Transcript
Patrick Gray (0:00)
Foreign and welcome to this special Soapbox edition of the Risky Business podcast. My name's Patrick Gray. For those who don't know, every single edition of Soapbox is wholly sponsored. And that means everyone you hear in one of these soapbox editions paid to be here. Today we are speaking with Tony De la Fuente, who is the founder of Prowler. Now, Prowler is a really interesting open source project and now company that was founded nearly a decade decade ago. So it's cloud security, a cloud security platform that really has nearly been around for 10 years and it is very popular, has a million contributors, a million stars on GitHub sort of thing. And yeah, it works really well. It's multi cloud, covers off everything. Started as an AWS project but now kind of covers everything. So in this interview with Tony, we really just talked about the origins of Prowler. He created it to solve a problem. He's a security practitioner, he's worked as a cloud security architect, he's worked as a pen tester. And yeah, as you're going to hear, Prowler really just was born of necessity. He needed to create something to just get his job done and then it just sort of went from there. So here is a nice half hour conversation with Tony Delafuente where we talk all about Prowler, you know, where it came from, where it's going. It's all very interesting stuff and I do hope you enjoy it. Cheers.
Tony De la Fuente (1:28)
So in 2016 I had all of a sudden like 30 AWS accounts to manage and to assess and I had no idea what to do. By that time I think there were a couple of tools, but not very comprehensive tools or not very easy for me at least. And also I wanted to learn how to perform the assessment, but also the hardening of initially AWS, 30 AWS accounts. So what I did was started reading about hardening S3EC2 and RDS and I said, okay, I'm going to do this just once, I'm going to automate everything with the AWS cli. And I started writing probably without even knowing it, a wrapper of the clique to check only security configurations, misconfigurations basically related to security. I started with S3SD2 and everything for the first CIS AWS security benchmark. That was what I released. The first version of Prowler was a basic way of assessing aws, all regions and all this dev supported services in just one line in a bash script. The point is whatever you you run, Prowler always went through all the Regions and all the supported services so you don't have to configure anything. That was the good thing. And using the same credentials and the same pattern patterns as in the. In the AWS CLI that everybody is familiar with. Right. So it was very easy to use because you get read if you have something to fix and green if it's well computer. So very, very straightforward. In a matter of weeks or months, I did a couple of conferences talking about cloud security hardening because I've been. I've been doing also digital forensics and I started some articles about digital forensics in the cloud and how to perform incident response and forensics. Talking also about Prowler because Prowler has categories in one of the categories of Prowler is forensics readiness. So do you have all the logging enabled and all that stuff. So Prowler became. Started becoming popular by that time and started getting more and more GitHub stars and over the years was getting more developers, community contributions, many different companies using Prowler and asking me for new features. And it was my pet project because I started something for my needs. But I realized that I needed to put many more hours than just work hours. Right. Because I have many other things to do. Of course. And many years later I joined aws.
