rieck-srlabs

Results 13 issues of rieck-srlabs

# Description - Updates `azure-mgmt-storage` dependency to `17.0.0`. Needed because the version currently used in ScoutSuite does not support checking if a storage account support access keys or not. -...

# Description This commit changes the UI description for the Azure rule 'Blob Containers Allowing Public Access'. The UI incorrectly specified that the rule scans Storage Accounts, while it actually...

# Description ScoutSuite failed to flag key vaults where the `enable_rbac_authorization field` was set to `null`. Through manual configuration in the Azure portal I confirmed that RBAC Access Control is...

**Describe the bug** ScoutSuite incorrectly flags Storage Accounts that do not allow access keys as having never been rotated. **To Reproduce** Create a storage account that does not permit access...

bug
potential

**Describe the bug** The rule 'Blob Containers Allowing Public Access' states how many Storage Accounts were checked and how many Storage Accounts were flagged. However, the rule checks and flags...

bug
potential

**Describe the bug** ScoutSuite's 'Key Vault Role Based Access Control Disabled' rule fails to flag certain Key Vaults that are using the Vault access policy permission model. The problem is...

bug
potential

### Description Prowler (v3) failed to produce _valid_ HTML outputs. There were - tags not closed - attributes not placed in double quotes - text elements not properly HTML-escaped -...

### Steps to Reproduce There are various AWS checks that currently only consider `"Custom"` policies: - `iam_policy_no_full_access_to_cloudtrail` - `iam_policy_no_full_access_to_kms` - `iam_policy_allows_privilege_escalation` To reproduce, 1. Create an inline policy allowing full...

bug
status/needs-triage
provider/aws

### Description Renames tags policies to tag policies to align with [AWS documentation](https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_policies_tag-policies.html) ### License By submitting this pull request, I confirm that my contribution is made under the terms...

no-merge
provider/aws

The code previously returned all groups, not just security groups. This PR fixes #22