+
"Attributes": [
|
|
2579
|
+
{
|
|
2580
|
+
"GCPService": "Cloud Asset Inventory",
|
|
2581
|
+
"Category": "Detect",
|
|
2582
|
+
"Value": "Partial",
|
|
2583
|
+
"Comment": "Cloud Asset Inventory maintains inventory of software packages and OS information for Compute Engine instances when the Ops Agent is installed. This inventory reveals what software adversaries might discover. However, Asset Inventory provides only Partial detection as it focuses on maintaining inventory rather than detecting active software enumeration by adversaries. It's useful for understanding the software attack surface."
|
|
2584
|
+
},
|
|
2585
|
+
{
|
|
2586
|
+
"GCPService": "Cloud Audit Logs",
|
|
2587
|
+
"Category": "Detect",
|
|
2588
|
+
"Value": "Partial",
|
|
2589
|
+
"Comment": "Cloud Audit Logs capture API calls related to software and image discovery such as compute.images.list, compute.diskTypes.list, and container image queries. These operations can indicate adversaries attempting to enumerate software in the cloud environment. However, detection is Partial because Audit Logs cannot monitor instance-level software enumeration commands without additional logging agents."
|
|
2590
|
+
},
|
|
2591
|
+
{
|
|
2592
|
+
"GCPService": "Security Command Center",
|
|
2593
|
+
"Category": "Detect",
|
|
2594
|
+
"Value": "Minimal",
|
|
2595
|
+
"Comment": "Security Command Center provides Minimal direct detection for software discovery activities. SCC focuses on detecting vulnerabilities and misconfigurations in deployed software rather than reconnaissance activities. Detection would be indirect, potentially identifying compromised instances that may be performing software enumeration as part of broader attack patterns."
|
|
2596
|
+
},
|
|
2597
|
+
{
|
|
2598
|
+
"GCPService": "Cloud Monitoring",
|
|
2599
|
+
"Category": "Detect",
|
|
2600
|
+
"Value": "Minimal",
|
|
2601
|
+
"Comment": "Cloud Monitoring can collect logs from instances through the Ops Agent that may capture software enumeration commands if properly configured. However, this provides only Minimal detection as it requires agent deployment and log forwarding setup. Adversaries may use various methods to enumerate software that bypass or evade standard monitoring configurations."
|
|
2602
|
+
}
|
|
2603
|
+
]
|
|
2328
2604
|
},
|
|
2329
2605
|
{
|
|
2330
2606
|
"Name": "Permission Groups Discovery",
|
|
@@ -1,5 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"Framework": "NIS2",
|
|
3
|
+
"Name": "Network and Information Security Directive (Directive (EU) 2022/2555)",
|
|
3
4
|
"Version": "",
|
|
4
5
|
"Provider": "GCP",
|
|
5
6
|
"Description": "ANNEX to the Commission Implementing Regulation laying down rules for the application of Directive (EU) 2022/2555 as regards technical and methodological requirements of cybersecurity risk-management measures and further specification of the cases in which an incident is considered to be significant with regard to DNS service providers, TLD name registries, cloud computing service providers, data centre service providers, content delivery network providers, managed service providers, managed security service providers, providers of online market places, of online search engines and of social networking services platforms, and trust service providers",
|
|
@@ -1,5 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"Framework": "PCI",
|
|
3
|
+
"Name": "Payment Card Industry Data Security Standard (PCI DSS) v4.0",
|
|
3
4
|
"Version": "4.0",
|
|
4
5
|
"Provider": "GCP",
|
|
5
6
|
"Description": "The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard. It's administered by the PCI Security Standards Council, which was founded by American Express, Discover Financial Services, JCB International, MasterCard Worldwide, and Visa Inc. PCI DSS applies to entities that store, process, or transmit cardholder data (CHD) or sensitive authentication data (SAD). This includes, but isn't limited to, merchants, processors, acquirers, issuers, and service providers. The PCI DSS is mandated by the card brands and administered by the Payment Card Industry Security Standards Council.",
|
|
@@ -1,5 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"Framework": "ProwlerThreatScore",
|
|
3
|
+
"Name": "Prowler ThreatScore Compliance Framework for GCP",
|
|
3
4
|
"Version": "1.0",
|
|
4
5
|
"Provider": "GCP",
|
|
5
6
|
"Description": "Prowler ThreatScore Compliance Framework for GCP ensures that the GCP project is compliant taking into account four main pillars: Identity and Access Management, Attack Surface, Forensic Readiness and Encryption",
|
|
@@ -1,5 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"Framework": "SOC2",
|
|
3
|
+
"Name": "System and Organization Controls 2 (SOC2)",
|
|
3
4
|
"Version": "",
|
|
4
5
|
"Provider": "GCP",
|
|
5
6
|
"Description": "System and Organization Controls (SOC), defined by the American Institute of Certified Public Accountants (AICPA), is the name of a set of reports that's produced during an audit. It's intended for use by service organizations (organizations that provide information systems as a service to other organizations) to issue validated reports of internal controls over those information systems to the users of those services. The reports focus on controls grouped into five categories known as Trust Service Principles.",
|
|
@@ -1,5 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"Framework": "CIS",
|
|
3
|
+
"Name": "CIS Kubernetes Benchmark v1.10.0",
|
|
3
4
|
"Version": "1.10",
|
|
4
5
|
"Provider": "Kubernetes",
|
|
5
6
|
"Description": "This CIS Kubernetes Benchmark provides prescriptive guidance for establishing a secure configuration posture for Kubernetes v1.28 - v1.31",
|
|
@@ -1,5 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"Framework": "CIS",
|
|
3
|
+
"Name": "CIS Kubernetes Benchmark v1.11.0",
|
|
3
4
|
"Version": "1.11.1",
|
|
4
5
|
"Provider": "Kubernetes",
|
|
5
6
|
"Description": "This CIS Kubernetes Benchmark provides prescriptive guidance for establishing a secure configuration posture for Kubernetes v1.28 - v1.31",
|
|
@@ -1,5 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"Framework": "ISO27001",
|
|
3
|
+
"Name": "ISO/IEC 27001 Information Security Management Standard 2022",
|
|
3
4
|
"Version": "2022",
|
|
4
5
|
"Provider": "Kubernetes",
|
|
5
6
|
"Description": "ISO (the International Organization for Standardization) and IEC (the International Electrotechnical Commission) form the specialized system for worldwide standardization. National bodies that are members of ISO or IEC participate in the development of International Standards through technical committees established by the respective organization to deal with particular fields of technical activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the work.",
|
|
@@ -1,5 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"Framework": "PCI",
|
|
3
|
+
"Name": "Payment Card Industry Data Security Standard (PCI DSS) v4.0",
|
|
3
4
|
"Version": "4.0",
|
|
4
5
|
"Provider": "Kubernetes",
|
|
5
6
|
"Description": "The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard. It's administered by the PCI Security Standards Council, which was founded by American Express, Discover Financial Services, JCB International, MasterCard Worldwide, and Visa Inc. PCI DSS applies to entities that store, process, or transmit cardholder data (CHD) or sensitive authentication data (SAD). This includes, but isn't limited to, merchants, processors, acquirers, issuers, and service providers. The PCI DSS is mandated by the card brands and administered by the Payment Card Industry Security Standards Council.",
|
|
File without changes
|
|
@@ -1,5 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"Framework": "CIS",
|
|
3
|
+
"Name": "CIS Microsoft 365 Foundations Benchmark v4.0.0",
|
|
3
4
|
"Version": "4.0",
|
|
4
5
|
"Provider": "M365",
|
|
5
6
|
"Description": "The CIS Microsoft 365 Foundations Benchmark provides prescriptive guidance for establishing a secure configuration posture for Microsoft 365 Cloud offerings running on any OS.",
|
|
@@ -1,5 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"Framework": "ISO27001",
|
|
3
|
+
"Name": "ISO/IEC 27001 Information Security Management Standard 2022",
|
|
3
4
|
"Version": "2022",
|
|
4
5
|
"Provider": "M365",
|
|
5
6
|
"Description": "ISO (the International Organization for Standardization) and IEC (the International Electrotechnical Commission) form the specialized system for worldwide standardization. National bodies that are members of ISO or IEC participate in the development of International Standards through technical committees established by the respective organization to deal with particular fields of technical activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the work.",
|
|
@@ -1,5 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"Framework": "ProwlerThreatScore",
|
|
3
|
+
"Name": "Prowler ThreatScore Compliance Framework for Microsoft 365",
|
|
3
4
|
"Version": "1.0",
|
|
4
5
|
"Provider": "M365",
|
|
5
6
|
"Description": "Prowler ThreatScore Compliance Framework for Microsoft 365 ensures that the Microsoft 365 tenant is compliant taking into account four main pillars: Identity and Access Management, Attack Surface, Forensic Readiness and Encryption",
|
|
@@ -1,5 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"Framework": "ISO27001",
|
|
3
|
+
"Name": "ISO/IEC 27001 Information Security Management Standard 2022",
|
|
3
4
|
"Version": "2022",
|
|
4
5
|
"Provider": "NHN",
|
|
5
6
|
"Description": "ISO (the International Organization for Standardization) and IEC (the International Electrotechnical Commission) form the specialized system for worldwide standardization. National bodies that are members of ISO or IEC participate in the development of International Standards through technical committees established by the respective organization to deal with particular fields of technical activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the work.",
|
|
File without changes
|