Name | Modified | Size | Downloads / Week |
---|---|---|---|
Parent folder | |||
Prowler 5.9.0 source code.tar.gz | 2025-07-17 | 47.3 MB | |
Prowler 5.9.0 source code.zip | 2025-07-17 | 51.8 MB | |
README.md | 2025-07-17 | 11.3 kB | |
Totals: 3 Items | 99.2 MB | 0 |
New features to highlight in this version
π Mutelist Support
Easily mute findings through a flexible and fully configurable setup.
- Mute findings seamlessly either from the interface or through API calls, no extra effort required.
- Instantly toggle the visibility of muted findings across all visualizations and tables.
- The mute reason is clearly displayed in finding details and listing views for full transparency.
[!NOTE] π Support for muting findings based on filters, bulk selection, and adding custom mute details directly from the UI.
π Single Sign-On (SSO) with SAML: Seamless and Secure Access
We are pleased to introduce Single Sign-On (SSO) with SAML, a significant step forward in making your authentication experience both smoother and more secure. With SAML-based SSO, you can now log in to Prowler using your organization's identity provider, such as Okta, without needing to remember another set of credentials.
- Effortless Access: Simply use your existing corporate account to sign in, reducing password fatigue and streamlining your daily workflow.
- Enhanced Security: Authentication is managed by your trusted identity provider, ensuring that access policies and multi-factor authentication requirements are enforced consistently.
- Consistent Experience: The login process is now fully integrated with your organization's security standards, providing a familiar and reliable experience every time you access Prowler.
- Broad Compatibility: Our SAML integration supports leading providers like Okta and any other SAML-compatible service, making onboarding straightforward for organizations of all sizes.
To get started, look for the new "Sign in with SSO" option on the login page. For detailed configuration instructions, please refer to the "SSO with SAML" section in our documentation.
π§© Resource View: A unified overview of your assets
Introducing a brand-new Resource View, a central place to explore and understand your resources in depth.
- Browse all resources in your environment with a clean and organized layout.
- Each resource comes with its tags clearly displayed, making classification and filtering effortless.
- Quickly assess security posture by viewing findings directly linked to each resource β no need to navigate away.
- Get full visibility into resource details, provider info, and metadata.
[!NOTE] All findings are sorted by the number of the associated
FAIL
findings. This feature works from v5.9 onwards, so after your next scan all your resources will be sorted by that.
β‘οΈ Smoother, Faster Experience
We've made several improvements behind the scenes to make Prowler feel faster and more responsive.
- Resource and overview pages now load quicker, even in large environments.
- Filtering across findings and resources using the search bar is now accurate and noticeably faster.
- Interacting with data β whether through the UI or API β feels more fluid and efficient.
- New backend optimizations reduce wait times and improve overall performance across the platform.
π Enhanced Password Security
We've improved account security by introducing stronger password requirements. Passwords must now be at least 12 characters long and include a mix of uppercase letters, lowercase letters, numbers, and special characters. A real-time strength indicator helps users meet these criteria as they type, ensuring more secure account creation. These enhancements align with best practices to better protect user data and prevent unauthorized access.
[!WARNING] These changes apply only to new sign-ups. Existing passwords are not affected, but we strongly recommend updating your password to meet the new standards for improved security.
β New Checks!
We've added 8 new security checks across multiple cloud providers and services to help you stay ahead of evolving risks:
entra_intune_enrollment_sign_in_frequency_every_time
for M365.- The following 7 checks for Azure:
storage_smb_channel_encryption_with_secure_algorithm
storage_smb_protocol_version_is_latest
vm_backup_enabled
vm_linux_enforce_ssh_authentication
vm_ensure_using_approved_images
vm_scaleset_associated_load_balancer
defender_attack_path_notifications_properly_configured
π οΈ IaC Provider now supports remote Git repositories
The IaC provider just got more powerful! You can now scan Infrastructure-as-Code files directly from remote Git repositories.
- Supports both public and private repos
- Authenticate via CLI flags or environment variables
- Perfect for integrating into CI/CD pipelines and automated workflows
- Continue scanning Terraform, CloudFormation, Kubernetes YAML, and more
[!NOTE]
Try it out with:
prowler iac --scan-repository-url https://github.com/user/repo.git
UI
π Added
- Mutelist configuration form (#8190)
- SAML login integration (#8203)
- Resource view (#7760)
- Navigation link in Scans view to access Compliance Overview (#8251)
- Status column for findings table in the Compliance Detail view (#8244)
- Allow to restrict routes access based on user permissions (#8287)
π Security
- Enhanced password validation to enforce 12+ character passwords with special characters, uppercase, lowercase, and numbers (#8225)
π Changed
- Upgrade to Next.js 14.2.30 and lock TypeScript to 5.5.4 for ESLint compatibility (#8189)
π Fixed
- Error message when launching a scan if user has no permissions (#8280)
- Include compliance in the download button tooltip (#8307)
API
π Added
- SSO with SAML support (#8175)
GET /resources/metadata
,GET /resources/metadata/latest
andGET /resources/latest
to expose resource metadata and latest scan results (#8112)
π Changed
/processors
endpoints to post-process findings. Currently, only the Mutelist processor is supported to allow to mute findings.- Optimized the underlying queries for resources endpoints (#8112)
- Optimized include parameters for resources view (#8229)
- Optimized overview background tasks (#8300)
POST /schedules/daily
returns a409 CONFLICT
if already created (#8258)
π Fixed
- Search filter for findings and resources (#8112)
- RBAC is now applied to
GET /overviews/providers
(#8277)
π Security
- Enhanced password validation to enforce 12+ character passwords with special characters, uppercase, lowercase, and numbers (#8225)
SDK
π Added
storage_smb_channel_encryption_with_secure_algorithm
check for Azure provider (#8123)storage_smb_protocol_version_is_latest
check for Azure provider (#8128)vm_backup_enabled
check for Azure provider (#8182)vm_linux_enforce_ssh_authentication
check for Azure provider (#8149)vm_ensure_using_approved_images
check for Azure provider (#8168)vm_scaleset_associated_load_balancer
check for Azure provider (#8181)defender_attack_path_notifications_properly_configured
check for Azure provider (#8245)entra_intune_enrollment_sign_in_frequency_every_time
check for M365 provider (#8223)- Support for remote repository scanning in IaC provider (#8193)
- Add
test_connection
method to GitHub provider (#8248)
π Changed
- Refactor the Azure Defender get security contact configuration method to use the API REST endpoint instead of the SDK (#8241)
π Fixed
- Title & description wording for
iam_user_accesskey_unused
check for AWS provider (#8233) - Add GitHub provider to lateral panel in documentation and change -h environment variable output (#8246)
- Show
m365_identity_type
andm365_identity_id
in cloud reports (#8247) - Ensure
is_service_role
only returnsTrue
for service roles (#8274) - Update DynamoDB check metadata to fix broken link (#8273)
- Show correct count of findings in Dashboard Security Posture page (#8270)
- Add Check's metadata service name validator (#8289)
- Use subscription ID in Azure mutelist (#8290)
ServiceName
field in Network Firewall checks metadata (#8280)- Update
entra_users_mfa_capable
check to use the correct resource name and ID (#8288) - Handle multiple services and severities while listing checks (#8302)
- Handle
tenant_id
for M365 Mutelist (#8306)