Closed yevgenypats closed 1 year ago
Hello @yevgenypats! Thanks for your kind words and suggestions. I respond to your ideas below:
In Prowler v3 we have a new way to implement security frameworks that make them more accurate and better to get comprehensive reports. In the nutshell, we have separated infra checks from compliance requirements. Unlike most of the tools out there, we don't map 1:1 a check with compliance requirement but multiple checks with them when needed. That is a game changer in v3 in my opinion (and also the speed of scan from the unique source of truth that is the CSP API).
Also we do non CSP API checks, like secrets scanning in multiple places of the infra, Shodan integration and more to come. I don't know if that is even possible with SQL queries.
With that said, what other collaboration would work?
@toniblyx Thanks for the detailed response!
Yeah I know you use boto right now, but basically the suggestion is to save you from developing all this code here: https://github.com/prowler-cloud/prowler/tree/master/prowler (which is a lot to develop and maintain).
If you use SQL for the queries then you can output in any format out of the box as depending on the destination that you use, most destinations like sqlite or postgres support export to csv, json and anything else.
I know it's a big architecture change but thought maybe it will be interesting. Totally understand if not as it might too big.
Re other collaboration, I think that's the only one that comes to mind as of this moment :)
Considering the important milestone we have achieved recently with v3, another foundational change is probably not appropriate at this point. We will think about other ways to integrate if possible. Thanks for your comments.
Hi folks!
I've been following this project closely as this is prob the best suite of open source checks for AWS and Azure :)
I had an interesting idea for collaboration:
1) For the data extraction phase use CloudQuery plugins - https://www.cloudquery.io/docs/plugins/sources/overview 2) For the policies use SQL and we will be happy to help here and transfer the current policies that we have to this repo. 2.1 ) The current that we have are for AWS, Azure, GCP and K8S
This can be a win win as this will give us a way to focus on the data extraction phase as we are mostly a data company and for you to focus solely on security rules and logic and expand to other cloud providers and checks (without writing the ingestion part).
Will be happy also to brainstorm more here or on our discord or via email
yp
atcloudquery.io