Sergio Garcia
Sergio Garcia
Hi @hb3b, thank you for reaching out! I am running Prowler with groups and it works for me. Could you send us snapshots of the unexpected behavior?
Hi @hb3b, please reopen this PR if you are still with this problem.
Hi @kagahd, good catch, thank you for your contribution! But, why did you remove the cron from the [refresh_aws_services_regions.yml](https://github.com/prowler-cloud/prowler/pull/1420/commits/e15d07c8bf6cea3a50521f42d7826146ffe75386)?
Hi @kagahd, sorry for the delayed response. The check is duplicated and we included it in the roadmap of the new version 3 that we will release soon. Stay tuned...
so @D592 you would execute the check only for specific service roles and not apply it to all the services?
Hi @bblommers, thank you for your quick response! I was able to force the creation of the default policy that AWS provides if no PolicyDocument is given: ``` PolicyDocument=json.dumps( {...
Please @jfagoagas, review if the logic and functions used for the first check is correct in order to do the same for the rest of the checks.
For sure @Fennerr , great idea! I could help you with the metadata 💪🏼
Hi @addefisher, thank you for reaching us out! Good idea, we will adjust to CIS regarding the attachment of the policies and make a configurable option for the scope.
Sorry for the delay, I just created the PR with the changes. As CISv1.5 control 1.16 requires to check attaches policies for both custom or AWS managed, it did not...