From a7f8656e89bd12d380c36fe94048b909ce9e72fd Mon Sep 17 00:00:00 2001 From: Fennerr <41741346+Fennerr@users.noreply.github.com> Date: Mon, 11 Dec 2023 12:04:37 +0200 Subject: [PATCH] chore(elb): Improve status in elbv2_insecure_ssl_ciphers (#3169) --- .../elbv2_insecure_ssl_ciphers/elbv2_insecure_ssl_ciphers.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/prowler/providers/aws/services/elbv2/elbv2_insecure_ssl_ciphers/elbv2_insecure_ssl_ciphers.py b/prowler/providers/aws/services/elbv2/elbv2_insecure_ssl_ciphers/elbv2_insecure_ssl_ciphers.py index 40bcf1e1..eeca1eb0 100644 --- a/prowler/providers/aws/services/elbv2/elbv2_insecure_ssl_ciphers/elbv2_insecure_ssl_ciphers.py +++ b/prowler/providers/aws/services/elbv2/elbv2_insecure_ssl_ciphers/elbv2_insecure_ssl_ciphers.py @@ -33,7 +33,7 @@ class elbv2_insecure_ssl_ciphers(Check): and listener.ssl_policy not in secure_ssl_policies ): report.status = "FAIL" - report.status_extended = f"ELBv2 {lb.name} has listeners with insecure SSL protocols or ciphers." + report.status_extended = f"ELBv2 {lb.name} has listeners with insecure SSL protocols or ciphers ({listener.ssl_policy})." findings.append(report)