From 18fcf3be2d9a9f0d54a2db8a7fc4cdebd3c3ea15 Mon Sep 17 00:00:00 2001 From: Ilia Kebets <104737176+ilia-kebets-sonarsource@users.noreply.github.com> Date: Tue, 22 Nov 2022 16:21:09 +0100 Subject: [PATCH] Update rules metadata before new release (#3570) --- css-sonarpedia/sonarpedia.json | 2 +- .../l10n/javascript/rules/javascript/S5542.html | 2 +- .../l10n/javascript/rules/javascript/S6303.html | 15 ++++++++++----- .../l10n/javascript/rules/javascript/S6303.json | 2 +- .../l10n/javascript/rules/javascript/S6304.html | 5 ++++- sonarpedia.json | 2 +- 6 files changed, 18 insertions(+), 10 deletions(-) diff --git a/css-sonarpedia/sonarpedia.json b/css-sonarpedia/sonarpedia.json index c6d0c556fec..a9cc54be6fe 100644 --- a/css-sonarpedia/sonarpedia.json +++ b/css-sonarpedia/sonarpedia.json @@ -3,7 +3,7 @@ "languages": [ "CSS" ], - "latest-update": "2022-11-03T12:53:02.211603Z", + "latest-update": "2022-11-22T14:32:56.265429Z", "options": { "no-language-in-filenames": true } diff --git a/javascript-checks/src/main/resources/org/sonar/l10n/javascript/rules/javascript/S5542.html b/javascript-checks/src/main/resources/org/sonar/l10n/javascript/rules/javascript/S5542.html index f34cc32eeae..289f0136e70 100644 --- a/javascript-checks/src/main/resources/org/sonar/l10n/javascript/rules/javascript/S5542.html +++ b/javascript-checks/src/main/resources/org/sonar/l10n/javascript/rules/javascript/S5542.html @@ -1,4 +1,4 @@ -
Encryption operations should use a secure mode and padding scheme so that confidentiality and integrity can be guaranteed.
+Encryption algorithms should use secure modes and padding schemes where appropriate to guarantee data confidentiality and integrity.
Amazon Relational Database Service (RDS) allows to easily host and manage a relational database in the cloud. RDS databases can be encrypted, -ensuring the security of data-at-rest. In the case that adversaries gain physical access to the storage medium they are not able to access the -data.
+Using unencrypted RDS DB resources exposes data to unauthorized access to the underlying storage.
This includes database data, logs, automatic
+backups, read replicas, snapshots, and cluster metadata.
This situation can occur in a variety of scenarios, such as:
+AWS-managed encryption at rest reduces this risk with a simple switch.
There is a risk if you answered yes to any of those questions.
It’s recommended to encrypt databases that contain sensitive information. Encryption and decryption are handled transparently by RDS, so no further -modifications to the application are necessary.
+It is recommended to enable encryption at rest on any RDS DB resource, regardless of the engine.
In any case, no further maintenance is
+required as encryption at rest is fully managed by AWS.
For aws-cdk-lib.aws_rds.CfnDBCluster
:
No issue is reported when on Key policies in AWS KMS.
+