Updated README

This commit is contained in:
Toni de la Fuente
2016-09-13 16:14:35 -04:00
parent 703baddaa0
commit 609a079d4f
2 changed files with 7 additions and 8 deletions

View File

@@ -44,33 +44,33 @@ arn:aws:iam::aws:policy/SecurityAudit
1 - Run the prowler.sh command without options:
```
./prowler.sh
./prowler
```
2 - For custom AWS-CLI profile and region use:
```
./prowler.sh -p custom-profile -r us-east-1
./prowler -p custom-profile -r us-east-1
```
3 - For a single check use option -c:
```
./prowler.sh -c check310
./prowler -c check310
```
or for custom profile and region
```
./prowler.sh -p custom-profile -r us-east-1 -c check11
./prowler -p custom-profile -r us-east-1 -c check11
```
Valid check numbers are like in the AWS CIS Benchmark guide, while 1.1 is check11 or 3.10 is check310
4 - For help use:
```
./prowler.sh -h
./prowler -h
USAGE:
prowler.sh -p <profile> -r <region> [ -v ] [ -h ]
prowler -p <profile> -r <region> [ -v ] [ -h ]
Options:
-p <profile> specify your AWS profile to use (i.e.: default)
-r <region> specify a desired AWS region to use (i.e.: us-east-1)

View File

@@ -260,7 +260,6 @@ check13(){
done)
# list of users that have used password
USERS_PASSWORD_USED=$($AWSCLI iam list-users --query "Users[?PasswordLastUsed].UserName" --output text --profile $PROFILE --region $REGION)
echo -e "\n$TITLE13 "
# look for users with a password last used more or equal to 90 days
echo -e " User list: "
@@ -270,7 +269,7 @@ check13(){
if [ $HOWOLDER -gt "90" ];then
echo " $RED $i $NORMAL"
else
echo " $OK OK $NORMAL"
echo " $OK OK, no users found with unused credentials for 90 days or greater $NORMAL"
fi
done
}