mirror of
https://github.com/ghndrx/prowler.git
synced 2026-02-10 06:45:08 +00:00
chore(metadata): Remove CheckName and CheckAlias field (#1299)
This commit is contained in:
@@ -1,8 +1,6 @@
|
||||
{
|
||||
"Categories": [],
|
||||
"CheckAlias": "extra71",
|
||||
"CheckID": "iam_administrator_access_with_mfa",
|
||||
"CheckName": "iam_administrator_access_with_mfa",
|
||||
"CheckTitle": "Ensure users of groups with AdministratorAccess policy have MFA tokens enabled",
|
||||
"CheckType": "Infrastructure Security",
|
||||
"Compliance": [],
|
||||
|
||||
@@ -1,8 +1,6 @@
|
||||
{
|
||||
"Categories": [],
|
||||
"CheckAlias": "check11",
|
||||
"CheckID": "iam_avoid_root_usage",
|
||||
"CheckName": "iam_avoid_root_usage",
|
||||
"CheckTitle": "Avoid the use of the root accounts",
|
||||
"CheckType": "Software and Configuration Checks/Industry and Regulatory Standards/CIS AWS Foundations Benchmark",
|
||||
"Compliance": [
|
||||
|
||||
@@ -1,8 +1,6 @@
|
||||
{
|
||||
"Categories": [],
|
||||
"CheckAlias": "extra774",
|
||||
"CheckID": "iam_disable_30_days_credentials",
|
||||
"CheckName": "iam_disable_30_days_credentials",
|
||||
"CheckTitle": "Ensure credentials unused for 30 days or greater are disabled",
|
||||
"CheckType": "Software and Configuration Checks",
|
||||
"Compliance": [],
|
||||
|
||||
@@ -1,8 +1,6 @@
|
||||
{
|
||||
"Categories": [],
|
||||
"CheckAlias": "check13",
|
||||
"CheckID": "iam_disable_90_days_credentials",
|
||||
"CheckName": "iam_disable_90_days_credentials",
|
||||
"CheckTitle": "Ensure credentials unused for 90 days or greater are disabled",
|
||||
"CheckType": "Software and Configuration Checks",
|
||||
"Compliance": [
|
||||
|
||||
@@ -1,8 +1,6 @@
|
||||
{
|
||||
"Categories": [],
|
||||
"CheckAlias": "check112",
|
||||
"CheckID": "iam_no_root_access_key",
|
||||
"CheckName": "iam_no_root_access_key",
|
||||
"CheckTitle": "Ensure no root account access key exists",
|
||||
"CheckType": "Software and Configuration Checks/Industry and Regulatory Standards/CIS AWS Foundations Benchmark",
|
||||
"Compliance": [
|
||||
|
||||
@@ -1,8 +1,6 @@
|
||||
{
|
||||
"Categories": [],
|
||||
"CheckAlias": "check114",
|
||||
"CheckID": "iam_root_hardware_mfa_enabled",
|
||||
"CheckName": "iam_root_hardware_mfa_enabled",
|
||||
"CheckTitle": "Ensure hardware MFA is enabled for the root account",
|
||||
"CheckType": "Software and Configuration Checks/Industry and Regulatory Standards/CIS AWS Foundations Benchmark",
|
||||
"Compliance": [
|
||||
|
||||
@@ -1,8 +1,6 @@
|
||||
{
|
||||
"Categories": [],
|
||||
"CheckAlias": "check113",
|
||||
"CheckID": "iam_root_mfa_enabled",
|
||||
"CheckName": "iam_root_mfa_enabled",
|
||||
"CheckTitle": "Ensure MFA is enabled for the root account",
|
||||
"CheckType": "Software and Configuration Checks/Industry and Regulatory Standards/CIS AWS Foundations Benchmark",
|
||||
"Compliance": [
|
||||
|
||||
@@ -1,8 +1,6 @@
|
||||
{
|
||||
"Categories": [],
|
||||
"CheckAlias": "check14",
|
||||
"CheckID": "iam_rotate_access_key_90_days",
|
||||
"CheckName": "iam_rotate_access_key_90_days",
|
||||
"CheckTitle": "Ensure access keys are rotated every 90 days or less",
|
||||
"CheckType": "Software and Configuration Checks/Industry and Regulatory Standards/CIS AWS Foundations Benchmark",
|
||||
"Compliance": [
|
||||
|
||||
@@ -1,8 +1,6 @@
|
||||
{
|
||||
"Categories": [],
|
||||
"CheckAlias": "extra7125",
|
||||
"CheckID": "iam_user_hardware_mfa_enabled",
|
||||
"CheckName": "iam_user_hardware_mfa_enabled",
|
||||
"CheckTitle": "Check if IAM users have Hardware MFA enabled.",
|
||||
"CheckType": "Software and Configuration Checks/Industry and Regulatory Standards/CIS AWS Foundations Benchmark",
|
||||
"Compliance": [],
|
||||
|
||||
@@ -1,8 +1,6 @@
|
||||
{
|
||||
"Categories": [],
|
||||
"CheckAlias": "check12",
|
||||
"CheckID": "iam_user_mfa_enabled_console_access",
|
||||
"CheckName": "iam_user_mfa_enabled_console_access",
|
||||
"CheckTitle": "Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console password.",
|
||||
"CheckType": "Software and Configuration Checks/Industry and Regulatory Standards/CIS AWS Foundations Benchmark",
|
||||
"Compliance": [],
|
||||
|
||||
@@ -1,8 +1,6 @@
|
||||
{
|
||||
"Categories": [],
|
||||
"CheckAlias": "extra7123",
|
||||
"CheckID": "iam_user_two_active_access_key",
|
||||
"CheckName": "iam_user_two_active_access_key",
|
||||
"CheckTitle": "Check if IAM users have two active access keys",
|
||||
"CheckType": "Software and Configuration Checks/Industry and Regulatory Standards/CIS AWS Foundations Benchmark",
|
||||
"Compliance": [],
|
||||
|
||||
Reference in New Issue
Block a user