Download Latest Version Prowler 5.9.2 source code.tar.gz (47.4 MB)
Email in envelope

Get an email when there's a new version of Prowler

Home / 5.9.0
Name Modified Size InfoDownloads / Week
Parent folder
Prowler 5.9.0 source code.tar.gz 2025-07-17 47.3 MB
Prowler 5.9.0 source code.zip 2025-07-17 51.8 MB
README.md 2025-07-17 11.3 kB
Totals: 3 Items   99.2 MB 0

New features to highlight in this version

πŸ”‡ Mutelist Support

Easily mute findings through a flexible and fully configurable setup.

  • Mute findings seamlessly either from the interface or through API calls, no extra effort required.
  • Instantly toggle the visibility of muted findings across all visualizations and tables.
  • The mute reason is clearly displayed in finding details and listing views for full transparency.

mutelist

[!NOTE] πŸ”œ Support for muting findings based on filters, bulk selection, and adding custom mute details directly from the UI.

πŸ” Single Sign-On (SSO) with SAML: Seamless and Secure Access

We are pleased to introduce Single Sign-On (SSO) with SAML, a significant step forward in making your authentication experience both smoother and more secure. With SAML-based SSO, you can now log in to Prowler using your organization's identity provider, such as Okta, without needing to remember another set of credentials.

  • Effortless Access: Simply use your existing corporate account to sign in, reducing password fatigue and streamlining your daily workflow.
  • Enhanced Security: Authentication is managed by your trusted identity provider, ensuring that access policies and multi-factor authentication requirements are enforced consistently.
  • Consistent Experience: The login process is now fully integrated with your organization's security standards, providing a familiar and reliable experience every time you access Prowler.
  • Broad Compatibility: Our SAML integration supports leading providers like Okta and any other SAML-compatible service, making onboarding straightforward for organizations of all sizes.

To get started, look for the new "Sign in with SSO" option on the login page. For detailed configuration instructions, please refer to the "SSO with SAML" section in our documentation.

saml1

🧩 Resource View: A unified overview of your assets

Introducing a brand-new Resource View, a central place to explore and understand your resources in depth.

  • Browse all resources in your environment with a clean and organized layout.
  • Each resource comes with its tags clearly displayed, making classification and filtering effortless.
  • Quickly assess security posture by viewing findings directly linked to each resource β€” no need to navigate away.
  • Get full visibility into resource details, provider info, and metadata.

resources

[!NOTE] All findings are sorted by the number of the associated FAIL findings. This feature works from v5.9 onwards, so after your next scan all your resources will be sorted by that.

⚑️ Smoother, Faster Experience

We've made several improvements behind the scenes to make Prowler feel faster and more responsive.

  • Resource and overview pages now load quicker, even in large environments.
  • Filtering across findings and resources using the search bar is now accurate and noticeably faster.
  • Interacting with data β€” whether through the UI or API β€” feels more fluid and efficient.
  • New backend optimizations reduce wait times and improve overall performance across the platform.

πŸ”’ Enhanced Password Security

We've improved account security by introducing stronger password requirements. Passwords must now be at least 12 characters long and include a mix of uppercase letters, lowercase letters, numbers, and special characters. A real-time strength indicator helps users meet these criteria as they type, ensuring more secure account creation. These enhancements align with best practices to better protect user data and prevent unauthorized access.

Screenshot 2025-07-17 at 18 17 32

[!WARNING] These changes apply only to new sign-ups. Existing passwords are not affected, but we strongly recommend updating your password to meet the new standards for improved security.

βœ… New Checks!

We've added 8 new security checks across multiple cloud providers and services to help you stay ahead of evolving risks:

  • entra_intune_enrollment_sign_in_frequency_every_time for M365.
  • The following 7 checks for Azure:
  • storage_smb_channel_encryption_with_secure_algorithm
  • storage_smb_protocol_version_is_latest
  • vm_backup_enabled
  • vm_linux_enforce_ssh_authentication
  • vm_ensure_using_approved_images
  • vm_scaleset_associated_load_balancer
  • defender_attack_path_notifications_properly_configured

πŸ› οΈ IaC Provider now supports remote Git repositories

The IaC provider just got more powerful! You can now scan Infrastructure-as-Code files directly from remote Git repositories.

  • Supports both public and private repos
  • Authenticate via CLI flags or environment variables
  • Perfect for integrating into CI/CD pipelines and automated workflows
  • Continue scanning Terraform, CloudFormation, Kubernetes YAML, and more

[!NOTE]
Try it out with:
prowler iac --scan-repository-url https://github.com/user/repo.git


UI

πŸš€ Added

  • Mutelist configuration form (#8190)
  • SAML login integration (#8203)
  • Resource view (#7760)
  • Navigation link in Scans view to access Compliance Overview (#8251)
  • Status column for findings table in the Compliance Detail view (#8244)
  • Allow to restrict routes access based on user permissions (#8287)

πŸ”’ Security

  • Enhanced password validation to enforce 12+ character passwords with special characters, uppercase, lowercase, and numbers (#8225)

πŸ”„ Changed

  • Upgrade to Next.js 14.2.30 and lock TypeScript to 5.5.4 for ESLint compatibility (#8189)

🐞 Fixed

  • Error message when launching a scan if user has no permissions (#8280)
  • Include compliance in the download button tooltip (#8307)

API

πŸš€ Added

  • SSO with SAML support (#8175)
  • GET /resources/metadata, GET /resources/metadata/latest and GET /resources/latest to expose resource metadata and latest scan results (#8112)

πŸ”„ Changed

  • /processors endpoints to post-process findings. Currently, only the Mutelist processor is supported to allow to mute findings.
  • Optimized the underlying queries for resources endpoints (#8112)
  • Optimized include parameters for resources view (#8229)
  • Optimized overview background tasks (#8300)
  • POST /schedules/daily returns a 409 CONFLICT if already created (#8258)

🐞 Fixed

  • Search filter for findings and resources (#8112)
  • RBAC is now applied to GET /overviews/providers (#8277)

πŸ”’ Security

  • Enhanced password validation to enforce 12+ character passwords with special characters, uppercase, lowercase, and numbers (#8225)

SDK

πŸš€ Added

  • storage_smb_channel_encryption_with_secure_algorithm check for Azure provider (#8123)
  • storage_smb_protocol_version_is_latest check for Azure provider (#8128)
  • vm_backup_enabled check for Azure provider (#8182)
  • vm_linux_enforce_ssh_authentication check for Azure provider (#8149)
  • vm_ensure_using_approved_images check for Azure provider (#8168)
  • vm_scaleset_associated_load_balancer check for Azure provider (#8181)
  • defender_attack_path_notifications_properly_configured check for Azure provider (#8245)
  • entra_intune_enrollment_sign_in_frequency_every_time check for M365 provider (#8223)
  • Support for remote repository scanning in IaC provider (#8193)
  • Add test_connection method to GitHub provider (#8248)

πŸ”„ Changed

  • Refactor the Azure Defender get security contact configuration method to use the API REST endpoint instead of the SDK (#8241)

🐞 Fixed

  • Title & description wording for iam_user_accesskey_unused check for AWS provider (#8233)
  • Add GitHub provider to lateral panel in documentation and change -h environment variable output (#8246)
  • Show m365_identity_type and m365_identity_id in cloud reports (#8247)
  • Ensure is_service_role only returns True for service roles (#8274)
  • Update DynamoDB check metadata to fix broken link (#8273)
  • Show correct count of findings in Dashboard Security Posture page (#8270)
  • Add Check's metadata service name validator (#8289)
  • Use subscription ID in Azure mutelist (#8290)
  • ServiceName field in Network Firewall checks metadata (#8280)
  • Update entra_users_mfa_capable check to use the correct resource name and ID (#8288)
  • Handle multiple services and severities while listing checks (#8302)
  • Handle tenant_id for M365 Mutelist (#8306)
Source: README.md, updated 2025-07-17