-
Notifications
You must be signed in to change notification settings - Fork 2k
Description
Steps to Reproduce
Hey All,
I'm running prowler once a day, and I started to get a throttling exception on the AWS application elasticmapreduce.amazonaws.com for DescribeCluster events.
Can you specify which check does a lot for this event, and how can I reduce the number?
I run multiple check that include only one check for the EMR (emr_cluster_account_public_block_enabled)
I used a static version Prowler 3.13.0
Thanks.
Expected behavior
Reduce the number of API calls
Actual Result with Screenshots or Logs
Checks:
"iam_check_saml_providers_sts",
"guardduty_is_enabled",
"cloudtrail_multi_region_enabled",
"cloudtrail_logs_s3_bucket_is_not_publicly_accessible",
"ec2_ebs_public_snapshot",
"guardduty_no_high_severity_findings",
"iam_administrator_access_with_mfa",
"iam_avoid_root_usage",
"iam_no_root_access_key",
"iam_root_mfa_enabled"
"iam_no_custom_policy_permissive_role_assumption",
"iam_policy_allows_privilege_escalation",
"iam_customer_attached_policy_no_administrative_privileges",
"iam_user_mfa_enabled_console_access",
"s3_bucket_policy_public_write_access",
"s3_bucket_public_access",
"sns_topics_not_publicly_accessible",
"sqs_queues_not_publicly_accessible",
"ec2_ami_public",
"ec2_instance_secrets_user_data",
"ecr_repositories_not_publicly_accessible",
"redshift_cluster_public_access",
"opensearch_service_domains_not_publicly_accessible",
"iam_user_accesskey_unused",
"iam_user_console_access_unused",
"iam_password_policy_lowercase",
"rds_instance_no_public_access",
"rds_snapshots_public_access",
"iam_role_administratoraccess_policy",
"iam_inline_policy_no_administrative_privileges",
"s3_bucket_public_list_acl",
"s3_bucket_public_write_acl",
"awslambda_function_not_publicly_accessible",
"s3_account_level_public_access_blocks",
"emr_cluster_account_public_block_enabled",
"iam_user_no_setup_initial_access_key"
"ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21",
"ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22",
"ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389",
"ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23",
"ec2_securitygroup_allow_ingress_from_internet_to_any_port",
"autoscaling_find_secrets_ec2_launch_configuration",
"awslambda_function_no_secrets_in_code",
"awslambda_function_no_secrets_in_variables",
"cloudformation_stack_outputs_find_secrets",
"ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018",
"ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888",
"ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601",
"ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092",
"ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211",
"ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306",
"ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483",
"ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432",
"ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379",
"ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434",
"awslambda_function_url_public",
"cloudtrail_kms_encryption_enabled",
"iam_rotate_access_key_90_days",
"iam_user_two_active_access_key",
"iam_customer_unattached_policy_no_administrative_privileges",
"redshift_cluster_automatic_upgrades",
"s3_bucket_default_encryption",
"sns_topics_kms_encryption_at_rest_enabled",
"ssm_document_secrets",
"vpc_peering_routing_tables_with_least_privilege",
"ec2_ebs_default_encryption",
"ec2_securitygroup_allow_wide_open_public_ipv4"
How did you install Prowler?
Cloning the repository from github.com (git clone)
Environment Resource
Fargate Task
OS used
Linux
Prowler version
3.13.0
Pip version
3.9
Context
No response