Added in: 5.18.0
Prowler for OpenStack allows you to audit your OpenStack cloud infrastructure for security misconfigurations, including compute instances, networking, identity and access management, storage, and more.
Prerequisites
Before running Prowler with the OpenStack provider, ensure you have:- An OpenStack public cloud account with at least one project
- Access to the Horizon dashboard or provider control panel
- An OpenStack user with the Reader role assigned to your project (see detailed instructions in the Authentication guide)
- Access to Prowler CLI (see Installation) or an account created in Prowler Cloud
Prowler CLI
Run OpenStack security audits with Prowler CLI
Authentication Methods
Learn about OpenStack authentication options
Prowler CLI
Step 1: Set Up Authentication
Download theclouds.yaml file from your OpenStack provider (see Authentication guide for detailed instructions) and save it to ~/.config/openstack/clouds.yaml:
For detailed step-by-step instructions with screenshots, see the OpenStack Authentication guide.
Step 2: Run Your First Scan
Run a baseline scan of your OpenStack cloud:openstack with your cloud name if you customized it in the clouds.yaml file (e.g., ovh-production).
Prowler will automatically discover and audit all supported OpenStack services in your project.
Scan a specific OpenStack service:
clouds.yaml with multiple cloud configurations:
Step 3: Review the Results
Prowler outputs findings to the console and generates reports in multiple formats. By default, Prowler generates reports in theoutput/ directory:
- CSV format:
output/prowler-output-{timestamp}.csv - JSON format:
output/prowler-output-{timestamp}.json - HTML dashboard:
output/prowler-output-{timestamp}.html
Supported OpenStack Services
Prowler currently supports security checks for the following OpenStack services:| Common Name | OpenStack Service | Description | Example Checks |
|---|---|---|---|
| Compute | Nova | Virtual machine instances | Public IP associations, security group usage |
| Networking | Neutron | Virtual networks and security | Security group rules, network isolation |
| Identity | Keystone | Authentication and authorization | Password policies, MFA configuration |
| Image | Glance | Virtual machine images | Image visibility, image encryption |
| Block Storage | Cinder | Persistent block storage | Volume encryption, backup policies |
| Object Storage | Swift | Object storage service | Container ACLs, public access |
Support for additional OpenStack services will be added in future releases. Check the release notes for updates.
Troubleshooting
Authentication Errors
If encountering authentication errors:-
Verify credentials are correct:
-
Check network connectivity to the authentication endpoint:
-
Verify the Identity API version is v3:
Permission Errors
If checks are failing due to insufficient permissions:- Ensure your OpenStack user has the Reader role assigned to the project
- Check role assignments in your provider’s control panel or Horizon dashboard
- Verify that your user has access to all required services (Compute, Networking, Identity, etc.)
- Contact your OpenStack provider support if you need additional permissions
Keystone/Identity Service Limitations
If you see errors related to the Identity service:- This is expected behavior for public cloud providers
- Identity-related checks will be added for self-deployed OpenStack environments in future releases
- Focus on other available services (Compute, Networking, Storage, etc.)
OpenStack Additional Resources
- Supported OpenStack versions: Stein (2019.1) and later
- Minimum Identity API version: v3
- Tested providers: OVH Public Cloud, OpenStack-Ansible, DevStack
- Cloud compatibility: Fully compatible with standard OpenStack APIs

