Prowler (delta) 5.13.0
Test results for this specific product, vendor, and version combination
| Vendor | Prowler |
| Product | Prowler (delta) |
| Version | 5.13.0 |
Test Summary
Aggregate summary of all tests for this configuration result
| Resources In Configuration | 2 |
| Count of Tests | 17 |
| Passing Tests | 8 |
| Failing Tests | 9 |
| Catalogs Tested |
Control Catalog Summary
Summary of test results grouped by control catalog and resource
| Control Catalog | Resources | Total Tests | Passing | Failing | Tested Requirements | Missing Requirements |
|---|---|---|---|---|---|---|
| CCC.AuditLog | stcfistoragecad63808 | 4 | 2 | 2 | ||
| CCC.Core | stcfistoragecad63808 | 14 | 5 | 9 | CCC.Core.CN01.AR01CCC.Core.CN01.AR02CCC.Core.CN01.AR03CCC.Core.CN01.AR07CCC.Core.CN02.AR01CCC.Core.CN05.AR02CCC.Core.CN05.AR03CCC.Core.CN05.AR04CCC.Core.CN05.AR05CCC.Core.CN06.AR01CCC.Core.CN08.AR01CCC.Core.CN08.AR02CCC.Core.CN10.AR01CCC.Core.CN11.AR01CCC.Core.CN11.AR02CCC.Core.CN11.AR03CCC.Core.CN11.AR04CCC.Core.CN11.AR05CCC.Core.CN13.AR02 | CCC.Core.CN01.AR08CCC.Core.CN03.AR01CCC.Core.CN03.AR02CCC.Core.CN03.AR03CCC.Core.CN03.AR04CCC.Core.CN04.AR01CCC.Core.CN04.AR02CCC.Core.CN04.AR03CCC.Core.CN05.AR01CCC.Core.CN05.AR06CCC.Core.CN06.AR02CCC.Core.CN07.AR01CCC.Core.CN07.AR02CCC.Core.CN09.AR01CCC.Core.CN09.AR02CCC.Core.CN09.AR03CCC.Core.CN11.AR06CCC.Core.CN13.AR01CCC.Core.CN13.AR03CCC.Core.CN14.AR01CCC.Core.CN14.AR02 |
| CCC.Logging | stcfistoragecad63808 | 2 | 2 | 0 | ||
| CCC.MLDE | stcfistoragecad63808 | 4 | 2 | 2 | ||
| CCC.ObjStor | stcfistoragecad63808 | 9 | 4 | 5 |
Test Mapping Summary
Summary of test mappings showing how event codes map to test requirements
| Control Catalog | Test Requirement | Mapped Tests (Event Code | Total | Passing | Failing) |
|---|---|---|
| CCC.AuditLog | CCC.AuditLog.CN04.AR01 When audit log buckets are created then verify that server access
logging MUST be enabled for the audit log bucket,
with logs delivered to a separate, secure logging bucket.
| storage_blob_public_access_level_is_disabled110 |
| CCC.AuditLog | CCC.AuditLog.CN06.AR01 When the retention policy is applied, then data MUST
be automatically deleted after the configured number of days.
| storage_ensure_soft_delete_is_enabled110 |
| CCC.AuditLog | CCC.AuditLog.CN08.AR01 When an attempt is made to delete data before the object
lock period expires, then the deletion MUST be denied.
| storage_ensure_soft_delete_is_enabled110 |
| CCC.AuditLog | CCC.AuditLog.CN10.AR01 When audit log storage bucket's are created then, bucket's access control settings MUST explicitly deny
public read and write access.
| storage_blob_public_access_level_is_disabled110 storage_ensure_private_endpoints_in_storage_accounts101 |
| CCC.AuditLog | CCC.AuditLog.CN10.AR02 When the URL of a audit log storage bucket's object is accessed publicly then,
it should be denied by bucket policy.
| storage_blob_public_access_level_is_disabled110 storage_default_network_access_rule_is_denied101 storage_ensure_private_endpoints_in_storage_accounts101 |
| CCC.Core | CCC.Core.CN01.AR01 When a port is exposed for non-SSH network traffic, all traffic
MUST include a TLS handshake AND be encrypted using TLS 1.3 or
higher.
| storage_ensure_minimum_tls_version_12110 storage_secure_transfer_required_is_enabled110 |
| CCC.Core | CCC.Core.CN01.AR02 When a port is exposed for SSH network traffic, all traffic MUST
include a SSH handshake AND be encrypted using SSHv2 or higher.
| storage_ensure_minimum_tls_version_12110 storage_secure_transfer_required_is_enabled110 |
| CCC.Core | CCC.Core.CN01.AR03 When the service receives unencrypted traffic,
then it MUST either block the request or automatically
redirect it to the secure equivalent.
| storage_ensure_minimum_tls_version_12110 storage_secure_transfer_required_is_enabled110 |
| CCC.Core | CCC.Core.CN01.AR07 When a port is exposed, the service MUST ensure that the protocol
and service officially assigned to that port number by the IANA
Service Name and Transport Protocol Port Number Registry, and no
other, is run on that port.
| storage_ensure_minimum_tls_version_12110 storage_secure_transfer_required_is_enabled110 storage_smb_channel_encryption_with_secure_algorithm101 |
| CCC.Core | CCC.Core.CN02.AR01 When data is stored, it MUST be encrypted using the latest
industry-standard encryption methods.
| storage_ensure_encryption_with_customer_managed_keys101 storage_infrastructure_encryption_is_enabled101 |
| CCC.Core | CCC.Core.CN05.AR02 When administrative access or configuration change is attempted on
the service or a child resource, the service MUST refuse requests
from unauthorized entities.
| storage_account_key_access_disabled101 storage_default_to_entra_authorization_enabled101 storage_ensure_azure_services_are_trusted_to_access_is_enabled110 storage_ensure_private_endpoints_in_storage_accounts101 |
| CCC.Core | CCC.Core.CN05.AR03 When administrative access or configuration change is attempted on
the service or a child resource in a multi-tenant environment, the
service MUST refuse requests across tenant boundaries unless the
origin is explicitly included in a pre-approved allowlist.
| storage_blob_public_access_level_is_disabled110 storage_cross_tenant_replication_disabled101 storage_default_network_access_rule_is_denied101 storage_ensure_private_endpoints_in_storage_accounts101 |
| CCC.Core | CCC.Core.CN05.AR04 When data is requested from outside the trust perimeter, the
service MUST refuse requests from unauthorized entities.
| storage_account_key_access_disabled101 storage_default_network_access_rule_is_denied101 storage_default_to_entra_authorization_enabled101 storage_ensure_azure_services_are_trusted_to_access_is_enabled110 storage_secure_transfer_required_is_enabled110 |
| CCC.Core | CCC.Core.CN05.AR05 When any request is made from outside the trust perimeter,
the service MUST NOT provide any response that may indicate the
service exists.
| storage_account_key_access_disabled101 storage_default_to_entra_authorization_enabled101 storage_ensure_azure_services_are_trusted_to_access_is_enabled110 storage_ensure_private_endpoints_in_storage_accounts101 |
| CCC.Core | CCC.Core.CN06.AR01 When the service is running, its region and availability zone MUST
be included in a list of explicitly trusted or approved locations
within the trust perimeter.
| storage_ensure_private_endpoints_in_storage_accounts101 |
| CCC.Core | CCC.Core.CN08.AR01 When data is created or modified, the data MUST have a complete
and recoverable duplicate that is stored in a physically separate
data center.
| storage_geo_redundant_enabled110 |
| CCC.Core | CCC.Core.CN08.AR02 When data is replicated into a second location, the service MUST
be able to accurately represent the replication locations,
replication status, and data synchronization status.
| storage_geo_redundant_enabled110 |
| CCC.Core | CCC.Core.CN10.AR01 When data is replicated, the service MUST ensure that replication
only occurs to destinations that are explicitly included within
the defined trust perimeter.
| storage_cross_tenant_replication_disabled101 storage_ensure_private_endpoints_in_storage_accounts101 |
| CCC.Core | CCC.Core.CN11.AR01 When encryption keys are used, the service MUST verify that
all encryption keys use the latest industry-standard cryptographic
algorithms.
| storage_ensure_encryption_with_customer_managed_keys101 storage_ensure_minimum_tls_version_12110 storage_secure_transfer_required_is_enabled110 storage_smb_channel_encryption_with_secure_algorithm101 |
| CCC.Core | CCC.Core.CN11.AR02 When encryption keys are used, the service MUST rotate active keys
within 180 days of issuance.
| storage_key_rotation_90_days101 |
| CCC.Core | CCC.Core.CN11.AR03 When encrypting data, the service MUST verify that
customer-managed encryption keys (CMEKs) are used.
| storage_ensure_encryption_with_customer_managed_keys101 |
| CCC.Core | CCC.Core.CN11.AR04 When encryption keys are accessed, the service MUST verify that
access to encryption keys is restricted to authorized personnel
and services, following the principle of least privilege.
| storage_ensure_encryption_with_customer_managed_keys101 |
| CCC.Core | CCC.Core.CN11.AR05 When encryption keys are used, the service MUST rotate active keys
within 365 days of issuance.
| storage_ensure_encryption_with_customer_managed_keys101 storage_key_rotation_90_days101 |
| CCC.Core | CCC.Core.CN13.AR02 When a port is exposed that uses certificate-based encryption,
the service MUST rotate active certificates within 180 days of
issuance.
| storage_ensure_encryption_with_customer_managed_keys101 |
| CCC.Logging | CCC.Logging.CN05.AR01 When a log storage bucket is created, the bucket's access control settings MUST
explicitly deny public read and write access.
| storage_blob_public_access_level_is_disabled110 |
| CCC.Logging | CCC.Logging.CN05.AR02 When the URL of a log storage bucket's object is accessed publicly, the action MUST be denied
by bucket policy.
| storage_blob_public_access_level_is_disabled110 storage_geo_redundant_enabled110 |
| CCC.MLDE | CCC.MLDE.CN07.AR01 Verify that MLDE instances containing sensitive data cannot be accessed via public IP addresses.
| storage_blob_public_access_level_is_disabled110 storage_default_network_access_rule_is_denied101 storage_ensure_private_endpoints_in_storage_accounts101 |
| CCC.MLDE | CCC.MLDE.CN07.AR02 For MLDE instances without sensitive data requiring public access,
ensure that appropriate security controls are in place and access is approved.
| storage_default_network_access_rule_is_denied101 storage_ensure_private_endpoints_in_storage_accounts101 |
| CCC.MLDE | CCC.MLDE.CN08.AR01 Verify that MLDE instances containing sensitive data can only be deployed in
approved virtual networks with appropriate security controls.
| storage_default_network_access_rule_is_denied101 storage_ensure_private_endpoints_in_storage_accounts101 |
| CCC.MLDE | CCC.MLDE.CN08.AR02 Ensure that MLDE instances without sensitive data are deployed in
networks that meet organizational security standards.
| storage_default_network_access_rule_is_denied101 storage_ensure_azure_services_are_trusted_to_access_is_enabled110 storage_ensure_private_endpoints_in_storage_accounts101 |
| CCC.ObjStor | CCC.ObjStor.CN01.AR01 When a request is made to read a bucket, the service
MUST prevent any request using KMS keys not listed as trusted by
the organization.
| storage_ensure_encryption_with_customer_managed_keys101 |
| CCC.ObjStor | CCC.ObjStor.CN01.AR02 When a request is made to read an object, the service
MUST prevent any request using KMS keys not listed as trusted by
the organization.
| storage_ensure_encryption_with_customer_managed_keys101 |
| CCC.ObjStor | CCC.ObjStor.CN01.AR03 When a request is made to write to a bucket, the service MUST
prevent any request using KMS keys not listed as trusted by the
organization.
| storage_ensure_encryption_with_customer_managed_keys101 storage_ensure_private_endpoints_in_storage_accounts101 |
| CCC.ObjStor | CCC.ObjStor.CN01.AR04 When a request is made to write to an object, the service MUST
prevent any request using KMS keys not listed as trusted by the
organization.
| storage_ensure_encryption_with_customer_managed_keys101 |
| CCC.ObjStor | CCC.ObjStor.CN02.AR01 When a permission set is allowed for an object in a bucket, the
service MUST allow the same permission set to access all objects
in the same bucket.
| storage_blob_public_access_level_is_disabled110 storage_default_network_access_rule_is_denied101 storage_ensure_private_endpoints_in_storage_accounts101 |
| CCC.ObjStor | CCC.ObjStor.CN02.AR02 When a permission set is denied for an object in a bucket, the
service MUST deny the same permission set to access all objects
in the same bucket.
| storage_account_key_access_disabled101 storage_blob_public_access_level_is_disabled110 storage_default_to_entra_authorization_enabled101 storage_ensure_private_endpoints_in_storage_accounts101 |
| CCC.ObjStor | CCC.ObjStor.CN03.AR01 When an object storage bucket deletion is attempted, the bucket MUST be
fully recoverable for a set time-frame after deletion is requested.
| storage_blob_versioning_is_enabled110 storage_ensure_soft_delete_is_enabled110 |
| CCC.ObjStor | CCC.ObjStor.CN04.AR01 When an object is uploaded to the object storage system, the object
MUST automatically receive a default retention policy that prevents
premature deletion or modification.
| storage_blob_versioning_is_enabled110 storage_ensure_file_shares_soft_delete_is_enabled110 storage_ensure_soft_delete_is_enabled110 |
| CCC.ObjStor | CCC.ObjStor.CN04.AR02 When an attempt is made to delete or modify an object that is subject
to an active retention policy, the service MUST prevent the action
from being completed.
| storage_ensure_file_shares_soft_delete_is_enabled110 storage_ensure_soft_delete_is_enabled110 |
| CCC.ObjStor | CCC.ObjStor.CN05.AR01 When an object is uploaded to the object storage bucket, the object
MUST be stored with a unique identifier.
| storage_blob_versioning_is_enabled110 |
| CCC.ObjStor | CCC.ObjStor.CN05.AR02 When an object is modified, the service MUST assign a new unique
identifier to the modified object to differentiate it from the
previous version.
| storage_blob_versioning_is_enabled110 |
| CCC.ObjStor | CCC.ObjStor.CN05.AR03 When an object is modified, the service MUST allow for recovery
of previous versions of the object.
| storage_blob_versioning_is_enabled110 |
| CCC.ObjStor | CCC.ObjStor.CN05.AR04 When an object is deleted, the service MUST retain other versions of
the object to allow for recovery of previous versions.
| storage_blob_versioning_is_enabled110 |
Resource Summary
Summary of all resources mentioned in OCSF results
| Resource Name | Resource Type | Control Catalogs | Total Tests | Passing | Failing |
|---|---|---|---|---|---|
stcfistoragecad63808 | AzureStorageAccount | 16 | 8 | 8 | |
stcfistoragecad63808 | AzureRole | 1 | 0 | 1 |
Test Results
OCSF test results filtered for entries with CCC compliance mappings
| Status | Finding | Resource Name | Resource Type | Message | Test Requirements |
|---|---|---|---|---|---|
| FAIL | Ensure allow storage account key access is disabled Storage account stcfistoragecad63808 from subscription Azure subscription 1 has shared key access enabled. | stcfistoragecad63808 | AzureStorageAccount | Storage account stcfistoragecad63808 from subscription Azure subscription 1 has shared key access enabled. | |
| PASS | Ensure that the 'Public access level' is set to 'Private (no anonymous access)' for all blob containers in your storage account Storage account stcfistoragecad63808 from subscription Azure subscription 1 has allow blob public access disabled. | stcfistoragecad63808 | AzureStorageAccount | Storage account stcfistoragecad63808 from subscription Azure subscription 1 has allow blob public access disabled. | |
| PASS | Ensure Blob Versioning is Enabled on Azure Blob Storage Accounts Storage account stcfistoragecad63808 from subscription Azure subscription 1 has blob versioning enabled. | stcfistoragecad63808 | AzureStorageAccount | Storage account stcfistoragecad63808 from subscription Azure subscription 1 has blob versioning enabled. | |
| FAIL | Ensure cross-tenant replication is disabled Storage account stcfistoragecad63808 from subscription Azure subscription 1 has cross-tenant replication enabled. | stcfistoragecad63808 | AzureStorageAccount | Storage account stcfistoragecad63808 from subscription Azure subscription 1 has cross-tenant replication enabled. | |
| FAIL | Ensure Default Network Access Rule for Storage Accounts is Set to Deny Storage account stcfistoragecad63808 from subscription Azure subscription 1 has network access rule set to Allow. | stcfistoragecad63808 | AzureStorageAccount | Storage account stcfistoragecad63808 from subscription Azure subscription 1 has network access rule set to Allow. | |
| FAIL | Ensure Microsoft Entra authorization is enabled by default for Azure Storage Accounts Default to Microsoft Entra authorization is not enabled for storage account stcfistoragecad63808. | stcfistoragecad63808 | AzureStorageAccount | Default to Microsoft Entra authorization is not enabled for storage account stcfistoragecad63808. | |
| PASS | Ensure that 'Allow trusted Microsoft services to access this storage account' is enabled for storage accounts Storage account stcfistoragecad63808 from subscription Azure subscription 1 allows trusted Microsoft services to access this storage account. | stcfistoragecad63808 | AzureStorageAccount | Storage account stcfistoragecad63808 from subscription Azure subscription 1 allows trusted Microsoft services to access this storage account. | |
| FAIL | Ensure that your Microsoft Azure Storage accounts are using Customer Managed Keys (CMKs) instead of Microsoft Managed Keys Storage account stcfistoragecad63808 from subscription Azure subscription 1 does not encrypt with CMKs. | stcfistoragecad63808 | AzureStorageAccount | Storage account stcfistoragecad63808 from subscription Azure subscription 1 does not encrypt with CMKs. | |
| PASS | Ensure soft delete for Azure File Shares is enabled File share soft delete is enabled for storage account stcfistoragecad63808 with a retention period of 7 days. | stcfistoragecad63808 | AzureStorageAccount | File share soft delete is enabled for storage account stcfistoragecad63808 with a retention period of 7 days. | |
| PASS | Ensure the 'Minimum TLS version' for storage accounts is set to 'Version 1.2' Storage account stcfistoragecad63808 from subscription Azure subscription 1 has TLS version set to 1.2. | stcfistoragecad63808 | AzureStorageAccount | Storage account stcfistoragecad63808 from subscription Azure subscription 1 has TLS version set to 1.2. | |
| FAIL | Ensure Private Endpoints are used to access Storage Accounts Storage account stcfistoragecad63808 from subscription Azure subscription 1 does not have private endpoint connections. | stcfistoragecad63808 | AzureStorageAccount | Storage account stcfistoragecad63808 from subscription Azure subscription 1 does not have private endpoint connections. | |
| PASS | Ensure Soft Delete is Enabled for Azure Containers and Blob Storage Storage account stcfistoragecad63808 from subscription Azure subscription 1 has soft delete enabled. | stcfistoragecad63808 | AzureStorageAccount | Storage account stcfistoragecad63808 from subscription Azure subscription 1 has soft delete enabled. | |
| PASS | Ensure geo-redundant storage (GRS) is enabled on critical Azure Storage Accounts Storage account stcfistoragecad63808 from subscription Azure subscription 1 has Geo-redundant storage Standard_GRS enabled. | stcfistoragecad63808 | AzureStorageAccount | Storage account stcfistoragecad63808 from subscription Azure subscription 1 has Geo-redundant storage Standard_GRS enabled. | |
| FAIL | Ensure that 'Enable Infrastructure Encryption' for Each Storage Account in Azure Storage is Set to 'enabled' Storage account stcfistoragecad63808 from subscription Azure subscription 1 has infrastructure encryption disabled. | stcfistoragecad63808 | AzureRole | Storage account stcfistoragecad63808 from subscription Azure subscription 1 has infrastructure encryption disabled. | |
| FAIL | Ensure that Storage Account Access Keys are Periodically Regenerated Storage account stcfistoragecad63808 from subscription Azure subscription 1 has no key expiration period set. | stcfistoragecad63808 | AzureStorageAccount | Storage account stcfistoragecad63808 from subscription Azure subscription 1 has no key expiration period set. | |
| PASS | Ensure that all data transferred between clients and your Azure Storage account is encrypted using the HTTPS protocol. Storage account stcfistoragecad63808 from subscription Azure subscription 1 has secure transfer required enabled. | stcfistoragecad63808 | AzureStorageAccount | Storage account stcfistoragecad63808 from subscription Azure subscription 1 has secure transfer required enabled. | |
| FAIL | Ensure SMB channel encryption uses a secure algorithm for SMB file shares Storage account stcfistoragecad63808 from subscription Azure subscription 1 does not have SMB channel encryption enabled for file shares. | stcfistoragecad63808 | AzureStorageAccount | Storage account stcfistoragecad63808 from subscription Azure subscription 1 does not have SMB channel encryption enabled for file shares. |