mirror of
https://github.com/ghndrx/prowler.git
synced 2026-02-10 14:55:00 +00:00
chore(list): list compliance and categories sorted (#3381)
This commit is contained in:
@@ -7,30 +7,35 @@ In order to see which compliance frameworks are cover by Prowler, you can use op
|
|||||||
prowler <provider> --list-compliance
|
prowler <provider> --list-compliance
|
||||||
```
|
```
|
||||||
Currently, the available frameworks are:
|
Currently, the available frameworks are:
|
||||||
|
- `aws_account_security_onboarding_aws`
|
||||||
- `cis_1.4_aws`
|
|
||||||
- `cis_1.5_aws`
|
|
||||||
- `ens_rd2022_aws`
|
|
||||||
- `aws_audit_manager_control_tower_guardrails_aws`
|
- `aws_audit_manager_control_tower_guardrails_aws`
|
||||||
- `aws_foundational_security_best_practices_aws`
|
- `aws_foundational_security_best_practices_aws`
|
||||||
|
- `aws_well_architected_framework_reliability_pillar_aws`
|
||||||
- `aws_well_architected_framework_security_pillar_aws`
|
- `aws_well_architected_framework_security_pillar_aws`
|
||||||
|
- `cis_1.4_aws`
|
||||||
|
- `cis_1.5_aws`
|
||||||
|
- `cis_2.0_aws`
|
||||||
|
- `cis_2.0_gcp`
|
||||||
|
- `cis_3.0_aws`
|
||||||
- `cisa_aws`
|
- `cisa_aws`
|
||||||
|
- `ens_rd2022_aws`
|
||||||
- `fedramp_low_revision_4_aws`
|
- `fedramp_low_revision_4_aws`
|
||||||
- `fedramp_moderate_revision_4_aws`
|
- `fedramp_moderate_revision_4_aws`
|
||||||
- `ffiec_aws`
|
- `ffiec_aws`
|
||||||
- `gdpr_aws`
|
- `gdpr_aws`
|
||||||
- `gxp_eu_annex_11_aws`
|
|
||||||
- `gxp_21_cfr_part_11_aws`
|
- `gxp_21_cfr_part_11_aws`
|
||||||
|
- `gxp_eu_annex_11_aws`
|
||||||
- `hipaa_aws`
|
- `hipaa_aws`
|
||||||
|
- `iso27001_2013_aws`
|
||||||
|
- `mitre_attack_aws`
|
||||||
|
- `nist_800_171_revision_2_aws`
|
||||||
- `nist_800_53_revision_4_aws`
|
- `nist_800_53_revision_4_aws`
|
||||||
- `nist_800_53_revision_5_aws`
|
- `nist_800_53_revision_5_aws`
|
||||||
- `nist_800_171_revision_2_aws`
|
|
||||||
- `nist_csf_1.1_aws`
|
- `nist_csf_1.1_aws`
|
||||||
- `pci_3.2.1_aws`
|
- `pci_3.2.1_aws`
|
||||||
- `rbi_cyber_security_framework_aws`
|
- `rbi_cyber_security_framework_aws`
|
||||||
- `soc2_aws`
|
- `soc2_aws`
|
||||||
|
|
||||||
|
|
||||||
## List Requirements of Compliance Frameworks
|
## List Requirements of Compliance Frameworks
|
||||||
For each compliance framework, you can use option `--list-compliance-requirements` to list its requirements:
|
For each compliance framework, you can use option `--list-compliance-requirements` to list its requirements:
|
||||||
```sh
|
```sh
|
||||||
|
|||||||
@@ -217,7 +217,7 @@ def print_categories(categories: set):
|
|||||||
singular_string = f"\nThere is {Fore.YELLOW}{categories_num}{Style.RESET_ALL} available category.\n"
|
singular_string = f"\nThere is {Fore.YELLOW}{categories_num}{Style.RESET_ALL} available category.\n"
|
||||||
|
|
||||||
message = plural_string if categories_num > 1 else singular_string
|
message = plural_string if categories_num > 1 else singular_string
|
||||||
for category in categories:
|
for category in sorted(categories):
|
||||||
print(f"- {category}")
|
print(f"- {category}")
|
||||||
|
|
||||||
print(message)
|
print(message)
|
||||||
@@ -246,7 +246,7 @@ def print_compliance_frameworks(
|
|||||||
singular_string = f"\nThere is {Fore.YELLOW}{frameworks_num}{Style.RESET_ALL} available Compliance Framework.\n"
|
singular_string = f"\nThere is {Fore.YELLOW}{frameworks_num}{Style.RESET_ALL} available Compliance Framework.\n"
|
||||||
message = plural_string if frameworks_num > 1 else singular_string
|
message = plural_string if frameworks_num > 1 else singular_string
|
||||||
|
|
||||||
for framework in bulk_compliance_frameworks.keys():
|
for framework in sorted(bulk_compliance_frameworks.keys()):
|
||||||
print(f"- {framework}")
|
print(f"- {framework}")
|
||||||
|
|
||||||
print(message)
|
print(message)
|
||||||
|
|||||||
Reference in New Issue
Block a user