diff --git a/README.md b/README.md index e19c32fd..37a96897 100644 --- a/README.md +++ b/README.md @@ -2,14 +2,14 @@ ## Description -Tool based on AWS-CLI commands for AWS account hardening, following guidelines of the [CIS Amazon Web Services Foundations Benchmark](https://d0.awsstatic.com/whitepapers/compliance/AWS_CIS_Foundations_Benchmark.pdf) +Tool based on AWS-CLI commands for AWS account hardening, following guidelines of the [CIS Amazon Web Services Foundations Benchmark 1.1 ](https://benchmarks.cisecurity.org/tools2/amazon/CIS_Amazon_Web_Services_Foundations_Benchmark_v1.1.0.pdf) It covers hardening and security best practices for all regions related to: -- Identity and Access Management (15 checks) +- Identity and Access Management (24 checks) - Logging (8 checks) -- Monitoring (16 checks) -- Networking (4 checks) +- Monitoring (15 checks) +- Networking (5 checks) For a comprehesive list and resolution look at the guide on the link above. @@ -95,7 +95,7 @@ USAGE: ``` ## How to fix all WARNINGS: - Check your report and fix the issues following all specific guidelines per check in https://d0.awsstatic.com/whitepapers/compliance/AWS_CIS_Foundations_Benchmark.pdf + Check your report and fix the issues following all specific guidelines per check in https://benchmarks.cisecurity.org/tools2/amazon/CIS_Amazon_Web_Services_Foundations_Benchmark_v1.1.0.pdf ## Screenshots diff --git a/prowler b/prowler index e489d74d..691491dc 100755 --- a/prowler +++ b/prowler @@ -236,7 +236,11 @@ REGIONS=$($AWSCLI ec2 describe-regions --query 'Regions[].RegionName' \ infoReferenceLong(){ # Report review note: - echo -e " $NOTICE https://benchmarks.cisecurity.org/tools2/amazon/CIS_Amazon_Web_Services_Foundations_Benchmark_v1.1.0.pdf$NORMAL" + echo -e " $BLUE \n*********************************$NORMAL" + echo -e " $NOTICE For more information: $NORMAL" + echo -e " $NOTICE https://benchmarks.cisecurity.org/tools2/amazon/CIS_Amazon_Web_Services_Foundations_Benchmark_v1.1.0.pdf$NORMAL" + echo -e " $NOTICE For bugs or feedback: $NORMAL" + echo -e " $NOTICE https://github.com/Alfresco/aws-cis-security-benchmark/issues$NORMAL" } infoReferenceShort(){ @@ -983,8 +987,8 @@ check314(){ } check315(){ - TITLE315="$BLUE 3.16$NORMAL Ensure appropriate subscribers to each SNS topic (Not Scored)" - echo -e "\n$TITLE316 " + TITLE315="$BLUE 3.15$NORMAL Ensure appropriate subscribers to each SNS topic (Not Scored)" + echo -e "\n$TITLE315 " for regx in $REGIONS; do TOPICS_LIST=$($AWSCLI sns list-topics --profile $PROFILE --region $regx --output text --query 'Topics[*].TopicArn') if [[ $TOPICS_LIST ]];then