Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: add compliance spec for nsa #1021

Merged

Conversation

chen-keinan
Copy link
Contributor

@chen-keinan chen-keinan commented Oct 18, 2022

Signed-off-by: chenk [email protected]

Description:

Add compliance spec for nsa

Close: #1022

@chen-keinan chen-keinan force-pushed the feat/add-compliance-nsa-spec branch from 9b07126 to 030e2dd Compare October 19, 2022 12:23
@chen-keinan chen-keinan force-pushed the feat/add-compliance-nsa-spec branch from 030e2dd to 43abc86 Compare October 19, 2022 12:23
@chen-keinan chen-keinan marked this pull request as ready for review October 19, 2022 12:23
@owenrumney owenrumney merged commit 4fbece1 into aquasecurity:master Oct 19, 2022
@@ -0,0 +1,175 @@
---
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

For my understanding, how was this spec created? Is it available somewhere as a yaml file or you just translated their PDF into this yaml?

Would you know if they have similar spec for AWS?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I have created it my self bases on investigation of the NSA spec and made the relevant mapping to rego

description: 'Control check whether audit policy is configure'
id: '8.0'
defaultStatus: 'FAIL'
checks:
Copy link
Member

@simar7 simar7 Nov 3, 2022

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Another quick q: why some of these checks don't have an associated rule (check)? Is it because we don't support it?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yes , see #1042 ,we now tag it as Manual checks. Trivy can't run these checks in a non intrusive mode (outside of the cluster) .but it still part of Nsa so we added it.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

add support for compliance reports
4 participants