Skip to content

Commit 1ebdd24

Browse files
andoniafHamza-abughazaleh
authored andcommitted
feat(iac): set only misconfig and secret as default scanners (prowler-cloud#9553)
1 parent f79a593 commit 1ebdd24

File tree

3 files changed

+36
-12
lines changed

3 files changed

+36
-12
lines changed

docs/user-guide/providers/iac/getting-started-iac.mdx

Lines changed: 33 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -5,18 +5,26 @@ import { VersionBadge } from "/snippets/version-badge.mdx"
55

66
Prowler's Infrastructure as Code (IaC) provider enables scanning of local or remote infrastructure code for security and compliance issues using [Trivy](https://trivy.dev/). This provider supports a wide range of IaC frameworks, allowing assessment of code before deployment.
77

8-
## Supported Scanners
9-
10-
The IaC provider leverages [Trivy](https://trivy.dev/latest/docs/scanner/vulnerability/) to support multiple scanners, including:
11-
12-
- Vulnerability
13-
- Misconfiguration
14-
- Secret
15-
- License
8+
## Supported IaC Formats
9+
10+
Prowler IaC provider scans the following Infrastructure as Code configurations for misconfigurations and secrets:
11+
12+
| Configuration Type | File Patterns |
13+
|--------------------|----------------------------------------------|
14+
| Kubernetes | `*.yml`, `*.yaml`, `*.json` |
15+
| Docker | `Dockerfile`, `Containerfile` |
16+
| Terraform | `*.tf`, `*.tf.json`, `*.tfvars` |
17+
| Terraform Plan | `tfplan`, `*.tfplan`, `*.json` |
18+
| CloudFormation | `*.yml`, `*.yaml`, `*.json` |
19+
| Azure ARM Template | `*.json` |
20+
| Helm | `*.yml`, `*.yaml`, `*.tpl`, `*.tar.gz`, etc. |
21+
| YAML | `*.yaml`, `*.yml` |
22+
| JSON | `*.json` |
23+
| Ansible | `*.yml`, `*.yaml`, `*.json`, `*.ini`, without extension |
1624

1725
## How It Works
1826

19-
- The IaC provider scans local directories (or specified paths) for supported IaC files, or scans remote repositories.
27+
- Prowler App leverages [Trivy](https://trivy.dev/docs/latest/guide/coverage/iac/#scanner) to scan local directories (or specified paths) for supported IaC files, or scans remote repositories.
2028
- No cloud credentials or authentication are required for local scans.
2129
- For remote repository scans, authentication can be provided via [git URL](https://git-scm.com/docs/git-clone#_git_urls), CLI flags or environment variables.
2230
- Check the [IaC Authentication](/user-guide/providers/iac/authentication) page for more details.
@@ -27,6 +35,10 @@ The IaC provider leverages [Trivy](https://trivy.dev/latest/docs/scanner/vulnera
2735

2836
<VersionBadge version="5.14.0" />
2937

38+
### Supported Scanners
39+
40+
Scanner selection is not configurable in Prowler App. Default scanners, misconfig and secret, run automatically during each scan.
41+
3042
### Step 1: Access Prowler Cloud/App
3143

3244
1. Navigate to [Prowler Cloud](https://cloud.prowler.com/) or launch [Prowler App](/user-guide/tutorials/prowler-app)
@@ -63,6 +75,17 @@ The IaC provider leverages [Trivy](https://trivy.dev/latest/docs/scanner/vulnera
6375

6476
<VersionBadge version="5.8.0" />
6577

78+
### Supported Scanners
79+
80+
Prowler CLI supports the following scanners:
81+
82+
- [Vulnerability](https://trivy.dev/docs/latest/guide/scanner/vulnerability/)
83+
- [Misconfiguration](https://trivy.dev/docs/latest/guide/scanner/misconfiguration/)
84+
- [Secret](https://trivy.dev/docs/latest/guide/scanner/secret/)
85+
- [License](https://trivy.dev/docs/latest/guide/scanner/license/)
86+
87+
By default, only misconfiguration and secret scanners run during a scan. To specify which scanners to use, refer to the [Specify Scanners](#specify-scanners) section below.
88+
6689
### Usage
6790

6891
Use the `iac` argument to run Prowler with the IaC provider. Specify the directory or repository to scan, frameworks to include, and paths to exclude.
@@ -103,7 +126,7 @@ Authentication for private repositories can be provided using one of the followi
103126

104127
#### Specify Scanners
105128

106-
Scan only vulnerability and misconfiguration scanners:
129+
To run only specific scanners, use the `--scanners` flag. For example, to scan only for vulnerabilities and misconfigurations:
107130

108131
```sh
109132
prowler iac --scan-path ./my-iac-directory --scanners vuln misconfig

prowler/CHANGELOG.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@ All notable changes to the **Prowler SDK** are documented in this file.
77
### Added
88

99
- `privilege-escalation` and `ec2-imdsv1` categories for AWS checks [(#9536)](https://github.com/prowler-cloud/prowler/pull/9536)
10+
- Supported IaC formats and scanner documentation for the IaC provider [(#9553)](https://github.com/prowler-cloud/prowler/pull/9553)
1011

1112
## [5.15.1] (Prowler UNRELEASED)
1213

prowler/providers/iac/lib/arguments/arguments.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,9 +35,9 @@ def init_parser(self):
3535
"--scanner",
3636
dest="scanners",
3737
nargs="+",
38-
default=["vuln", "misconfig", "secret"],
38+
default=["misconfig", "secret"],
3939
choices=SCANNERS_CHOICES,
40-
help="Comma-separated list of scanners to scan. Default: vuln, misconfig, secret",
40+
help="Comma-separated list of scanners to scan. Default: misconfig, secret",
4141
)
4242
iac_scan_subparser.add_argument(
4343
"--exclude-path",

0 commit comments

Comments
 (0)