Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

duplicate aws_caller_identity block #4

Merged
merged 2 commits into from
Sep 27, 2023
Merged

Conversation

kourosh-forti-hands
Copy link
Member

No description provided.

@kourosh-forti-hands kourosh-forti-hands merged commit afe5ef1 into main Sep 27, 2023
1 of 2 checks passed
@kourosh-forti-hands kourosh-forti-hands deleted the initial-build branch September 27, 2023 15:43
@github-actions
Copy link
Contributor

Checkov Scan Results 📖:

File Check ID Description Resource Checkov Result
/guard_duty.tf CKV_TF_1 Ensure Terraform module sources use a commit hash guardduty_kms_key FAILED
/guard_duty.tf CKV_AWS_338 Ensure CloudWatch log groups retains logs for at least 1 year aws_cloudwatch_log_group.guardduty FAILED
/guard_duty.tf CKV_AWS_66 Ensure that CloudWatch Log Group specifies retention days aws_cloudwatch_log_group.guardduty FAILED
/guard_duty.tf CKV_AWS_158 Ensure that CloudWatch Log Group is encrypted by KMS aws_cloudwatch_log_group.guardduty FAILED
/guard_duty.tf CKV2_AWS_62 Ensure S3 buckets should have event notifications enabled aws_s3_bucket.gd_bucket FAILED
/guard_duty.tf CKV_AWS_21 Ensure all data stored in the S3 bucket have versioning enabled aws_s3_bucket.gd_bucket FAILED
/guard_duty.tf CKV_AWS_144 Ensure that S3 bucket has cross-region replication enabled aws_s3_bucket.gd_bucket FAILED
/guard_duty.tf CKV2_AWS_61 Ensure that an S3 bucket has a lifecycle configuration aws_s3_bucket.gd_bucket FAILED
/guard_duty.tf CKV_AWS_18 Ensure the S3 bucket has access logging enabled aws_s3_bucket.gd_bucket FAILED
/guard_duty.tf CKV2_AWS_6 Ensure that S3 bucket has a Public Access block aws_s3_bucket.gd_bucket FAILED
/guard_duty.tf CKV_AWS_145 Ensure that S3 buckets are encrypted with KMS by default aws_s3_bucket.gd_bucket FAILED

Please review the above report. ⚠️

@github-actions
Copy link
Contributor

Checkov Scan Results 📖:

File Check ID Description Resource Checkov Result
/guard_duty.tf CKV_AWS_338 Ensure CloudWatch log groups retains logs for at least 1 year aws_cloudwatch_log_group.guardduty FAILED
/guard_duty.tf CKV_AWS_66 Ensure that CloudWatch Log Group specifies retention days aws_cloudwatch_log_group.guardduty FAILED
/guard_duty.tf CKV_AWS_158 Ensure that CloudWatch Log Group is encrypted by KMS aws_cloudwatch_log_group.guardduty FAILED
/guard_duty.tf CKV_TF_1 Ensure Terraform module sources use a commit hash guardduty_kms_key FAILED
/guard_duty.tf CKV2_AWS_62 Ensure S3 buckets should have event notifications enabled aws_s3_bucket.gd_bucket FAILED
/guard_duty.tf CKV_AWS_21 Ensure all data stored in the S3 bucket have versioning enabled aws_s3_bucket.gd_bucket FAILED
/guard_duty.tf CKV_AWS_144 Ensure that S3 bucket has cross-region replication enabled aws_s3_bucket.gd_bucket FAILED
/guard_duty.tf CKV2_AWS_61 Ensure that an S3 bucket has a lifecycle configuration aws_s3_bucket.gd_bucket FAILED
/guard_duty.tf CKV_AWS_18 Ensure the S3 bucket has access logging enabled aws_s3_bucket.gd_bucket FAILED
/guard_duty.tf CKV2_AWS_6 Ensure that S3 bucket has a Public Access block aws_s3_bucket.gd_bucket FAILED
/guard_duty.tf CKV_AWS_145 Ensure that S3 buckets are encrypted with KMS by default aws_s3_bucket.gd_bucket FAILED

Please review the above report. ⚠️

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

1 participant