Secure Code Analysis #644
code-scanning.yml
on: schedule
trivy
3m 18s
checkov
7m 33s
Matrix: tflint
Annotations
11 errors
trivy
Code Scanning could not process the submitted SARIF file:
locationFromSarifResult: expected artifact location, locationFromSarifResult: expected artifact location, locationFromSarifResult: expected artifact location
|
checkov:
terraform/environments/analytical-platform-ingestion/route53-resolver-associations.tf#L1
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
|
checkov:
terraform/environments/analytical-platform-ingestion/route53-resolver-endpoints.tf#L1
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
|
checkov:
terraform/environments/apex/backups.tf#L6
CKV_AWS_166: "Ensure Backup Vault is encrypted at rest using KMS CMK"
|
checkov:
terraform/environments/apex/backups.tf#L64
CKV_AWS_166: "Ensure Backup Vault is encrypted at rest using KMS CMK"
|
checkov:
terraform/environments/apex/cloudfront.tf#L157
CKV_AWS_300: "Ensure S3 lifecycle configuration sets period for aborting failed uploads"
|
checkov:
terraform/environments/apex/cloudfront.tf#L177
CKV_AWS_310: "Ensure CloudFront distributions should have origin failover configured"
|
checkov:
terraform/environments/apex/cloudfront.tf#L177
CKV_AWS_374: "Ensure AWS CloudFront web distribution has geo restriction enabled"
|
checkov:
terraform/environments/apex/cloudfront.tf#L177
CKV_AWS_305: "Ensure CloudFront distribution has a default root object configured"
|
checkov:
terraform/environments/apex/cloudfront.tf#L295
CKV_AWS_233: "Ensure Create before destroy for ACM certificates"
|
checkov:
terraform/environments/apex/ec2.tf#L6
CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled"
|