LinuxCommandLibrary

prowler

Multi-cloud security assessment tool

TLDR

Run AWS security audit

$ prowler aws
copy
Scan specific services
$ prowler aws --services [s3] [iam] [ec2]
copy
Output to file
$ prowler aws -M json -o [report.json]
copy
Use specific profile
$ prowler aws -p [profile_name]
copy
Scan Azure
$ prowler azure
copy
Scan GCP
$ prowler gcp
copy
Run specific checks
$ prowler aws -c [check11] [check12]
copy

SYNOPSIS

prowler provider [--services list] [-M format] [options]

DESCRIPTION

prowler performs automated security assessments on cloud environments by running hundreds of checks against CIS benchmarks, compliance frameworks (GDPR, HIPAA, PCI-DSS), and provider-specific best practices. It supports AWS, Azure, GCP, Kubernetes, GitHub, and Microsoft 365, adapting its checks to each platform's security model.
Scans can be targeted to specific services, individual checks, or severity levels to focus on the most critical findings. Output is available in JSON, CSV, and HTML formats for integration with security dashboards and CI/CD pipelines.
The tool requires read-only credentials for the target environment and uses the provider's standard authentication (AWS profiles, Azure service principals, GCP service accounts).

PARAMETERS

aws

Audit AWS account.
azure
Audit Azure subscription.
gcp
Audit GCP project.
--services LIST
Services to audit.
-c, --checks LIST
Specific checks.
-p, --profile NAME
AWS profile.
-M, --output-modes FORMAT
Output format.
-o, --output-filename FILE
Output file.
--severity LEVEL
Filter by severity.

CAVEATS

Requires cloud credentials with read access. Large accounts may take time. Some checks need specific permissions.

HISTORY

Prowler was created by Toni de la Fuente for AWS security auditing. It has grown to support multiple cloud providers and compliance frameworks.

SEE ALSO

> TERMINAL_GEAR

Curated for the Linux community

Copied to clipboard

> TERMINAL_GEAR

Curated for the Linux community