Skip to content

Commit 5830cb6

Browse files
authored
fix(sdk): update Trend Micro URLs in AWS metadata files (#10068)
1 parent 75c7f61 commit 5830cb6

File tree

230 files changed

+253
-251
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

230 files changed

+253
-251
lines changed

prowler/CHANGELOG.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -51,6 +51,10 @@ All notable changes to the **Prowler SDK** are documented in this file.
5151
- Update Azure Virtual Machines service metadata to new format [(#9629)](https://github.com/prowler-cloud/prowler/pull/9629)
5252
- Cloudflare provider credential validation with specific exceptions [(#9910)](https://github.com/prowler-cloud/prowler/pull/9910)
5353

54+
### 🐞 Fixed
55+
56+
- Update AWS checks metadata URLs to replace deprecated Trend Micro CloudOne Conformity (EOL July 2026) with Vision One and remove docs.prowler.com references [(#10068)](https://github.com/prowler-cloud/prowler/pull/10068)
57+
5458
### 🔐 Security
5559

5660
- Bumped `py-ocsf-models` to 0.8.1 and `cryptography` to 44.0.3 [(#10059)](https://github.com/prowler-cloud/prowler/pull/10059)

prowler/providers/aws/services/accessanalyzer/accessanalyzer_enabled_without_findings/accessanalyzer_enabled_without_findings.metadata.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@
2727
"https://docs.aws.amazon.com/IAM/latest/UserGuide/access-analyzer-findings.html",
2828
"https://aws.amazon.com/blogs/security/automate-resolution-for-iam-access-analyzer-cross-account-access-findings-on-iam-roles/",
2929
"https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html",
30-
"https://www.trendmicro.com/cloudoneconformity/knowledge-base/aws/AccessAnalyzer/findings.html"
30+
"https://www.trendmicro.com/trendaivisiononecloudriskmanagement/knowledge-base/aws/AccessAnalyzer/findings.html"
3131
],
3232
"Remediation": {
3333
"Code": {

prowler/providers/aws/services/account/account_maintain_current_contact_details/account_maintain_current_contact_details.metadata.json

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,6 @@
1515
"Risk": "Outdated or single-person contacts delay **security notifications**, slow **incident response**, and complicate **account recovery**.\n\nAWS may throttle services during abuse mitigation, reducing **availability**. Missed alerts enable ongoing misuse, risking **data exfiltration** and unauthorized changes (**integrity**).",
1616
"RelatedUrl": "",
1717
"AdditionalURLs": [
18-
"https://docs.prowler.com/checks/aws/iam-policies/iam_18-maintain-contact-details#aws-console",
1918
"https://repost.aws/knowledge-center/update-phone-number",
2019
"https://support.stax.io/docs/accounts/update-aws-account-contact-details",
2120
"https://maartenbruntink.nl/blog/2022/09/26/aws-account-hygiene-101-mass-updating-alternate-account-contacts/",

prowler/providers/aws/services/account/account_maintain_different_contact_details_to_security_billing_and_operations/account_maintain_different_contact_details_to_security_billing_and_operations.metadata.json

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,11 +17,10 @@
1717
"RelatedUrl": "",
1818
"AdditionalURLs": [
1919
"https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/account_alternate_contact",
20-
"https://docs.prowler.com/checks/aws/iam-policies/iam_18-maintain-contact-details#aws-console",
2120
"https://docs.aws.amazon.com/accounts/latest/reference/manage-acct-update-contact-alternate.html",
2221
"https://builder.aws.com/content/2qRw97fe8JFwfk2AbpJ3sYNpNvM/aws-bulk-update-alternate-contacts-across-organization",
2322
"https://github.com/aws-samples/aws-account-alternate-contact-with-terraform",
24-
"https://trendmicro.com/cloudoneconformity/knowledge-base/aws/IAM/account-security-alternate-contacts.html",
23+
"https://trendmicro.com/trendaivisiononecloudriskmanagement/knowledge-base/aws/IAM/account-security-alternate-contacts.html",
2524
"https://repost.aws/articles/ARDFbpt-bvQ8iuErnqVVcCXQ/managing-aws-organization-alternate-contacts-via-csv"
2625
],
2726
"Remediation": {

prowler/providers/aws/services/account/account_security_contact_information_is_registered/account_security_contact_information_is_registered.metadata.json

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,6 @@
1717
"RelatedUrl": "",
1818
"AdditionalURLs": [
1919
"https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/account_alternate_contact",
20-
"https://docs.prowler.com/checks/aws/iam-policies/iam_19/",
2120
"https://support.icompaas.com/support/solutions/articles/62000234161-1-2-ensure-security-contact-information-is-registered-manual-",
2221
"https://www.plerion.com/cloud-knowledge-base/ensure-security-contact-information-is-registered",
2322
"https://repost.aws/articles/ARDFbpt-bvQ8iuErnqVVcCXQ/managing-aws-organization-alternate-contacts-via-csv"

prowler/providers/aws/services/account/account_security_questions_are_registered_in_the_aws_account/account_security_questions_are_registered_in_the_aws_account.metadata.json

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,8 +15,7 @@
1515
"Risk": "Absence of these questions can limit support-assisted recovery if root credentials or MFA are lost, reducing **availability** and slowing **incident response**. Reliance on KBA also weakens **confidentiality** due to **social engineering**. Treat this as a recovery gap and adopt stronger, phishing-resistant factors.",
1616
"RelatedUrl": "",
1717
"AdditionalURLs": [
18-
"https://docs.prowler.com/checks/aws/iam-policies/iam_15",
19-
"https://www.trendmicro.com/cloudoneconformity/knowledge-base/aws/IAM/security-challenge-questions.html"
18+
"https://www.trendmicro.com/trendaivisiononecloudriskmanagement/knowledge-base/aws/IAM/security-challenge-questions.html"
2019
],
2120
"Remediation": {
2221
"Code": {

prowler/providers/aws/services/acm/acm_certificates_expiration_check/acm_certificates_expiration_check.metadata.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@
1717
"Risk": "Expired or near-expiry **TLS certificates** can break handshakes, causing **service outages** and failed API calls (**availability**). Emergency fixes raise misconfiguration risk, enabling disabled verification or weak ciphers, which allows **MITM** and data exposure (**confidentiality**/**integrity**).",
1818
"RelatedUrl": "",
1919
"AdditionalURLs": [
20-
"https://www.trendmicro.com/cloudoneconformity/knowledge-base/aws/ACM/certificate-expires-in-45-days.html",
20+
"https://www.trendmicro.com/trendaivisiononecloudriskmanagement/knowledge-base/aws/ACM/certificate-expires-in-45-days.html",
2121
"https://repost.aws/es/knowledge-center/acm-notification-certificate-renewal",
2222
"https://docs.aws.amazon.com/config/latest/developerguide/acm-certificate-expiration-check.html",
2323
"https://repost.aws/questions/QU3sMaeZPMRo2kLcsfJsfuVA/acm-notifications-for-expiring-certificates"

prowler/providers/aws/services/apigateway/apigateway_restapi_logging_enabled/apigateway_restapi_logging_enabled.metadata.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@
1919
"AdditionalURLs": [
2020
"https://docs.aws.amazon.com/apigateway/latest/developerguide/security-monitoring.html",
2121
"https://docs.aws.amazon.com/apigateway/latest/developerguide/http-api-logging.html",
22-
"https://www.trendmicro.com/cloudoneconformity/knowledge-base/aws/APIGateway/cloudwatch-logs.html",
22+
"https://www.trendmicro.com/trendaivisiononecloudriskmanagement/knowledge-base/aws/APIGateway/cloudwatch-logs.html",
2323
"https://docs.aws.amazon.com/apigateway/latest/developerguide/set-up-logging.html",
2424
"https://repost.aws/knowledge-center/api-gateway-cloudwatch-logs",
2525
"https://repost.aws/knowledge-center/api-gateway-missing-cloudwatch-logs",

prowler/providers/aws/services/apigateway/apigateway_restapi_tracing_enabled/apigateway_restapi_tracing_enabled.metadata.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@
1818
"AdditionalURLs": [
1919
"https://docs.aws.amazon.com/securityhub/latest/userguide/apigateway-controls.html#apigateway-3",
2020
"https://docs.aws.amazon.com/xray/latest/devguide/xray-services-apigateway.html",
21-
"https://www.trendmicro.com/cloudoneconformity/knowledge-base/aws/APIGateway/tracing.html"
21+
"https://www.trendmicro.com/trendaivisiononecloudriskmanagement/knowledge-base/aws/APIGateway/tracing.html"
2222
],
2323
"Remediation": {
2424
"Code": {

prowler/providers/aws/services/apigatewayv2/apigatewayv2_api_access_logging_enabled/apigatewayv2_api_access_logging_enabled.metadata.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@
2121
"https://docs.aws.amazon.com/apigateway/latest/developerguide/security-monitoring.html",
2222
"https://docs.aws.amazon.com/apigateway/latest/developerguide/set-up-logging.html",
2323
"https://support.icompaas.com/support/solutions/articles/62000229562-ensure-api-gateway-v2-has-access-logging-enabled",
24-
"https://www.trendmicro.com/cloudoneconformity/knowledge-base/aws/APIGateway/api-gateway-stage-access-logging.html"
24+
"https://www.trendmicro.com/trendaivisiononecloudriskmanagement/knowledge-base/aws/APIGateway/api-gateway-stage-access-logging.html"
2525
],
2626
"Remediation": {
2727
"Code": {

0 commit comments

Comments
 (0)