Skip to content

Operation DescribeAccount doesn't work #10215

@vjancich

Description

@vjancich

Issue search

  • I have searched the existing issues and this bug has not been reported yet

Which component is affected?

Prowler API

Cloud Provider (if applicable)

AWS

Steps to Reproduce

Hello,

we are running Prowler as a AWS ECS Fargate service. Everything works fine but I noticed following error in logs during scan:
2026-03-02 11:01:04.247ERROR[2026-03-02 10:01:04,054: WARNING/ForkPoolWorker-69] AccessDeniedException[15]: An error occurred (AccessDeniedException) when calling the DescribeAccount operation: You don't have permissions to access this resource.

We migrated Prowler into account which is delegated administrator account so this command should work.

Expected behavior

Command DescribeAccount works.

Actual Result with Screenshots or Logs

If I manually assume prowler role and execute the command, it works.

~ $ aws sts get-caller-identity                                                                                                                                                                                                                           
{
    "UserId": "AROA6LTKSWWMCC5BS74IG:prowler-session",
    "Account": "986992260504",
    "Arn": "arn:aws:sts::986992260504:assumed-role/cor-prowler-scan/prowler-session"
}
$ aws organizations describe-account --account-id 986992260504
{
    "Account": {
        "Id": "986992260504",
        "Arn": "arn:aws:organizations::183992486874:account/<org_id>/986992260504",
        "Email": "<email_address>,
        "Name": "<account_name>",
        "Status": "ACTIVE",
        "State": "ACTIVE",
        "JoinedMethod": "INVITED",
        "JoinedTimestamp": "2021-04-14T17:45:33.932000+00:00"
    }
}

However, prowler logs this:

2026-03-02 11:01:04.247ERROR[2026-03-02 10:01:04,054: WARNING/ForkPoolWorker-69] AccessDeniedException[15]: An error occurred (AccessDeniedException) when calling the DescribeAccount operation: You don't have permissions to access this resource.

2026-03-02 11:01:04.247INFO[2026-03-02 10:01:03,653: INFO/ForkPoolWorker-69] Getting AWS Organizations metadata for account 986992260504

2026-03-02 11:01:04.247INFO[2026-03-02 10:01:03,653: INFO/ForkPoolWorker-69] Setting new identity for the AWS IAM Role assumed

2026-03-02 11:01:04.247INFO[2026-03-02 10:01:03,653: INFO/ForkPoolWorker-69] Audit session is the new session created assuming an IAM Role

2026-03-02 11:01:04.247INFO[2026-03-02 10:01:03,644: INFO/ForkPoolWorker-69] IAM Role assumed: arn:aws:iam::986992260504:role/cor-prowler-scan

2026-03-02 11:01:04.247INFO[2026-03-02 10:01:03,568: INFO/ForkPoolWorker-69] Assuming role: arn:aws:iam::986992260504:role/cor-prowler-scan

2026-03-02 11:01:04.247INFO[2026-03-02 10:01:03,568: INFO/ForkPoolWorker-69] Original AWS Caller Identity ARN: arn='arn:aws:sts::986992260504:assumed-role/cor-prowler-api-dev-task-role/8c06fd372e2440609fa8fe281fa9af2b' partition='aws' service='sts' region=None account_id='986992260504' resource='cor-prowler-api-dev-task-role/8c06fd372e2440609fa8fe281fa9af2b' resource_type='assumed-role'

2026-03-02 11:01:04.247INFO[2026-03-02 10:01:03,568: INFO/ForkPoolWorker-69] Original AWS Caller Identity UserId: AROA6LTKSWWMA55GNMDBU:8c06fd372e2440609fa8fe281fa9af2b

2026-03-02 11:01:04.247INFO[2026-03-02 10:01:03,567: INFO/ForkPoolWorker-69] Credentials validated

2026-03-02 11:01:04.247INFO[2026-03-02 10:01:03,403: INFO/ForkPoolWorker-69] Validating credentials ...

2026-03-02 11:01:04.247INFO[2026-03-02 10:01:03,392: INFO/ForkPoolWorker-69] Generating original session ...

2026-03-02 11:01:04.247INFO[2026-03-02 10:01:03,391: INFO/ForkPoolWorker-69] Initializing AWS provider ...

Prowler succesfully assumed the same role as I did during my testing. I'm capable of executing DescribeAccount command, Prowler isn't.

How did you install Prowler?

Cloning the repository from github.com (git clone)

Environment Resource

AWS ECS Fargate service

OS used

not applicable (AWS managed)

Prowler version

v5.18.3

Python version

provided by prowler

Pip version

provided by prowler

Context

No response

Metadata

Metadata

Assignees

Labels

ai-issue-review[Experimental] Triggers AI-powered issue triage with coding-agent-ready fix plansbugprovider/awsIssues/PRs related with the AWS providerstatus/needs-triageIssue pending triage

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions