Compliance¶
Prowler allows you to execute checks based on requirements defined in compliance frameworks.
List Available Compliance Frameworks¶
In order to see which compliance frameworks are cover by Prowler, you can use option --list-compliance
:
cis_1.4_aws
cis_1.5_aws
ens_rd2022_aws
aws_audit_manager_control_tower_guardrails_aws
aws_foundational_security_best_practices_aws
cisa_aws
fedramp_low_revision_4_aws
fedramp_moderate_revision_4_aws
ffiec_aws
gdpr_aws
gxp_eu_annex_11_aws
gxp_21_cfr_part_11_aws
hipaa_aws
nist_800_53_revision_4_aws
nist_800_53_revision_5_aws
nist_800_171_revision_2_aws
nist_csf_1.1_aws
pci_3.2.1_aws
rbi_cyber_security_framework_aws
soc2_aws
List Requirements of Compliance Frameworks¶
For each compliance framework, you can use option --list-compliance-requirements
to list its requirements:
Example for the first requirements of CIS 1.5 for AWS:
Listing CIS 1.5 AWS Compliance Requirements:
Requirement Id: 1.1
- Description: Maintain current contact details
- Checks:
account_maintain_current_contact_details
Requirement Id: 1.2
- Description: Ensure security contact information is registered
- Checks:
account_security_contact_information_is_registered
Requirement Id: 1.3
- Description: Ensure security questions are registered in the AWS account
- Checks:
account_security_questions_are_registered_in_the_aws_account
Requirement Id: 1.4
- Description: Ensure no 'root' user account access key exists
- Checks:
iam_no_root_access_key
Requirement Id: 1.5
- Description: Ensure MFA is enabled for the 'root' user account
- Checks:
iam_root_mfa_enabled
[redacted]
Execute Prowler based on Compliance Frameworks¶
As we mentioned, Prowler can be execute to analyse you environment based on a specific compliance framework, to do it, you can use option --compliance
:
Create and contribute adding other Security Frameworks¶
This information is part of the Developer Guide and can be found here: https://docs.prowler.cloud/en/latest/tutorials/developer-guide/.