This commit is contained in:
Toni de la Fuente
2018-02-07 22:22:51 -05:00
parent 84591d25a6
commit 53580d488c
2 changed files with 4 additions and 3 deletions

View File

@@ -9,7 +9,7 @@
- [Screenshots](#screenshots)
- [Troubleshooting](#troubleshooting)
- [Extras](#extras)
- [Forensics ready checks](#forensics-ready-checks)
- [Forensics Ready Checks](#forensics-ready-checks)
- [Add Custom Checks](#add-custom-checks)
- [Third Party Integrations](#third-party-integrations)
@@ -26,6 +26,7 @@ It covers hardening and security best practices for all AWS regions related to:
- Monitoring (15 checks)
- Networking (5 checks)
- Extras (12 checks) *see Extras section
- Forensics related checks
For a comprehesive list and resolution look at the guide on the link above.

View File

@@ -167,7 +167,7 @@ fi
SCRIPT_START_TIME=$( date -u +"%Y-%m-%dT%H:%M:%S%z" )
# Functions to manage dates depending on OS
if [[ "$OSTYPE" == "linux-gnu" ]]; then
if [ "$OSTYPE" == "linux-gnu" ] || [ "$OSTYPE" == "linux-musl" ]; then
# function to compare in days, usage how_older_from_today date
# date format %Y-%m-%d
how_older_from_today()
@@ -570,7 +570,7 @@ genCredReport() {
# Save report to a file, decode it, deletion at finish and after every single check
saveReport(){
TEMP_REPORT_FILE=$(mktemp -t prowler-${ACCOUNT_NUM}-XXXXX.cred_report )
TEMP_REPORT_FILE=$(mktemp -t -p /tmp prowler-${ACCOUNT_NUM}.cred_report-XXXXXX)
$AWSCLI iam get-credential-report --query 'Content' --output text $PROFILE_OPT --region $REGION | decode_report > $TEMP_REPORT_FILE
if [[ $KEEPCREDREPORT -eq 1 ]]; then
textTitle "0.2" "Saving IAM Credential Report ..." "NOT_SCORED" "SUPPORT"