Navigate:
Prowler
~$PROWL0.8%

Prowler: Open-source cloud security compliance platform

Cloud security platform automating assessments and compliance across AWS, Azure, GCP, and K8s.

LIVE RANKINGS • 11:31 AM • STEADY
OVERALL
#104
17
SECURITY
#8
5
30 DAY RANKING TREND
ovr#104
·Secur#8
STARS
13.1K
FORKS
2.0K
7D STARS
+111
7D FORKS
+19
See Repo:
Share:

Learn more about Prowler

Prowler is a Python-based cloud security posture management (CSPM) tool that performs automated security assessments across AWS, Azure, GCP, Kubernetes, and other cloud platforms. The platform executes security checks against cloud resources using provider APIs and generates compliance reports based on industry standards and regulatory frameworks. It includes a ThreatScore system for risk prioritization, supports over 1,100 security checks across multiple providers, and offers both CLI and web-based interfaces. Organizations use Prowler for continuous compliance monitoring, security auditing, and cloud security hardening across multi-cloud environments.

Prowler

1

Multi-Cloud Coverage

Supports 11 different cloud providers and platforms including AWS, Azure, GCP, Kubernetes, GitHub, and M365 with over 1,100 security checks. Provides unified security assessment across heterogeneous cloud environments.

2

Compliance Frameworks

Includes 40+ built-in compliance frameworks covering industry standards like CIS, NIST, regulatory requirements like GDPR and PCI-DSS, and cloud-specific frameworks. Supports custom security framework creation for specific organizational needs.

3

Attack Path Analysis

Integrates with Neo4j to generate attack path visualizations by combining cloud inventory data with security findings. Automatically creates graph-based threat models for AWS environments after each scan.


v5.18.1

This release fixes a performance issue in the UI's scans page by optimizing the polling mechanism to reduce unnecessary API calls.

  • UI Fixed - Scans page polling now only refreshes scan table data instead of re-rendering the entire server component tree, eliminating redundant API calls to providers, findings, and compliance endpoints every 5 seconds
v5.18.0

Introduces OpenStack as a new cloud provider, adds CloudTrail Timeline for resource history tracking, and includes HIPAA compliance support.

  • New privilege escalation queries for Bedrock Code Interpreter and AttachRolePolicy patterns
  • Cartography upgraded to 0.126.1 with expanded AWS scans covering SageMaker, CloudFront, and Bedrock
  • Neo4j database per tenant architecture for improved isolation and performance
  • AWS: rdsinstanceextended_support - Detect RDS instances using extended support
  • M365: defenderzapforteamsenabled, exchangesharedmailboxsignin_disabled
v5.17.1

This release focuses on API improvements and bug fixes, particularly around Attack Paths functionality, database operations, and memory optimization.

  • Improve API startup process by manage.py argument detection
  • Deleting providers don't try to delete a None Neo4j database when an Attack Paths scan is scheduled
  • Use replica database for reading Findings to add them to the Attack Paths graph
  • Attack paths findings loading query to use streaming generator for O(batchsize) memory instead of O(totalfindings)
  • Lazy load Neo4j driver


[ EXPLORE MORE ]

Related Repositories

Discover similar tools and frameworks used by developers