prowler
Multi-cloud security assessment tool
TLDR
Run AWS security audit
SYNOPSIS
prowler provider [--services list] [-M format] [options]
DESCRIPTION
prowler performs automated security assessments on cloud environments by running hundreds of checks against CIS benchmarks, compliance frameworks (GDPR, HIPAA, PCI-DSS), and provider-specific best practices. It supports AWS, Azure, GCP, Kubernetes, GitHub, and Microsoft 365, adapting its checks to each platform's security model.
Scans can be targeted to specific services, individual checks, or severity levels to focus on the most critical findings. Output is available in JSON, CSV, and HTML formats for integration with security dashboards and CI/CD pipelines.
The tool requires read-only credentials for the target environment and uses the provider's standard authentication (AWS profiles, Azure service principals, GCP service accounts).
PARAMETERS
aws
Audit AWS account.azure
Audit Azure subscription.gcp
Audit GCP project.--services LIST
Services to audit.-c, --checks LIST
Specific checks.-p, --profile NAME
AWS profile.-M, --output-modes FORMAT
Output format.-o, --output-filename FILE
Output file.--severity LEVEL
Filter by severity.
CAVEATS
Requires cloud credentials with read access. Large accounts may take time. Some checks need specific permissions.
HISTORY
Prowler was created by Toni de la Fuente for AWS security auditing. It has grown to support multiple cloud providers and compliance frameworks.
SEE ALSO
aws-cli(1), scout(1), cloudsploit(1)
