diff --git a/README.md b/README.md index 7e109802..294768f7 100644 --- a/README.md +++ b/README.md @@ -9,7 +9,7 @@ - [Screenshots](#screenshots) - [Troubleshooting](#troubleshooting) - [Extras](#extras) -- [Forensics ready checks](#forensics-ready-checks) +- [Forensics Ready Checks](#forensics-ready-checks) - [Add Custom Checks](#add-custom-checks) - [Third Party Integrations](#third-party-integrations) @@ -26,6 +26,7 @@ It covers hardening and security best practices for all AWS regions related to: - Monitoring (15 checks) - Networking (5 checks) - Extras (12 checks) *see Extras section +- Forensics related checks For a comprehesive list and resolution look at the guide on the link above. diff --git a/prowler b/prowler index 14d8ee65..527d90d2 100755 --- a/prowler +++ b/prowler @@ -167,7 +167,7 @@ fi SCRIPT_START_TIME=$( date -u +"%Y-%m-%dT%H:%M:%S%z" ) # Functions to manage dates depending on OS -if [[ "$OSTYPE" == "linux-gnu" ]]; then +if [ "$OSTYPE" == "linux-gnu" ] || [ "$OSTYPE" == "linux-musl" ]; then # function to compare in days, usage how_older_from_today date # date format %Y-%m-%d how_older_from_today() @@ -570,7 +570,7 @@ genCredReport() { # Save report to a file, decode it, deletion at finish and after every single check saveReport(){ - TEMP_REPORT_FILE=$(mktemp -t prowler-${ACCOUNT_NUM}-XXXXX.cred_report ) + TEMP_REPORT_FILE=$(mktemp -t -p /tmp prowler-${ACCOUNT_NUM}.cred_report-XXXXXX) $AWSCLI iam get-credential-report --query 'Content' --output text $PROFILE_OPT --region $REGION | decode_report > $TEMP_REPORT_FILE if [[ $KEEPCREDREPORT -eq 1 ]]; then textTitle "0.2" "Saving IAM Credential Report ..." "NOT_SCORED" "SUPPORT"