forked from iacsecurity/tool-compare
-
Notifications
You must be signed in to change notification settings - Fork 0
/
tfsec_results.txt
101 lines (73 loc) · 2.66 KB
/
tfsec_results.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
Check 1
[AWS066][ERROR] Resource 'aws_eks_cluster.test' has no encryption_config block
/src/main.tf:19-25
16 | vpc_id = aws_vpc.vpc.id
17 | }
18 |
19 | resource "aws_eks_cluster" "test" {
20 | name = "test"
21 | role_arn = aws_iam_role.eksrole.arn
22 | vpc_config {
23 | subnet_ids = [aws_subnet.subnet1.id]
24 | }
25 | }
Impact: EKS secrets could be read if compromised
Resolution: Enable encryption of EKS secrets
See https://tfsec.dev/docs/aws/AWS066/ for more information.
Check 2
[AWS067][ERROR] Resource 'aws_eks_cluster.test' missing the enabled_cluster_log_types attribute to enable control plane logging
/src/main.tf:19-25
16 | vpc_id = aws_vpc.vpc.id
17 | }
18 |
19 | resource "aws_eks_cluster" "test" {
20 | name = "test"
21 | role_arn = aws_iam_role.eksrole.arn
22 | vpc_config {
23 | subnet_ids = [aws_subnet.subnet1.id]
24 | }
25 | }
Impact: Logging provides valuable information about access and usage
Resolution: Enable logging for the EKS control plane
See https://tfsec.dev/docs/aws/AWS067/ for more information.
Check 3
[AWS068][ERROR] Resource 'aws_eks_cluster.test' is using default public access cidrs in the vpc config
/src/main.tf:22-24
19 | resource "aws_eks_cluster" "test" {
20 | name = "test"
21 | role_arn = aws_iam_role.eksrole.arn
22 | vpc_config {
23 | subnet_ids = [aws_subnet.subnet1.id]
24 | }
25 | }
Impact: EKS can be access from the internet
Resolution: Don't enable public access to EKS Clusters
See https://tfsec.dev/docs/aws/AWS068/ for more information.
Check 4
[AWS069][ERROR] Resource 'aws_eks_cluster.test' is using default public access in the vpc config
/src/main.tf:22-24
19 | resource "aws_eks_cluster" "test" {
20 | name = "test"
21 | role_arn = aws_iam_role.eksrole.arn
22 | vpc_config {
23 | subnet_ids = [aws_subnet.subnet1.id]
24 | }
25 | }
Impact: EKS can be access from the internet
Resolution: Don't enable public access to EKS Clusters
See https://tfsec.dev/docs/aws/AWS069/ for more information.
times
------------------------------------------
disk i/o 50.940209ms
parsing HCL 502.75µs
evaluating values 2.633792ms
running checks 14.543541ms
counts
------------------------------------------
files loaded 1
blocks 5
evaluated blocks 5
modules 0
module blocks 0
ignored checks 0
4 potential problems detected.