mirror of
https://github.com/ghndrx/prowler.git
synced 2026-02-10 14:55:00 +00:00
feat(metadata): Include EC2 subservices (#1311)
This commit is contained in:
@@ -4,7 +4,7 @@
|
|||||||
"CheckTitle": "Ensure there are no EBS Snapshots set as Public.",
|
"CheckTitle": "Ensure there are no EBS Snapshots set as Public.",
|
||||||
"CheckType": "Data Protection",
|
"CheckType": "Data Protection",
|
||||||
"ServiceName": "ec2",
|
"ServiceName": "ec2",
|
||||||
"SubServiceName": "ebs-snapshots",
|
"SubServiceName": "snapshot",
|
||||||
"ResourceIdTemplate": "arn:partition:service:region:account-id:resource-id",
|
"ResourceIdTemplate": "arn:partition:service:region:account-id:resource-id",
|
||||||
"Severity": "critical",
|
"Severity": "critical",
|
||||||
"ResourceType": "AwsEc2Snapshot",
|
"ResourceType": "AwsEc2Snapshot",
|
||||||
|
|||||||
@@ -4,7 +4,7 @@
|
|||||||
"CheckTitle": "Check if EBS snapshots are encrypted.",
|
"CheckTitle": "Check if EBS snapshots are encrypted.",
|
||||||
"CheckType": "Data Protection",
|
"CheckType": "Data Protection",
|
||||||
"ServiceName": "ec2",
|
"ServiceName": "ec2",
|
||||||
"SubServiceName": "ebs-snapshots",
|
"SubServiceName": "snapshot",
|
||||||
"ResourceIdTemplate": "arn:partition:service:region:account-id:resource-id",
|
"ResourceIdTemplate": "arn:partition:service:region:account-id:resource-id",
|
||||||
"Severity": "medium",
|
"Severity": "medium",
|
||||||
"ResourceType": "AwsEc2Snapshot",
|
"ResourceType": "AwsEc2Snapshot",
|
||||||
|
|||||||
@@ -4,7 +4,7 @@
|
|||||||
"CheckTitle": "Check for EC2 Instances with Public IP.",
|
"CheckTitle": "Check for EC2 Instances with Public IP.",
|
||||||
"CheckType": "Infrastructure Security",
|
"CheckType": "Infrastructure Security",
|
||||||
"ServiceName": "ec2",
|
"ServiceName": "ec2",
|
||||||
"SubServiceName": "instances",
|
"SubServiceName": "instance",
|
||||||
"ResourceIdTemplate": "arn:partition:service:region:account-id:resource-id",
|
"ResourceIdTemplate": "arn:partition:service:region:account-id:resource-id",
|
||||||
"Severity": "medium",
|
"Severity": "medium",
|
||||||
"ResourceType": "AwsEc2SecurityGroup",
|
"ResourceType": "AwsEc2SecurityGroup",
|
||||||
|
|||||||
@@ -4,7 +4,7 @@
|
|||||||
"CheckTitle": "Ensure no Network ACLs allow ingress from 0.0.0.0/0 to SSH port 22",
|
"CheckTitle": "Ensure no Network ACLs allow ingress from 0.0.0.0/0 to SSH port 22",
|
||||||
"CheckType": "Infrastructure Security",
|
"CheckType": "Infrastructure Security",
|
||||||
"ServiceName": "ec2",
|
"ServiceName": "ec2",
|
||||||
"SubServiceName": "networkacls",
|
"SubServiceName": "networkacl",
|
||||||
"ResourceIdTemplate": "arn:partition:service:region:account-id:resource-id",
|
"ResourceIdTemplate": "arn:partition:service:region:account-id:resource-id",
|
||||||
"Severity": "high",
|
"Severity": "high",
|
||||||
"ResourceType": "AwsEc2NetworkAcl",
|
"ResourceType": "AwsEc2NetworkAcl",
|
||||||
|
|||||||
@@ -4,7 +4,7 @@
|
|||||||
"CheckTitle": "Ensure no Network ACLs allow ingress from 0.0.0.0/0 to Microsoft RDP port 3389",
|
"CheckTitle": "Ensure no Network ACLs allow ingress from 0.0.0.0/0 to Microsoft RDP port 3389",
|
||||||
"CheckType": "Infrastructure Security",
|
"CheckType": "Infrastructure Security",
|
||||||
"ServiceName": "ec2",
|
"ServiceName": "ec2",
|
||||||
"SubServiceName": "networkacls",
|
"SubServiceName": "networkacl",
|
||||||
"ResourceIdTemplate": "arn:partition:service:region:account-id:resource-id",
|
"ResourceIdTemplate": "arn:partition:service:region:account-id:resource-id",
|
||||||
"Severity": "high",
|
"Severity": "high",
|
||||||
"ResourceType": "AwsEc2NetworkAcl",
|
"ResourceType": "AwsEc2NetworkAcl",
|
||||||
|
|||||||
@@ -4,7 +4,7 @@
|
|||||||
"CheckTitle": "Ensure no security groups allow ingress from 0.0.0.0/0 or ::/0 to any port.",
|
"CheckTitle": "Ensure no security groups allow ingress from 0.0.0.0/0 or ::/0 to any port.",
|
||||||
"CheckType": "Infrastructure Security",
|
"CheckType": "Infrastructure Security",
|
||||||
"ServiceName": "ec2",
|
"ServiceName": "ec2",
|
||||||
"SubServiceName": "securitygroups",
|
"SubServiceName": "securitygroup",
|
||||||
"ResourceIdTemplate": "arn:partition:service:region:account-id:resource-id",
|
"ResourceIdTemplate": "arn:partition:service:region:account-id:resource-id",
|
||||||
"Severity": "high",
|
"Severity": "high",
|
||||||
"ResourceType": "AwsEc2SecurityGroup",
|
"ResourceType": "AwsEc2SecurityGroup",
|
||||||
|
|||||||
@@ -4,7 +4,7 @@
|
|||||||
"CheckTitle": "Ensure no security groups allow ingress from 0.0.0.0/0 or ::/0 to SSH port 22.",
|
"CheckTitle": "Ensure no security groups allow ingress from 0.0.0.0/0 or ::/0 to SSH port 22.",
|
||||||
"CheckType": "Infrastructure Security",
|
"CheckType": "Infrastructure Security",
|
||||||
"ServiceName": "ec2",
|
"ServiceName": "ec2",
|
||||||
"SubServiceName": "securitygroups",
|
"SubServiceName": "securitygroup",
|
||||||
"ResourceIdTemplate": "arn:partition:service:region:account-id:resource-id",
|
"ResourceIdTemplate": "arn:partition:service:region:account-id:resource-id",
|
||||||
"Severity": "high",
|
"Severity": "high",
|
||||||
"ResourceType": "AwsEc2SecurityGroup",
|
"ResourceType": "AwsEc2SecurityGroup",
|
||||||
|
|||||||
@@ -4,7 +4,7 @@
|
|||||||
"CheckTitle": "Ensure no security groups allow ingress from 0.0.0.0/0 or ::/0 to port 3389.",
|
"CheckTitle": "Ensure no security groups allow ingress from 0.0.0.0/0 or ::/0 to port 3389.",
|
||||||
"CheckType": "Infrastructure Security",
|
"CheckType": "Infrastructure Security",
|
||||||
"ServiceName": "ec2",
|
"ServiceName": "ec2",
|
||||||
"SubServiceName": "securitygroups",
|
"SubServiceName": "securitygroup",
|
||||||
"ResourceIdTemplate": "arn:partition:service:region:account-id:resource-id",
|
"ResourceIdTemplate": "arn:partition:service:region:account-id:resource-id",
|
||||||
"Severity": "high",
|
"Severity": "high",
|
||||||
"ResourceType": "AwsEc2SecurityGroup",
|
"ResourceType": "AwsEc2SecurityGroup",
|
||||||
|
|||||||
@@ -4,7 +4,7 @@
|
|||||||
"CheckTitle": "Ensure no security groups allow ingress from 0.0.0.0/0 or ::/0 to MySQL port 3306.",
|
"CheckTitle": "Ensure no security groups allow ingress from 0.0.0.0/0 or ::/0 to MySQL port 3306.",
|
||||||
"CheckType": "Infrastructure Security",
|
"CheckType": "Infrastructure Security",
|
||||||
"ServiceName": "ec2",
|
"ServiceName": "ec2",
|
||||||
"SubServiceName": "",
|
"SubServiceName": "securitygroups",
|
||||||
"ResourceIdTemplate": "arn:partition:service:region:account-id:resource-id",
|
"ResourceIdTemplate": "arn:partition:service:region:account-id:resource-id",
|
||||||
"Severity": "high",
|
"Severity": "high",
|
||||||
"ResourceType": "AwsEc2SecurityGroup",
|
"ResourceType": "AwsEc2SecurityGroup",
|
||||||
|
|||||||
@@ -5,7 +5,7 @@
|
|||||||
"CheckTitle": "Ensure no security groups allow ingress from 0.0.0.0/0 or ::/0 to Oracle ports 1521 or 2483.",
|
"CheckTitle": "Ensure no security groups allow ingress from 0.0.0.0/0 or ::/0 to Oracle ports 1521 or 2483.",
|
||||||
"CheckType": "Infrastructure Security",
|
"CheckType": "Infrastructure Security",
|
||||||
"ServiceName": "ec2",
|
"ServiceName": "ec2",
|
||||||
"SubServiceName": "",
|
"SubServiceName": "securitygroup",
|
||||||
"ResourceIdTemplate": "arn:partition:service:region:account-id:resource-id",
|
"ResourceIdTemplate": "arn:partition:service:region:account-id:resource-id",
|
||||||
"Severity": "high",
|
"Severity": "high",
|
||||||
"ResourceType": "AwsEc2SecurityGroup",
|
"ResourceType": "AwsEc2SecurityGroup",
|
||||||
|
|||||||
Reference in New Issue
Block a user