Skip to content

Commit 68eb8d6

Browse files
committed
hotfix(v0.6.5): Fix PCI scanner panic on permission errors
1 parent 6734bc4 commit 68eb8d6

File tree

16 files changed

+1116
-631
lines changed

16 files changed

+1116
-631
lines changed

CHANGELOG.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,13 @@
22

33
All notable changes to AuditKit will be documented in this file.
44

5+
## [v0.6.5] - 2025-10-11
6+
7+
### Fixed
8+
- **CRITICAL:** Fixed PCI-DSS scanner crash when AWS credentials lack EC2:DescribeSecurityGroups permission
9+
- Improved error handling in network segmentation checks (Req 1.2.1, 2.2.2)
10+
- Removed hardcoded development paths from source files
11+
512
## [v0.6.4] - 2025-10-10
613

714
### Enhanced Compliance Reporting

README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44

55
[![GitHub stars](https://img.shields.io/github/stars/guardian-nexus/auditkit)](https://github.com/guardian-nexus/auditkit/stargazers)
66
[![License](https://img.shields.io/badge/License-Apache_2.0-blue.svg)](https://opensource.org/licenses/Apache-2.0)
7-
[![Version](https://img.shields.io/badge/version-v0.6.4-green.svg)](https://github.com/guardian-nexus/auditkit/releases)
7+
[![Version](https://img.shields.io/badge/version-v0.6.5-green.svg)](https://github.com/guardian-nexus/auditkit/releases)
88
[![Newsletter](https://img.shields.io/badge/Newsletter-Subscribe-orange)](https://auditkit.substack.com)
99

1010
## What AuditKit Does
@@ -83,7 +83,7 @@ auditkit integrate -source scubagear -file ScubaResults.json -output m365-report
8383
```
8484

8585
## Recent Updates
86-
86+
**v0.6.5 (Oct 2025)** - Hotfix to address PCI-DSS Scanner crash. See CHANGELOG.
8787
**v0.6.4 (Oct 2025)** - Enhanced output control with `--full` flag
8888
**v0.6.3 (Oct 2025)** - Enhanced reports + Complete M365 coverage
8989
**v0.6.2 (Oct 2025)** - Framework scanning improvements & Hotfix

scanner/cmd/auditkit/main.go

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,3 @@
1-
// Path: /home/dijital/Documents/auditkit-all/auditkit-pro/scanner/cmd/auditkit/main.go
21
package main
32

43
import (
@@ -21,7 +20,7 @@ import (
2120
"github.com/guardian-nexus/auditkit/scanner/pkg/updater"
2221
)
2322

24-
const CurrentVersion = "v0.6.4" // ScubaGear integration + telemetry removed
23+
const CurrentVersion = "v0.6.5" // ScubaGear integration + telemetry removed
2524

2625
type ComplianceResult struct {
2726
Timestamp time.Time `json:"timestamp"`
Lines changed: 99 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,99 @@
1+
Running CMMC Level 1 (17 practices) - Open Source
2+
CMMC Level 1 complete: 17 controls
3+
4+
UPGRADE TO CMMC LEVEL 2:
5+
110 additional practices for CUI handling
6+
Required for DoD contractors processing CUI
7+
Complete evidence collection guides
8+
November 10, 2025 deadline compliance
9+
10+
Visit auditkit.io/pro or contact info@auditkit.io
11+
12+
AuditKit CMMC Compliance Scan Results
13+
=====================================
14+
AWS Account: 405894844061
15+
Framework: CMMC
16+
Scan Time: 2025-10-09 00:47:03
17+
18+
Compliance Score: 17.6%
19+
Controls Passed: 3/17
20+
21+
Other Issues:
22+
================
23+
[FAIL] AC.L1-3.1.2 - Security Control
24+
Issue: No custom IAM policies found - relying only on AWS managed policies
25+
Fix: Create custom IAM policies that restrict specific actions for CUI protection
26+
27+
[FAIL] IA.L1-3.5.2 - Security Control
28+
Issue: 2 users without MFA enabled: auditkit-test, test-user-no-mfa
29+
Fix: Enable MFA for all IAM users accessing CUI systems
30+
31+
[FAIL] SC.L1-3.13.1 - Security Control
32+
Issue: 1 security groups allow unrestricted internet access (0.0.0.0/0)
33+
Fix: Restrict Security Group rules to specific IP ranges, not 0.0.0.0/0
34+
35+
Manual Documentation Required:
36+
=================================
37+
[INFO] MP.L1-3.8.3 - Security Control
38+
Guidance: MANUAL PROCESS: Verify secure deletion procedures for EBS volumes and S3 objects containing CUI
39+
Evidence: Document secure deletion procedures | EC2 → Volumes → Screenshot encrypted volumes | S3 → Lifecycle policies
40+
41+
[INFO] MP.L1-3.8.2 - Security Control
42+
Guidance: Found 1 S3 buckets - manual review of bucket policies required
43+
Evidence: AWS Console → S3 → Each bucket → Permissions → Screenshot bucket policies and access controls
44+
45+
[INFO] PS.L1-3.9.1 - Security Control
46+
Guidance: MANUAL PROCESS: Personnel screening procedures must be documented and implemented
47+
Evidence: HR Documentation → Screenshot personnel screening policy | Access approval records → Screenshot showing completed screenings
48+
49+
[INFO] SC.L1-3.13.5 - Security Control
50+
Guidance: MANUAL CHECK: Verify KMS encryption is configured for all CUI data
51+
Evidence: AWS Console → KMS → Keys → Screenshot showing customer-managed keys | S3/EBS/RDS → Screenshot showing encryption enabled
52+
53+
[INFO] SC.L1-3.13.11 - Security Control
54+
Guidance: AWS KMS uses FIPS 140-2 validated cryptographic modules - verify usage
55+
Evidence: AWS Console → KMS → Screenshot showing FIPS-validated key usage | Documentation → Screenshot FIPS compliance
56+
57+
[INFO] SC.L1-3.13.17 - Security Control
58+
Guidance: MANUAL CHECK: Verify IAM session timeout policies are configured
59+
Evidence: AWS Console → IAM → Account settings → Screenshot session duration limits
60+
61+
[INFO] SI.L1-3.14.1 - Security Control
62+
Guidance: MANUAL CHECK: Verify Systems Manager Patch Manager is configured
63+
Evidence: AWS Console → Systems Manager → Patch Manager → Screenshot patch compliance
64+
65+
[INFO] SI.L1-3.14.2 - Security Control
66+
Guidance: MANUAL CHECK: Verify GuardDuty is enabled and endpoint protection is deployed
67+
Evidence: AWS Console → GuardDuty → Screenshot enabled status | EC2 → Screenshot endpoint protection
68+
69+
[INFO] SI.L1-3.14.4 - Security Control
70+
Guidance: GuardDuty automatically updates - verify endpoint protection has auto-updates enabled
71+
Evidence: AWS Console → GuardDuty → Settings | EC2 → Screenshot endpoint auto-update config
72+
73+
[INFO] SI.L1-3.14.6 - Security Control
74+
Guidance: MANUAL CHECK: Verify Security Hub is enabled and alerting is configured
75+
Evidence: AWS Console → Security Hub → Screenshot alerts dashboard | CloudWatch → Screenshot alarms
76+
77+
[INFO] SI.L1-3.14.7 - Security Control
78+
Guidance: AWS security services auto-update - verify endpoint agents have update mechanisms
79+
Evidence: AWS Console → Security services → Screenshot version status
80+
81+
Passed Controls:
82+
===================
83+
- AC.L1-3.1.1 - Security Control
84+
- IA.L1-3.5.1 - Security Control
85+
- SC.L1-3.13.16 - Security Control
86+
87+
Priority Action Items:
88+
=========================
89+
1. Enable continuous compliance monitoring
90+
2. Document your security policies and procedures
91+
3. Set up automated alerting for security events
92+
4. Schedule quarterly access reviews
93+
94+
For detailed CMMC report with full evidence checklist:
95+
auditkit scan -provider aws -framework cmmc -format pdf -output report.pdf
96+
97+
To track evidence collection progress:
98+
auditkit evidence -provider aws
99+

0 commit comments

Comments
 (0)