fix(KMS): Kms key for CloudWatch #353
Annotations
10 errors
Run dasmeta/reusable-actions-workflows/[email protected]
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
|
Run dasmeta/reusable-actions-workflows/[email protected]
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
|
Run dasmeta/reusable-actions-workflows/[email protected]
CKV_AWS_186: "Ensure S3 bucket Object is encrypted by KMS using a customer managed Key (CMK)"
|
Run dasmeta/reusable-actions-workflows/[email protected]
CKV_AWS_124: "Ensure that CloudFormation stacks are sending event notifications to an SNS topic"
|
Run dasmeta/reusable-actions-workflows/[email protected]
CKV_AWS_363: "Ensure Lambda Runtime is not deprecated"
|
Run dasmeta/reusable-actions-workflows/[email protected]
CKV_AWS_272: "Ensure AWS Lambda function is configured to validate code-signing"
|
Run dasmeta/reusable-actions-workflows/[email protected]
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
|
Run dasmeta/reusable-actions-workflows/[email protected]
CKV_AWS_158: "Ensure that CloudWatch Log Group is encrypted by KMS"
|
Run dasmeta/reusable-actions-workflows/[email protected]
CKV2_AWS_62: "Ensure S3 buckets should have event notifications enabled"
|
Run dasmeta/reusable-actions-workflows/[email protected]
CKV_AWS_18: "Ensure the S3 bucket has access logging enabled"
|
Loading