Kanji
・ Cloud engineer / freelance ・ Born in 1993 ・ Born in Ehime Prefecture / Lives in Shibuya-ku, Tokyo ・ AWS history 5 years Profile details
Table of contents
Prowler is an open-source security tool for AWS, Azure, Google Cloud, and Kubernetes that performs security best practices assessments, audits, incident response, continuous monitoring, hardening, and forensics readiness, and also performs remediation. There is Prowler CLI (Command Line Interface) called Prowler Open Source and a service on top of it called Prowler SaaS. Source: GitHub - prowler-cloud/prowler
Prowler is an open-source security tool for AWS, Azure, Google Cloud, and Kubernetes that performs security best practices assessments, audits, incident response, continuous monitoring, hardening, and forensics readiness, and also performs remediation. There is Prowler CLI (Command Line Interface) called Prowler Open Source and a service on top of it called Prowler SaaS.
The custom checks folder must contain one subfolder per check, each subfolder must be named after the check and contain the following: An empty init .py: This tells Python to treat this check folder as a package. check_name.py: Contains the logic of the check. check_name.metadata.json: Contains the metadata of the check. The check name must start with the service name followed by an underscore (e.g., ec2_instance_public_ip). For more details on how to write checks, refer to the “Developer Guide”. Source: Miscellaneous - Prowler Documentation
The custom checks folder must contain one subfolder per check, each subfolder must be named after the check and contain the following:
An empty init .py: This tells Python to treat this check folder as a package. check_name.py: Contains the logic of the check. check_name.metadata.json: Contains the metadata of the check. The check name must start with the service name followed by an underscore (e.g., ec2_instance_public_ip).
For more details on how to write checks, refer to the “Developer Guide”.
${parent_folder_name}/ ∟ ${AWS_service_name}_${check_name} ∟ __init__.py ∟ ${AWS_service_name}_${check_name}.py ∟ ${AWS_service_name}_${check_name}.metadata.json # Example file structure: Check if alternative contact information is registered for the account custom-checks-folder/ ∟ account_alternative_contact_information_is_registered/ ∟ __init__.py ∟ account_alternative_contact_information_is_registered.py ∟ account_alternative_contact_information_is_registered.metadata.json
${parent_folder_name}
${AWS_service_name}_${check_name}
${AWS_service_name}
${check_name}
__init__.py
${AWS_service_name}_${check_name}.py
Check_Report_AWS
region
resource_arn
resource_id
status
status_extended
resource_tags
account_client
prowler/providers/aws/services/${AWS_service_name}/${AWS_service_name}_client.py
prowler/providers/aws/services/${AWS_service_name}/${AWS_service_name}_service.py
${AWS_service_name}_service.py
import json from prowler.lib.logger import logger from prowler.lib.check.models import Check, Check_Report_AWS from prowler.providers.aws.services.account.account_client import account_client class account_alternative_contact_information_is_registered(Check): def execute(self): desired_alternative_contact_count = account_client.audit_config.get("desired_alternative_contact_count", 1) findings = [] report = Check_Report_AWS(self.metadata()) # For each Prowler check we MUST fill the following # Check_Report_AWS fields: # - region # - resource_id # - resource_arn # - status # - status_extended # - resource_tags (optional) logger.debug(f"account_client.contact_names: {account_client.contact_names}") logger.debug(f"account_client.contact_phone_numbers: {account_client.contact_phone_numbers}") logger.debug(f"account_client.contact_emails: {account_client.contact_emails}") contact_emails = account_client.contact_emails contact_emails.discard(None) report = Check_Report_AWS(self.metadata()) report.region = account_client.region report.resource_arn = account_client.audited_account_arn report.resource_id = account_client.audited_account if len(contact_emails) != desired_alternative_contact_count: report.status = "FAIL" else: report.status = "PASS" report.status_extended = json.dumps( { "desired_alternative_contact_count": desired_alternative_contact_count, "contact_emails_count": len(contact_emails), "contact_emails": list(contact_emails), }, ) findings.append(report) return findings
${AWS_service_name}_${check_name}.metadata.json
Provider
aws
CheckID
ServiceName
Severity
low
medium
high
critical
{ "Provider": "aws", "CheckID": "account_alternative_contact_information_is_registered", "CheckTitle": "Account alternative contact information is registered", "CheckType": [ "IAM" ], "ServiceName": "account", "SubServiceName": "", "ResourceIdTemplate": "arn:partition:access-recorder:region:account-id:recorder/resource-id", "Severity": "medium", "ResourceType": "Other", "Description": "", "Risk": "", "RelatedUrl": "", "Remediation": { "Code": { "CLI": "", "NativeIaC": "", "Other": "", "Terraform": "" }, "Recommendation": { "Text": "", "Url": "" } }, "Categories": [ "custom-checks" ], "DependsOn": [], "RelatedTo": [], "Notes": "" }
cst_*.py
${parent_folder_name}/ ∟ ${AWS_service_name}_${check_name} ∟ __init__.py ∟ ${AWS_service_name}_${check_name}.py ∟ ${AWS_service_name}_${check_name}.metadata.json ∟ cst_${AWS_service_name}_client.py ∟ cst_${AWS_service_name}_service.py # Example file structure: Check if the Config delivery channel is enabled custom-checks-folder/ ∟ config_delivery_channel_enabled/ ∟ __init__.py ∟ config_delivery_channel_enabled.py ∟ config_delivery_channel_enabled.metadata.json ∟ cst_config_client.py ∟ cst_config_service.py
${AWS_service_name}_${check_name}/
sys.path.append
from prowler.lib.logger import logger from prowler.lib.check.models import Check, Check_Report_AWS import os import sys sys.path.append(os.path.join(os.path.dirname(__file__))) from cst_config_client import config_client # noqa: E402 class config_delivery_channel_enabled(Check): def execute(self): findings = [] report = Check_Report_AWS(self.metadata()) // Omitted
cst_config_client.py
cst_config_service.py
from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info from cst_config_service import Config config_client = Config(current_audit_info)
Config(AWSService)
__describe_delivery_channels__
regional_client.describe_delivery_channels()
DeliveryChannel
self.delivery_channels
DeliveryChannel(BaseModel)
Optional
None
from typing import Optional from pydantic import BaseModel from prowler.lib.logger import logger from prowler.lib.scan_filters.scan_filters import is_resource_filtered from prowler.providers.aws.lib.service.service import AWSService class Config(AWSService): def __init__(self, audit_info): super().__init__(__class__.__name__, audit_info) self.delivery_channels = [] self.__threading_call__(self.__describe_delivery_channels__) def __describe_delivery_channels__(self, regional_client): logger.info("Config - Listing Delivery Channels...") try: delivery_channel_count = 0 delivery_channels = regional_client.describe_delivery_channels()[ "DeliveryChannels" ] for delivery_channel in delivery_channels: if not self.audit_resources or ( is_resource_filtered(delivery_channel["name"], self.audit_resources) ): self.delivery_channels.append( DeliveryChannel( name=delivery_channel["name"], s3_bucket_name=delivery_channel["s3BucketName"], s3_key_prefix=delivery_channel["s3KeyPrefix"], sns_topic_arn=delivery_channel["snsTopicARN"], region=regional_client.region, ) ) delivery_channel_count += 1 # No delivery channels in region if delivery_channel_count == 0: self.delivery_channels.append( DeliveryChannel( name=self.audited_account, s3_bucket_name=None, s3_key_prefix=None, sns_topic_arn=None, region=regional_client.region, ) ) except Exception as error: logger.error( f"{regional_client.region} -- {error.__class__.__name__}[{error.__traceback__.tb_lineno}]: {error}" ) class DeliveryChannel(BaseModel): name: str s3_bucket_name: Optional[str] s3_key_prefix: Optional[str] sns_topic_arn: Optional[str] region: str
--checks
--log-level
prowler aws \ --checks-folder ./custom-checks-folder/ \ --checks \ account_alternative_contact_information_is_registered \ --log-level ERROR \ -M csv \ --output-directory ./output
prowler aws \ --checks-folder ./custom-checks-folder/ \ --checks \ account_alternative_contact_information_is_registered \ --log-level DEBUG \ -M csv \ --output-directory ./output > debug.log 2>&1
prowler/__main__.py
prowler()