- Add
--vpc-peering-dot
to save vpc peering in a dot file
2023/03/10
- Display EC2 OS info and improve filter
- Pattern: add rule has_attribute_contain*
- Add
--only-dangerous-actions
for iam verb
- Fix
--layer
and add Usage in README
2023/01/26
- Add 'os' filter
- Add 'MQ' asset type
- Display InstanceID for EC2
- Filter IAM roles to display only Instance Profiles
2023/01/10
- Add Lambda object, displayed in draw for API Gateway
- Add
-o|--output
to save JSON audit and discovery in the specified file
2023/01/06
- Add
--limit
and--all
for draw
- Add Public ELB rule
2022/09/08
- Add
draw
verb :aws-tower draw <my-profile>
to display a threat map
- Dissociate IAM services and actions, easier to read and understand findings
- whitelist more IAM actions as readers and not poweruser
- Add more retryier in lambda monitoring and split in another lambda child
- Update deprecated RDS/EKS engine in rules
- Fix iam_scan to use min-rights
2022/08/24
- Add 'Endpoint Service has untrusted account in principals' rule
- Add option
-p|--list-profiles
to list available profiles
- Detect SSH keys issues if creation time > 6 months
- Remove
-n|--name
option
- Handle boto3 errors with pretty output (sso and more)
2022/06/22
- Add 'Public RDS database' rule
- [BETA] Add
-l|--layer
to generate a layer for the ATT&CK navigator
2022/06/18
- Improve filtering: add option
-f|--filter
(see README)
- Deprecate of
-n|--name
, use-f|--filter
instead
- Disabled cloudfront no longer appear in result
2022/04/21
- Add VPC Peering
- Add VPC Endpoint services
- Add VPC VPN
- Add multiple dangerous actions
- Lower severity for S3 IgnorePublicACLs
medium -> low
- Fix missing asset_id in lambda monitoring
- Factorize Pattern compilation for audit
2022/02/28
- Move lambda code to
monitoring/aws_lambda/
directory
2021/12/09
- Rich color for the CLI and
--no-color
argument - Add EKS
- Add RDS version alerting: mariadb, postgres, mysql, sqlserver-se (mssql)
- lambda: Update finding 'updated_at', in Patrowl, at each iteration
- lambda: Scan multiple regions
- Add EC2 associated roles, if at least EC2 and IAM are selected
- Add cache \o/ (
--no-cache
and--clean-cache
too) - Add IAM 'dangerous roles' detection
- Remove not vuln members in assetgroup (IAM and S3)
- DnsRecord severity changes from medium to low
- Remove 'support' IAM permission by default
- Rename ELBV2 to ELB
- Avoid crash if sts get caller identity fails
- Avoid crash if S3 Acls and permissions fails
- Avoid crash if Route53 permissions fails
- Don't scan Route53 if it's EC2 or ELB are not selected
- Avoid crash when 'Resource' is not present in RolePolicy (NotResource is ignored)
2021/10/04
- Add IAM_ROLENAME_PASSLIST to reduce noise
- Lambda: Can limite meta-type check for each account
2021/10/04
- Fix unknown region/vpc/subnet if token lacks permissions
2021/09/28
- Display errors if user with few authorizations
- Add welcome logging
2021/05/28
- Add API GATEWAY monitoring
- Add CloudFront monitoring
- [Lambda] Add in assetgroup in the laucher directly, before starting every sub lambdas
2021/05/26
- Add region for lambda profile configuration
2021/04/20
- Can specify IAM resource-name only, not necessarily the complete ARN
2021/04/15
- Add hashcode for all findings
2021/04/14
- Strip too long finding title in Patrowl import and add a hashcode
2021/04/14
- Fix missing 'Resource' parameter in policy statement
2021/04/08
- Add ACTION_PASSLIST to hide some legit actions
- Hide not roles without resources
'*'
to limit false positive
- Lambda: Block asset add in assetgroup is remote is empty (becaus of previous request failure)
2021/04/07
- Add finding_description method in assettypes
- S3 Groups are returned instead of S3
- Add 'env' parameter in lambda.config
2021/04/06
- Fix not referenced is_lost_asset in lambda...
2021/04/06
- Lambda: Can retrieve lost assets (asset without asset-group)
- Lambda: Add in asset group at the end of the lambda (instead of each new asset)
2021/03/19
- Case insensitive during name search
--name|-n
- Hidding IAM roles without Poweruser/Admin actions
- Stack IAM roles in an IAM Group
- Lambda: Remove Patterns and use asset.audit() only
2021/03/17
- Add IAM service type in discover and audit
- Add IAM rules
--action-category
is replaced by--min-rights
2021/03/12
- Add a iam positional argument, to display info avec IAM arn
2021/02/23
- Add a -n|--name optional argument, to filter the asset name
- Fix rules by splitting public|private assets
2021/02/18
- Add a lambda launcher to have one lambda per account
- rules are in yaml, not json
- rename 'scan' positional argument into 'audit'
- output is changed
- code is simplified
- updated requirements.txt (and requirements.lambda.txt)
- audit minimal severity is 'medium', not 'low'