New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Bug]: iam_user_console_access_unused.py checks for last password usage #3176
Comments
Hi @IvanKusturic, Those checks rely on the credential report created by IAM service. That report is refreshed every 4 hours, that could be the reason behind that false positives. Could you test it again and let us know the result? Thanks |
Hi @n4ch04, Thank you for quick response. I understand how this check works, so let me further explain my situation. On AWS account I have users that used passwords long time ago for console access and prowler reports them. We don't use passwords anymore for accessing AWS and Console Access is disabled for all of the users. From my point of view, it maybe makes sense to check is Console Access enabled for a user before checking when user last used password for access(On this line probably). What's the point of checking password usage if Console Access is disabled? Thanks |
Hey @n4ch04, any update on this? Thanks |
Steps to Reproduce
Results of running Prowler as Fargate task on AWS
Expected behavior
For check with name iam_user_console_access_unused, I would expect to check is user Console access disabled since current report makes false alarm for users with already disabled Console access.
Actual Result with Screenshots or Logs
No screenshots or logs
How did you install Prowler?
Docker (docker pull toniblyx/prowler)
Environment Resource
Fargate task
OS used
Amazon Linux
Prowler version
latest
Pip version
Unknown
Context
No response
The text was updated successfully, but these errors were encountered: