feat(new_check): cloudwatch_log_group_no_secrets_in_logs (#1980)

Co-authored-by: Sergio Garcia <sergargar1@gmail.com>
Co-authored-by: Pepe Fagoaga <pepe@verica.io>
Co-authored-by: Jeffrey Souza <JeffreySouza@users.noreply.github.com>
This commit is contained in:
Fennerr
2023-03-06 13:16:46 +02:00
committed by GitHub
parent fa1f42af59
commit 17cd0dc91d
25 changed files with 1155 additions and 2 deletions

View File

@@ -17,8 +17,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -64,8 +72,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -117,8 +133,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -182,8 +206,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -259,8 +291,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -336,8 +376,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)

View File

@@ -17,8 +17,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -64,8 +72,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -117,8 +133,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -182,8 +206,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -259,8 +291,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -336,8 +376,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)

View File

@@ -17,8 +17,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -64,8 +72,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -117,8 +133,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -182,8 +206,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -259,8 +291,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -336,8 +376,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)

View File

@@ -17,8 +17,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -64,8 +72,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -117,8 +133,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -182,8 +206,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -259,8 +291,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -336,8 +376,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)

View File

@@ -11,8 +11,16 @@ class Test_cloudwatch_cross_account_sharing_disabled:
def test_cloudwatch_without_cross_account_role(self):
from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info
from prowler.providers.aws.services.iam.iam_service import IAM
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
with mock.patch(
"prowler.providers.aws.services.cloudwatch.cloudwatch_cross_account_sharing_disabled.cloudwatch_cross_account_sharing_disabled.iam_client",
@@ -44,8 +52,16 @@ class Test_cloudwatch_cross_account_sharing_disabled:
)
from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info
from prowler.providers.aws.services.iam.iam_service import IAM
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
with mock.patch(
"prowler.providers.aws.services.cloudwatch.cloudwatch_cross_account_sharing_disabled.cloudwatch_cross_account_sharing_disabled.iam_client",

View File

@@ -10,8 +10,16 @@ class Test_cloudwatch_log_group_kms_encryption_enabled:
def test_cloudwatch_no_log_groups(self):
from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info
from prowler.providers.aws.services.cloudwatch.cloudwatch_service import Logs
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
with mock.patch(
"prowler.providers.aws.services.cloudwatch.cloudwatch_log_group_kms_encryption_enabled.cloudwatch_log_group_kms_encryption_enabled.logs_client",
@@ -37,8 +45,16 @@ class Test_cloudwatch_log_group_kms_encryption_enabled:
)
from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info
from prowler.providers.aws.services.cloudwatch.cloudwatch_service import Logs
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
with mock.patch(
"prowler.providers.aws.services.cloudwatch.cloudwatch_log_group_kms_encryption_enabled.cloudwatch_log_group_kms_encryption_enabled.logs_client",
@@ -68,8 +84,16 @@ class Test_cloudwatch_log_group_kms_encryption_enabled:
logs_client.create_log_group(logGroupName="test", kmsKeyId="test_kms_id")
from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info
from prowler.providers.aws.services.cloudwatch.cloudwatch_service import Logs
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
with mock.patch(
"prowler.providers.aws.services.cloudwatch.cloudwatch_log_group_kms_encryption_enabled.cloudwatch_log_group_kms_encryption_enabled.logs_client",

View File

@@ -0,0 +1,129 @@
from re import search
from unittest import mock
from boto3 import client
from moto import mock_logs
from moto.core.utils import unix_time_millis
AWS_REGION = "us-east-1"
class Test_cloudwatch_log_group_no_secrets_in_logs:
def test_cloudwatch_no_log_groups(self):
from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info
from prowler.providers.aws.services.cloudwatch.cloudwatch_service import Logs
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
with mock.patch(
"prowler.providers.aws.services.cloudwatch.cloudwatch_log_group_no_secrets_in_logs.cloudwatch_log_group_no_secrets_in_logs.logs_client",
new=Logs(current_audit_info),
):
# Test Check
from prowler.providers.aws.services.cloudwatch.cloudwatch_log_group_no_secrets_in_logs.cloudwatch_log_group_no_secrets_in_logs import (
cloudwatch_log_group_no_secrets_in_logs,
)
check = cloudwatch_log_group_no_secrets_in_logs()
result = check.execute()
assert len(result) == 0
@mock_logs
def test_cloudwatch_log_group_without_secrets(self):
# Generate Logs Client
logs_client = client("logs", region_name=AWS_REGION)
# Request Logs group
logs_client.create_log_group(logGroupName="test")
logs_client.create_log_stream(logGroupName="test", logStreamName="test stream")
logs_client.put_log_events(
logGroupName="test",
logStreamName="test stream",
logEvents=[{"timestamp": 0, "message": "line"}],
)
from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info
from prowler.providers.aws.services.cloudwatch.cloudwatch_service import Logs
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
with mock.patch(
"prowler.providers.aws.services.cloudwatch.cloudwatch_log_group_no_secrets_in_logs.cloudwatch_log_group_no_secrets_in_logs.logs_client",
new=Logs(current_audit_info),
):
# Test Check
from prowler.providers.aws.services.cloudwatch.cloudwatch_log_group_no_secrets_in_logs.cloudwatch_log_group_no_secrets_in_logs import (
cloudwatch_log_group_no_secrets_in_logs,
)
check = cloudwatch_log_group_no_secrets_in_logs()
result = check.execute()
assert len(result) == 1
assert result[0].status == "PASS"
assert result[0].status_extended == "No secrets found in test log group."
assert result[0].resource_id == "test"
@mock_logs
def test_cloudwatch_log_group_with_secrets(self):
# Generate Logs Client
logs_client = client("logs", region_name=AWS_REGION)
# Request Logs group
logs_client.create_log_group(logGroupName="test")
logs_client.create_log_stream(logGroupName="test", logStreamName="test stream")
logs_client.put_log_events(
logGroupName="test",
logStreamName="test stream",
logEvents=[
{
"timestamp": int(unix_time_millis()),
"message": "password = password123",
}
],
)
from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info
from prowler.providers.aws.services.cloudwatch.cloudwatch_service import Logs
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
with mock.patch(
"prowler.providers.aws.services.cloudwatch.cloudwatch_log_group_no_secrets_in_logs.cloudwatch_log_group_no_secrets_in_logs.logs_client",
new=Logs(current_audit_info),
):
# Test Check
from prowler.providers.aws.services.cloudwatch.cloudwatch_log_group_no_secrets_in_logs.cloudwatch_log_group_no_secrets_in_logs import (
cloudwatch_log_group_no_secrets_in_logs,
)
check = cloudwatch_log_group_no_secrets_in_logs()
result = check.execute()
assert len(result) == 1
assert result[0].status == "FAIL"
assert search(
"Potential secrets found in log group", result[0].status_extended
)
assert result[0].resource_id == "test"

View File

@@ -10,8 +10,16 @@ class Test_cloudwatch_log_group_retention_policy_specific_days_enabled:
def test_cloudwatch_no_log_groups(self):
from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info
from prowler.providers.aws.services.cloudwatch.cloudwatch_service import Logs
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
with mock.patch(
"prowler.providers.aws.services.cloudwatch.cloudwatch_log_group_retention_policy_specific_days_enabled.cloudwatch_log_group_retention_policy_specific_days_enabled.logs_client",
@@ -37,8 +45,16 @@ class Test_cloudwatch_log_group_retention_policy_specific_days_enabled:
)
from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info
from prowler.providers.aws.services.cloudwatch.cloudwatch_service import Logs
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
with mock.patch(
"prowler.providers.aws.services.cloudwatch.cloudwatch_log_group_retention_policy_specific_days_enabled.cloudwatch_log_group_retention_policy_specific_days_enabled.logs_client",
@@ -71,8 +87,16 @@ class Test_cloudwatch_log_group_retention_policy_specific_days_enabled:
logs_client.put_retention_policy(logGroupName="test", retentionInDays=400)
from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info
from prowler.providers.aws.services.cloudwatch.cloudwatch_service import Logs
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
with mock.patch(
"prowler.providers.aws.services.cloudwatch.cloudwatch_log_group_retention_policy_specific_days_enabled.cloudwatch_log_group_retention_policy_specific_days_enabled.logs_client",
@@ -105,8 +129,16 @@ class Test_cloudwatch_log_group_retention_policy_specific_days_enabled:
logs_client.put_retention_policy(logGroupName="test", retentionInDays=7)
from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info
from prowler.providers.aws.services.cloudwatch.cloudwatch_service import Logs
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
with mock.patch(
"prowler.providers.aws.services.cloudwatch.cloudwatch_log_group_retention_policy_specific_days_enabled.cloudwatch_log_group_retention_policy_specific_days_enabled.logs_client",

View File

@@ -17,8 +17,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -66,8 +74,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -121,8 +137,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -188,8 +212,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -267,8 +299,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -346,8 +386,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)

View File

@@ -17,8 +17,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -66,8 +74,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -121,8 +137,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -188,8 +212,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -267,8 +299,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -346,8 +386,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)

View File

@@ -17,8 +17,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -64,8 +72,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -117,8 +133,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -182,8 +206,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -259,8 +291,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -336,8 +376,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)

View File

@@ -17,8 +17,16 @@ class Test_cloudwatch_log_metric_filter_aws_organizations_changes:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -64,8 +72,16 @@ class Test_cloudwatch_log_metric_filter_aws_organizations_changes:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -117,8 +133,16 @@ class Test_cloudwatch_log_metric_filter_aws_organizations_changes:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -182,8 +206,16 @@ class Test_cloudwatch_log_metric_filter_aws_organizations_changes:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -259,8 +291,16 @@ class Test_cloudwatch_log_metric_filter_aws_organizations_changes:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -336,8 +376,16 @@ class Test_cloudwatch_log_metric_filter_aws_organizations_changes:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)

View File

@@ -17,8 +17,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -66,8 +74,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -121,8 +137,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -188,8 +212,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -267,8 +299,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -346,8 +386,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)

View File

@@ -17,8 +17,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -64,8 +72,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -117,8 +133,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -182,8 +206,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -259,8 +291,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -336,8 +376,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)

View File

@@ -17,8 +17,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -64,8 +72,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -117,8 +133,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -182,8 +206,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -259,8 +291,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -336,8 +376,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)

View File

@@ -17,8 +17,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -64,8 +72,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -117,8 +133,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -182,8 +206,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -259,8 +291,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -336,8 +376,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)

View File

@@ -17,8 +17,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -64,8 +72,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -117,8 +133,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -182,8 +206,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -259,8 +291,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -336,8 +376,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)

View File

@@ -17,8 +17,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -64,8 +72,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -117,8 +133,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -182,8 +206,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -259,8 +291,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -336,8 +376,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)

View File

@@ -17,8 +17,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -64,8 +72,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -117,8 +133,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -182,8 +206,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -259,8 +291,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)
@@ -336,8 +376,16 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls:
CloudWatch,
Logs,
)
from prowler.providers.common.models import Audit_Metadata
current_audit_info.audited_partition = "aws"
current_audit_info.audit_metadata = Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
)
from prowler.providers.aws.services.cloudtrail.cloudtrail_client import (
Cloudtrail,
)

View File

@@ -3,6 +3,7 @@ from moto import mock_cloudwatch
from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info
from prowler.providers.aws.services.cloudwatch.cloudwatch_service import CloudWatch
from prowler.providers.common.models import Audit_Metadata
AWS_ACCOUNT_NUMBER = 123456789012
AWS_REGION = "us-east-1"
@@ -29,6 +30,13 @@ class Test_CloudWatch_Service:
audited_regions=None,
organizations_metadata=None,
audit_resources=None,
audit_metadata=Audit_Metadata(
services_scanned=0,
# We need to set this check to call __describe_log_groups__
expected_checks=["cloudwatch_log_group_no_secrets_in_logs"],
completed_checks=0,
audit_progress=0,
),
)
return audit_info