-
Notifications
You must be signed in to change notification settings - Fork 2k
Description
Issue search
- I have searched the existing issues and this bug has not been reported yet
Which component is affected?
Prowler API
Cloud Provider (if applicable)
AWS
Steps to Reproduce
Hello,
we are running Prowler as a AWS ECS Fargate service. Everything works fine but I noticed following error in logs during scan:
2026-03-02 11:01:04.247ERROR[2026-03-02 10:01:04,054: WARNING/ForkPoolWorker-69] AccessDeniedException[15]: An error occurred (AccessDeniedException) when calling the DescribeAccount operation: You don't have permissions to access this resource.
We migrated Prowler into account which is delegated administrator account so this command should work.
Expected behavior
Command DescribeAccount works.
Actual Result with Screenshots or Logs
If I manually assume prowler role and execute the command, it works.
~ $ aws sts get-caller-identity
{
"UserId": "AROA6LTKSWWMCC5BS74IG:prowler-session",
"Account": "986992260504",
"Arn": "arn:aws:sts::986992260504:assumed-role/cor-prowler-scan/prowler-session"
}
$ aws organizations describe-account --account-id 986992260504
{
"Account": {
"Id": "986992260504",
"Arn": "arn:aws:organizations::183992486874:account/<org_id>/986992260504",
"Email": "<email_address>,
"Name": "<account_name>",
"Status": "ACTIVE",
"State": "ACTIVE",
"JoinedMethod": "INVITED",
"JoinedTimestamp": "2021-04-14T17:45:33.932000+00:00"
}
}
However, prowler logs this:
2026-03-02 11:01:04.247ERROR[2026-03-02 10:01:04,054: WARNING/ForkPoolWorker-69] AccessDeniedException[15]: An error occurred (AccessDeniedException) when calling the DescribeAccount operation: You don't have permissions to access this resource.
2026-03-02 11:01:04.247INFO[2026-03-02 10:01:03,653: INFO/ForkPoolWorker-69] Getting AWS Organizations metadata for account 986992260504
2026-03-02 11:01:04.247INFO[2026-03-02 10:01:03,653: INFO/ForkPoolWorker-69] Setting new identity for the AWS IAM Role assumed
2026-03-02 11:01:04.247INFO[2026-03-02 10:01:03,653: INFO/ForkPoolWorker-69] Audit session is the new session created assuming an IAM Role
2026-03-02 11:01:04.247INFO[2026-03-02 10:01:03,644: INFO/ForkPoolWorker-69] IAM Role assumed: arn:aws:iam::986992260504:role/cor-prowler-scan
2026-03-02 11:01:04.247INFO[2026-03-02 10:01:03,568: INFO/ForkPoolWorker-69] Assuming role: arn:aws:iam::986992260504:role/cor-prowler-scan
2026-03-02 11:01:04.247INFO[2026-03-02 10:01:03,568: INFO/ForkPoolWorker-69] Original AWS Caller Identity ARN: arn='arn:aws:sts::986992260504:assumed-role/cor-prowler-api-dev-task-role/8c06fd372e2440609fa8fe281fa9af2b' partition='aws' service='sts' region=None account_id='986992260504' resource='cor-prowler-api-dev-task-role/8c06fd372e2440609fa8fe281fa9af2b' resource_type='assumed-role'
2026-03-02 11:01:04.247INFO[2026-03-02 10:01:03,568: INFO/ForkPoolWorker-69] Original AWS Caller Identity UserId: AROA6LTKSWWMA55GNMDBU:8c06fd372e2440609fa8fe281fa9af2b
2026-03-02 11:01:04.247INFO[2026-03-02 10:01:03,567: INFO/ForkPoolWorker-69] Credentials validated
2026-03-02 11:01:04.247INFO[2026-03-02 10:01:03,403: INFO/ForkPoolWorker-69] Validating credentials ...
2026-03-02 11:01:04.247INFO[2026-03-02 10:01:03,392: INFO/ForkPoolWorker-69] Generating original session ...
2026-03-02 11:01:04.247INFO[2026-03-02 10:01:03,391: INFO/ForkPoolWorker-69] Initializing AWS provider ...
Prowler succesfully assumed the same role as I did during my testing. I'm capable of executing DescribeAccount command, Prowler isn't.
How did you install Prowler?
Cloning the repository from github.com (git clone)
Environment Resource
AWS ECS Fargate service
OS used
not applicable (AWS managed)
Prowler version
v5.18.3
Python version
provided by prowler
Pip version
provided by prowler
Context
No response