Skip to main content

Prowler (delta) 5.13.0

Test results for this specific product, vendor, and version combination

VendorProwler
ProductProwler (delta)
Version5.13.0

Test Summary

Aggregate summary of all tests for this configuration result

Resources In Configuration2
Count of Tests17
Passing Tests8
Failing Tests9
Catalogs Tested

Control Catalog Summary

Summary of test results grouped by control catalog and resource

Control CatalogResourcesTotal TestsPassingFailingTested RequirementsMissing Requirements
CCC.AuditLog
stcfistoragecad63808
422
CCC.Core
stcfistoragecad63808
1459
CCC.Logging
stcfistoragecad63808
220
CCC.MLDE
stcfistoragecad63808
422
CCC.ObjStor
stcfistoragecad63808
945

Test Mapping Summary

Summary of test mappings showing how event codes map to test requirements

Control CatalogTest RequirementMapped Tests (Event Code | Total | Passing | Failing)
CCC.AuditLog
CCC.AuditLog.CN04.AR01
When audit log buckets are created then verify that server access logging MUST be enabled for the audit log bucket, with logs delivered to a separate, secure logging bucket.
storage_blob_public_access_level_is_disabled
110
CCC.AuditLog
CCC.AuditLog.CN06.AR01
When the retention policy is applied, then data MUST be automatically deleted after the configured number of days.
storage_ensure_soft_delete_is_enabled
110
CCC.AuditLog
CCC.AuditLog.CN08.AR01
When an attempt is made to delete data before the object lock period expires, then the deletion MUST be denied.
storage_ensure_soft_delete_is_enabled
110
CCC.AuditLog
CCC.AuditLog.CN10.AR01
When audit log storage bucket's are created then, bucket's access control settings MUST explicitly deny public read and write access.
storage_blob_public_access_level_is_disabled
110
storage_ensure_private_endpoints_in_storage_accounts
101
CCC.AuditLog
CCC.AuditLog.CN10.AR02
When the URL of a audit log storage bucket's object is accessed publicly then, it should be denied by bucket policy.
storage_blob_public_access_level_is_disabled
110
storage_default_network_access_rule_is_denied
101
storage_ensure_private_endpoints_in_storage_accounts
101
CCC.Core
CCC.Core.CN01.AR01
When a port is exposed for non-SSH network traffic, all traffic MUST include a TLS handshake AND be encrypted using TLS 1.3 or higher.
storage_ensure_minimum_tls_version_12
110
storage_secure_transfer_required_is_enabled
110
CCC.Core
CCC.Core.CN01.AR02
When a port is exposed for SSH network traffic, all traffic MUST include a SSH handshake AND be encrypted using SSHv2 or higher.
storage_ensure_minimum_tls_version_12
110
storage_secure_transfer_required_is_enabled
110
CCC.Core
CCC.Core.CN01.AR03
When the service receives unencrypted traffic, then it MUST either block the request or automatically redirect it to the secure equivalent.
storage_ensure_minimum_tls_version_12
110
storage_secure_transfer_required_is_enabled
110
CCC.Core
CCC.Core.CN01.AR07
When a port is exposed, the service MUST ensure that the protocol and service officially assigned to that port number by the IANA Service Name and Transport Protocol Port Number Registry, and no other, is run on that port.
storage_ensure_minimum_tls_version_12
110
storage_secure_transfer_required_is_enabled
110
storage_smb_channel_encryption_with_secure_algorithm
101
CCC.Core
CCC.Core.CN02.AR01
When data is stored, it MUST be encrypted using the latest industry-standard encryption methods.
storage_ensure_encryption_with_customer_managed_keys
101
storage_infrastructure_encryption_is_enabled
101
CCC.Core
CCC.Core.CN05.AR02
When administrative access or configuration change is attempted on the service or a child resource, the service MUST refuse requests from unauthorized entities.
storage_account_key_access_disabled
101
storage_default_to_entra_authorization_enabled
101
storage_ensure_azure_services_are_trusted_to_access_is_enabled
110
storage_ensure_private_endpoints_in_storage_accounts
101
CCC.Core
CCC.Core.CN05.AR03
When administrative access or configuration change is attempted on the service or a child resource in a multi-tenant environment, the service MUST refuse requests across tenant boundaries unless the origin is explicitly included in a pre-approved allowlist.
storage_blob_public_access_level_is_disabled
110
storage_cross_tenant_replication_disabled
101
storage_default_network_access_rule_is_denied
101
storage_ensure_private_endpoints_in_storage_accounts
101
CCC.Core
CCC.Core.CN05.AR04
When data is requested from outside the trust perimeter, the service MUST refuse requests from unauthorized entities.
storage_account_key_access_disabled
101
storage_default_network_access_rule_is_denied
101
storage_default_to_entra_authorization_enabled
101
storage_ensure_azure_services_are_trusted_to_access_is_enabled
110
storage_secure_transfer_required_is_enabled
110
CCC.Core
CCC.Core.CN05.AR05
When any request is made from outside the trust perimeter, the service MUST NOT provide any response that may indicate the service exists.
storage_account_key_access_disabled
101
storage_default_to_entra_authorization_enabled
101
storage_ensure_azure_services_are_trusted_to_access_is_enabled
110
storage_ensure_private_endpoints_in_storage_accounts
101
CCC.Core
CCC.Core.CN06.AR01
When the service is running, its region and availability zone MUST be included in a list of explicitly trusted or approved locations within the trust perimeter.
storage_ensure_private_endpoints_in_storage_accounts
101
CCC.Core
CCC.Core.CN08.AR01
When data is created or modified, the data MUST have a complete and recoverable duplicate that is stored in a physically separate data center.
storage_geo_redundant_enabled
110
CCC.Core
CCC.Core.CN08.AR02
When data is replicated into a second location, the service MUST be able to accurately represent the replication locations, replication status, and data synchronization status.
storage_geo_redundant_enabled
110
CCC.Core
CCC.Core.CN10.AR01
When data is replicated, the service MUST ensure that replication only occurs to destinations that are explicitly included within the defined trust perimeter.
storage_cross_tenant_replication_disabled
101
storage_ensure_private_endpoints_in_storage_accounts
101
CCC.Core
CCC.Core.CN11.AR01
When encryption keys are used, the service MUST verify that all encryption keys use the latest industry-standard cryptographic algorithms.
storage_ensure_encryption_with_customer_managed_keys
101
storage_ensure_minimum_tls_version_12
110
storage_secure_transfer_required_is_enabled
110
storage_smb_channel_encryption_with_secure_algorithm
101
CCC.Core
CCC.Core.CN11.AR02
When encryption keys are used, the service MUST rotate active keys within 180 days of issuance.
storage_key_rotation_90_days
101
CCC.Core
CCC.Core.CN11.AR03
When encrypting data, the service MUST verify that customer-managed encryption keys (CMEKs) are used.
storage_ensure_encryption_with_customer_managed_keys
101
CCC.Core
CCC.Core.CN11.AR04
When encryption keys are accessed, the service MUST verify that access to encryption keys is restricted to authorized personnel and services, following the principle of least privilege.
storage_ensure_encryption_with_customer_managed_keys
101
CCC.Core
CCC.Core.CN11.AR05
When encryption keys are used, the service MUST rotate active keys within 365 days of issuance.
storage_ensure_encryption_with_customer_managed_keys
101
storage_key_rotation_90_days
101
CCC.Core
CCC.Core.CN13.AR02
When a port is exposed that uses certificate-based encryption, the service MUST rotate active certificates within 180 days of issuance.
storage_ensure_encryption_with_customer_managed_keys
101
CCC.Logging
CCC.Logging.CN05.AR01
When a log storage bucket is created, the bucket's access control settings MUST explicitly deny public read and write access.
storage_blob_public_access_level_is_disabled
110
CCC.Logging
CCC.Logging.CN05.AR02
When the URL of a log storage bucket's object is accessed publicly, the action MUST be denied by bucket policy.
storage_blob_public_access_level_is_disabled
110
storage_geo_redundant_enabled
110
CCC.MLDE
CCC.MLDE.CN07.AR01
Verify that MLDE instances containing sensitive data cannot be accessed via public IP addresses.
storage_blob_public_access_level_is_disabled
110
storage_default_network_access_rule_is_denied
101
storage_ensure_private_endpoints_in_storage_accounts
101
CCC.MLDE
CCC.MLDE.CN07.AR02
For MLDE instances without sensitive data requiring public access, ensure that appropriate security controls are in place and access is approved.
storage_default_network_access_rule_is_denied
101
storage_ensure_private_endpoints_in_storage_accounts
101
CCC.MLDE
CCC.MLDE.CN08.AR01
Verify that MLDE instances containing sensitive data can only be deployed in approved virtual networks with appropriate security controls.
storage_default_network_access_rule_is_denied
101
storage_ensure_private_endpoints_in_storage_accounts
101
CCC.MLDE
CCC.MLDE.CN08.AR02
Ensure that MLDE instances without sensitive data are deployed in networks that meet organizational security standards.
storage_default_network_access_rule_is_denied
101
storage_ensure_azure_services_are_trusted_to_access_is_enabled
110
storage_ensure_private_endpoints_in_storage_accounts
101
CCC.ObjStor
CCC.ObjStor.CN01.AR01
When a request is made to read a bucket, the service MUST prevent any request using KMS keys not listed as trusted by the organization.
storage_ensure_encryption_with_customer_managed_keys
101
CCC.ObjStor
CCC.ObjStor.CN01.AR02
When a request is made to read an object, the service MUST prevent any request using KMS keys not listed as trusted by the organization.
storage_ensure_encryption_with_customer_managed_keys
101
CCC.ObjStor
CCC.ObjStor.CN01.AR03
When a request is made to write to a bucket, the service MUST prevent any request using KMS keys not listed as trusted by the organization.
storage_ensure_encryption_with_customer_managed_keys
101
storage_ensure_private_endpoints_in_storage_accounts
101
CCC.ObjStor
CCC.ObjStor.CN01.AR04
When a request is made to write to an object, the service MUST prevent any request using KMS keys not listed as trusted by the organization.
storage_ensure_encryption_with_customer_managed_keys
101
CCC.ObjStor
CCC.ObjStor.CN02.AR01
When a permission set is allowed for an object in a bucket, the service MUST allow the same permission set to access all objects in the same bucket.
storage_blob_public_access_level_is_disabled
110
storage_default_network_access_rule_is_denied
101
storage_ensure_private_endpoints_in_storage_accounts
101
CCC.ObjStor
CCC.ObjStor.CN02.AR02
When a permission set is denied for an object in a bucket, the service MUST deny the same permission set to access all objects in the same bucket.
storage_account_key_access_disabled
101
storage_blob_public_access_level_is_disabled
110
storage_default_to_entra_authorization_enabled
101
storage_ensure_private_endpoints_in_storage_accounts
101
CCC.ObjStor
CCC.ObjStor.CN03.AR01
When an object storage bucket deletion is attempted, the bucket MUST be fully recoverable for a set time-frame after deletion is requested.
storage_blob_versioning_is_enabled
110
storage_ensure_soft_delete_is_enabled
110
CCC.ObjStor
CCC.ObjStor.CN04.AR01
When an object is uploaded to the object storage system, the object MUST automatically receive a default retention policy that prevents premature deletion or modification.
storage_blob_versioning_is_enabled
110
storage_ensure_file_shares_soft_delete_is_enabled
110
storage_ensure_soft_delete_is_enabled
110
CCC.ObjStor
CCC.ObjStor.CN04.AR02
When an attempt is made to delete or modify an object that is subject to an active retention policy, the service MUST prevent the action from being completed.
storage_ensure_file_shares_soft_delete_is_enabled
110
storage_ensure_soft_delete_is_enabled
110
CCC.ObjStor
CCC.ObjStor.CN05.AR01
When an object is uploaded to the object storage bucket, the object MUST be stored with a unique identifier.
storage_blob_versioning_is_enabled
110
CCC.ObjStor
CCC.ObjStor.CN05.AR02
When an object is modified, the service MUST assign a new unique identifier to the modified object to differentiate it from the previous version.
storage_blob_versioning_is_enabled
110
CCC.ObjStor
CCC.ObjStor.CN05.AR03
When an object is modified, the service MUST allow for recovery of previous versions of the object.
storage_blob_versioning_is_enabled
110
CCC.ObjStor
CCC.ObjStor.CN05.AR04
When an object is deleted, the service MUST retain other versions of the object to allow for recovery of previous versions.
storage_blob_versioning_is_enabled
110

Resource Summary

Summary of all resources mentioned in OCSF results

Resource NameResource TypeControl CatalogsTotal TestsPassingFailing
stcfistoragecad63808
AzureStorageAccount1688
stcfistoragecad63808
AzureRole101

Test Results

OCSF test results filtered for entries with CCC compliance mappings

StatusFindingResource NameResource TypeMessageTest Requirements
FAIL
Ensure allow storage account key access is disabled
Storage account stcfistoragecad63808 from subscription Azure subscription 1 has shared key access enabled.
stcfistoragecad63808
AzureStorageAccount
Storage account stcfistoragecad63808 from subscription Azure subscription 1 has shared key access enabled.
PASS
Ensure that the 'Public access level' is set to 'Private (no anonymous access)' for all blob containers in your storage account
Storage account stcfistoragecad63808 from subscription Azure subscription 1 has allow blob public access disabled.
stcfistoragecad63808
AzureStorageAccount
Storage account stcfistoragecad63808 from subscription Azure subscription 1 has allow blob public access disabled.
PASS
Ensure Blob Versioning is Enabled on Azure Blob Storage Accounts
Storage account stcfistoragecad63808 from subscription Azure subscription 1 has blob versioning enabled.
stcfistoragecad63808
AzureStorageAccount
Storage account stcfistoragecad63808 from subscription Azure subscription 1 has blob versioning enabled.
FAIL
Ensure cross-tenant replication is disabled
Storage account stcfistoragecad63808 from subscription Azure subscription 1 has cross-tenant replication enabled.
stcfistoragecad63808
AzureStorageAccount
Storage account stcfistoragecad63808 from subscription Azure subscription 1 has cross-tenant replication enabled.
FAIL
Ensure Default Network Access Rule for Storage Accounts is Set to Deny
Storage account stcfistoragecad63808 from subscription Azure subscription 1 has network access rule set to Allow.
stcfistoragecad63808
AzureStorageAccount
Storage account stcfistoragecad63808 from subscription Azure subscription 1 has network access rule set to Allow.
FAIL
Ensure Microsoft Entra authorization is enabled by default for Azure Storage Accounts
Default to Microsoft Entra authorization is not enabled for storage account stcfistoragecad63808.
stcfistoragecad63808
AzureStorageAccount
Default to Microsoft Entra authorization is not enabled for storage account stcfistoragecad63808.
PASS
Ensure that 'Allow trusted Microsoft services to access this storage account' is enabled for storage accounts
Storage account stcfistoragecad63808 from subscription Azure subscription 1 allows trusted Microsoft services to access this storage account.
stcfistoragecad63808
AzureStorageAccount
Storage account stcfistoragecad63808 from subscription Azure subscription 1 allows trusted Microsoft services to access this storage account.
FAIL
Ensure that your Microsoft Azure Storage accounts are using Customer Managed Keys (CMKs) instead of Microsoft Managed Keys
Storage account stcfistoragecad63808 from subscription Azure subscription 1 does not encrypt with CMKs.
stcfistoragecad63808
AzureStorageAccount
Storage account stcfistoragecad63808 from subscription Azure subscription 1 does not encrypt with CMKs.
PASS
Ensure soft delete for Azure File Shares is enabled
File share soft delete is enabled for storage account stcfistoragecad63808 with a retention period of 7 days.
stcfistoragecad63808
AzureStorageAccount
File share soft delete is enabled for storage account stcfistoragecad63808 with a retention period of 7 days.
PASS
Ensure the 'Minimum TLS version' for storage accounts is set to 'Version 1.2'
Storage account stcfistoragecad63808 from subscription Azure subscription 1 has TLS version set to 1.2.
stcfistoragecad63808
AzureStorageAccount
Storage account stcfistoragecad63808 from subscription Azure subscription 1 has TLS version set to 1.2.
FAIL
Ensure Private Endpoints are used to access Storage Accounts
Storage account stcfistoragecad63808 from subscription Azure subscription 1 does not have private endpoint connections.
stcfistoragecad63808
AzureStorageAccount
Storage account stcfistoragecad63808 from subscription Azure subscription 1 does not have private endpoint connections.
PASS
Ensure Soft Delete is Enabled for Azure Containers and Blob Storage
Storage account stcfistoragecad63808 from subscription Azure subscription 1 has soft delete enabled.
stcfistoragecad63808
AzureStorageAccount
Storage account stcfistoragecad63808 from subscription Azure subscription 1 has soft delete enabled.
PASS
Ensure geo-redundant storage (GRS) is enabled on critical Azure Storage Accounts
Storage account stcfistoragecad63808 from subscription Azure subscription 1 has Geo-redundant storage Standard_GRS enabled.
stcfistoragecad63808
AzureStorageAccount
Storage account stcfistoragecad63808 from subscription Azure subscription 1 has Geo-redundant storage Standard_GRS enabled.
FAIL
Ensure that 'Enable Infrastructure Encryption' for Each Storage Account in Azure Storage is Set to 'enabled'
Storage account stcfistoragecad63808 from subscription Azure subscription 1 has infrastructure encryption disabled.
stcfistoragecad63808
AzureRole
Storage account stcfistoragecad63808 from subscription Azure subscription 1 has infrastructure encryption disabled.
FAIL
Ensure that Storage Account Access Keys are Periodically Regenerated
Storage account stcfistoragecad63808 from subscription Azure subscription 1 has no key expiration period set.
stcfistoragecad63808
AzureStorageAccount
Storage account stcfistoragecad63808 from subscription Azure subscription 1 has no key expiration period set.
PASS
Ensure that all data transferred between clients and your Azure Storage account is encrypted using the HTTPS protocol.
Storage account stcfistoragecad63808 from subscription Azure subscription 1 has secure transfer required enabled.
stcfistoragecad63808
AzureStorageAccount
Storage account stcfistoragecad63808 from subscription Azure subscription 1 has secure transfer required enabled.
FAIL
Ensure SMB channel encryption uses a secure algorithm for SMB file shares
Storage account stcfistoragecad63808 from subscription Azure subscription 1 does not have SMB channel encryption enabled for file shares.
stcfistoragecad63808
AzureStorageAccount
Storage account stcfistoragecad63808 from subscription Azure subscription 1 does not have SMB channel encryption enabled for file shares.