Skip to content

AWS Organizations in Prowler

Prowler can integrate with AWS Organizations to manage the visibility and onboarding of accounts centrally.

When trusted access is enabled with the Organization, Prowler can discover accounts as they are created and even automate deployment of the Prowler Scan IAM Role.

ℹ️ Trusted access can be enabled in the Management Account from the AWS Console under AWS Organizations → Settings → Trusted access for AWS CloudFormation StackSets.

When not using StackSets or Prowler and only needing to scan AWS Organization accounts using the CLI, it is possible to assume a role in each account manually or automate that logic with custom scripts.

Retrieving AWS Account Details

If AWS Organizations is enabled, Prowler can fetch detailed account information during scans, including:

  • Account Name
  • Email Address
  • ARN
  • Organization ID
  • Tags

These details will be included alongside each security finding in the output.

Enabling AWS Organizations Data Retrieval

To retrieve AWS Organizations account details, use the -O/--organizations-role <organizations_role_arn> argument. If this argument is not provided, Prowler will attempt to fetch the data automatically—provided the AWS account is a delegated administrator for the AWS Organization.

Note

For more information on AWS Organizations delegated administrator, refer to the official documentation here.

The following command is an example:

prowler aws \
  -O arn:aws:iam::<management_organizations_account_id>:role/<role_name>
Note

Ensure the IAM role used in your AWS Organizations management account has the following permissions:organizations:DescribeAccount and organizations:ListTagsForResource.

Prowler will scan the AWS account and get the account details from AWS Organizations.

Handling JSON Output

In Prowler's JSON output, tags are encoded in Base64 to prevent formatting errors in CSV or JSON outputs. This ensures compatibility when exporting findings.

  "Account Email": "[email protected]",
  "Account Name": "my-prod-account",
  "Account ARN": "arn:aws:organizations::222222222222:account/o-abcde1234/111111111111",
  "Account Organization": "o-abcde1234",
  "Account tags": "\"eyJUYWdzIjpasf0=\""

The additional fields in CSV header output are as follows:

  • ACCOUNT_DETAILS_EMAIL
  • ACCOUNT_DETAILS_NAME
  • ACCOUNT_DETAILS_ARN
  • ACCOUNT_DETAILS_ORG
  • ACCOUNT_DETAILS_TAGS

Deploying Prowler IAM Roles Across AWS Organizations

When onboarding multiple AWS accounts into Prowler Cloud, it is important to deploy the Prowler Scan IAM Role in each account. The most efficient way to do this across an AWS Organization is by leveraging AWS CloudFormation StackSets, which rolls out infrastructure—like IAM roles—to all accounts centrally from the Management or Delegated Admin account.

When using Infrastructure as Code (IaC), Terraform is recommended to manage this deployment systematically.

  • Use StackSets from the Management Account (or a Delegated Admin/Security Account).
  • Use Terraform to orchestrate the deployment.
  • Use the official CloudFormation template provided by Prowler.
  • Target specific Organizational Units (OUs) or the entire Organization.
Note

A detailed community article this implementation is based on is available here: Deploy IAM Roles Across an AWS Organization as Code (Unicrons) This guide has been adapted with permission and aligned with Prowler’s IAM role requirements.


Step-by-Step Guide Using Terraform

Below is a ready Terraform snippet that deploys the Prowler Scan IAM Role CloudFormation template across the AWS Organization using StackSets:

main.tf
data "aws_caller_identity" "this" {}

data "aws_organizations_organization" "this" {}

module "prowler-scan-role" {
  source = "unicrons/organization-iam-role/aws"

  stack_set_name        = "prowler-scan-role"
  stack_set_description = "Deploy Prowler Scan IAM Role across all organization accounts"
  template_path         = "${path.root}/prowler-scan-role.yaml"

  template_parameters = {
    ExternalId = "<< external ID >>"  # Replace with the External ID provided by Prowler Cloud
  }

  # Specific OU IDs can be specified instead of root
  organizational_unit_ids = [data.aws_organizations_organization.this.roots[0].id]
}

prowler-scan-role.yaml

Download or reference the official CloudFormation template directly from GitHub:


IAM Role: External ID Support

Include the ExternalId parameter in the StackSet if required by the organization's Prowler Cloud setup. This ensures secure cross-account access for scanning.


When encountering issues during deployment or needing to target specific OUs or environments (e.g., dev/staging/prod), reach out to the Prowler team via Slack Community or Support.

Extra: Run Prowler across all accounts in AWS Organizations by assuming roles

Running Prowler Across All AWS Organization Accounts

  1. To run Prowler across all accounts in AWS Organizations, first retrieve a list of accounts that are not suspended:

    ACCOUNTS_IN_ORGS=$(aws organizations list-accounts \
      --query "Accounts[?Status=='ACTIVE'].Id" \
      --output text \
    )
    
  2. Then run Prowler to assume a role (same in all members) per each account:

    for accountId in $ACCOUNTS_IN_ORGS;
    do
      prowler aws \
        -O arn:aws:iam::<management_organizations_account_id>:role/<role_name> \
        -R arn:aws:iam::"${accountId}":role/<role_name>;
    done
    
Note

This same loop structure can be adapted to scan a predefined list of accounts using a variable like the following:
ACCOUNTS_LIST='11111111111 2222222222 333333333'