mirror of
https://github.com/ghndrx/prowler.git
synced 2026-02-10 14:55:00 +00:00
fix(outputs): Table and Azure metadata (#1520)
This commit is contained in:
@@ -6,7 +6,7 @@ class defender_ensure_defender_for_app_services_is_on(Check):
|
||||
def execute(self) -> Check_Report:
|
||||
findings = []
|
||||
for subscription, pricings in defender_client.pricings.items():
|
||||
report = Check_Report(self.metadata)
|
||||
report = Check_Report(self.metadata())
|
||||
report.region = defender_client.region
|
||||
report.status = "PASS"
|
||||
report.resource_id = "Defender plan App Services"
|
||||
|
||||
@@ -6,7 +6,7 @@ class defender_ensure_defender_for_arm_is_on(Check):
|
||||
def execute(self) -> Check_Report:
|
||||
findings = []
|
||||
for subscription, pricings in defender_client.pricings.items():
|
||||
report = Check_Report(self.metadata)
|
||||
report = Check_Report(self.metadata())
|
||||
report.region = defender_client.region
|
||||
report.status = "PASS"
|
||||
report.resource_id = "Defender planARM"
|
||||
|
||||
@@ -6,7 +6,7 @@ class defender_ensure_defender_for_azure_sql_databases_is_on(Check):
|
||||
def execute(self) -> Check_Report:
|
||||
findings = []
|
||||
for subscription, pricings in defender_client.pricings.items():
|
||||
report = Check_Report(self.metadata)
|
||||
report = Check_Report(self.metadata())
|
||||
report.region = defender_client.region
|
||||
report.status = "PASS"
|
||||
report.resource_id = "Defender plan Azure sql db servers"
|
||||
|
||||
@@ -6,7 +6,7 @@ class defender_ensure_defender_for_containers_is_on(Check):
|
||||
def execute(self) -> Check_Report:
|
||||
findings = []
|
||||
for subscription, pricings in defender_client.pricings.items():
|
||||
report = Check_Report(self.metadata)
|
||||
report = Check_Report(self.metadata())
|
||||
report.region = defender_client.region
|
||||
report.status = "PASS"
|
||||
report.resource_id = "Defender plan Container Registries"
|
||||
|
||||
@@ -6,7 +6,7 @@ class defender_ensure_defender_for_cosmosdb_is_on(Check):
|
||||
def execute(self) -> Check_Report:
|
||||
findings = []
|
||||
for subscription, pricings in defender_client.pricings.items():
|
||||
report = Check_Report(self.metadata)
|
||||
report = Check_Report(self.metadata())
|
||||
report.region = defender_client.region
|
||||
report.status = "PASS"
|
||||
report.resource_id = "Defender plan Cosmos DB"
|
||||
|
||||
@@ -6,7 +6,7 @@ class defender_ensure_defender_for_databases_is_on(Check):
|
||||
def execute(self) -> Check_Report:
|
||||
findings = []
|
||||
for subscription, pricings in defender_client.pricings.items():
|
||||
report = Check_Report(self.metadata)
|
||||
report = Check_Report(self.metadata())
|
||||
report.region = defender_client.region
|
||||
report.status = "PASS"
|
||||
report.resource_id = "Defender plan Databases"
|
||||
|
||||
@@ -6,7 +6,7 @@ class defender_ensure_defender_for_dns_is_on(Check):
|
||||
def execute(self) -> Check_Report:
|
||||
findings = []
|
||||
for subscription, pricings in defender_client.pricings.items():
|
||||
report = Check_Report(self.metadata)
|
||||
report = Check_Report(self.metadata())
|
||||
report.region = defender_client.region
|
||||
report.status = "PASS"
|
||||
report.resource_id = "Defender plan DNS"
|
||||
|
||||
@@ -6,7 +6,7 @@ class defender_ensure_defender_for_keyvault_is_on(Check):
|
||||
def execute(self) -> Check_Report:
|
||||
findings = []
|
||||
for subscription, pricings in defender_client.pricings.items():
|
||||
report = Check_Report(self.metadata)
|
||||
report = Check_Report(self.metadata())
|
||||
report.region = defender_client.region
|
||||
report.status = "PASS"
|
||||
report.resource_id = "Defender plan KeyVaults"
|
||||
|
||||
@@ -6,7 +6,7 @@ class defender_ensure_defender_for_os_relational_databases_is_on(Check):
|
||||
def execute(self) -> Check_Report:
|
||||
findings = []
|
||||
for subscription, pricings in defender_client.pricings.items():
|
||||
report = Check_Report(self.metadata)
|
||||
report = Check_Report(self.metadata())
|
||||
report.region = defender_client.region
|
||||
report.status = "PASS"
|
||||
report.resource_id = "Defender plan Open-Source Relational Databases"
|
||||
|
||||
@@ -6,7 +6,7 @@ class defender_ensure_defender_for_server_is_on(Check):
|
||||
def execute(self) -> Check_Report:
|
||||
findings = []
|
||||
for subscription, pricings in defender_client.pricings.items():
|
||||
report = Check_Report(self.metadata)
|
||||
report = Check_Report(self.metadata())
|
||||
report.region = defender_client.region
|
||||
report.status = "PASS"
|
||||
report.resource_id = "Defender plan Servers"
|
||||
|
||||
@@ -6,7 +6,7 @@ class defender_ensure_defender_for_sql_servers_is_on(Check):
|
||||
def execute(self) -> Check_Report:
|
||||
findings = []
|
||||
for subscription, pricings in defender_client.pricings.items():
|
||||
report = Check_Report(self.metadata)
|
||||
report = Check_Report(self.metadata())
|
||||
report.region = defender_client.region
|
||||
report.status = "PASS"
|
||||
report.resource_id = "Defender plan SQL Server VMs"
|
||||
|
||||
@@ -6,7 +6,7 @@ class defender_ensure_defender_for_storage_is_on(Check):
|
||||
def execute(self) -> Check_Report:
|
||||
findings = []
|
||||
for subscription, pricings in defender_client.pricings.items():
|
||||
report = Check_Report(self.metadata)
|
||||
report = Check_Report(self.metadata())
|
||||
report.region = defender_client.region
|
||||
report.status = "PASS"
|
||||
report.resource_id = "Defender plan Storage Accounts"
|
||||
|
||||
@@ -9,7 +9,7 @@ class iam_subscription_roles_owner_custom_not_created(Check):
|
||||
findings = []
|
||||
for subscription, roles in iam_client.roles.items():
|
||||
for role in roles:
|
||||
report = Check_Report(self.metadata)
|
||||
report = Check_Report(self.metadata())
|
||||
report.region = iam_client.region
|
||||
report.status = "PASS"
|
||||
report.status_extended = f"Role {role.name} from subscription {subscription} is not a custom owner role"
|
||||
|
||||
@@ -7,7 +7,7 @@ class storage_blob_public_access_level_is_disabled(Check):
|
||||
findings = []
|
||||
for subscription, storage_accounts in storage_client.storage_accounts.items():
|
||||
for storage_account in storage_accounts:
|
||||
report = Check_Report(self.metadata)
|
||||
report = Check_Report(self.metadata())
|
||||
report.region = storage_client.region
|
||||
report.status = "PASS"
|
||||
report.status_extended = f"Storage account {storage_account.name} from subscription {subscription} has allow blob public access disabled"
|
||||
|
||||
@@ -7,7 +7,7 @@ class storage_default_network_access_rule_is_denied(Check):
|
||||
findings = []
|
||||
for subscription, storage_accounts in storage_client.storage_accounts.items():
|
||||
for storage_account in storage_accounts:
|
||||
report = Check_Report(self.metadata)
|
||||
report = Check_Report(self.metadata())
|
||||
report.region = storage_client.region
|
||||
report.status = "PASS"
|
||||
report.status_extended = f"Storage account {storage_account.name} from subscription {subscription} has network access rule set to Deny"
|
||||
|
||||
@@ -7,7 +7,7 @@ class storage_ensure_azure_services_are_trusted_to_access_is_enabled(Check):
|
||||
findings = []
|
||||
for subscription, storage_accounts in storage_client.storage_accounts.items():
|
||||
for storage_account in storage_accounts:
|
||||
report = Check_Report(self.metadata)
|
||||
report = Check_Report(self.metadata())
|
||||
report.region = storage_client.region
|
||||
report.status = "PASS"
|
||||
report.status_extended = f"Storage account {storage_account.name} from subscription {subscription} allows trusted Microsoft services to access this storage account"
|
||||
|
||||
@@ -7,7 +7,7 @@ class storage_ensure_encryption_with_customer_managed_keys(Check):
|
||||
findings = []
|
||||
for subscription, storage_accounts in storage_client.storage_accounts.items():
|
||||
for storage_account in storage_accounts:
|
||||
report = Check_Report(self.metadata)
|
||||
report = Check_Report(self.metadata())
|
||||
report.region = storage_client.region
|
||||
report.status = "PASS"
|
||||
report.status_extended = f"Storage account {storage_account.name} from subscription {subscription} encrypts with CMKs"
|
||||
|
||||
@@ -7,7 +7,7 @@ class storage_ensure_minimum_tls_version_12(Check):
|
||||
findings = []
|
||||
for subscription, storage_accounts in storage_client.storage_accounts.items():
|
||||
for storage_account in storage_accounts:
|
||||
report = Check_Report(self.metadata)
|
||||
report = Check_Report(self.metadata())
|
||||
report.region = storage_client.region
|
||||
report.status = "PASS"
|
||||
report.status_extended = f"Storage account {storage_account.name} from subscription {subscription} has TLS version set to 1.2"
|
||||
|
||||
@@ -7,7 +7,7 @@ class storage_infrastructure_encryption_is_enabled(Check):
|
||||
findings = []
|
||||
for subscription, storage_accounts in storage_client.storage_accounts.items():
|
||||
for storage_account in storage_accounts:
|
||||
report = Check_Report(self.metadata)
|
||||
report = Check_Report(self.metadata())
|
||||
report.region = storage_client.region
|
||||
report.status = "PASS"
|
||||
report.status_extended = f"Storage account {storage_account.name} from subscription {subscription} has infrastructure encryption enabled"
|
||||
|
||||
@@ -7,7 +7,7 @@ class storage_secure_transfer_required_is_enabled(Check):
|
||||
findings = []
|
||||
for subscription, storage_accounts in storage_client.storage_accounts.items():
|
||||
for storage_account in storage_accounts:
|
||||
report = Check_Report(self.metadata)
|
||||
report = Check_Report(self.metadata())
|
||||
report.region = storage_client.region
|
||||
report.status = "PASS"
|
||||
report.status_extended = f"Storage account {storage_account.name} from subscription {subscription} has secure transfer required enabled"
|
||||
|
||||
Reference in New Issue
Block a user