Security News > 2024 > February > Prowler: Open-source security tool for AWS, Google Cloud Platform, Azure

Prowler is an open-source security tool designed to assess, audit, and enhance the security of AWS, GCP, and Azure.
"Easy to use from the command line with simple, understandable output, Prowler offers standard reporting formats like CSV and JSON, enabling users to thoroughly examine findings across any cloud provider, all in a uniform format. Its seamless integrations with Security Hub and S3 facilitate easy incorporation with other SIEMs, databases, and more. The ability to write custom checks and develop custom security frameworks is crucial for our expanding community," Toni de la Fuente, the creator of Prowler, told Help Net Security.
You can run Prowler from your workstation, an EC2 instance, Fargate, or any other container, Codebuild, CloudShell, and Cloud9.
The tool was written in Python using the AWS SDK, Azure SDK, and GCP API Python Client.
The developers are expanding Prowler with additional checks for Azure and GCP and full Kubernetes support in the upcoming version 4.0, which is scheduled for release in March.
Must read: 15 open-source cybersecurity tools you'll wish you'd known earlier.
News URL
Related news
- Google Cloud Researchers Uncover Flaws in Rsync File Synchronization Tool (source)
- Sara: Open-source RouterOS security inspector (source)
- What’s Next for Open Source Software Security in 2025? (source)
- GitHub CISO on security strategy and collaborating with the open-source community (source)
- How to Bring Zero Trust to Wi-Fi Security with a Cloud-based Captive Portal? (source)
- Fleet: Open-source platform for IT and security teams (source)
- Google Patches 47 Android Security Flaws, Including Actively Exploited CVE-2024-53104 (source)
- Google patches odd Android kernel security bug amid signs of targeted exploitation (source)
- Watch Out For These 8 Cloud Security Shifts in 2025 (source)
- Google Chrome's AI-powered security feature rolls out to everyone (source)