Loading...
Loading...
Compare original and translation side by side
prowler/compliance/{provider}/{framework_name}_{provider}.jsonawsazuregcpkubernetesgithubm365alibabacloudcloudflareoraclecloudocinhnmongodbatlasiacllmprowler/compliance/{provider}/{framework_name}_{provider}.jsonawsazuregcpkubernetesgithubm365alibabacloudcloudflareoraclecloudocinhnmongodbatlasiacllm{
"Framework": "FRAMEWORK_NAME",
"Name": "Full Framework Name with Version",
"Version": "X.X",
"Provider": "PROVIDER",
"Description": "Framework description...",
"Requirements": [
{
"Id": "requirement_id",
"Description": "Requirement description",
"Name": "Optional requirement name",
"Attributes": [...],
"Checks": ["check_name_1", "check_name_2"]
}
]
}{
"Framework": "FRAMEWORK_NAME",
"Name": "Full Framework Name with Version",
"Version": "X.X",
"Provider": "PROVIDER",
"Description": "Framework description...",
"Requirements": [
{
"Id": "requirement_id",
"Description": "Requirement description",
"Name": "Optional requirement name",
"Attributes": [...],
"Checks": ["check_name_1", "check_name_2"]
}
]
}cis_{version}_{provider}cis_5.0_aws{
"Id": "1.1",
"Description": "Maintain current contact details",
"Checks": ["account_maintain_current_contact_details"],
"Attributes": [
{
"Section": "1 Identity and Access Management",
"SubSection": "Optional subsection",
"Profile": "Level 1",
"AssessmentStatus": "Automated",
"Description": "Detailed attribute description",
"RationaleStatement": "Why this control matters",
"ImpactStatement": "Impact of implementing this control",
"RemediationProcedure": "Steps to fix the issue",
"AuditProcedure": "Steps to verify compliance",
"AdditionalInformation": "Extra notes",
"DefaultValue": "Default configuration value",
"References": "https://docs.example.com/reference"
}
]
}Level 1Level 2E3 Level 1E3 Level 2E5 Level 1E5 Level 2AutomatedManualcis_{version}_{provider}cis_5.0_aws{
"Id": "1.1",
"Description": "Maintain current contact details",
"Checks": ["account_maintain_current_contact_details"],
"Attributes": [
{
"Section": "1 Identity and Access Management",
"SubSection": "Optional subsection",
"Profile": "Level 1",
"AssessmentStatus": "Automated",
"Description": "Detailed attribute description",
"RationaleStatement": "Why this control matters",
"ImpactStatement": "Impact of implementing this control",
"RemediationProcedure": "Steps to fix the issue",
"AuditProcedure": "Steps to verify compliance",
"AdditionalInformation": "Extra notes",
"DefaultValue": "Default configuration value",
"References": "https://docs.example.com/reference"
}
]
}Level 1Level 2E3 Level 1E3 Level 2E5 Level 1E5 Level 2AutomatedManualiso27001_{year}_{provider}iso27001_2022_aws{
"Id": "A.5.1",
"Description": "Policies for information security should be defined...",
"Name": "Policies for information security",
"Checks": ["securityhub_enabled"],
"Attributes": [
{
"Category": "A.5 Organizational controls",
"Objetive_ID": "A.5.1",
"Objetive_Name": "Policies for information security",
"Check_Summary": "Summary of what is being checked"
}
]
}Objetive_IDObjetive_Nameiso27001_{year}_{provider}iso27001_2022_aws{
"Id": "A.5.1",
"Description": "Policies for information security should be defined...",
"Name": "Policies for information security",
"Checks": ["securityhub_enabled"],
"Attributes": [
{
"Category": "A.5 Organizational controls",
"Objetive_ID": "A.5.1",
"Objetive_Name": "Policies for information security",
"Check_Summary": "Summary of what is being checked"
}
]
}Objetive_IDObjetive_Nameens_rd2022_{provider}ens_rd2022_aws{
"Id": "op.acc.1.aws.iam.2",
"Description": "Proveedor de identidad centralizado",
"Checks": ["iam_check_saml_providers_sts"],
"Attributes": [
{
"IdGrupoControl": "op.acc.1",
"Marco": "operacional",
"Categoria": "control de acceso",
"DescripcionControl": "Detailed control description in Spanish",
"Nivel": "alto",
"Tipo": "requisito",
"Dimensiones": ["trazabilidad", "autenticidad"],
"ModoEjecucion": "automatico",
"Dependencias": []
}
]
}opcionalbajomedioaltorefuerzorequisitorecomendacionmedidaconfidencialidadintegridadtrazabilidadautenticidaddisponibilidadens_rd2022_{provider}ens_rd2022_aws{
"Id": "op.acc.1.aws.iam.2",
"Description": "Proveedor de identidad centralizado",
"Checks": ["iam_check_saml_providers_sts"],
"Attributes": [
{
"IdGrupoControl": "op.acc.1",
"Marco": "operacional",
"Categoria": "control de acceso",
"DescripcionControl": "Detailed control description in Spanish",
"Nivel": "alto",
"Tipo": "requisito",
"Dimensiones": ["trazabilidad", "autenticidad"],
"ModoEjecucion": "automatico",
"Dependencias": []
}
]
}opcionalbajomedioaltorefuerzorequisitorecomendacionmedidaconfidencialidadintegridadtrazabilidadautenticidaddisponibilidadmitre_attack_{provider}mitre_attack_aws{
"Name": "Exploit Public-Facing Application",
"Id": "T1190",
"Tactics": ["Initial Access"],
"SubTechniques": [],
"Platforms": ["Containers", "IaaS", "Linux", "Network", "Windows", "macOS"],
"Description": "Adversaries may attempt to exploit a weakness...",
"TechniqueURL": "https://attack.mitre.org/techniques/T1190/",
"Checks": ["guardduty_is_enabled", "inspector2_is_enabled"],
"Attributes": [
{
"AWSService": "Amazon GuardDuty",
"Category": "Detect",
"Value": "Minimal",
"Comment": "Explanation of how this service helps..."
}
]
}AzureServiceAWSServiceGCPServiceAWSServiceDetectProtectRespondMinimalPartialSignificantmitre_attack_{provider}mitre_attack_aws{
"Name": "Exploit Public-Facing Application",
"Id": "T1190",
"Tactics": ["Initial Access"],
"SubTechniques": [],
"Platforms": ["Containers", "IaaS", "Linux", "Network", "Windows", "macOS"],
"Description": "Adversaries may attempt to exploit a weakness...",
"TechniqueURL": "https://attack.mitre.org/techniques/T1190/",
"Checks": ["guardduty_is_enabled", "inspector2_is_enabled"],
"Attributes": [
{
"AWSService": "Amazon GuardDuty",
"Category": "Detect",
"Value": "Minimal",
"Comment": "Explanation of how this service helps..."
}
]
}AzureServiceAWSServiceGCPServiceAWSServiceDetectProtectRespondMinimalPartialSignificantnist_800_53_revision_{version}_{provider}nist_800_53_revision_5_aws{
"Id": "ac_2_1",
"Name": "AC-2(1) Automated System Account Management",
"Description": "Support the management of system accounts...",
"Checks": ["iam_password_policy_minimum_length_14"],
"Attributes": [
{
"ItemId": "ac_2_1",
"Section": "Access Control (AC)",
"SubSection": "Account Management (AC-2)",
"SubGroup": "AC-2(3) Disable Accounts",
"Service": "iam"
}
]
}nist_800_53_revision_{version}_{provider}nist_800_53_revision_5_aws{
"Id": "ac_2_1",
"Name": "AC-2(1) Automated System Account Management",
"Description": "Support the management of system accounts...",
"Checks": ["iam_password_policy_minimum_length_14"],
"Attributes": [
{
"ItemId": "ac_2_1",
"Section": "Access Control (AC)",
"SubSection": "Account Management (AC-2)",
"SubGroup": "AC-2(3) Disable Accounts",
"Service": "iam"
}
]
}{
"Id": "requirement_id",
"Description": "Requirement description",
"Name": "Optional name",
"Checks": ["check_name"],
"Attributes": [
{
"ItemId": "item_id",
"Section": "Section name",
"SubSection": "Subsection name",
"SubGroup": "Subgroup name",
"Service": "service_name",
"Type": "type"
}
]
}{
"Id": "requirement_id",
"Description": "Requirement description",
"Name": "Optional name",
"Checks": ["check_name"],
"Attributes": [
{
"ItemId": "item_id",
"Section": "Section name",
"SubSection": "Subsection name",
"SubGroup": "Subgroup name",
"Service": "service_name",
"Type": "type"
}
]
}aws_well_architected_framework_{pillar}_pillar_aws{
"Id": "SEC01-BP01",
"Description": "Establish common guardrails...",
"Name": "Establish common guardrails",
"Checks": ["account_part_of_organizations"],
"Attributes": [
{
"Name": "Establish common guardrails",
"WellArchitectedQuestionId": "securely-operate",
"WellArchitectedPracticeId": "sec_securely_operate_multi_accounts",
"Section": "Security",
"SubSection": "Security foundations",
"LevelOfRisk": "High",
"AssessmentMethod": "Automated",
"Description": "Detailed description",
"ImplementationGuidanceUrl": "https://docs.aws.amazon.com/..."
}
]
}aws_well_architected_framework_{pillar}_pillar_aws{
"Id": "SEC01-BP01",
"Description": "Establish common guardrails...",
"Name": "Establish common guardrails",
"Checks": ["account_part_of_organizations"],
"Attributes": [
{
"Name": "Establish common guardrails",
"WellArchitectedQuestionId": "securely-operate",
"WellArchitectedPracticeId": "sec_securely_operate_multi_accounts",
"Section": "Security",
"SubSection": "Security foundations",
"LevelOfRisk": "High",
"AssessmentMethod": "Automated",
"Description": "Detailed description",
"ImplementationGuidanceUrl": "https://docs.aws.amazon.com/..."
}
]
}kisa_isms_p_{year}_{provider}kisa_isms_p_2023_aws{
"Id": "1.1.1",
"Description": "Requirement description",
"Name": "Requirement name",
"Checks": ["check_name"],
"Attributes": [
{
"Domain": "1. Management System",
"Subdomain": "1.1 Management System Establishment",
"Section": "1.1.1 Section Name",
"AuditChecklist": ["Checklist item 1", "Checklist item 2"],
"RelatedRegulations": ["Regulation 1"],
"AuditEvidence": ["Evidence type 1"],
"NonComplianceCases": ["Non-compliance example"]
}
]
}kisa_isms_p_{year}_{provider}kisa_isms_p_2023_aws{
"Id": "1.1.1",
"Description": "Requirement description",
"Name": "Requirement name",
"Checks": ["check_name"],
"Attributes": [
{
"Domain": "1. Management System",
"Subdomain": "1.1 Management System Establishment",
"Section": "1.1.1 Section Name",
"AuditChecklist": ["Checklist item 1", "Checklist item 2"],
"RelatedRegulations": ["Regulation 1"],
"AuditEvidence": ["Evidence type 1"],
"NonComplianceCases": ["Non-compliance example"]
}
]
}c5_{provider}c5_aws{
"Id": "BCM-01",
"Description": "Requirement description",
"Name": "Requirement name",
"Checks": ["check_name"],
"Attributes": [
{
"Section": "BCM Business Continuity Management",
"SubSection": "BCM-01",
"Type": "Basic Criteria",
"AboutCriteria": "Description of criteria",
"ComplementaryCriteria": "Additional criteria"
}
]
}c5_{provider}c5_aws{
"Id": "BCM-01",
"Description": "Requirement description",
"Name": "Requirement name",
"Checks": ["check_name"],
"Attributes": [
{
"Section": "BCM Business Continuity Management",
"SubSection": "BCM-01",
"Type": "Basic Criteria",
"AboutCriteria": "Description of criteria",
"ComplementaryCriteria": "Additional criteria"
}
]
}ccc_{provider}ccc_aws{
"Id": "CCC.C01",
"Description": "Requirement description",
"Name": "Requirement name",
"Checks": ["check_name"],
"Attributes": [
{
"FamilyName": "Cryptography & Key Management",
"FamilyDescription": "Family description",
"Section": "CCC.C01",
"SubSection": "Key Management",
"SubSectionObjective": "Objective description",
"Applicability": ["IaaS", "PaaS", "SaaS"],
"Recommendation": "Recommended action",
"SectionThreatMappings": [{"threat": "T1190"}],
"SectionGuidelineMappings": [{"guideline": "NIST"}]
}
]
}ccc_{provider}ccc_aws{
"Id": "CCC.C01",
"Description": "Requirement description",
"Name": "Requirement name",
"Checks": ["check_name"],
"Attributes": [
{
"FamilyName": "Cryptography & Key Management",
"FamilyDescription": "Family description",
"Section": "CCC.C01",
"SubSection": "Key Management",
"SubSectionObjective": "Objective description",
"Applicability": ["IaaS", "PaaS", "SaaS"],
"Recommendation": "Recommended action",
"SectionThreatMappings": [{"threat": "T1190"}],
"SectionGuidelineMappings": [{"guideline": "NIST"}]
}
]
}prowler_threatscore_{provider}prowler_threatscore_aws| Pillar | Description |
|---|---|
| 1. IAM | Identity and Access Management controls (authentication, authorization, credentials) |
| 2. Attack Surface | Network exposure, public resources, security group rules |
| 3. Logging and Monitoring | Audit logging, threat detection, forensic readiness |
| 4. Encryption | Data at rest and in transit encryption |
543211000100101{
"Id": "1.1.1",
"Description": "Ensure MFA is enabled for the 'root' user account",
"Checks": ["iam_root_mfa_enabled"],
"Attributes": [
{
"Title": "MFA enabled for 'root'",
"Section": "1. IAM",
"SubSection": "1.1 Authentication",
"AttributeDescription": "The root user account holds the highest level of privileges within an AWS account. Enabling MFA enhances security by adding an additional layer of protection.",
"AdditionalInformation": "Enabling MFA enhances console security by requiring the authenticating user to both possess a time-sensitive key-generating device and have knowledge of their credentials.",
"LevelOfRisk": 5,
"Weight": 1000
}
]
}prowler_threatscore_{provider}prowler_threatscore_aws| 支柱 | 描述 |
|---|---|
| 1. IAM | 身份与访问管理控制措施(认证、授权、凭证) |
| 2. Attack Surface | 网络暴露面、公共资源、安全组规则 |
| 3. Logging and Monitoring | 审计日志、威胁检测、取证就绪性 |
| 4. Encryption | 静态数据与传输中数据加密 |
543211000100101{
"Id": "1.1.1",
"Description": "Ensure MFA is enabled for the 'root' user account",
"Checks": ["iam_root_mfa_enabled"],
"Attributes": [
{
"Title": "MFA enabled for 'root'",
"Section": "1. IAM",
"SubSection": "1.1 Authentication",
"AttributeDescription": "The root user account holds the highest level of privileges within an AWS account. Enabling MFA enhances security by adding an additional layer of protection.",
"AdditionalInformation": "Enabling MFA enhances console security by requiring the authenticating user to both possess a time-sensitive key-generating device and have knowledge of their credentials.",
"LevelOfRisk": 5,
"Weight": 1000
}
]
}| Framework | File Name |
|---|---|
| CIS 1.4, 1.5, 2.0, 3.0, 4.0, 5.0 | |
| ISO 27001:2013, 2022 | |
| NIST 800-53 Rev 4, 5 | |
| NIST 800-171 Rev 2 | |
| NIST CSF 1.1, 2.0 | |
| PCI DSS 3.2.1, 4.0 | |
| HIPAA | |
| GDPR | |
| SOC 2 | |
| FedRAMP Low/Moderate | |
| ENS RD2022 | |
| MITRE ATT&CK | |
| C5 Germany | |
| CISA | |
| FFIEC | |
| RBI Cyber Security | |
| AWS Well-Architected | |
| AWS FTR | |
| GxP 21 CFR Part 11, EU Annex 11 | |
| KISA ISMS-P 2023 | |
| NIS2 | |
| 框架 | 文件名 |
|---|---|
| CIS 1.4、1.5、2.0、3.0、4.0、5.0 | |
| ISO 27001:2013、2022 | |
| NIST 800-53 Rev 4、5 | |
| NIST 800-171 Rev 2 | |
| NIST CSF 1.1、2.0 | |
| PCI DSS 3.2.1、4.0 | |
| HIPAA | |
| GDPR | |
| SOC 2 | |
| FedRAMP Low/Moderate | |
| ENS RD2022 | |
| MITRE ATT&CK | |
| C5 Germany | |
| CISA | |
| FFIEC | |
| RBI Cyber Security | |
| AWS Well-Architected | |
| AWS FTR | |
| GxP 21 CFR Part 11、EU Annex 11 | |
| KISA ISMS-P 2023 | |
| NIS2 | |
| Framework | File Name |
|---|---|
| CIS 2.0, 2.1, 3.0, 4.0 | |
| ISO 27001:2022 | |
| ENS RD2022 | |
| MITRE ATT&CK | |
| PCI DSS 4.0 | |
| NIST CSF 2.0 | |
| 框架 | 文件名 |
|---|---|
| CIS 2.0、2.1、3.0、4.0 | |
| ISO 27001:2022 | |
| ENS RD2022 | |
| MITRE ATT&CK | |
| PCI DSS 4.0 | |
| NIST CSF 2.0 | |
| Framework | File Name |
|---|---|
| CIS 2.0, 3.0, 4.0 | |
| ISO 27001:2022 | |
| HIPAA | |
| MITRE ATT&CK | |
| PCI DSS 4.0 | |
| NIST CSF 2.0 | |
| 框架 | 文件名 |
|---|---|
| CIS 2.0、3.0、4.0 | |
| ISO 27001:2022 | |
| HIPAA | |
| MITRE ATT&CK | |
| PCI DSS 4.0 | |
| NIST CSF 2.0 | |
| Framework | File Name |
|---|---|
| CIS 1.8, 1.10, 1.11 | |
| ISO 27001:2022 | |
| PCI DSS 4.0 | |
| 框架 | 文件名 |
|---|---|
| CIS 1.8、1.10、1.11 | |
| ISO 27001:2022 | |
| PCI DSS 4.0 | |
cis_1.0_github.jsoncis_4.0_m365.jsoniso27001_2022_m365.jsoniso27001_2022_nhn.jsoncis_1.0_github.jsoncis_4.0_m365.jsoniso27001_2022_m365.jsoniso27001_2022_nhn.jsonChecks: []NameVersion{framework}_{version}_{provider}.jsonChecks: []NameVersion{framework}_{version}_{provider}.jsonundefinedundefinedundefinedundefinedprowler/lib/check/compliance_models.pyprowler/lib/check/compliance.pyprowler/lib/outputs/compliance/prowler/lib/check/compliance_models.pyprowler/lib/check/compliance.pyprowler/lib/outputs/compliance/