Secure Code Analysis #236
code-scanning.yml
on: schedule
tfsec
42s
checkov
1m 53s
Matrix: tflint
Annotations
10 errors and 1 notice
checkov:
terraform/environments/apex/ec2.tf#L25
CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled"
|
checkov:
terraform/environments/apex/ec2.tf#L138
CKV_AWS_290: "Ensure IAM policies does not allow write access without constraints"
|
checkov:
terraform/environments/apex/ec2.tf#L138
CKV_AWS_355: "Ensure no IAM policies documents allow "*" as a statement's resource for restrictable actions"
|
checkov:
terraform/environments/apex/efs.tf#L1
CKV_AWS_184: "Ensure resource is encrypted by KMS using a customer managed Key (CMK)"
|
checkov:
terraform/environments/apex/efs.tf#L20
CKV_AWS_23: "Ensure every security groups rule has a description"
|
checkov:
terraform/environments/ccms-ebs/ccms-cloudwatch.tf#L54
CKV_AWS_356: "Ensure no IAM policies documents allow "*" as a statement's resource for restrictable actions"
|
checkov:
terraform/environments/ccms-ebs/ccms-cloudwatch.tf#L15
CKV_AWS_158: "Ensure that CloudWatch Log Group is encrypted by KMS"
|
checkov:
terraform/environments/ccms-ebs/ccms-cloudwatch.tf#L28
CKV_AWS_337: "Ensure SSM parameters are using KMS CMK"
|
checkov:
terraform/environments/ccms-ebs/ccms-dlm.tf#L24
CKV_AWS_290: "Ensure IAM policies does not allow write access without constraints"
|
checkov:
terraform/environments/ccms-ebs/ccms-dlm.tf#L24
CKV_AWS_355: "Ensure no IAM policies documents allow "*" as a statement's resource for restrictable actions"
|
GitHub API token
Consider setting a GITHUB_TOKEN to prevent GitHub api rate limits
|