Prowler: Open-source cloud security compliance platform
Cloud security platform automating assessments and compliance across AWS, Azure, GCP, and K8s.
Learn more about Prowler
Prowler is a Python-based cloud security posture management (CSPM) tool that performs automated security assessments across AWS, Azure, GCP, Kubernetes, and other cloud platforms. The platform executes security checks against cloud resources using provider APIs and generates compliance reports based on industry standards and regulatory frameworks. It includes a ThreatScore system for risk prioritization, supports over 1,100 security checks across multiple providers, and offers both CLI and web-based interfaces. Organizations use Prowler for continuous compliance monitoring, security auditing, and cloud security hardening across multi-cloud environments.
Multi-Cloud Coverage
Supports 11 different cloud providers and platforms including AWS, Azure, GCP, Kubernetes, GitHub, and M365 with over 1,100 security checks. Provides unified security assessment across heterogeneous cloud environments.
Compliance Frameworks
Includes 40+ built-in compliance frameworks covering industry standards like CIS, NIST, regulatory requirements like GDPR and PCI-DSS, and cloud-specific frameworks. Supports custom security framework creation for specific organizational needs.
Attack Path Analysis
Integrates with Neo4j to generate attack path visualizations by combining cloud inventory data with security findings. Automatically creates graph-based threat models for AWS environments after each scan.
This release fixes a performance issue in the UI's scans page by optimizing the polling mechanism to reduce unnecessary API calls.
- –UI Fixed - Scans page polling now only refreshes scan table data instead of re-rendering the entire server component tree, eliminating redundant API calls to providers, findings, and compliance endpoints every 5 seconds
Introduces OpenStack as a new cloud provider, adds CloudTrail Timeline for resource history tracking, and includes HIPAA compliance support.
- –New privilege escalation queries for Bedrock Code Interpreter and AttachRolePolicy patterns
- –Cartography upgraded to 0.126.1 with expanded AWS scans covering SageMaker, CloudFront, and Bedrock
- –Neo4j database per tenant architecture for improved isolation and performance
- –AWS: rdsinstanceextended_support - Detect RDS instances using extended support
- –M365: defenderzapforteamsenabled, exchangesharedmailboxsignin_disabled
This release focuses on API improvements and bug fixes, particularly around Attack Paths functionality, database operations, and memory optimization.
- –Improve API startup process by manage.py argument detection
- –Deleting providers don't try to delete a None Neo4j database when an Attack Paths scan is scheduled
- –Use replica database for reading Findings to add them to the Attack Paths graph
- –Attack paths findings loading query to use streaming generator for O(batchsize) memory instead of O(totalfindings)
- –Lazy load Neo4j driver
Related Repositories
Discover similar tools and frameworks used by developers
OSINT-Framework
Structured web catalog of free OSINT tools.
CyberChef
Browser-based data transformation tool with chainable operations.
DOMPurify
DOM-based XSS sanitizer using native browser parsing.
OpenSSL
C-based cryptographic library implementing TLS, DTLS, and QUIC protocols.
WhatWeb
Ruby web scanner that identifies technologies and frameworks using 1800+ detection plugins.