layout | title | nav_order |
---|---|---|
default |
all resource scans |
1 |
Id | Type | Entity | Policy | IaC | |
---|---|---|---|---|---|
0 | CKV2_ADO_1 | resource | azuredevops_branch_policy_min_reviewers | Ensure at least two approving reviews for PRs | Terraform |
1 | CKV2_ADO_1 | resource | azuredevops_git_repository | Ensure at least two approving reviews for PRs | Terraform |
2 | CKV_ALI_1 | resource | alicloud_oss_bucket | Alibaba Cloud OSS bucket accessible to public | Terraform |
3 | CKV_ALI_2 | resource | alicloud_security_group_rule | Ensure no security groups allow ingress from 0.0.0.0:0 to port 22 | Terraform |
4 | CKV_ALI_3 | resource | alicloud_security_group_rule | Ensure no security groups allow ingress from 0.0.0.0:0 to port 3389 | Terraform |
5 | CKV_ALI_4 | resource | alicloud_actiontrail_trail | Ensure Action Trail Logging for all regions | Terraform |
6 | CKV_ALI_5 | resource | alicloud_actiontrail_trail | Ensure Action Trail Logging for all events | Terraform |
7 | CKV_ALI_6 | resource | alicloud_oss_bucket | Ensure OSS bucket is encrypted with Customer Master Key | Terraform |
8 | CKV_ALI_7 | resource | alicloud_disk | Ensure disk is encrypted | Terraform |
9 | CKV_ALI_8 | resource | alicloud_disk | Ensure Disk is encrypted with Customer Master Key | Terraform |
10 | CKV_ALI_9 | resource | alicloud_db_instance | Ensure database instance is not public | Terraform |
11 | CKV_ALI_10 | resource | alicloud_oss_bucket | Ensure OSS bucket has versioning enabled | Terraform |
12 | CKV_ALI_11 | resource | alicloud_oss_bucket | Ensure OSS bucket has transfer Acceleration enabled | Terraform |
13 | CKV_ALI_12 | resource | alicloud_oss_bucket | Ensure the OSS bucket has access logging enabled | Terraform |
14 | CKV_ALI_13 | resource | alicloud_ram_account_password_policy | Ensure RAM password policy requires minimum length of 14 or greater | Terraform |
15 | CKV_ALI_14 | resource | alicloud_ram_account_password_policy | Ensure RAM password policy requires at least one number | Terraform |
16 | CKV_ALI_15 | resource | alicloud_ram_account_password_policy | Ensure RAM password policy requires at least one symbol | Terraform |
17 | CKV_ALI_16 | resource | alicloud_ram_account_password_policy | Ensure RAM password policy expires passwords within 90 days or less | Terraform |
18 | CKV_ALI_17 | resource | alicloud_ram_account_password_policy | Ensure RAM password policy requires at least one lowercase letter | Terraform |
19 | CKV_ALI_18 | resource | alicloud_ram_account_password_policy | Ensure RAM password policy prevents password reuse | Terraform |
20 | CKV_ALI_19 | resource | alicloud_ram_account_password_policy | Ensure RAM password policy requires at least one uppercase letter | Terraform |
21 | CKV_ALI_20 | resource | alicloud_db_instance | Ensure RDS instance uses SSL | Terraform |
22 | CKV_ALI_21 | resource | alicloud_api_gateway_api | Ensure API Gateway API Protocol HTTPS | Terraform |
23 | CKV_ALI_22 | resource | alicloud_db_instance | Ensure Transparent Data Encryption is Enabled on instance | Terraform |
24 | CKV_ALI_23 | resource | alicloud_ram_account_password_policy | Ensure Ram Account Password Policy Max Login Attempts not > 5 | Terraform |
25 | CKV_ALI_24 | resource | alicloud_ram_security_preference | Ensure RAM enforces MFA | Terraform |
26 | CKV_ALI_25 | resource | alicloud_db_instance | Ensure RDS Instance SQL Collector Retention Period should be greater than 180 | Terraform |
27 | CKV_ALI_26 | resource | alicloud_cs_kubernetes | Ensure Kubernetes installs plugin Terway or Flannel to support standard policies | Terraform |
28 | CKV_ALI_27 | resource | alicloud_kms_key | Ensure KMS Key Rotation is enabled | Terraform |
29 | CKV_ALI_28 | resource | alicloud_kms_key | Ensure KMS Keys are enabled | Terraform |
30 | CKV_ALI_29 | resource | alicloud_alb_acl_entry_attachment | Alibaba ALB ACL does not restrict Access | Terraform |
31 | CKV_ALI_30 | resource | alicloud_db_instance | Ensure RDS instance auto upgrades for minor versions | Terraform |
32 | CKV_ALI_31 | resource | alicloud_cs_kubernetes_node_pool | Ensure K8s nodepools are set to auto repair | Terraform |
33 | CKV_ALI_32 | resource | alicloud_ecs_launch_template | Ensure launch template data disks are encrypted | Terraform |
34 | CKV_ALI_33 | resource | alicloud_slb_tls_cipher_policy | Alibaba Cloud Cypher Policy are secure | Terraform |
35 | CKV_ALI_35 | resource | alicloud_db_instance | Ensure RDS instance has log_duration enabled | Terraform |
36 | CKV_ALI_36 | resource | alicloud_db_instance | Ensure RDS instance has log_disconnections enabled | Terraform |
37 | CKV_ALI_37 | resource | alicloud_db_instance | Ensure RDS instance has log_connections enabled | Terraform |
38 | CKV_ALI_38 | resource | alicloud_log_audit | Ensure log audit is enabled for RDS | Terraform |
39 | CKV_ALI_41 | resource | alicloud_mongodb_instance | Ensure MongoDB is deployed inside a VPC | Terraform |
40 | CKV_ALI_42 | resource | alicloud_mongodb_instance | Ensure Mongodb instance uses SSL | Terraform |
41 | CKV_ALI_43 | resource | alicloud_mongodb_instance | Ensure MongoDB instance is not public | Terraform |
42 | CKV_ALI_44 | resource | alicloud_mongodb_instance | Ensure MongoDB has Transparent Data Encryption Enabled | Terraform |
43 | CKV_ARGO_1 | argo_workflows | spec | Ensure Workflow pods are not using the default ServiceAccount | Argo Workflows |
44 | CKV_ARGO_2 | argo_workflows | spec | Ensure Workflow pods are running as non-root user | Argo Workflows |
45 | CKV_AWS_1 | data | aws_iam_policy_document | Ensure IAM policies that allow full "-" administrative privileges are not created | Terraform |
46 | CKV_AWS_1 | resource | serverless_aws | Ensure IAM policies that allow full "-" administrative privileges are not created | serverless |
47 | CKV_AWS_2 | resource | AWS::ElasticLoadBalancingV2::Listener | Ensure ALB protocol is HTTPS | Cloudformation |
48 | CKV_AWS_2 | resource | aws_alb_listener | Ensure ALB protocol is HTTPS | Terraform |
49 | CKV_AWS_2 | resource | aws_lb_listener | Ensure ALB protocol is HTTPS | Terraform |
50 | CKV_AWS_3 | resource | AWS::EC2::Volume | Ensure all data stored in the EBS is securely encrypted | Cloudformation |
51 | CKV_AWS_3 | resource | aws_ebs_volume | Ensure all data stored in the EBS is securely encrypted | Terraform |
52 | CKV_AWS_5 | resource | AWS::Elasticsearch::Domain | Ensure all data stored in the Elasticsearch is securely encrypted at rest | Cloudformation |
53 | CKV_AWS_5 | resource | aws_elasticsearch_domain | Ensure all data stored in the Elasticsearch is securely encrypted at rest | Terraform |
54 | CKV_AWS_5 | resource | aws_opensearch_domain | Ensure all data stored in the Elasticsearch is securely encrypted at rest | Terraform |
55 | CKV_AWS_6 | resource | AWS::Elasticsearch::Domain | Ensure all Elasticsearch has node-to-node encryption enabled | Cloudformation |
56 | CKV_AWS_6 | resource | aws_elasticsearch_domain | Ensure all Elasticsearch has node-to-node encryption enabled | Terraform |
57 | CKV_AWS_6 | resource | aws_opensearch_domain | Ensure all Elasticsearch has node-to-node encryption enabled | Terraform |
58 | CKV_AWS_7 | resource | AWS::KMS::Key | Ensure rotation for customer created CMKs is enabled | Cloudformation |
59 | CKV_AWS_7 | resource | aws_kms_key | Ensure rotation for customer created CMKs is enabled | Terraform |
60 | CKV_AWS_8 | resource | AWS::AutoScaling::LaunchConfiguration | Ensure all data stored in the Launch configuration EBS is securely encrypted | Cloudformation |
61 | CKV_AWS_8 | resource | aws_instance | Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted | Terraform |
62 | CKV_AWS_8 | resource | aws_launch_configuration | Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted | Terraform |
63 | CKV_AWS_9 | resource | aws_iam_account_password_policy | Ensure IAM password policy expires passwords within 90 days or less | Terraform |
64 | CKV_AWS_10 | resource | aws_iam_account_password_policy | Ensure IAM password policy requires minimum length of 14 or greater | Terraform |
65 | CKV_AWS_11 | resource | aws_iam_account_password_policy | Ensure IAM password policy requires at least one lowercase letter | Terraform |
66 | CKV_AWS_12 | resource | aws_iam_account_password_policy | Ensure IAM password policy requires at least one number | Terraform |
67 | CKV_AWS_13 | resource | aws_iam_account_password_policy | Ensure IAM password policy prevents password reuse | Terraform |
68 | CKV_AWS_14 | resource | aws_iam_account_password_policy | Ensure IAM password policy requires at least one symbol | Terraform |
69 | CKV_AWS_15 | resource | aws_iam_account_password_policy | Ensure IAM password policy requires at least one uppercase letter | Terraform |
70 | CKV_AWS_16 | resource | AWS::RDS::DBInstance | Ensure all data stored in the RDS is securely encrypted at rest | Cloudformation |
71 | CKV_AWS_16 | resource | aws_db_instance | Ensure all data stored in the RDS is securely encrypted at rest | Terraform |
72 | CKV_AWS_17 | resource | AWS::RDS::DBInstance | Ensure all data stored in RDS is not publicly accessible | Cloudformation |
73 | CKV_AWS_17 | resource | aws_db_instance | Ensure all data stored in RDS is not publicly accessible | Terraform |
74 | CKV_AWS_17 | resource | aws_rds_cluster_instance | Ensure all data stored in RDS is not publicly accessible | Terraform |
75 | CKV_AWS_18 | resource | AWS::S3::Bucket | Ensure the S3 bucket has access logging enabled | Cloudformation |
76 | CKV_AWS_18 | resource | aws_s3_bucket | Ensure the S3 bucket has access logging enabled | Terraform |
77 | CKV_AWS_19 | resource | AWS::S3::Bucket | Ensure the S3 bucket has server-side-encryption enabled | Cloudformation |
78 | CKV_AWS_19 | resource | aws_s3_bucket | Ensure all data stored in the S3 bucket is securely encrypted at rest | Terraform |
79 | CKV_AWS_19 | resource | aws_s3_bucket_server_side_encryption_configuration | Ensure all data stored in the S3 bucket is securely encrypted at rest | Terraform |
80 | CKV_AWS_20 | resource | AWS::S3::Bucket | Ensure the S3 bucket does not allow READ permissions to everyone | Cloudformation |
81 | CKV_AWS_20 | resource | aws_s3_bucket | S3 Bucket has an ACL defined which allows public READ access. | Terraform |
82 | CKV_AWS_20 | resource | aws_s3_bucket_acl | S3 Bucket has an ACL defined which allows public READ access. | Terraform |
83 | CKV_AWS_21 | resource | AWS::S3::Bucket | Ensure the S3 bucket has versioning enabled | Cloudformation |
84 | CKV_AWS_21 | resource | aws_s3_bucket | Ensure all data stored in the S3 bucket have versioning enabled | Terraform |
85 | CKV_AWS_21 | resource | aws_s3_bucket_versioning | Ensure all data stored in the S3 bucket have versioning enabled | Terraform |
86 | CKV_AWS_22 | resource | aws_sagemaker_notebook_instance | Ensure SageMaker Notebook is encrypted at rest using KMS CMK | Terraform |
87 | CKV_AWS_23 | resource | AWS::EC2::SecurityGroup | Ensure every security groups rule has a description | Cloudformation |
88 | CKV_AWS_23 | resource | AWS::EC2::SecurityGroupEgress | Ensure every security groups rule has a description | Cloudformation |
89 | CKV_AWS_23 | resource | AWS::EC2::SecurityGroupIngress | Ensure every security groups rule has a description | Cloudformation |
90 | CKV_AWS_23 | resource | aws_db_security_group | Ensure every security groups rule has a description | Terraform |
91 | CKV_AWS_23 | resource | aws_elasticache_security_group | Ensure every security groups rule has a description | Terraform |
92 | CKV_AWS_23 | resource | aws_redshift_security_group | Ensure every security groups rule has a description | Terraform |
93 | CKV_AWS_23 | resource | aws_security_group | Ensure every security groups rule has a description | Terraform |
94 | CKV_AWS_23 | resource | aws_security_group_rule | Ensure every security groups rule has a description | Terraform |
95 | CKV_AWS_24 | resource | AWS::EC2::SecurityGroup | Ensure no security groups allow ingress from 0.0.0.0:0 to port 22 | Cloudformation |
96 | CKV_AWS_24 | resource | AWS::EC2::SecurityGroupIngress | Ensure no security groups allow ingress from 0.0.0.0:0 to port 22 | Cloudformation |
97 | CKV_AWS_24 | resource | aws_security_group | Ensure no security groups allow ingress from 0.0.0.0:0 to port 22 | Terraform |
98 | CKV_AWS_24 | resource | aws_security_group_rule | Ensure no security groups allow ingress from 0.0.0.0:0 to port 22 | Terraform |
99 | CKV_AWS_25 | resource | AWS::EC2::SecurityGroup | Ensure no security groups allow ingress from 0.0.0.0:0 to port 3389 | Cloudformation |
100 | CKV_AWS_25 | resource | AWS::EC2::SecurityGroupIngress | Ensure no security groups allow ingress from 0.0.0.0:0 to port 3389 | Cloudformation |
101 | CKV_AWS_25 | resource | aws_security_group | Ensure no security groups allow ingress from 0.0.0.0:0 to port 3389 | Terraform |
102 | CKV_AWS_25 | resource | aws_security_group_rule | Ensure no security groups allow ingress from 0.0.0.0:0 to port 3389 | Terraform |
103 | CKV_AWS_26 | resource | AWS::SNS::Topic | Ensure all data stored in the SNS topic is encrypted | Cloudformation |
104 | CKV_AWS_26 | resource | aws_sns_topic | Ensure all data stored in the SNS topic is encrypted | Terraform |
105 | CKV_AWS_27 | resource | AWS::SQS::Queue | Ensure all data stored in the SQS queue is encrypted | Cloudformation |
106 | CKV_AWS_27 | resource | aws_sqs_queue | Ensure all data stored in the SQS queue is encrypted | Terraform |
107 | CKV_AWS_28 | resource | AWS::DynamoDB::Table | Ensure Dynamodb point in time recovery (backup) is enabled | Cloudformation |
108 | CKV_AWS_28 | resource | aws_dynamodb_table | Ensure Dynamodb point in time recovery (backup) is enabled | Terraform |
109 | CKV_AWS_29 | resource | AWS::ElastiCache::ReplicationGroup | Ensure all data stored in the Elasticache Replication Group is securely encrypted at rest | Cloudformation |
110 | CKV_AWS_29 | resource | aws_elasticache_replication_group | Ensure all data stored in the Elasticache Replication Group is securely encrypted at rest | Terraform |
111 | CKV_AWS_30 | resource | AWS::ElastiCache::ReplicationGroup | Ensure all data stored in the Elasticache Replication Group is securely encrypted at transit | Cloudformation |
112 | CKV_AWS_30 | resource | aws_elasticache_replication_group | Ensure all data stored in the Elasticache Replication Group is securely encrypted at transit | Terraform |
113 | CKV_AWS_31 | resource | AWS::ElastiCache::ReplicationGroup | Ensure all data stored in the Elasticache Replication Group is securely encrypted at transit and has auth token | Cloudformation |
114 | CKV_AWS_31 | resource | aws_elasticache_replication_group | Ensure all data stored in the Elasticache Replication Group is securely encrypted at transit and has auth token | Terraform |
115 | CKV_AWS_32 | resource | AWS::ECR::Repository | Ensure ECR policy is not set to public | Cloudformation |
116 | CKV_AWS_32 | resource | aws_ecr_repository_policy | Ensure ECR policy is not set to public | Terraform |
117 | CKV_AWS_33 | resource | AWS::KMS::Key | Ensure KMS key policy does not contain wildcard (*) principal | Cloudformation |
118 | CKV_AWS_33 | resource | aws_kms_key | Ensure KMS key policy does not contain wildcard (*) principal | Terraform |
119 | CKV_AWS_34 | resource | AWS::CloudFront::Distribution | Ensure cloudfront distribution ViewerProtocolPolicy is set to HTTPS | Cloudformation |
120 | CKV_AWS_34 | resource | aws_cloudfront_distribution | Ensure cloudfront distribution ViewerProtocolPolicy is set to HTTPS | Terraform |
121 | CKV_AWS_35 | resource | AWS::CloudTrail::Trail | Ensure CloudTrail logs are encrypted at rest using KMS CMKs | Cloudformation |
122 | CKV_AWS_35 | resource | aws_cloudtrail | Ensure CloudTrail logs are encrypted at rest using KMS CMKs | Terraform |
123 | CKV_AWS_36 | resource | AWS::CloudTrail::Trail | Ensure CloudTrail log file validation is enabled | Cloudformation |
124 | CKV_AWS_36 | resource | aws_cloudtrail | Ensure CloudTrail log file validation is enabled | Terraform |
125 | CKV_AWS_37 | resource | aws_eks_cluster | Ensure Amazon EKS control plane logging enabled for all log types | Terraform |
126 | CKV_AWS_38 | resource | aws_eks_cluster | Ensure Amazon EKS public endpoint not accessible to 0.0.0.0/0 | Terraform |
127 | CKV_AWS_39 | resource | aws_eks_cluster | Ensure Amazon EKS public endpoint disabled | Terraform |
128 | CKV_AWS_40 | resource | AWS::IAM::Policy | Ensure IAM policies are attached only to groups or roles (Reducing access management complexity may in-turn reduce opportunity for a principal to inadvertently receive or retain excessive privileges.) | Cloudformation |
129 | CKV_AWS_40 | resource | aws_iam_policy_attachment | Ensure IAM policies are attached only to groups or roles (Reducing access management complexity may in-turn reduce opportunity for a principal to inadvertently receive or retain excessive privileges.) | Terraform |
130 | CKV_AWS_40 | resource | aws_iam_user_policy | Ensure IAM policies are attached only to groups or roles (Reducing access management complexity may in-turn reduce opportunity for a principal to inadvertently receive or retain excessive privileges.) | Terraform |
131 | CKV_AWS_40 | resource | aws_iam_user_policy_attachment | Ensure IAM policies are attached only to groups or roles (Reducing access management complexity may in-turn reduce opportunity for a principal to inadvertently receive or retain excessive privileges.) | Terraform |
132 | CKV_AWS_41 | provider | aws | Ensure no hard coded AWS access key and secret key exists in provider | Terraform |
133 | CKV_AWS_41 | resource | serverless_aws | Ensure no hard coded AWS access key and secret key exists in provider | serverless |
134 | CKV_AWS_42 | resource | AWS::EFS::FileSystem | Ensure EFS is securely encrypted | Cloudformation |
135 | CKV_AWS_42 | resource | aws_efs_file_system | Ensure EFS is securely encrypted | Terraform |
136 | CKV_AWS_43 | resource | AWS::Kinesis::Stream | Ensure Kinesis Stream is securely encrypted | Cloudformation |
137 | CKV_AWS_43 | resource | aws_kinesis_stream | Ensure Kinesis Stream is securely encrypted | Terraform |
138 | CKV_AWS_44 | resource | AWS::Neptune::DBCluster | Ensure Neptune storage is securely encrypted | Cloudformation |
139 | CKV_AWS_44 | resource | aws_neptune_cluster | Ensure Neptune storage is securely encrypted | Terraform |
140 | CKV_AWS_45 | resource | AWS::Lambda::Function | Ensure no hard-coded secrets exist in lambda environment | Cloudformation |
141 | CKV_AWS_45 | resource | AWS::Serverless::Function | Ensure no hard-coded secrets exist in lambda environment | Cloudformation |
142 | CKV_AWS_45 | resource | aws_lambda_function | Ensure no hard-coded secrets exist in lambda environment | Terraform |
143 | CKV_AWS_46 | resource | AWS::EC2::Instance | Ensure no hard-coded secrets exist in EC2 user data | Cloudformation |
144 | CKV_AWS_46 | resource | aws_instance | Ensure no hard-coded secrets exist in EC2 user data | Terraform |
145 | CKV_AWS_47 | resource | AWS::DAX::Cluster | Ensure DAX is encrypted at rest (default is unencrypted) | Cloudformation |
146 | CKV_AWS_47 | resource | aws_dax_cluster | Ensure DAX is encrypted at rest (default is unencrypted) | Terraform |
147 | CKV_AWS_48 | resource | aws_mq_broker | Ensure MQ Broker logging is enabled | Terraform |
148 | CKV_AWS_49 | data | aws_iam_policy_document | Ensure no IAM policies documents allow "*" as a statement's actions | Terraform |
149 | CKV_AWS_49 | resource | serverless_aws | Ensure no IAM policies documents allow "*" as a statement's actions | serverless |
150 | CKV_AWS_50 | resource | aws_lambda_function | X-ray tracing is enabled for Lambda | Terraform |
151 | CKV_AWS_51 | resource | AWS::ECR::Repository | Ensure ECR Image Tags are immutable | Cloudformation |
152 | CKV_AWS_51 | resource | aws_ecr_repository | Ensure ECR Image Tags are immutable | Terraform |
153 | CKV_AWS_53 | resource | AWS::S3::Bucket | Ensure S3 bucket has block public ACLS enabled | Cloudformation |
154 | CKV_AWS_53 | resource | aws_s3_bucket_public_access_block | Ensure S3 bucket has block public ACLS enabled | Terraform |
155 | CKV_AWS_54 | resource | AWS::S3::Bucket | Ensure S3 bucket has block public policy enabled | Cloudformation |
156 | CKV_AWS_54 | resource | aws_s3_bucket_public_access_block | Ensure S3 bucket has block public policy enabled | Terraform |
157 | CKV_AWS_55 | resource | AWS::S3::Bucket | Ensure S3 bucket has ignore public ACLs enabled | Cloudformation |
158 | CKV_AWS_55 | resource | aws_s3_bucket_public_access_block | Ensure S3 bucket has ignore public ACLs enabled | Terraform |
159 | CKV_AWS_56 | resource | AWS::S3::Bucket | Ensure S3 bucket has 'restrict_public_bucket' enabled | Cloudformation |
160 | CKV_AWS_56 | resource | aws_s3_bucket_public_access_block | Ensure S3 bucket has 'restrict_public_bucket' enabled | Terraform |
161 | CKV_AWS_57 | resource | AWS::S3::Bucket | Ensure the S3 bucket does not allow WRITE permissions to everyone | Cloudformation |
162 | CKV_AWS_57 | resource | aws_s3_bucket | S3 Bucket has an ACL defined which allows public WRITE access. | Terraform |
163 | CKV_AWS_57 | resource | aws_s3_bucket_acl | S3 Bucket has an ACL defined which allows public WRITE access. | Terraform |
164 | CKV_AWS_58 | resource | AWS::EKS::Cluster | Ensure EKS Cluster has Secrets Encryption Enabled | Cloudformation |
165 | CKV_AWS_58 | resource | aws_eks_cluster | Ensure EKS Cluster has Secrets Encryption Enabled | Terraform |
166 | CKV_AWS_59 | resource | AWS::ApiGateway::Method | Ensure there is no open access to back-end resources through API | Cloudformation |
167 | CKV_AWS_59 | resource | aws_api_gateway_method | Ensure there is no open access to back-end resources through API | Terraform |
168 | CKV_AWS_60 | resource | AWS::IAM::Role | Ensure IAM role allows only specific services or principals to assume it | Cloudformation |
169 | CKV_AWS_60 | resource | aws_iam_role | Ensure IAM role allows only specific services or principals to assume it | Terraform |
170 | CKV_AWS_61 | resource | AWS::IAM::Role | Ensure AWS IAM policy does not allow assume role permission across all services | Cloudformation |
171 | CKV_AWS_61 | resource | aws_iam_role | Ensure AWS IAM policy does not allow assume role permission across all services | Terraform |
172 | CKV_AWS_62 | resource | AWS::IAM::Group | Ensure no IAM policies that allow full "-" administrative privileges are not created | Cloudformation |
173 | CKV_AWS_62 | resource | AWS::IAM::Policy | Ensure no IAM policies that allow full "-" administrative privileges are not created | Cloudformation |
174 | CKV_AWS_62 | resource | AWS::IAM::Role | Ensure no IAM policies that allow full "-" administrative privileges are not created | Cloudformation |
175 | CKV_AWS_62 | resource | AWS::IAM::User | Ensure no IAM policies that allow full "-" administrative privileges are not created | Cloudformation |
176 | CKV_AWS_62 | resource | aws_iam_group_policy | Ensure IAM policies that allow full "-" administrative privileges are not created | Terraform |
177 | CKV_AWS_62 | resource | aws_iam_policy | Ensure IAM policies that allow full "-" administrative privileges are not created | Terraform |
178 | CKV_AWS_62 | resource | aws_iam_role_policy | Ensure IAM policies that allow full "-" administrative privileges are not created | Terraform |
179 | CKV_AWS_62 | resource | aws_iam_user_policy | Ensure IAM policies that allow full "-" administrative privileges are not created | Terraform |
180 | CKV_AWS_62 | resource | aws_ssoadmin_permission_set_inline_policy | Ensure IAM policies that allow full "-" administrative privileges are not created | Terraform |
181 | CKV_AWS_63 | resource | AWS::IAM::Group | Ensure no IAM policies documents allow "*" as a statement's actions | Cloudformation |
182 | CKV_AWS_63 | resource | AWS::IAM::Policy | Ensure no IAM policies documents allow "*" as a statement's actions | Cloudformation |
183 | CKV_AWS_63 | resource | AWS::IAM::Role | Ensure no IAM policies documents allow "*" as a statement's actions | Cloudformation |
184 | CKV_AWS_63 | resource | AWS::IAM::User | Ensure no IAM policies documents allow "*" as a statement's actions | Cloudformation |
185 | CKV_AWS_63 | resource | aws_iam_group_policy | Ensure no IAM policies documents allow "*" as a statement's actions | Terraform |
186 | CKV_AWS_63 | resource | aws_iam_policy | Ensure no IAM policies documents allow "*" as a statement's actions | Terraform |
187 | CKV_AWS_63 | resource | aws_iam_role_policy | Ensure no IAM policies documents allow "*" as a statement's actions | Terraform |
188 | CKV_AWS_63 | resource | aws_iam_user_policy | Ensure no IAM policies documents allow "*" as a statement's actions | Terraform |
189 | CKV_AWS_63 | resource | aws_ssoadmin_permission_set_inline_policy | Ensure no IAM policies documents allow "*" as a statement's actions | Terraform |
190 | CKV_AWS_64 | resource | AWS::Redshift::Cluster | Ensure all data stored in the Redshift cluster is securely encrypted at rest | Cloudformation |
191 | CKV_AWS_64 | resource | aws_redshift_cluster | Ensure all data stored in the Redshift cluster is securely encrypted at rest | Terraform |
192 | CKV_AWS_65 | resource | AWS::ECS::Cluster | Ensure container insights are enabled on ECS cluster | Cloudformation |
193 | CKV_AWS_65 | resource | aws_ecs_cluster | Ensure container insights are enabled on ECS cluster | Terraform |
194 | CKV_AWS_66 | resource | AWS::Logs::LogGroup | Ensure that CloudWatch Log Group specifies retention days | Cloudformation |
195 | CKV_AWS_66 | resource | aws_cloudwatch_log_group | Ensure that CloudWatch Log Group specifies retention days | Terraform |
196 | CKV_AWS_67 | resource | AWS::CloudTrail::Trail | Ensure CloudTrail is enabled in all Regions | Cloudformation |
197 | CKV_AWS_67 | resource | aws_cloudtrail | Ensure CloudTrail is enabled in all Regions | Terraform |
198 | CKV_AWS_68 | resource | AWS::CloudFront::Distribution | CloudFront Distribution should have WAF enabled | Cloudformation |
199 | CKV_AWS_68 | resource | aws_cloudfront_distribution | CloudFront Distribution should have WAF enabled | Terraform |
200 | CKV_AWS_69 | resource | AWS::AmazonMQ::Broker | Ensure Amazon MQ Broker should not have public access | Cloudformation |
201 | CKV_AWS_69 | resource | aws_mq_broker | Ensure MQ Broker is not publicly exposed | Terraform |
202 | CKV_AWS_70 | resource | aws_s3_bucket | Ensure S3 bucket does not allow an action with any Principal | Terraform |
203 | CKV_AWS_70 | resource | aws_s3_bucket_policy | Ensure S3 bucket does not allow an action with any Principal | Terraform |
204 | CKV_AWS_71 | resource | AWS::Redshift::Cluster | Ensure Redshift Cluster logging is enabled | Cloudformation |
205 | CKV_AWS_71 | resource | aws_redshift_cluster | Ensure Redshift Cluster logging is enabled | Terraform |
206 | CKV_AWS_72 | resource | aws_sqs_queue_policy | Ensure SQS policy does not allow ALL (*) actions. | Terraform |
207 | CKV_AWS_73 | resource | AWS::ApiGateway::Stage | Ensure API Gateway has X-Ray Tracing enabled | Cloudformation |
208 | CKV_AWS_73 | resource | AWS::Serverless::Api | Ensure API Gateway has X-Ray Tracing enabled | Cloudformation |
209 | CKV_AWS_73 | resource | aws_api_gateway_stage | Ensure API Gateway has X-Ray Tracing enabled | Terraform |
210 | CKV_AWS_74 | resource | AWS::DocDB::DBCluster | Ensure DocDB is encrypted at rest (default is unencrypted) | Cloudformation |
211 | CKV_AWS_74 | resource | aws_docdb_cluster | Ensure DocDB is encrypted at rest (default is unencrypted) | Terraform |
212 | CKV_AWS_75 | resource | aws_globalaccelerator_accelerator | Ensure Global Accelerator accelerator has flow logs enabled | Terraform |
213 | CKV_AWS_76 | resource | AWS::ApiGateway::Stage | Ensure API Gateway has Access Logging enabled | Cloudformation |
214 | CKV_AWS_76 | resource | AWS::Serverless::Api | Ensure API Gateway has Access Logging enabled | Cloudformation |
215 | CKV_AWS_76 | resource | aws_api_gateway_stage | Ensure API Gateway has Access Logging enabled | Terraform |
216 | CKV_AWS_76 | resource | aws_apigatewayv2_stage | Ensure API Gateway has Access Logging enabled | Terraform |
217 | CKV_AWS_77 | resource | aws_athena_database | Ensure Athena Database is encrypted at rest (default is unencrypted) | Terraform |
218 | CKV_AWS_78 | resource | AWS::CodeBuild::Project | Ensure that CodeBuild Project encryption is not disabled | Cloudformation |
219 | CKV_AWS_78 | resource | aws_codebuild_project | Ensure that CodeBuild Project encryption is not disabled | Terraform |
220 | CKV_AWS_79 | resource | AWS::EC2::LaunchTemplate | Ensure Instance Metadata Service Version 1 is not enabled | Cloudformation |
221 | CKV_AWS_79 | resource | aws_instance | Ensure Instance Metadata Service Version 1 is not enabled | Terraform |
222 | CKV_AWS_79 | resource | aws_launch_configuration | Ensure Instance Metadata Service Version 1 is not enabled | Terraform |
223 | CKV_AWS_79 | resource | aws_launch_template | Ensure Instance Metadata Service Version 1 is not enabled | Terraform |
224 | CKV_AWS_80 | resource | aws_msk_cluster | Ensure MSK Cluster logging is enabled | Terraform |
225 | CKV_AWS_81 | resource | aws_msk_cluster | Ensure MSK Cluster encryption in rest and transit is enabled | Terraform |
226 | CKV_AWS_82 | resource | AWS::Athena::WorkGroup | Ensure Athena Workgroup should enforce configuration to prevent client disabling encryption | Cloudformation |
227 | CKV_AWS_82 | resource | aws_athena_workgroup | Ensure Athena Workgroup should enforce configuration to prevent client disabling encryption | Terraform |
228 | CKV_AWS_83 | resource | AWS::Elasticsearch::Domain | Ensure Elasticsearch Domain enforces HTTPS | Cloudformation |
229 | CKV_AWS_83 | resource | aws_elasticsearch_domain | Ensure Elasticsearch Domain enforces HTTPS | Terraform |
230 | CKV_AWS_83 | resource | aws_opensearch_domain | Ensure Elasticsearch Domain enforces HTTPS | Terraform |
231 | CKV_AWS_84 | resource | AWS::Elasticsearch::Domain | Ensure Elasticsearch Domain Logging is enabled | Cloudformation |
232 | CKV_AWS_84 | resource | aws_elasticsearch_domain | Ensure Elasticsearch Domain Logging is enabled | Terraform |
233 | CKV_AWS_84 | resource | aws_opensearch_domain | Ensure Elasticsearch Domain Logging is enabled | Terraform |
234 | CKV_AWS_85 | resource | AWS::DocDB::DBCluster | Ensure DocDB Logging is enabled | Cloudformation |
235 | CKV_AWS_85 | resource | aws_docdb_cluster | Ensure DocDB Logging is enabled | Terraform |
236 | CKV_AWS_86 | resource | AWS::CloudFront::Distribution | Ensure Cloudfront distribution has Access Logging enabled | Cloudformation |
237 | CKV_AWS_86 | resource | aws_cloudfront_distribution | Ensure Cloudfront distribution has Access Logging enabled | Terraform |
238 | CKV_AWS_87 | resource | AWS::Redshift::Cluster | Redshift cluster should not be publicly accessible | Cloudformation |
239 | CKV_AWS_87 | resource | aws_redshift_cluster | Redshift cluster should not be publicly accessible | Terraform |
240 | CKV_AWS_88 | resource | AWS::EC2::Instance | EC2 instance should not have public IP. | Cloudformation |
241 | CKV_AWS_88 | resource | AWS::EC2::LaunchTemplate | EC2 instance should not have public IP. | Cloudformation |
242 | CKV_AWS_88 | resource | aws_instance | EC2 instance should not have public IP. | Terraform |
243 | CKV_AWS_88 | resource | aws_launch_template | EC2 instance should not have public IP. | Terraform |
244 | CKV_AWS_89 | resource | AWS::DMS::ReplicationInstance | DMS replication instance should not be publicly accessible | Cloudformation |
245 | CKV_AWS_89 | resource | aws_dms_replication_instance | DMS replication instance should not be publicly accessible | Terraform |
246 | CKV_AWS_90 | resource | AWS::DocDB::DBClusterParameterGroup | Ensure DocDB TLS is not disabled | Cloudformation |
247 | CKV_AWS_90 | resource | aws_docdb_cluster_parameter_group | Ensure DocDB TLS is not disabled | Terraform |
248 | CKV_AWS_91 | resource | AWS::ElasticLoadBalancingV2::LoadBalancer | Ensure the ELBv2 (Application/Network) has access logging enabled | Cloudformation |
249 | CKV_AWS_91 | resource | aws_alb | Ensure the ELBv2 (Application/Network) has access logging enabled | Terraform |
250 | CKV_AWS_91 | resource | aws_lb | Ensure the ELBv2 (Application/Network) has access logging enabled | Terraform |
251 | CKV_AWS_92 | resource | AWS::ElasticLoadBalancing::LoadBalancer | Ensure the ELB has access logging enabled | Cloudformation |
252 | CKV_AWS_92 | resource | aws_elb | Ensure the ELB has access logging enabled | Terraform |
253 | CKV_AWS_93 | resource | aws_s3_bucket | Ensure S3 bucket policy does not lockout all but root user. (Prevent lockouts needing root account fixes) | Terraform |
254 | CKV_AWS_93 | resource | aws_s3_bucket_policy | Ensure S3 bucket policy does not lockout all but root user. (Prevent lockouts needing root account fixes) | Terraform |
255 | CKV_AWS_94 | resource | AWS::Glue::DataCatalogEncryptionSettings | Ensure Glue Data Catalog Encryption is enabled | Cloudformation |
256 | CKV_AWS_94 | resource | aws_glue_data_catalog_encryption_settings | Ensure Glue Data Catalog Encryption is enabled | Terraform |
257 | CKV_AWS_95 | resource | AWS::ApiGatewayV2::Stage | Ensure API Gateway V2 has Access Logging enabled | Cloudformation |
258 | CKV_AWS_95 | resource | AWS::Serverless::HttpApi | Ensure API Gateway V2 has Access Logging enabled | Cloudformation |
259 | CKV_AWS_96 | resource | AWS::RDS::DBCluster | Ensure all data stored in Aurora is securely encrypted at rest | Cloudformation |
260 | CKV_AWS_96 | resource | aws_rds_cluster | Ensure all data stored in Aurora is securely encrypted at rest | Terraform |
261 | CKV_AWS_97 | resource | AWS::ECS::TaskDefinition | Ensure Encryption in transit is enabled for EFS volumes in ECS Task definitions | Cloudformation |
262 | CKV_AWS_97 | resource | aws_ecs_task_definition | Ensure Encryption in transit is enabled for EFS volumes in ECS Task definitions | Terraform |
263 | CKV_AWS_98 | resource | aws_sagemaker_endpoint_configuration | Ensure all data stored in the Sagemaker Endpoint is securely encrypted at rest | Terraform |
264 | CKV_AWS_99 | resource | AWS::Glue::SecurityConfiguration | Ensure Glue Security Configuration Encryption is enabled | Cloudformation |
265 | CKV_AWS_99 | resource | aws_glue_security_configuration | Ensure Glue Security Configuration Encryption is enabled | Terraform |
266 | CKV_AWS_100 | resource | AWS::EKS::Nodegroup | Ensure AWS EKS node group does not have implicit SSH access from 0.0.0.0/0 | Cloudformation |
267 | CKV_AWS_100 | resource | aws_eks_node_group | Ensure AWS EKS node group does not have implicit SSH access from 0.0.0.0/0 | Terraform |
268 | CKV_AWS_101 | resource | AWS::Neptune::DBCluster | Ensure Neptune logging is enabled | Cloudformation |
269 | CKV_AWS_101 | resource | aws_neptune_cluster | Ensure Neptune logging is enabled | Terraform |
270 | CKV_AWS_102 | resource | aws_neptune_cluster_instance | Ensure Neptune Cluster instance is not publicly available | Terraform |
271 | CKV_AWS_103 | resource | AWS::ElasticLoadBalancingV2::Listener | Ensure that Load Balancer Listener is using at least TLS v1.2 | Cloudformation |
272 | CKV_AWS_103 | resource | aws_alb_listener | Ensure that load balancer is using TLS 1.2 | Terraform |
273 | CKV_AWS_103 | resource | aws_lb | Ensure that load balancer is using TLS 1.2 | Terraform |
274 | CKV_AWS_103 | resource | aws_lb_listener | Ensure that load balancer is using TLS 1.2 | Terraform |
275 | CKV_AWS_104 | resource | AWS::DocDB::DBClusterParameterGroup | Ensure DocDB has audit logs enabled | Cloudformation |
276 | CKV_AWS_104 | resource | aws_docdb_cluster_parameter_group | Ensure DocDB has audit logs enabled | Terraform |
277 | CKV_AWS_105 | resource | AWS::Redshift::ClusterParameterGroup | Ensure Redshift uses SSL | Cloudformation |
278 | CKV_AWS_105 | resource | aws_redshift_parameter_group | Ensure Redshift uses SSL | Terraform |
279 | CKV_AWS_106 | resource | aws_ebs_encryption_by_default | Ensure EBS default encryption is enabled | Terraform |
280 | CKV_AWS_107 | resource | AWS::IAM::Group | Ensure IAM policies does not allow credentials exposure | Cloudformation |
281 | CKV_AWS_107 | resource | AWS::IAM::ManagedPolicy | Ensure IAM policies does not allow credentials exposure | Cloudformation |
282 | CKV_AWS_107 | resource | AWS::IAM::Policy | Ensure IAM policies does not allow credentials exposure | Cloudformation |
283 | CKV_AWS_107 | resource | AWS::IAM::Role | Ensure IAM policies does not allow credentials exposure | Cloudformation |
284 | CKV_AWS_107 | resource | AWS::IAM::User | Ensure IAM policies does not allow credentials exposure | Cloudformation |
285 | CKV_AWS_107 | data | aws_iam_policy_document | Ensure IAM policies does not allow credentials exposure | Terraform |
286 | CKV_AWS_108 | resource | AWS::IAM::Group | Ensure IAM policies does not allow data exfiltration | Cloudformation |
287 | CKV_AWS_108 | resource | AWS::IAM::ManagedPolicy | Ensure IAM policies does not allow data exfiltration | Cloudformation |
288 | CKV_AWS_108 | resource | AWS::IAM::Policy | Ensure IAM policies does not allow data exfiltration | Cloudformation |
289 | CKV_AWS_108 | resource | AWS::IAM::Role | Ensure IAM policies does not allow data exfiltration | Cloudformation |
290 | CKV_AWS_108 | resource | AWS::IAM::User | Ensure IAM policies does not allow data exfiltration | Cloudformation |
291 | CKV_AWS_108 | data | aws_iam_policy_document | Ensure IAM policies does not allow data exfiltration | Terraform |
292 | CKV_AWS_109 | resource | AWS::IAM::Group | Ensure IAM policies does not allow permissions management without constraints | Cloudformation |
293 | CKV_AWS_109 | resource | AWS::IAM::ManagedPolicy | Ensure IAM policies does not allow permissions management without constraints | Cloudformation |
294 | CKV_AWS_109 | resource | AWS::IAM::Policy | Ensure IAM policies does not allow permissions management without constraints | Cloudformation |
295 | CKV_AWS_109 | resource | AWS::IAM::Role | Ensure IAM policies does not allow permissions management without constraints | Cloudformation |
296 | CKV_AWS_109 | resource | AWS::IAM::User | Ensure IAM policies does not allow permissions management without constraints | Cloudformation |
297 | CKV_AWS_109 | data | aws_iam_policy_document | Ensure IAM policies does not allow permissions management / resource exposure without constraints | Terraform |
298 | CKV_AWS_110 | resource | AWS::IAM::Group | Ensure IAM policies does not allow privilege escalation | Cloudformation |
299 | CKV_AWS_110 | resource | AWS::IAM::ManagedPolicy | Ensure IAM policies does not allow privilege escalation | Cloudformation |
300 | CKV_AWS_110 | resource | AWS::IAM::Policy | Ensure IAM policies does not allow privilege escalation | Cloudformation |
301 | CKV_AWS_110 | resource | AWS::IAM::Role | Ensure IAM policies does not allow privilege escalation | Cloudformation |
302 | CKV_AWS_110 | resource | AWS::IAM::User | Ensure IAM policies does not allow privilege escalation | Cloudformation |
303 | CKV_AWS_110 | data | aws_iam_policy_document | Ensure IAM policies does not allow privilege escalation | Terraform |
304 | CKV_AWS_111 | resource | AWS::IAM::Group | Ensure IAM policies does not allow write access without constraints | Cloudformation |
305 | CKV_AWS_111 | resource | AWS::IAM::ManagedPolicy | Ensure IAM policies does not allow write access without constraints | Cloudformation |
306 | CKV_AWS_111 | resource | AWS::IAM::Policy | Ensure IAM policies does not allow write access without constraints | Cloudformation |
307 | CKV_AWS_111 | resource | AWS::IAM::Role | Ensure IAM policies does not allow write access without constraints | Cloudformation |
308 | CKV_AWS_111 | resource | AWS::IAM::User | Ensure IAM policies does not allow write access without constraints | Cloudformation |
309 | CKV_AWS_111 | data | aws_iam_policy_document | Ensure IAM policies does not allow write access without constraints | Terraform |
310 | CKV_AWS_112 | resource | aws_ssm_document | Ensure Session Manager data is encrypted in transit | Terraform |
311 | CKV_AWS_113 | resource | aws_ssm_document | Ensure Session Manager logs are enabled and encrypted | Terraform |
312 | CKV_AWS_114 | resource | aws_emr_cluster | Ensure that EMR clusters with Kerberos have Kerberos Realm set | Terraform |
313 | CKV_AWS_115 | resource | AWS::Lambda::Function | Ensure that AWS Lambda function is configured for function-level concurrent execution limit | Cloudformation |
314 | CKV_AWS_115 | resource | AWS::Serverless::Function | Ensure that AWS Lambda function is configured for function-level concurrent execution limit | Cloudformation |
315 | CKV_AWS_115 | resource | aws_lambda_function | Ensure that AWS Lambda function is configured for function-level concurrent execution limit | Terraform |
316 | CKV_AWS_116 | resource | AWS::Lambda::Function | Ensure that AWS Lambda function is configured for a Dead Letter Queue(DLQ) | Cloudformation |
317 | CKV_AWS_116 | resource | AWS::Serverless::Function | Ensure that AWS Lambda function is configured for a Dead Letter Queue(DLQ) | Cloudformation |
318 | CKV_AWS_116 | resource | aws_lambda_function | Ensure that AWS Lambda function is configured for a Dead Letter Queue(DLQ) | Terraform |
319 | CKV_AWS_117 | resource | AWS::Lambda::Function | Ensure that AWS Lambda function is configured inside a VPC | Cloudformation |
320 | CKV_AWS_117 | resource | AWS::Serverless::Function | Ensure that AWS Lambda function is configured inside a VPC | Cloudformation |
321 | CKV_AWS_117 | resource | aws_lambda_function | Ensure that AWS Lambda function is configured inside a VPC | Terraform |
322 | CKV_AWS_118 | resource | AWS::RDS::DBInstance | Ensure that enhanced monitoring is enabled for Amazon RDS instances | Cloudformation |
323 | CKV_AWS_118 | resource | aws_db_instance | Ensure that enhanced monitoring is enabled for Amazon RDS instances | Terraform |
324 | CKV_AWS_118 | resource | aws_rds_cluster_instance | Ensure that enhanced monitoring is enabled for Amazon RDS instances | Terraform |
325 | CKV_AWS_119 | resource | AWS::DynamoDB::Table | Ensure DynamoDB Tables are encrypted using a KMS Customer Managed CMK | Cloudformation |
326 | CKV_AWS_119 | resource | aws_dynamodb_table | Ensure DynamoDB Tables are encrypted using a KMS Customer Managed CMK | Terraform |
327 | CKV_AWS_120 | resource | AWS::ApiGateway::Stage | Ensure API Gateway caching is enabled | Cloudformation |
328 | CKV_AWS_120 | resource | AWS::Serverless::Api | Ensure API Gateway caching is enabled | Cloudformation |
329 | CKV_AWS_120 | resource | aws_api_gateway_stage | Ensure API Gateway caching is enabled | Terraform |
330 | CKV_AWS_121 | resource | aws_config_configuration_aggregator | Ensure AWS Config is enabled in all regions | Terraform |
331 | CKV_AWS_122 | resource | aws_sagemaker_notebook_instance | Ensure that direct internet access is disabled for an Amazon SageMaker Notebook Instance | Terraform |
332 | CKV_AWS_123 | resource | AWS::EC2::VPCEndpointService | Ensure that VPC Endpoint Service is configured for Manual Acceptance | Cloudformation |
333 | CKV_AWS_123 | resource | aws_vpc_endpoint_service | Ensure that VPC Endpoint Service is configured for Manual Acceptance | Terraform |
334 | CKV_AWS_124 | resource | aws_cloudformation_stack | Ensure that CloudFormation stacks are sending event notifications to an SNS topic | Terraform |
335 | CKV_AWS_126 | resource | aws_instance | Ensure that detailed monitoring is enabled for EC2 instances | Terraform |
336 | CKV_AWS_127 | resource | aws_elb | Ensure that Elastic Load Balancer(s) uses SSL certificates provided by AWS Certificate Manager | Terraform |
337 | CKV_AWS_128 | resource | aws_rds_cluster | Ensure that an Amazon RDS Clusters have AWS Identity and Access Management (IAM) authentication enabled | Terraform |
338 | CKV_AWS_129 | resource | aws_db_instance | Ensure that respective logs of Amazon Relational Database Service (Amazon RDS) are enabled | Terraform |
339 | CKV_AWS_130 | resource | aws_subnet | Ensure VPC subnets do not assign public IP by default | Terraform |
340 | CKV_AWS_131 | resource | AWS::ElasticLoadBalancingV2::LoadBalancer | Ensure that ALB drops HTTP headers | Cloudformation |
341 | CKV_AWS_131 | resource | aws_alb | Ensure that ALB drops HTTP headers | Terraform |
342 | CKV_AWS_131 | resource | aws_lb | Ensure that ALB drops HTTP headers | Terraform |
343 | CKV_AWS_133 | resource | aws_db_instance | Ensure that RDS instances has backup policy | Terraform |
344 | CKV_AWS_133 | resource | aws_rds_cluster | Ensure that RDS instances has backup policy | Terraform |
345 | CKV_AWS_134 | resource | aws_elasticache_cluster | Ensure that Amazon ElastiCache Redis clusters have automatic backup turned on | Terraform |
346 | CKV_AWS_135 | resource | aws_instance | Ensure that EC2 is EBS optimized | Terraform |
347 | CKV_AWS_136 | resource | AWS::ECR::Repository | Ensure that ECR repositories are encrypted using KMS | Cloudformation |
348 | CKV_AWS_136 | resource | aws_ecr_repository | Ensure that ECR repositories are encrypted using KMS | Terraform |
349 | CKV_AWS_137 | resource | aws_elasticsearch_domain | Ensure that Elasticsearch is configured inside a VPC | Terraform |
350 | CKV_AWS_137 | resource | aws_opensearch_domain | Ensure that Elasticsearch is configured inside a VPC | Terraform |
351 | CKV_AWS_138 | resource | aws_elb | Ensure that ELB is cross-zone-load-balancing enabled | Terraform |
352 | CKV_AWS_139 | resource | aws_rds_cluster | Ensure that RDS clusters have deletion protection enabled | Terraform |
353 | CKV_AWS_140 | resource | aws_rds_global_cluster | Ensure that RDS global clusters are encrypted | Terraform |
354 | CKV_AWS_141 | resource | aws_redshift_cluster | Ensured that redshift cluster allowing version upgrade by default | Terraform |
355 | CKV_AWS_142 | resource | aws_redshift_cluster | Ensure that Redshift cluster is encrypted by KMS | Terraform |
356 | CKV_AWS_143 | resource | aws_s3_bucket | Ensure that S3 bucket has lock configuration enabled by default | Terraform |
357 | CKV_AWS_144 | resource | aws_s3_bucket | Ensure that S3 bucket has cross-region replication enabled | Terraform |
358 | CKV_AWS_144 | resource | aws_s3_bucket_replication_configuration | Ensure that S3 bucket has cross-region replication enabled | Terraform |
359 | CKV_AWS_145 | resource | aws_s3_bucket | Ensure that S3 buckets are encrypted with KMS by default | Terraform |
360 | CKV_AWS_145 | resource | aws_s3_bucket_server_side_encryption_configuration | Ensure that S3 buckets are encrypted with KMS by default | Terraform |
361 | CKV_AWS_146 | resource | aws_db_cluster_snapshot | Ensure that RDS database cluster snapshot is encrypted | Terraform |
362 | CKV_AWS_147 | resource | aws_codebuild_project | Ensure that CodeBuild projects are encrypted | Terraform |
363 | CKV_AWS_148 | resource | aws_default_vpc | Ensure no default VPC is planned to be provisioned | Terraform |
364 | CKV_AWS_149 | resource | AWS::SecretsManager::Secret | Ensure that Secrets Manager secret is encrypted using KMS CMK | Cloudformation |
365 | CKV_AWS_149 | resource | aws_secretsmanager_secret | Ensure that Secrets Manager secret is encrypted using KMS CMK | Terraform |
366 | CKV_AWS_150 | resource | aws_alb | Ensure that Load Balancer has deletion protection enabled | Terraform |
367 | CKV_AWS_150 | resource | aws_lb | Ensure that Load Balancer has deletion protection enabled | Terraform |
368 | CKV_AWS_152 | resource | aws_alb | Ensure that Load Balancer (Network/Gateway) has cross-zone load balancing enabled | Terraform |
369 | CKV_AWS_152 | resource | aws_lb | Ensure that Load Balancer (Network/Gateway) has cross-zone load balancing enabled | Terraform |
370 | CKV_AWS_153 | resource | aws_autoscaling_group | Autoscaling groups should supply tags to launch configurations | Terraform |
371 | CKV_AWS_154 | resource | AWS::Redshift::Cluster | Ensure Redshift is not deployed outside of a VPC | Cloudformation |
372 | CKV_AWS_154 | resource | aws_redshift_cluster | Ensure Redshift is not deployed outside of a VPC | Terraform |
373 | CKV_AWS_155 | resource | AWS::WorkSpaces::Workspace | Ensure that Workspace user volumes are encrypted | Cloudformation |
374 | CKV_AWS_155 | resource | aws_workspaces_workspace | Ensure that Workspace user volumes are encrypted | Terraform |
375 | CKV_AWS_156 | resource | AWS::WorkSpaces::Workspace | Ensure that Workspace root volumes are encrypted | Cloudformation |
376 | CKV_AWS_156 | resource | aws_workspaces_workspace | Ensure that Workspace root volumes are encrypted | Terraform |
377 | CKV_AWS_157 | resource | AWS::RDS::DBInstance | Ensure that RDS instances have Multi-AZ enabled | Cloudformation |
378 | CKV_AWS_157 | resource | aws_db_instance | Ensure that RDS instances have Multi-AZ enabled | Terraform |
379 | CKV_AWS_158 | resource | AWS::Logs::LogGroup | Ensure that CloudWatch Log Group is encrypted by KMS | Cloudformation |
380 | CKV_AWS_158 | resource | aws_cloudwatch_log_group | Ensure that CloudWatch Log Group is encrypted by KMS | Terraform |
381 | CKV_AWS_159 | resource | aws_athena_workgroup | Ensure that Athena Workgroup is encrypted | Terraform |
382 | CKV_AWS_160 | resource | AWS::Timestream::Database | Ensure that Timestream database is encrypted with KMS CMK | Cloudformation |
383 | CKV_AWS_160 | resource | aws_timestreamwrite_database | Ensure that Timestream database is encrypted with KMS CMK | Terraform |
384 | CKV_AWS_161 | resource | AWS::RDS::DBInstance | Ensure RDS database has IAM authentication enabled | Cloudformation |
385 | CKV_AWS_161 | resource | aws_db_instance | Ensure RDS database has IAM authentication enabled | Terraform |
386 | CKV_AWS_162 | resource | AWS::RDS::DBCluster | Ensure RDS cluster has IAM authentication enabled | Cloudformation |
387 | CKV_AWS_162 | resource | aws_rds_cluster | Ensure RDS cluster has IAM authentication enabled | Terraform |
388 | CKV_AWS_163 | resource | AWS::ECR::Repository | Ensure ECR image scanning on push is enabled | Cloudformation |
389 | CKV_AWS_163 | resource | aws_ecr_repository | Ensure ECR image scanning on push is enabled | Terraform |
390 | CKV_AWS_164 | resource | AWS::Transfer::Server | Ensure Transfer Server is not exposed publicly. | Cloudformation |
391 | CKV_AWS_164 | resource | aws_transfer_server | Ensure Transfer Server is not exposed publicly. | Terraform |
392 | CKV_AWS_165 | resource | AWS::DynamoDB::GlobalTable | Ensure Dynamodb global table point in time recovery (backup) is enabled | Cloudformation |
393 | CKV_AWS_165 | resource | aws_dynamodb_global_table | Ensure Dynamodb point in time recovery (backup) is enabled for global tables | Terraform |
394 | CKV_AWS_166 | resource | AWS::Backup::BackupVault | Ensure Backup Vault is encrypted at rest using KMS CMK | Cloudformation |
395 | CKV_AWS_166 | resource | aws_backup_vault | Ensure Backup Vault is encrypted at rest using KMS CMK | Terraform |
396 | CKV_AWS_167 | resource | aws_glacier_vault | Ensure Glacier Vault access policy is not public by only allowing specific services or principals to access it | Terraform |
397 | CKV_AWS_168 | resource | aws_sqs_queue | Ensure SQS queue policy is not public by only allowing specific services or principals to access it | Terraform |
398 | CKV_AWS_168 | resource | aws_sqs_queue_policy | Ensure SQS queue policy is not public by only allowing specific services or principals to access it | Terraform |
399 | CKV_AWS_169 | resource | aws_sns_topic_policy | Ensure SNS topic policy is not public by only allowing specific services or principals to access it | Terraform |
400 | CKV_AWS_170 | resource | AWS::QLDB::Ledger | Ensure QLDB ledger permissions mode is set to STANDARD | Cloudformation |
401 | CKV_AWS_170 | resource | aws_qldb_ledger | Ensure QLDB ledger permissions mode is set to STANDARD | Terraform |
402 | CKV_AWS_171 | resource | aws_emr_security_configuration | Ensure Cluster security configuration encryption is using SSE-KMS | Terraform |
403 | CKV_AWS_172 | resource | AWS::QLDB::Ledger | Ensure QLDB ledger has deletion protection enabled | Cloudformation |
404 | CKV_AWS_172 | resource | aws_qldb_ledger | Ensure QLDB ledger has deletion protection enabled | Terraform |
405 | CKV_AWS_173 | resource | AWS::Lambda::Function | Check encryption settings for Lambda environmental variable | Cloudformation |
406 | CKV_AWS_173 | resource | AWS::Serverless::Function | Check encryption settings for Lambda environmental variable | Cloudformation |
407 | CKV_AWS_173 | resource | aws_lambda_function | Check encryption settings for Lambda environmental variable | Terraform |
408 | CKV_AWS_174 | resource | AWS::CloudFront::Distribution | Verify CloudFront Distribution Viewer Certificate is using TLS v1.2 | Cloudformation |
409 | CKV_AWS_174 | resource | aws_cloudfront_distribution | Verify CloudFront Distribution Viewer Certificate is using TLS v1.2 | Terraform |
410 | CKV_AWS_175 | resource | aws_waf_web_acl | Ensure WAF has associated rules | Terraform |
411 | CKV_AWS_175 | resource | aws_wafregional_web_acl | Ensure WAF has associated rules | Terraform |
412 | CKV_AWS_175 | resource | aws_wafv2_web_acl | Ensure WAF has associated rules | Terraform |
413 | CKV_AWS_176 | resource | aws_waf_web_acl | Ensure Logging is enabled for WAF Web Access Control Lists | Terraform |
414 | CKV_AWS_176 | resource | aws_wafregional_web_acl | Ensure Logging is enabled for WAF Web Access Control Lists | Terraform |
415 | CKV_AWS_177 | resource | aws_kinesis_video_stream | Ensure Kinesis Video Stream is encrypted by KMS using a customer managed Key (CMK) | Terraform |
416 | CKV_AWS_178 | resource | aws_fsx_ontap_file_system | Ensure fx ontap file system is encrypted by KMS using a customer managed Key (CMK) | Terraform |
417 | CKV_AWS_179 | resource | aws_fsx_windows_file_system | Ensure FSX Windows filesystem is encrypted by KMS using a customer managed Key (CMK) | Terraform |
418 | CKV_AWS_180 | resource | aws_imagebuilder_component | Ensure Image Builder component is encrypted by KMS using a customer managed Key (CMK) | Terraform |
419 | CKV_AWS_181 | resource | aws_s3_object_copy | Ensure S3 Object Copy is encrypted by KMS using a customer managed Key (CMK) | Terraform |
420 | CKV_AWS_182 | resource | aws_docdb_cluster | Ensure Doc DB is encrypted by KMS using a customer managed Key (CMK) | Terraform |
421 | CKV_AWS_183 | resource | aws_ebs_snapshot_copy | Ensure EBS Snapshot Copy is encrypted by KMS using a customer managed Key (CMK) | Terraform |
422 | CKV_AWS_184 | resource | aws_efs_file_system | Ensure resource is encrypted by KMS using a customer managed Key (CMK) | Terraform |
423 | CKV_AWS_185 | resource | aws_kinesis_stream | Ensure Kinesis Stream is encrypted by KMS using a customer managed Key (CMK) | Terraform |
424 | CKV_AWS_186 | resource | aws_s3_bucket_object | Ensure S3 bucket Object is encrypted by KMS using a customer managed Key (CMK) | Terraform |
425 | CKV_AWS_187 | resource | aws_sagemaker_domain | Ensure Sagemaker domain is encrypted by KMS using a customer managed Key (CMK) | Terraform |
426 | CKV_AWS_188 | resource | aws_redshift_cluster | Ensure RedShift Cluster is encrypted by KMS using a customer managed Key (CMK) | Terraform |
427 | CKV_AWS_189 | resource | aws_ebs_volume | Ensure EBS Volume is encrypted by KMS using a customer managed Key (CMK) | Terraform |
428 | CKV_AWS_190 | resource | aws_fsx_lustre_file_system | Ensure lustre file systems is encrypted by KMS using a customer managed Key (CMK) | Terraform |
429 | CKV_AWS_191 | resource | aws_elasticache_replication_group | Ensure Elasticache replication group is encrypted by KMS using a customer managed Key (CMK) | Terraform |
430 | CKV_AWS_192 | resource | AWS::WAFv2::WebACL | Ensure WAF prevents message lookup in Log4j2. See CVE-2021-44228 aka log4jshell | Cloudformation |
431 | CKV_AWS_192 | resource | aws_wafv2_web_acl | Ensure WAF prevents message lookup in Log4j2. See CVE-2021-44228 aka log4jshell | Terraform |
432 | CKV_AWS_193 | resource | AWS::AppSync::GraphQLApi | Ensure AppSync has Logging enabled | Cloudformation |
433 | CKV_AWS_193 | resource | aws_appsync_graphql_api | Ensure AppSync has Logging enabled | Terraform |
434 | CKV_AWS_194 | resource | AWS::AppSync::GraphQLApi | Ensure AppSync has Field-Level logs enabled | Cloudformation |
435 | CKV_AWS_194 | resource | aws_appsync_graphql_api | Ensure AppSync has Field-Level logs enabled | Terraform |
436 | CKV_AWS_195 | resource | AWS::Glue::Crawler | Ensure Glue component has a security configuration associated | Cloudformation |
437 | CKV_AWS_195 | resource | AWS::Glue::DevEndpoint | Ensure Glue component has a security configuration associated | Cloudformation |
438 | CKV_AWS_195 | resource | AWS::Glue::Job | Ensure Glue component has a security configuration associated | Cloudformation |
439 | CKV_AWS_195 | resource | aws_glue_crawler | Ensure Glue component has a security configuration associated | Terraform |
440 | CKV_AWS_195 | resource | aws_glue_dev_endpoint | Ensure Glue component has a security configuration associated | Terraform |
441 | CKV_AWS_195 | resource | aws_glue_job | Ensure Glue component has a security configuration associated | Terraform |
442 | CKV_AWS_196 | resource | aws_elasticache_security_group | Ensure no aws_elasticache_security_group resources exist | Terraform |
443 | CKV_AWS_197 | resource | AWS::AmazonMQ::Broker | Ensure MQ Broker Audit logging is enabled | Cloudformation |
444 | CKV_AWS_197 | resource | aws_mq_broker | Ensure MQ Broker Audit logging is enabled | Terraform |
445 | CKV_AWS_198 | resource | aws_db_security_group | Ensure no aws_db_security_group resources exist | Terraform |
446 | CKV_AWS_199 | resource | aws_imagebuilder_distribution_configuration | Ensure Image Builder Distribution Configuration encrypts AMI's using KMS - a customer managed Key (CMK) | Terraform |
447 | CKV_AWS_200 | resource | aws_imagebuilder_image_recipe | Ensure that Image Recipe EBS Disk are encrypted with CMK | Terraform |
448 | CKV_AWS_201 | resource | aws_memorydb_cluster | Ensure MemoryDB is encrypted at rest using KMS CMKs | Terraform |
449 | CKV_AWS_202 | resource | aws_memorydb_cluster | Ensure MemoryDB data is encrypted in transit | Terraform |
450 | CKV_AWS_203 | resource | aws_fsx_openzfs_file_system | Ensure resource is encrypted by KMS using a customer managed Key (CMK) | Terraform |
451 | CKV_AWS_204 | resource | aws_ami | Ensure AMIs are encrypted using KMS CMKs | Terraform |
452 | CKV_AWS_205 | resource | aws_ami_launch_permission | Ensure to Limit AMI launch Permissions | Terraform |
453 | CKV_AWS_206 | resource | aws_api_gateway_domain_name | Ensure API Gateway Domain uses a modern security Policy | Terraform |
454 | CKV_AWS_207 | resource | aws_mq_broker | Ensure MQ Broker minor version updates are enabled | Terraform |
455 | CKV_AWS_208 | resource | aws_mq_broker | Ensure MQBroker version is current | Terraform |
456 | CKV_AWS_208 | resource | aws_mq_configuration | Ensure MQBroker version is current | Terraform |
457 | CKV_AWS_209 | resource | aws_mq_broker | Ensure MQ broker encrypted by KMS using a customer managed Key (CMK) | Terraform |
458 | CKV_AWS_210 | resource | aws_batch_job_definition | Batch job does not define a privileged container | Terraform |
459 | CKV_AWS_211 | resource | aws_db_instance | Ensure RDS uses a modern CaCert | Terraform |
460 | CKV_AWS_212 | resource | aws_dms_replication_instance | Ensure EBS Volume is encrypted by KMS using a customer managed Key (CMK) | Terraform |
461 | CKV_AWS_213 | resource | aws_load_balancer_policy | Ensure ELB Policy uses only secure protocols | Terraform |
462 | CKV_AWS_214 | resource | aws_appsync_api_cache | Ensure Appsync API Cache is encrypted at rest | Terraform |
463 | CKV_AWS_215 | resource | aws_appsync_api_cache | Ensure Appsync API Cache is encrypted in transit | Terraform |
464 | CKV_AWS_216 | resource | aws_cloudfront_distribution | Ensure Cloudfront distribution is enabled | Terraform |
465 | CKV_AWS_217 | resource | aws_api_gateway_deployment | Ensure Create before destroy for API deployments | Terraform |
466 | CKV_AWS_218 | resource | aws_cloudsearch_domain | Ensure that Cloudsearch is using latest TLS | Terraform |
467 | CKV_AWS_219 | resource | aws_codepipeline | Ensure Code Pipeline Artifact store is using a KMS CMK | Terraform |
468 | CKV_AWS_220 | resource | aws_cloudsearch_domain | Ensure that Cloudsearch is using https | Terraform |
469 | CKV_AWS_221 | resource | aws_codeartifact_domain | Ensure Code artifact Domain is encrypted by KMS using a customer managed Key (CMK) | Terraform |
470 | CKV_AWS_222 | resource | aws_dms_replication_instance | Ensure DMS instance gets all minor upgrade automatically | Terraform |
471 | CKV_AWS_223 | resource | aws_ecs_cluster | Ensure ECS Cluster enables logging of ECS Exec | Terraform |
472 | CKV_AWS_224 | resource | aws_ecs_cluster | Ensure Cluster logging with CMK | Terraform |
473 | CKV_AWS_225 | resource | aws_api_gateway_method_settings | Ensure API Gateway method setting caching is enabled | Terraform |
474 | CKV_AWS_226 | resource | aws_db_instance | Ensure DB instance gets all minor upgrades automatically | Terraform |
475 | CKV_AWS_226 | resource | aws_rds_cluster_instance | Ensure DB instance gets all minor upgrades automatically | Terraform |
476 | CKV_AWS_227 | resource | aws_kms_key | Ensure KMS key is enabled | Terraform |
477 | CKV_AWS_228 | resource | aws_elasticsearch_domain | Verify Elasticsearch domain is using an up to date TLS policy | Terraform |
478 | CKV_AWS_228 | resource | aws_opensearch_domain | Verify Elasticsearch domain is using an up to date TLS policy | Terraform |
479 | CKV_AWS_229 | resource | aws_network_acl | Ensure no NACL allow ingress from 0.0.0.0:0 to port 21 | Terraform |
480 | CKV_AWS_229 | resource | aws_network_acl_rule | Ensure no NACL allow ingress from 0.0.0.0:0 to port 21 | Terraform |
481 | CKV_AWS_230 | resource | aws_network_acl | Ensure no NACL allow ingress from 0.0.0.0:0 to port 20 | Terraform |
482 | CKV_AWS_230 | resource | aws_network_acl_rule | Ensure no NACL allow ingress from 0.0.0.0:0 to port 20 | Terraform |
483 | CKV_AWS_231 | resource | aws_network_acl | Ensure no NACL allow ingress from 0.0.0.0:0 to port 3389 | Terraform |
484 | CKV_AWS_231 | resource | aws_network_acl_rule | Ensure no NACL allow ingress from 0.0.0.0:0 to port 3389 | Terraform |
485 | CKV_AWS_232 | resource | aws_network_acl | Ensure no NACL allow ingress from 0.0.0.0:0 to port 22 | Terraform |
486 | CKV_AWS_232 | resource | aws_network_acl_rule | Ensure no NACL allow ingress from 0.0.0.0:0 to port 22 | Terraform |
487 | CKV_AWS_233 | resource | aws_acm_certificate | Ensure Create before destroy for ACM certificates | Terraform |
488 | CKV_AWS_234 | resource | aws_acm_certificate | Verify logging preference for ACM certificates | Terraform |
489 | CKV_AWS_235 | resource | aws_ami_copy | Ensure that copied AMIs are encrypted | Terraform |
490 | CKV_AWS_236 | resource | aws_ami_copy | Ensure AMI copying uses a CMK | Terraform |
491 | CKV_AWS_237 | resource | aws_api_gateway_rest_api | Ensure Create before destroy for API GATEWAY | Terraform |
492 | CKV_AWS_238 | resource | aws_guardduty_detector | Ensure that Guard Duty detector is enabled | Terraform |
493 | CKV_AWS_239 | resource | aws_dax_cluster | Ensure DAX cluster endpoint is using TLS | Terraform |
494 | CKV_AWS_240 | resource | aws_kinesis_firehose_delivery_stream | Ensure Kinesis Firehose delivery stream is encrypted | Terraform |
495 | CKV_AWS_241 | resource | aws_kinesis_firehose_delivery_stream | Ensure that Kinesis Firehose Delivery Streams are encrypted with CMK | Terraform |
496 | CKV_AWS_242 | resource | aws_mwaa_environment | Ensure MWAA environment has scheduler logs enabled | Terraform |
497 | CKV_AWS_243 | resource | aws_mwaa_environment | Ensure MWAA environment has worker logs enabled | Terraform |
498 | CKV_AWS_244 | resource | aws_mwaa_environment | Ensure MWAA environment has webserver logs enabled | Terraform |
499 | CKV_AWS_245 | resource | aws_db_instance_automated_backups_replication | Ensure replicated backups are encrypted at rest using KMS CMKs | Terraform |
500 | CKV_AWS_246 | resource | aws_rds_cluster_activity_stream | Ensure RDS Cluster activity streams are encrypted using KMS CMKs | Terraform |
501 | CKV_AWS_247 | resource | aws_elasticsearch_domain | Ensure all data stored in the Elasticsearch is encrypted with a CMK | Terraform |
502 | CKV_AWS_247 | resource | aws_opensearch_domain | Ensure all data stored in the Elasticsearch is encrypted with a CMK | Terraform |
503 | CKV_AWS_248 | resource | aws_elasticsearch_domain | Ensure that Elasticsearch is not using the default Security Group | Terraform |
504 | CKV_AWS_248 | resource | aws_opensearch_domain | Ensure that Elasticsearch is not using the default Security Group | Terraform |
505 | CKV_AWS_249 | resource | aws_ecs_task_definition | Ensure that the Execution Role ARN and the Task Role ARN are different in ECS Task definitions | Terraform |
506 | CKV_AWS_250 | resource | aws_db_instance | Ensure that RDS PostgreSQL instances use a non vulnerable version with the log_fdw extension (https://aws.amazon.com/security/security-bulletins/AWS-2022-004/) | Terraform |
507 | CKV_AWS_250 | resource | aws_rds_cluster | Ensure that RDS PostgreSQL instances use a non vulnerable version with the log_fdw extension (https://aws.amazon.com/security/security-bulletins/AWS-2022-004/) | Terraform |
508 | CKV_AWS_251 | resource | aws_cloudtrail | Ensure CloudTrail logging is enabled | Terraform |
509 | CKV_AWS_252 | resource | aws_cloudtrail | Ensure CloudTrail defines an SNS Topic | Terraform |
510 | CKV_AWS_253 | resource | aws_dlm_lifecycle_policy | Ensure DLM cross region events are encrypted | Terraform |
511 | CKV_AWS_254 | resource | aws_dlm_lifecycle_policy | Ensure DLM cross region events are encrypted with Customer Managed Key | Terraform |
512 | CKV_AWS_255 | resource | aws_dlm_lifecycle_policy | Ensure DLM cross region schedules are encrypted | Terraform |
513 | CKV_AWS_256 | resource | aws_dlm_lifecycle_policy | Ensure DLM cross region schedules are encrypted using a Customer Managed Key | Terraform |
514 | CKV_AWS_257 | resource | aws_codecommit_approval_rule_template | Ensure codecommit branch changes have at least 2 approvals | Terraform |
515 | CKV_AWS_258 | resource | AWS::Lambda::Url | Ensure that Lambda function URLs AuthType is not None | Cloudformation |
516 | CKV_AWS_258 | resource | aws_lambda_function_url | Ensure that Lambda function URLs AuthType is not None | Terraform |
517 | CKV_AWS_259 | resource | aws_cloudfront_response_headers_policy | Ensure CloudFront response header policy enforces Strict Transport Security | Terraform |
518 | CKV_AWS_260 | resource | AWS::EC2::SecurityGroup | Ensure no security groups allow ingress from 0.0.0.0:0 to port 80 | Cloudformation |
519 | CKV_AWS_260 | resource | AWS::EC2::SecurityGroupIngress | Ensure no security groups allow ingress from 0.0.0.0:0 to port 80 | Cloudformation |
520 | CKV_AWS_260 | resource | aws_security_group | Ensure no security groups allow ingress from 0.0.0.0:0 to port 80 | Terraform |
521 | CKV_AWS_260 | resource | aws_security_group_rule | Ensure no security groups allow ingress from 0.0.0.0:0 to port 80 | Terraform |
522 | CKV_AWS_261 | resource | aws_alb_target_group | Ensure HTTP HTTPS Target group defines Healthcheck | Terraform |
523 | CKV_AWS_261 | resource | aws_lb_target_group | Ensure HTTP HTTPS Target group defines Healthcheck | Terraform |
524 | CKV_AWS_262 | resource | aws_kendra_index | Ensure Kendra index Server side encryption uses CMK | Terraform |
525 | CKV_AWS_263 | resource | aws_appflow_flow | Ensure App Flow flow uses CMK | Terraform |
526 | CKV_AWS_264 | resource | aws_appflow_connector_profile | Ensure App Flow connector profile uses CMK | Terraform |
527 | CKV_AWS_265 | resource | aws_keyspaces_table | Ensure Keyspaces Table uses CMK | Terraform |
528 | CKV_AWS_266 | resource | aws_db_snapshot_copy | Ensure App Flow connector profile uses CMK | Terraform |
529 | CKV_AWS_267 | resource | aws_comprehend_entity_recognizer | Ensure that Comprehend Entity Recognizer's model is encrypted by KMS using a customer managed Key (CMK) | Terraform |
530 | CKV_AWS_268 | resource | aws_comprehend_entity_recognizer | Ensure that Comprehend Entity Recognizer's volume is encrypted by KMS using a customer managed Key (CMK) | Terraform |
531 | CKV_AWS_269 | resource | aws_connect_instance_storage_config | Ensure Connect Instance Kinesis Video Stream Storage Config uses CMK | Terraform |
532 | CKV_AWS_270 | resource | aws_connect_instance_storage_config | Ensure Connect Instance S3 Storage Config uses CMK | Terraform |
533 | CKV_AWS_271 | resource | aws_dynamodb_table_replica | Ensure DynamoDB table replica KMS encryption uses CMK | Terraform |
534 | CKV_AWS_272 | resource | aws_lambda_function | Ensure AWS Lambda function is configured to validate code-signing | Terraform |
535 | CKV2_AWS_1 | resource | aws_network_acl | Ensure that all NACL are attached to subnets | Terraform |
536 | CKV2_AWS_1 | resource | aws_subnet | Ensure that all NACL are attached to subnets | Terraform |
537 | CKV2_AWS_2 | resource | aws_ebs_volume | Ensure that only encrypted EBS volumes are attached to EC2 instances | Terraform |
538 | CKV2_AWS_2 | resource | aws_volume_attachment | Ensure that only encrypted EBS volumes are attached to EC2 instances | Terraform |
539 | CKV2_AWS_3 | resource | aws_guardduty_detector | Ensure GuardDuty is enabled to specific org/region | Terraform |
540 | CKV2_AWS_3 | resource | aws_guardduty_organization_configuration | Ensure GuardDuty is enabled to specific org/region | Terraform |
541 | CKV2_AWS_4 | resource | aws_api_gateway_method_settings | Ensure API Gateway stage have logging level defined as appropriate | Terraform |
542 | CKV2_AWS_4 | resource | aws_api_gateway_stage | Ensure API Gateway stage have logging level defined as appropriate | Terraform |
543 | CKV2_AWS_5 | resource | aws_security_group | Ensure that Security Groups are attached to another resource | Terraform |
544 | CKV2_AWS_6 | resource | aws_s3_bucket | Ensure that S3 bucket has a Public Access block | Terraform |
545 | CKV2_AWS_6 | resource | aws_s3_bucket_public_access_block | Ensure that S3 bucket has a Public Access block | Terraform |
546 | CKV2_AWS_7 | resource | aws_emr_cluster | Ensure that Amazon EMR clusters' security groups are not open to the world | Terraform |
547 | CKV2_AWS_7 | resource | aws_security_group | Ensure that Amazon EMR clusters' security groups are not open to the world | Terraform |
548 | CKV2_AWS_8 | resource | aws_rds_cluster | Ensure that RDS clusters has backup plan of AWS Backup | Terraform |
549 | CKV2_AWS_9 | resource | aws_backup_selection | Ensure that EBS are added in the backup plans of AWS Backup | Terraform |
550 | CKV2_AWS_10 | resource | aws_cloudtrail | Ensure CloudTrail trails are integrated with CloudWatch Logs | Terraform |
551 | CKV2_AWS_11 | resource | aws_vpc | Ensure VPC flow logging is enabled in all VPCs | Terraform |
552 | CKV2_AWS_12 | resource | aws_default_security_group | Ensure the default security group of every VPC restricts all traffic | Terraform |
553 | CKV2_AWS_12 | resource | aws_vpc | Ensure the default security group of every VPC restricts all traffic | Terraform |
554 | CKV2_AWS_14 | resource | aws_iam_group | Ensure that IAM groups includes at least one IAM user | Terraform |
555 | CKV2_AWS_14 | resource | aws_iam_group_membership | Ensure that IAM groups includes at least one IAM user | Terraform |
556 | CKV2_AWS_15 | resource | aws_autoscaling_group | Ensure that auto Scaling groups that are associated with a load balancer, are using Elastic Load Balancing health checks. | Terraform |
557 | CKV2_AWS_15 | resource | aws_elb | Ensure that auto Scaling groups that are associated with a load balancer, are using Elastic Load Balancing health checks. | Terraform |
558 | CKV2_AWS_16 | resource | aws_appautoscaling_target | Ensure that Auto Scaling is enabled on your DynamoDB tables | Terraform |
559 | CKV2_AWS_16 | resource | aws_dynamodb_table | Ensure that Auto Scaling is enabled on your DynamoDB tables | Terraform |
560 | CKV2_AWS_18 | resource | aws_backup_selection | Ensure that Elastic File System (Amazon EFS) file systems are added in the backup plans of AWS Backup | Terraform |
561 | CKV2_AWS_19 | resource | aws_eip | Ensure that all EIP addresses allocated to a VPC are attached to EC2 instances | Terraform |
562 | CKV2_AWS_19 | resource | aws_eip_association | Ensure that all EIP addresses allocated to a VPC are attached to EC2 instances | Terraform |
563 | CKV2_AWS_20 | resource | aws_alb | Ensure that ALB redirects HTTP requests into HTTPS ones | Terraform |
564 | CKV2_AWS_20 | resource | aws_alb_listener | Ensure that ALB redirects HTTP requests into HTTPS ones | Terraform |
565 | CKV2_AWS_20 | resource | aws_lb | Ensure that ALB redirects HTTP requests into HTTPS ones | Terraform |
566 | CKV2_AWS_20 | resource | aws_lb_listener | Ensure that ALB redirects HTTP requests into HTTPS ones | Terraform |
567 | CKV2_AWS_21 | resource | aws_iam_group_membership | Ensure that all IAM users are members of at least one IAM group. | Terraform |
568 | CKV2_AWS_22 | resource | aws_iam_user | Ensure an IAM User does not have access to the console | Terraform |
569 | CKV2_AWS_23 | resource | aws_route53_record | Route53 A Record has Attached Resource | Terraform |
570 | CKV2_AWS_27 | resource | aws_rds_cluster | Ensure Postgres RDS as aws_rds_cluster has Query Logging enabled | Terraform |
571 | CKV2_AWS_27 | resource | aws_rds_cluster_parameter_group | Ensure Postgres RDS as aws_rds_cluster has Query Logging enabled | Terraform |
572 | CKV2_AWS_28 | resource | aws_alb | Ensure public facing ALB are protected by WAF | Terraform |
573 | CKV2_AWS_28 | resource | aws_lb | Ensure public facing ALB are protected by WAF | Terraform |
574 | CKV2_AWS_29 | resource | aws_api_gateway_rest_api | Ensure public API gateway are protected by WAF | Terraform |
575 | CKV2_AWS_29 | resource | aws_api_gateway_stage | Ensure public API gateway are protected by WAF | Terraform |
576 | CKV2_AWS_30 | resource | aws_db_instance | Ensure Postgres RDS as aws_db_instance has Query Logging enabled | Terraform |
577 | CKV2_AWS_30 | resource | aws_db_parameter_group | Ensure Postgres RDS as aws_db_instance has Query Logging enabled | Terraform |
578 | CKV2_AWS_31 | resource | aws_wafv2_web_acl | Ensure WAF2 has a Logging Configuration | Terraform |
579 | CKV2_AWS_32 | resource | aws_cloudfront_distribution | Ensure CloudFront distribution has a response headers policy attached | Terraform |
580 | CKV2_AWS_33 | resource | AWS::AppSync::GraphQLApi | Ensure AppSync is protected by WAF | Cloudformation |
581 | CKV2_AWS_33 | resource | aws_appsync_graphql_api | Ensure AppSync is protected by WAF | Terraform |
582 | CKV2_AWS_34 | resource | aws_ssm_parameter | AWS SSM Parameter should be Encrypted | Terraform |
583 | CKV2_AWS_35 | resource | aws_route | AWS NAT Gateways should be utilized for the default route | Terraform |
584 | CKV2_AWS_35 | resource | aws_route_table | AWS NAT Gateways should be utilized for the default route | Terraform |
585 | CKV2_AWS_36 | resource | aws_ssm_parameter | Ensure terraform is not sending SSM secrets to untrusted domains over HTTP | Terraform |
586 | CKV2_AWS_36 | resource | data.http | Ensure terraform is not sending SSM secrets to untrusted domains over HTTP | Terraform |
587 | CKV2_AWS_37 | resource | aws | Ensure Codecommit associates an approval rule | Terraform |
588 | CKV2_AWS_37 | resource | aws_accessanalyzer_analyzer | Ensure Codecommit associates an approval rule | Terraform |
589 | CKV2_AWS_37 | resource | aws_acm_certificate | Ensure Codecommit associates an approval rule | Terraform |
590 | CKV2_AWS_37 | resource | aws_acm_certificate_validation | Ensure Codecommit associates an approval rule | Terraform |
591 | CKV2_AWS_37 | resource | aws_acmpca_certificate_authority | Ensure Codecommit associates an approval rule | Terraform |
592 | CKV2_AWS_37 | resource | aws_ami | Ensure Codecommit associates an approval rule | Terraform |
593 | CKV2_AWS_37 | resource | aws_ami_copy | Ensure Codecommit associates an approval rule | Terraform |
594 | CKV2_AWS_37 | resource | aws_ami_from_instance | Ensure Codecommit associates an approval rule | Terraform |
595 | CKV2_AWS_37 | resource | aws_ami_launch_permission | Ensure Codecommit associates an approval rule | Terraform |
596 | CKV2_AWS_37 | resource | aws_api_gateway_account | Ensure Codecommit associates an approval rule | Terraform |
597 | CKV2_AWS_37 | resource | aws_api_gateway_api_key | Ensure Codecommit associates an approval rule | Terraform |
598 | CKV2_AWS_37 | resource | aws_api_gateway_authorizer | Ensure Codecommit associates an approval rule | Terraform |
599 | CKV2_AWS_37 | resource | aws_api_gateway_base_path_mapping | Ensure Codecommit associates an approval rule | Terraform |
600 | CKV2_AWS_37 | resource | aws_api_gateway_client_certificate | Ensure Codecommit associates an approval rule | Terraform |
601 | CKV2_AWS_37 | resource | aws_api_gateway_deployment | Ensure Codecommit associates an approval rule | Terraform |
602 | CKV2_AWS_37 | resource | aws_api_gateway_documentation_part | Ensure Codecommit associates an approval rule | Terraform |
603 | CKV2_AWS_37 | resource | aws_api_gateway_documentation_version | Ensure Codecommit associates an approval rule | Terraform |
604 | CKV2_AWS_37 | resource | aws_api_gateway_domain_name | Ensure Codecommit associates an approval rule | Terraform |
605 | CKV2_AWS_37 | resource | aws_api_gateway_gateway_response | Ensure Codecommit associates an approval rule | Terraform |
606 | CKV2_AWS_37 | resource | aws_api_gateway_integration | Ensure Codecommit associates an approval rule | Terraform |
607 | CKV2_AWS_37 | resource | aws_api_gateway_integration_response | Ensure Codecommit associates an approval rule | Terraform |
608 | CKV2_AWS_37 | resource | aws_api_gateway_method | Ensure Codecommit associates an approval rule | Terraform |
609 | CKV2_AWS_37 | resource | aws_api_gateway_method_response | Ensure Codecommit associates an approval rule | Terraform |
610 | CKV2_AWS_37 | resource | aws_api_gateway_method_settings | Ensure Codecommit associates an approval rule | Terraform |
611 | CKV2_AWS_37 | resource | aws_api_gateway_model | Ensure Codecommit associates an approval rule | Terraform |
612 | CKV2_AWS_37 | resource | aws_api_gateway_request_validator | Ensure Codecommit associates an approval rule | Terraform |
613 | CKV2_AWS_37 | resource | aws_api_gateway_resource | Ensure Codecommit associates an approval rule | Terraform |
614 | CKV2_AWS_37 | resource | aws_api_gateway_rest_api | Ensure Codecommit associates an approval rule | Terraform |
615 | CKV2_AWS_37 | resource | aws_api_gateway_stage | Ensure Codecommit associates an approval rule | Terraform |
616 | CKV2_AWS_37 | resource | aws_api_gateway_usage_plan | Ensure Codecommit associates an approval rule | Terraform |
617 | CKV2_AWS_37 | resource | aws_api_gateway_usage_plan_key | Ensure Codecommit associates an approval rule | Terraform |
618 | CKV2_AWS_37 | resource | aws_api_gateway_vpc_link | Ensure Codecommit associates an approval rule | Terraform |
619 | CKV2_AWS_37 | resource | aws_apigatewayv2_api | Ensure Codecommit associates an approval rule | Terraform |
620 | CKV2_AWS_37 | resource | aws_apigatewayv2_api_mapping | Ensure Codecommit associates an approval rule | Terraform |
621 | CKV2_AWS_37 | resource | aws_apigatewayv2_authorizer | Ensure Codecommit associates an approval rule | Terraform |
622 | CKV2_AWS_37 | resource | aws_apigatewayv2_deployment | Ensure Codecommit associates an approval rule | Terraform |
623 | CKV2_AWS_37 | resource | aws_apigatewayv2_domain_name | Ensure Codecommit associates an approval rule | Terraform |
624 | CKV2_AWS_37 | resource | aws_apigatewayv2_integration | Ensure Codecommit associates an approval rule | Terraform |
625 | CKV2_AWS_37 | resource | aws_apigatewayv2_integration_response | Ensure Codecommit associates an approval rule | Terraform |
626 | CKV2_AWS_37 | resource | aws_apigatewayv2_model | Ensure Codecommit associates an approval rule | Terraform |
627 | CKV2_AWS_37 | resource | aws_apigatewayv2_route | Ensure Codecommit associates an approval rule | Terraform |
628 | CKV2_AWS_37 | resource | aws_apigatewayv2_route_response | Ensure Codecommit associates an approval rule | Terraform |
629 | CKV2_AWS_37 | resource | aws_apigatewayv2_stage | Ensure Codecommit associates an approval rule | Terraform |
630 | CKV2_AWS_37 | resource | aws_apigatewayv2_vpc_link | Ensure Codecommit associates an approval rule | Terraform |
631 | CKV2_AWS_37 | resource | aws_app_cookie_stickiness_policy | Ensure Codecommit associates an approval rule | Terraform |
632 | CKV2_AWS_37 | resource | aws_appautoscaling_policy | Ensure Codecommit associates an approval rule | Terraform |
633 | CKV2_AWS_37 | resource | aws_appautoscaling_scheduled_action | Ensure Codecommit associates an approval rule | Terraform |
634 | CKV2_AWS_37 | resource | aws_appautoscaling_target | Ensure Codecommit associates an approval rule | Terraform |
635 | CKV2_AWS_37 | resource | aws_appmesh_mesh | Ensure Codecommit associates an approval rule | Terraform |
636 | CKV2_AWS_37 | resource | aws_appmesh_route | Ensure Codecommit associates an approval rule | Terraform |
637 | CKV2_AWS_37 | resource | aws_appmesh_virtual_node | Ensure Codecommit associates an approval rule | Terraform |
638 | CKV2_AWS_37 | resource | aws_appmesh_virtual_router | Ensure Codecommit associates an approval rule | Terraform |
639 | CKV2_AWS_37 | resource | aws_appmesh_virtual_service | Ensure Codecommit associates an approval rule | Terraform |
640 | CKV2_AWS_37 | resource | aws_appsync_api_key | Ensure Codecommit associates an approval rule | Terraform |
641 | CKV2_AWS_37 | resource | aws_appsync_datasource | Ensure Codecommit associates an approval rule | Terraform |
642 | CKV2_AWS_37 | resource | aws_appsync_function | Ensure Codecommit associates an approval rule | Terraform |
643 | CKV2_AWS_37 | resource | aws_appsync_graphql_api | Ensure Codecommit associates an approval rule | Terraform |
644 | CKV2_AWS_37 | resource | aws_appsync_resolver | Ensure Codecommit associates an approval rule | Terraform |
645 | CKV2_AWS_37 | resource | aws_athena_database | Ensure Codecommit associates an approval rule | Terraform |
646 | CKV2_AWS_37 | resource | aws_athena_named_query | Ensure Codecommit associates an approval rule | Terraform |
647 | CKV2_AWS_37 | resource | aws_athena_workgroup | Ensure Codecommit associates an approval rule | Terraform |
648 | CKV2_AWS_37 | resource | aws_autoscaling_attachment | Ensure Codecommit associates an approval rule | Terraform |
649 | CKV2_AWS_37 | resource | aws_autoscaling_group | Ensure Codecommit associates an approval rule | Terraform |
650 | CKV2_AWS_37 | resource | aws_autoscaling_lifecycle_hook | Ensure Codecommit associates an approval rule | Terraform |
651 | CKV2_AWS_37 | resource | aws_autoscaling_notification | Ensure Codecommit associates an approval rule | Terraform |
652 | CKV2_AWS_37 | resource | aws_autoscaling_policy | Ensure Codecommit associates an approval rule | Terraform |
653 | CKV2_AWS_37 | resource | aws_autoscaling_schedule | Ensure Codecommit associates an approval rule | Terraform |
654 | CKV2_AWS_37 | resource | aws_backup_plan | Ensure Codecommit associates an approval rule | Terraform |
655 | CKV2_AWS_37 | resource | aws_backup_selection | Ensure Codecommit associates an approval rule | Terraform |
656 | CKV2_AWS_37 | resource | aws_backup_vault | Ensure Codecommit associates an approval rule | Terraform |
657 | CKV2_AWS_37 | resource | aws_batch_compute_environment | Ensure Codecommit associates an approval rule | Terraform |
658 | CKV2_AWS_37 | resource | aws_batch_job_definition | Ensure Codecommit associates an approval rule | Terraform |
659 | CKV2_AWS_37 | resource | aws_batch_job_queue | Ensure Codecommit associates an approval rule | Terraform |
660 | CKV2_AWS_37 | resource | aws_budgets_budget | Ensure Codecommit associates an approval rule | Terraform |
661 | CKV2_AWS_37 | resource | aws_cloud9_environment_ec2 | Ensure Codecommit associates an approval rule | Terraform |
662 | CKV2_AWS_37 | resource | aws_cloudformation_stack | Ensure Codecommit associates an approval rule | Terraform |
663 | CKV2_AWS_37 | resource | aws_cloudformation_stack_set | Ensure Codecommit associates an approval rule | Terraform |
664 | CKV2_AWS_37 | resource | aws_cloudformation_stack_set_instance | Ensure Codecommit associates an approval rule | Terraform |
665 | CKV2_AWS_37 | resource | aws_cloudfront_distribution | Ensure Codecommit associates an approval rule | Terraform |
666 | CKV2_AWS_37 | resource | aws_cloudfront_origin_access_identity | Ensure Codecommit associates an approval rule | Terraform |
667 | CKV2_AWS_37 | resource | aws_cloudfront_public_key | Ensure Codecommit associates an approval rule | Terraform |
668 | CKV2_AWS_37 | resource | aws_cloudhsm_v2_cluster | Ensure Codecommit associates an approval rule | Terraform |
669 | CKV2_AWS_37 | resource | aws_cloudhsm_v2_hsm | Ensure Codecommit associates an approval rule | Terraform |
670 | CKV2_AWS_37 | resource | aws_cloudtrail | Ensure Codecommit associates an approval rule | Terraform |
671 | CKV2_AWS_37 | resource | aws_cloudwatch_dashboard | Ensure Codecommit associates an approval rule | Terraform |
672 | CKV2_AWS_37 | resource | aws_cloudwatch_event_permission | Ensure Codecommit associates an approval rule | Terraform |
673 | CKV2_AWS_37 | resource | aws_cloudwatch_event_rule | Ensure Codecommit associates an approval rule | Terraform |
674 | CKV2_AWS_37 | resource | aws_cloudwatch_event_target | Ensure Codecommit associates an approval rule | Terraform |
675 | CKV2_AWS_37 | resource | aws_cloudwatch_log_destination | Ensure Codecommit associates an approval rule | Terraform |
676 | CKV2_AWS_37 | resource | aws_cloudwatch_log_destination_policy | Ensure Codecommit associates an approval rule | Terraform |
677 | CKV2_AWS_37 | resource | aws_cloudwatch_log_group | Ensure Codecommit associates an approval rule | Terraform |
678 | CKV2_AWS_37 | resource | aws_cloudwatch_log_metric_filter | Ensure Codecommit associates an approval rule | Terraform |
679 | CKV2_AWS_37 | resource | aws_cloudwatch_log_resource_policy | Ensure Codecommit associates an approval rule | Terraform |
680 | CKV2_AWS_37 | resource | aws_cloudwatch_log_stream | Ensure Codecommit associates an approval rule | Terraform |
681 | CKV2_AWS_37 | resource | aws_cloudwatch_log_subscription_filter | Ensure Codecommit associates an approval rule | Terraform |
682 | CKV2_AWS_37 | resource | aws_cloudwatch_metric_alarm | Ensure Codecommit associates an approval rule | Terraform |
683 | CKV2_AWS_37 | resource | aws_codebuild_project | Ensure Codecommit associates an approval rule | Terraform |
684 | CKV2_AWS_37 | resource | aws_codebuild_source_credential | Ensure Codecommit associates an approval rule | Terraform |
685 | CKV2_AWS_37 | resource | aws_codebuild_webhook | Ensure Codecommit associates an approval rule | Terraform |
686 | CKV2_AWS_37 | resource | aws_codecommit_repository | Ensure Codecommit associates an approval rule | Terraform |
687 | CKV2_AWS_37 | resource | aws_codecommit_trigger | Ensure Codecommit associates an approval rule | Terraform |
688 | CKV2_AWS_37 | resource | aws_codedeploy_app | Ensure Codecommit associates an approval rule | Terraform |
689 | CKV2_AWS_37 | resource | aws_codedeploy_deployment_config | Ensure Codecommit associates an approval rule | Terraform |
690 | CKV2_AWS_37 | resource | aws_codedeploy_deployment_group | Ensure Codecommit associates an approval rule | Terraform |
691 | CKV2_AWS_37 | resource | aws_codepipeline | Ensure Codecommit associates an approval rule | Terraform |
692 | CKV2_AWS_37 | resource | aws_codepipeline_webhook | Ensure Codecommit associates an approval rule | Terraform |
693 | CKV2_AWS_37 | resource | aws_codestarnotifications_notification_rule | Ensure Codecommit associates an approval rule | Terraform |
694 | CKV2_AWS_37 | resource | aws_cognito_identity_pool | Ensure Codecommit associates an approval rule | Terraform |
695 | CKV2_AWS_37 | resource | aws_cognito_identity_pool_roles_attachment | Ensure Codecommit associates an approval rule | Terraform |
696 | CKV2_AWS_37 | resource | aws_cognito_identity_provider | Ensure Codecommit associates an approval rule | Terraform |
697 | CKV2_AWS_37 | resource | aws_cognito_resource_server | Ensure Codecommit associates an approval rule | Terraform |
698 | CKV2_AWS_37 | resource | aws_cognito_user_group | Ensure Codecommit associates an approval rule | Terraform |
699 | CKV2_AWS_37 | resource | aws_cognito_user_pool | Ensure Codecommit associates an approval rule | Terraform |
700 | CKV2_AWS_37 | resource | aws_cognito_user_pool_client | Ensure Codecommit associates an approval rule | Terraform |
701 | CKV2_AWS_37 | resource | aws_cognito_user_pool_domain | Ensure Codecommit associates an approval rule | Terraform |
702 | CKV2_AWS_37 | resource | aws_config_aggregate_authorization | Ensure Codecommit associates an approval rule | Terraform |
703 | CKV2_AWS_37 | resource | aws_config_config_rule | Ensure Codecommit associates an approval rule | Terraform |
704 | CKV2_AWS_37 | resource | aws_config_configuration_aggregator | Ensure Codecommit associates an approval rule | Terraform |
705 | CKV2_AWS_37 | resource | aws_config_configuration_recorder | Ensure Codecommit associates an approval rule | Terraform |
706 | CKV2_AWS_37 | resource | aws_config_configuration_recorder_status | Ensure Codecommit associates an approval rule | Terraform |
707 | CKV2_AWS_37 | resource | aws_config_delivery_channel | Ensure Codecommit associates an approval rule | Terraform |
708 | CKV2_AWS_37 | resource | aws_config_organization_custom_rule | Ensure Codecommit associates an approval rule | Terraform |
709 | CKV2_AWS_37 | resource | aws_config_organization_managed_rule | Ensure Codecommit associates an approval rule | Terraform |
710 | CKV2_AWS_37 | resource | aws_cur_report_definition | Ensure Codecommit associates an approval rule | Terraform |
711 | CKV2_AWS_37 | resource | aws_customer_gateway | Ensure Codecommit associates an approval rule | Terraform |
712 | CKV2_AWS_37 | resource | aws_datapipeline_pipeline | Ensure Codecommit associates an approval rule | Terraform |
713 | CKV2_AWS_37 | resource | aws_datasync_agent | Ensure Codecommit associates an approval rule | Terraform |
714 | CKV2_AWS_37 | resource | aws_datasync_location_efs | Ensure Codecommit associates an approval rule | Terraform |
715 | CKV2_AWS_37 | resource | aws_datasync_location_nfs | Ensure Codecommit associates an approval rule | Terraform |
716 | CKV2_AWS_37 | resource | aws_datasync_location_s3 | Ensure Codecommit associates an approval rule | Terraform |
717 | CKV2_AWS_37 | resource | aws_datasync_location_smb | Ensure Codecommit associates an approval rule | Terraform |
718 | CKV2_AWS_37 | resource | aws_datasync_task | Ensure Codecommit associates an approval rule | Terraform |
719 | CKV2_AWS_37 | resource | aws_dax_cluster | Ensure Codecommit associates an approval rule | Terraform |
720 | CKV2_AWS_37 | resource | aws_dax_parameter_group | Ensure Codecommit associates an approval rule | Terraform |
721 | CKV2_AWS_37 | resource | aws_dax_subnet_group | Ensure Codecommit associates an approval rule | Terraform |
722 | CKV2_AWS_37 | resource | aws_db_cluster_snapshot | Ensure Codecommit associates an approval rule | Terraform |
723 | CKV2_AWS_37 | resource | aws_db_event_subscription | Ensure Codecommit associates an approval rule | Terraform |
724 | CKV2_AWS_37 | resource | aws_db_instance | Ensure Codecommit associates an approval rule | Terraform |
725 | CKV2_AWS_37 | resource | aws_db_instance_role_association | Ensure Codecommit associates an approval rule | Terraform |
726 | CKV2_AWS_37 | resource | aws_db_option_group | Ensure Codecommit associates an approval rule | Terraform |
727 | CKV2_AWS_37 | resource | aws_db_parameter_group | Ensure Codecommit associates an approval rule | Terraform |
728 | CKV2_AWS_37 | resource | aws_db_security_group | Ensure Codecommit associates an approval rule | Terraform |
729 | CKV2_AWS_37 | resource | aws_db_snapshot | Ensure Codecommit associates an approval rule | Terraform |
730 | CKV2_AWS_37 | resource | aws_db_subnet_group | Ensure Codecommit associates an approval rule | Terraform |
731 | CKV2_AWS_37 | resource | aws_default_network_acl | Ensure Codecommit associates an approval rule | Terraform |
732 | CKV2_AWS_37 | resource | aws_default_route_table | Ensure Codecommit associates an approval rule | Terraform |
733 | CKV2_AWS_37 | resource | aws_default_security_group | Ensure Codecommit associates an approval rule | Terraform |
734 | CKV2_AWS_37 | resource | aws_default_subnet | Ensure Codecommit associates an approval rule | Terraform |
735 | CKV2_AWS_37 | resource | aws_default_vpc | Ensure Codecommit associates an approval rule | Terraform |
736 | CKV2_AWS_37 | resource | aws_default_vpc_dhcp_options | Ensure Codecommit associates an approval rule | Terraform |
737 | CKV2_AWS_37 | resource | aws_devicefarm_project | Ensure Codecommit associates an approval rule | Terraform |
738 | CKV2_AWS_37 | resource | aws_directory_service_conditional_forwarder | Ensure Codecommit associates an approval rule | Terraform |
739 | CKV2_AWS_37 | resource | aws_directory_service_directory | Ensure Codecommit associates an approval rule | Terraform |
740 | CKV2_AWS_37 | resource | aws_directory_service_log_subscription | Ensure Codecommit associates an approval rule | Terraform |
741 | CKV2_AWS_37 | resource | aws_dlm_lifecycle_policy | Ensure Codecommit associates an approval rule | Terraform |
742 | CKV2_AWS_37 | resource | aws_dms_certificate | Ensure Codecommit associates an approval rule | Terraform |
743 | CKV2_AWS_37 | resource | aws_dms_endpoint | Ensure Codecommit associates an approval rule | Terraform |
744 | CKV2_AWS_37 | resource | aws_dms_event_subscription | Ensure Codecommit associates an approval rule | Terraform |
745 | CKV2_AWS_37 | resource | aws_dms_replication_instance | Ensure Codecommit associates an approval rule | Terraform |
746 | CKV2_AWS_37 | resource | aws_dms_replication_subnet_group | Ensure Codecommit associates an approval rule | Terraform |
747 | CKV2_AWS_37 | resource | aws_dms_replication_task | Ensure Codecommit associates an approval rule | Terraform |
748 | CKV2_AWS_37 | resource | aws_docdb_cluster | Ensure Codecommit associates an approval rule | Terraform |
749 | CKV2_AWS_37 | resource | aws_docdb_cluster_instance | Ensure Codecommit associates an approval rule | Terraform |
750 | CKV2_AWS_37 | resource | aws_docdb_cluster_parameter_group | Ensure Codecommit associates an approval rule | Terraform |
751 | CKV2_AWS_37 | resource | aws_docdb_cluster_snapshot | Ensure Codecommit associates an approval rule | Terraform |
752 | CKV2_AWS_37 | resource | aws_docdb_subnet_group | Ensure Codecommit associates an approval rule | Terraform |
753 | CKV2_AWS_37 | resource | aws_dx_bgp_peer | Ensure Codecommit associates an approval rule | Terraform |
754 | CKV2_AWS_37 | resource | aws_dx_connection | Ensure Codecommit associates an approval rule | Terraform |
755 | CKV2_AWS_37 | resource | aws_dx_connection_association | Ensure Codecommit associates an approval rule | Terraform |
756 | CKV2_AWS_37 | resource | aws_dx_gateway | Ensure Codecommit associates an approval rule | Terraform |
757 | CKV2_AWS_37 | resource | aws_dx_gateway_association | Ensure Codecommit associates an approval rule | Terraform |
758 | CKV2_AWS_37 | resource | aws_dx_gateway_association_proposal | Ensure Codecommit associates an approval rule | Terraform |
759 | CKV2_AWS_37 | resource | aws_dx_hosted_private_virtual_interface | Ensure Codecommit associates an approval rule | Terraform |
760 | CKV2_AWS_37 | resource | aws_dx_hosted_private_virtual_interface_accepter | Ensure Codecommit associates an approval rule | Terraform |
761 | CKV2_AWS_37 | resource | aws_dx_hosted_public_virtual_interface | Ensure Codecommit associates an approval rule | Terraform |
762 | CKV2_AWS_37 | resource | aws_dx_hosted_public_virtual_interface_accepter | Ensure Codecommit associates an approval rule | Terraform |
763 | CKV2_AWS_37 | resource | aws_dx_hosted_transit_virtual_interface | Ensure Codecommit associates an approval rule | Terraform |
764 | CKV2_AWS_37 | resource | aws_dx_hosted_transit_virtual_interface_accepter | Ensure Codecommit associates an approval rule | Terraform |
765 | CKV2_AWS_37 | resource | aws_dx_lag | Ensure Codecommit associates an approval rule | Terraform |
766 | CKV2_AWS_37 | resource | aws_dx_private_virtual_interface | Ensure Codecommit associates an approval rule | Terraform |
767 | CKV2_AWS_37 | resource | aws_dx_public_virtual_interface | Ensure Codecommit associates an approval rule | Terraform |
768 | CKV2_AWS_37 | resource | aws_dx_transit_virtual_interface | Ensure Codecommit associates an approval rule | Terraform |
769 | CKV2_AWS_37 | resource | aws_dynamodb_global_table | Ensure Codecommit associates an approval rule | Terraform |
770 | CKV2_AWS_37 | resource | aws_dynamodb_table | Ensure Codecommit associates an approval rule | Terraform |
771 | CKV2_AWS_37 | resource | aws_dynamodb_table_item | Ensure Codecommit associates an approval rule | Terraform |
772 | CKV2_AWS_37 | resource | aws_ebs_default_kms_key | Ensure Codecommit associates an approval rule | Terraform |
773 | CKV2_AWS_37 | resource | aws_ebs_encryption_by_default | Ensure Codecommit associates an approval rule | Terraform |
774 | CKV2_AWS_37 | resource | aws_ebs_snapshot | Ensure Codecommit associates an approval rule | Terraform |
775 | CKV2_AWS_37 | resource | aws_ebs_snapshot_copy | Ensure Codecommit associates an approval rule | Terraform |
776 | CKV2_AWS_37 | resource | aws_ebs_volume | Ensure Codecommit associates an approval rule | Terraform |
777 | CKV2_AWS_37 | resource | aws_ec2_availability_zone_group | Ensure Codecommit associates an approval rule | Terraform |
778 | CKV2_AWS_37 | resource | aws_ec2_capacity_reservation | Ensure Codecommit associates an approval rule | Terraform |
779 | CKV2_AWS_37 | resource | aws_ec2_client_vpn_authorization_rule | Ensure Codecommit associates an approval rule | Terraform |
780 | CKV2_AWS_37 | resource | aws_ec2_client_vpn_endpoint | Ensure Codecommit associates an approval rule | Terraform |
781 | CKV2_AWS_37 | resource | aws_ec2_client_vpn_network_association | Ensure Codecommit associates an approval rule | Terraform |
782 | CKV2_AWS_37 | resource | aws_ec2_client_vpn_route | Ensure Codecommit associates an approval rule | Terraform |
783 | CKV2_AWS_37 | resource | aws_ec2_fleet | Ensure Codecommit associates an approval rule | Terraform |
784 | CKV2_AWS_37 | resource | aws_ec2_local_gateway_route | Ensure Codecommit associates an approval rule | Terraform |
785 | CKV2_AWS_37 | resource | aws_ec2_local_gateway_route_table_vpc_association | Ensure Codecommit associates an approval rule | Terraform |
786 | CKV2_AWS_37 | resource | aws_ec2_tag | Ensure Codecommit associates an approval rule | Terraform |
787 | CKV2_AWS_37 | resource | aws_ec2_traffic_mirror_filter | Ensure Codecommit associates an approval rule | Terraform |
788 | CKV2_AWS_37 | resource | aws_ec2_traffic_mirror_filter_rule | Ensure Codecommit associates an approval rule | Terraform |
789 | CKV2_AWS_37 | resource | aws_ec2_traffic_mirror_session | Ensure Codecommit associates an approval rule | Terraform |
790 | CKV2_AWS_37 | resource | aws_ec2_traffic_mirror_target | Ensure Codecommit associates an approval rule | Terraform |
791 | CKV2_AWS_37 | resource | aws_ec2_transit_gateway | Ensure Codecommit associates an approval rule | Terraform |
792 | CKV2_AWS_37 | resource | aws_ec2_transit_gateway_peering_attachment | Ensure Codecommit associates an approval rule | Terraform |
793 | CKV2_AWS_37 | resource | aws_ec2_transit_gateway_peering_attachment_accepter | Ensure Codecommit associates an approval rule | Terraform |
794 | CKV2_AWS_37 | resource | aws_ec2_transit_gateway_route | Ensure Codecommit associates an approval rule | Terraform |
795 | CKV2_AWS_37 | resource | aws_ec2_transit_gateway_route_table | Ensure Codecommit associates an approval rule | Terraform |
796 | CKV2_AWS_37 | resource | aws_ec2_transit_gateway_route_table_association | Ensure Codecommit associates an approval rule | Terraform |
797 | CKV2_AWS_37 | resource | aws_ec2_transit_gateway_route_table_propagation | Ensure Codecommit associates an approval rule | Terraform |
798 | CKV2_AWS_37 | resource | aws_ec2_transit_gateway_vpc_attachment | Ensure Codecommit associates an approval rule | Terraform |
799 | CKV2_AWS_37 | resource | aws_ec2_transit_gateway_vpc_attachment_accepter | Ensure Codecommit associates an approval rule | Terraform |
800 | CKV2_AWS_37 | resource | aws_ecr_lifecycle_policy | Ensure Codecommit associates an approval rule | Terraform |
801 | CKV2_AWS_37 | resource | aws_ecr_repository | Ensure Codecommit associates an approval rule | Terraform |
802 | CKV2_AWS_37 | resource | aws_ecr_repository_policy | Ensure Codecommit associates an approval rule | Terraform |
803 | CKV2_AWS_37 | resource | aws_ecs_capacity_provider | Ensure Codecommit associates an approval rule | Terraform |
804 | CKV2_AWS_37 | resource | aws_ecs_cluster | Ensure Codecommit associates an approval rule | Terraform |
805 | CKV2_AWS_37 | resource | aws_ecs_service | Ensure Codecommit associates an approval rule | Terraform |
806 | CKV2_AWS_37 | resource | aws_ecs_task_definition | Ensure Codecommit associates an approval rule | Terraform |
807 | CKV2_AWS_37 | resource | aws_efs_access_point | Ensure Codecommit associates an approval rule | Terraform |
808 | CKV2_AWS_37 | resource | aws_efs_file_system | Ensure Codecommit associates an approval rule | Terraform |
809 | CKV2_AWS_37 | resource | aws_efs_file_system_policy | Ensure Codecommit associates an approval rule | Terraform |
810 | CKV2_AWS_37 | resource | aws_efs_mount_target | Ensure Codecommit associates an approval rule | Terraform |
811 | CKV2_AWS_37 | resource | aws_egress_only_internet_gateway | Ensure Codecommit associates an approval rule | Terraform |
812 | CKV2_AWS_37 | resource | aws_eip | Ensure Codecommit associates an approval rule | Terraform |
813 | CKV2_AWS_37 | resource | aws_eip_association | Ensure Codecommit associates an approval rule | Terraform |
814 | CKV2_AWS_37 | resource | aws_eks_cluster | Ensure Codecommit associates an approval rule | Terraform |
815 | CKV2_AWS_37 | resource | aws_eks_fargate_profile | Ensure Codecommit associates an approval rule | Terraform |
816 | CKV2_AWS_37 | resource | aws_eks_node_group | Ensure Codecommit associates an approval rule | Terraform |
817 | CKV2_AWS_37 | resource | aws_elastic_beanstalk_application | Ensure Codecommit associates an approval rule | Terraform |
818 | CKV2_AWS_37 | resource | aws_elastic_beanstalk_application_version | Ensure Codecommit associates an approval rule | Terraform |
819 | CKV2_AWS_37 | resource | aws_elastic_beanstalk_configuration_template | Ensure Codecommit associates an approval rule | Terraform |
820 | CKV2_AWS_37 | resource | aws_elastic_beanstalk_environment | Ensure Codecommit associates an approval rule | Terraform |
821 | CKV2_AWS_37 | resource | aws_elasticache_cluster | Ensure Codecommit associates an approval rule | Terraform |
822 | CKV2_AWS_37 | resource | aws_elasticache_parameter_group | Ensure Codecommit associates an approval rule | Terraform |
823 | CKV2_AWS_37 | resource | aws_elasticache_replication_group | Ensure Codecommit associates an approval rule | Terraform |
824 | CKV2_AWS_37 | resource | aws_elasticache_security_group | Ensure Codecommit associates an approval rule | Terraform |
825 | CKV2_AWS_37 | resource | aws_elasticache_subnet_group | Ensure Codecommit associates an approval rule | Terraform |
826 | CKV2_AWS_37 | resource | aws_elasticsearch_domain | Ensure Codecommit associates an approval rule | Terraform |
827 | CKV2_AWS_37 | resource | aws_elasticsearch_domain_policy | Ensure Codecommit associates an approval rule | Terraform |
828 | CKV2_AWS_37 | resource | aws_elastictranscoder_pipeline | Ensure Codecommit associates an approval rule | Terraform |
829 | CKV2_AWS_37 | resource | aws_elastictranscoder_preset | Ensure Codecommit associates an approval rule | Terraform |
830 | CKV2_AWS_37 | resource | aws_elb | Ensure Codecommit associates an approval rule | Terraform |
831 | CKV2_AWS_37 | resource | aws_elb_attachment | Ensure Codecommit associates an approval rule | Terraform |
832 | CKV2_AWS_37 | resource | aws_emr_cluster | Ensure Codecommit associates an approval rule | Terraform |
833 | CKV2_AWS_37 | resource | aws_emr_instance_group | Ensure Codecommit associates an approval rule | Terraform |
834 | CKV2_AWS_37 | resource | aws_emr_security_configuration | Ensure Codecommit associates an approval rule | Terraform |
835 | CKV2_AWS_37 | resource | aws_flow_log | Ensure Codecommit associates an approval rule | Terraform |
836 | CKV2_AWS_37 | resource | aws_fms_admin_account | Ensure Codecommit associates an approval rule | Terraform |
837 | CKV2_AWS_37 | resource | aws_fsx_lustre_file_system | Ensure Codecommit associates an approval rule | Terraform |
838 | CKV2_AWS_37 | resource | aws_fsx_windows_file_system | Ensure Codecommit associates an approval rule | Terraform |
839 | CKV2_AWS_37 | resource | aws_gamelift_alias | Ensure Codecommit associates an approval rule | Terraform |
840 | CKV2_AWS_37 | resource | aws_gamelift_build | Ensure Codecommit associates an approval rule | Terraform |
841 | CKV2_AWS_37 | resource | aws_gamelift_fleet | Ensure Codecommit associates an approval rule | Terraform |
842 | CKV2_AWS_37 | resource | aws_gamelift_game_session_queue | Ensure Codecommit associates an approval rule | Terraform |
843 | CKV2_AWS_37 | resource | aws_glacier_vault | Ensure Codecommit associates an approval rule | Terraform |
844 | CKV2_AWS_37 | resource | aws_glacier_vault_lock | Ensure Codecommit associates an approval rule | Terraform |
845 | CKV2_AWS_37 | resource | aws_globalaccelerator_accelerator | Ensure Codecommit associates an approval rule | Terraform |
846 | CKV2_AWS_37 | resource | aws_globalaccelerator_endpoint_group | Ensure Codecommit associates an approval rule | Terraform |
847 | CKV2_AWS_37 | resource | aws_globalaccelerator_listener | Ensure Codecommit associates an approval rule | Terraform |
848 | CKV2_AWS_37 | resource | aws_glue_catalog_database | Ensure Codecommit associates an approval rule | Terraform |
849 | CKV2_AWS_37 | resource | aws_glue_catalog_table | Ensure Codecommit associates an approval rule | Terraform |
850 | CKV2_AWS_37 | resource | aws_glue_classifier | Ensure Codecommit associates an approval rule | Terraform |
851 | CKV2_AWS_37 | resource | aws_glue_connection | Ensure Codecommit associates an approval rule | Terraform |
852 | CKV2_AWS_37 | resource | aws_glue_crawler | Ensure Codecommit associates an approval rule | Terraform |
853 | CKV2_AWS_37 | resource | aws_glue_job | Ensure Codecommit associates an approval rule | Terraform |
854 | CKV2_AWS_37 | resource | aws_glue_security_configuration | Ensure Codecommit associates an approval rule | Terraform |
855 | CKV2_AWS_37 | resource | aws_glue_trigger | Ensure Codecommit associates an approval rule | Terraform |
856 | CKV2_AWS_37 | resource | aws_glue_workflow | Ensure Codecommit associates an approval rule | Terraform |
857 | CKV2_AWS_37 | resource | aws_guardduty_detector | Ensure Codecommit associates an approval rule | Terraform |
858 | CKV2_AWS_37 | resource | aws_guardduty_invite_accepter | Ensure Codecommit associates an approval rule | Terraform |
859 | CKV2_AWS_37 | resource | aws_guardduty_ipset | Ensure Codecommit associates an approval rule | Terraform |
860 | CKV2_AWS_37 | resource | aws_guardduty_member | Ensure Codecommit associates an approval rule | Terraform |
861 | CKV2_AWS_37 | resource | aws_guardduty_organization_admin_account | Ensure Codecommit associates an approval rule | Terraform |
862 | CKV2_AWS_37 | resource | aws_guardduty_organization_configuration | Ensure Codecommit associates an approval rule | Terraform |
863 | CKV2_AWS_37 | resource | aws_guardduty_threatintelset | Ensure Codecommit associates an approval rule | Terraform |
864 | CKV2_AWS_37 | resource | aws_iam_access_key | Ensure Codecommit associates an approval rule | Terraform |
865 | CKV2_AWS_37 | resource | aws_iam_account_alias | Ensure Codecommit associates an approval rule | Terraform |
866 | CKV2_AWS_37 | resource | aws_iam_account_password_policy | Ensure Codecommit associates an approval rule | Terraform |
867 | CKV2_AWS_37 | resource | aws_iam_group | Ensure Codecommit associates an approval rule | Terraform |
868 | CKV2_AWS_37 | resource | aws_iam_group_membership | Ensure Codecommit associates an approval rule | Terraform |
869 | CKV2_AWS_37 | resource | aws_iam_group_policy | Ensure Codecommit associates an approval rule | Terraform |
870 | CKV2_AWS_37 | resource | aws_iam_group_policy_attachment | Ensure Codecommit associates an approval rule | Terraform |
871 | CKV2_AWS_37 | resource | aws_iam_instance_profile | Ensure Codecommit associates an approval rule | Terraform |
872 | CKV2_AWS_37 | resource | aws_iam_openid_connect_provider | Ensure Codecommit associates an approval rule | Terraform |
873 | CKV2_AWS_37 | resource | aws_iam_policy | Ensure Codecommit associates an approval rule | Terraform |
874 | CKV2_AWS_37 | resource | aws_iam_policy_attachment | Ensure Codecommit associates an approval rule | Terraform |
875 | CKV2_AWS_37 | resource | aws_iam_policy_document | Ensure Codecommit associates an approval rule | Terraform |
876 | CKV2_AWS_37 | resource | aws_iam_role | Ensure Codecommit associates an approval rule | Terraform |
877 | CKV2_AWS_37 | resource | aws_iam_role_policy | Ensure Codecommit associates an approval rule | Terraform |
878 | CKV2_AWS_37 | resource | aws_iam_role_policy_attachment | Ensure Codecommit associates an approval rule | Terraform |
879 | CKV2_AWS_37 | resource | aws_iam_saml_provider | Ensure Codecommit associates an approval rule | Terraform |
880 | CKV2_AWS_37 | resource | aws_iam_server_certificate | Ensure Codecommit associates an approval rule | Terraform |
881 | CKV2_AWS_37 | resource | aws_iam_service_linked_role | Ensure Codecommit associates an approval rule | Terraform |
882 | CKV2_AWS_37 | resource | aws_iam_user | Ensure Codecommit associates an approval rule | Terraform |
883 | CKV2_AWS_37 | resource | aws_iam_user_group_membership | Ensure Codecommit associates an approval rule | Terraform |
884 | CKV2_AWS_37 | resource | aws_iam_user_login_profile | Ensure Codecommit associates an approval rule | Terraform |
885 | CKV2_AWS_37 | resource | aws_iam_user_policy | Ensure Codecommit associates an approval rule | Terraform |
886 | CKV2_AWS_37 | resource | aws_iam_user_policy_attachment | Ensure Codecommit associates an approval rule | Terraform |
887 | CKV2_AWS_37 | resource | aws_iam_user_ssh_key | Ensure Codecommit associates an approval rule | Terraform |
888 | CKV2_AWS_37 | resource | aws_inspector_assessment_target | Ensure Codecommit associates an approval rule | Terraform |
889 | CKV2_AWS_37 | resource | aws_inspector_assessment_template | Ensure Codecommit associates an approval rule | Terraform |
890 | CKV2_AWS_37 | resource | aws_inspector_resource_group | Ensure Codecommit associates an approval rule | Terraform |
891 | CKV2_AWS_37 | resource | aws_instance | Ensure Codecommit associates an approval rule | Terraform |
892 | CKV2_AWS_37 | resource | aws_internet_gateway | Ensure Codecommit associates an approval rule | Terraform |
893 | CKV2_AWS_37 | resource | aws_iot_certificate | Ensure Codecommit associates an approval rule | Terraform |
894 | CKV2_AWS_37 | resource | aws_iot_policy | Ensure Codecommit associates an approval rule | Terraform |
895 | CKV2_AWS_37 | resource | aws_iot_policy_attachment | Ensure Codecommit associates an approval rule | Terraform |
896 | CKV2_AWS_37 | resource | aws_iot_role_alias | Ensure Codecommit associates an approval rule | Terraform |
897 | CKV2_AWS_37 | resource | aws_iot_thing | Ensure Codecommit associates an approval rule | Terraform |
898 | CKV2_AWS_37 | resource | aws_iot_thing_principal_attachment | Ensure Codecommit associates an approval rule | Terraform |
899 | CKV2_AWS_37 | resource | aws_iot_thing_type | Ensure Codecommit associates an approval rule | Terraform |
900 | CKV2_AWS_37 | resource | aws_iot_topic_rule | Ensure Codecommit associates an approval rule | Terraform |
901 | CKV2_AWS_37 | resource | aws_key_pair | Ensure Codecommit associates an approval rule | Terraform |
902 | CKV2_AWS_37 | resource | aws_kinesis_analytics_application | Ensure Codecommit associates an approval rule | Terraform |
903 | CKV2_AWS_37 | resource | aws_kinesis_firehose_delivery_stream | Ensure Codecommit associates an approval rule | Terraform |
904 | CKV2_AWS_37 | resource | aws_kinesis_stream | Ensure Codecommit associates an approval rule | Terraform |
905 | CKV2_AWS_37 | resource | aws_kinesis_video_stream | Ensure Codecommit associates an approval rule | Terraform |
906 | CKV2_AWS_37 | resource | aws_kms_alias | Ensure Codecommit associates an approval rule | Terraform |
907 | CKV2_AWS_37 | resource | aws_kms_ciphertext | Ensure Codecommit associates an approval rule | Terraform |
908 | CKV2_AWS_37 | resource | aws_kms_external_key | Ensure Codecommit associates an approval rule | Terraform |
909 | CKV2_AWS_37 | resource | aws_kms_grant | Ensure Codecommit associates an approval rule | Terraform |
910 | CKV2_AWS_37 | resource | aws_kms_key | Ensure Codecommit associates an approval rule | Terraform |
911 | CKV2_AWS_37 | resource | aws_lambda_alias | Ensure Codecommit associates an approval rule | Terraform |
912 | CKV2_AWS_37 | resource | aws_lambda_event_source_mapping | Ensure Codecommit associates an approval rule | Terraform |
913 | CKV2_AWS_37 | resource | aws_lambda_function | Ensure Codecommit associates an approval rule | Terraform |
914 | CKV2_AWS_37 | resource | aws_lambda_function_event_invoke_config | Ensure Codecommit associates an approval rule | Terraform |
915 | CKV2_AWS_37 | resource | aws_lambda_layer_version | Ensure Codecommit associates an approval rule | Terraform |
916 | CKV2_AWS_37 | resource | aws_lambda_permission | Ensure Codecommit associates an approval rule | Terraform |
917 | CKV2_AWS_37 | resource | aws_lambda_provisioned_concurrency_config | Ensure Codecommit associates an approval rule | Terraform |
918 | CKV2_AWS_37 | resource | aws_launch_configuration | Ensure Codecommit associates an approval rule | Terraform |
919 | CKV2_AWS_37 | resource | aws_launch_template | Ensure Codecommit associates an approval rule | Terraform |
920 | CKV2_AWS_37 | resource | aws_lb | Ensure Codecommit associates an approval rule | Terraform |
921 | CKV2_AWS_37 | resource | aws_lb_cookie_stickiness_policy | Ensure Codecommit associates an approval rule | Terraform |
922 | CKV2_AWS_37 | resource | aws_lb_listener | Ensure Codecommit associates an approval rule | Terraform |
923 | CKV2_AWS_37 | resource | aws_lb_listener_certificate | Ensure Codecommit associates an approval rule | Terraform |
924 | CKV2_AWS_37 | resource | aws_lb_listener_rule | Ensure Codecommit associates an approval rule | Terraform |
925 | CKV2_AWS_37 | resource | aws_lb_ssl_negotiation_policy | Ensure Codecommit associates an approval rule | Terraform |
926 | CKV2_AWS_37 | resource | aws_lb_target_group | Ensure Codecommit associates an approval rule | Terraform |
927 | CKV2_AWS_37 | resource | aws_lb_target_group_attachment | Ensure Codecommit associates an approval rule | Terraform |
928 | CKV2_AWS_37 | resource | aws_licensemanager_association | Ensure Codecommit associates an approval rule | Terraform |
929 | CKV2_AWS_37 | resource | aws_licensemanager_license_configuration | Ensure Codecommit associates an approval rule | Terraform |
930 | CKV2_AWS_37 | resource | aws_lightsail_domain | Ensure Codecommit associates an approval rule | Terraform |
931 | CKV2_AWS_37 | resource | aws_lightsail_instance | Ensure Codecommit associates an approval rule | Terraform |
932 | CKV2_AWS_37 | resource | aws_lightsail_key_pair | Ensure Codecommit associates an approval rule | Terraform |
933 | CKV2_AWS_37 | resource | aws_lightsail_static_ip | Ensure Codecommit associates an approval rule | Terraform |
934 | CKV2_AWS_37 | resource | aws_lightsail_static_ip_attachment | Ensure Codecommit associates an approval rule | Terraform |
935 | CKV2_AWS_37 | resource | aws_load_balancer_backend_server_policy | Ensure Codecommit associates an approval rule | Terraform |
936 | CKV2_AWS_37 | resource | aws_load_balancer_listener_policy | Ensure Codecommit associates an approval rule | Terraform |
937 | CKV2_AWS_37 | resource | aws_load_balancer_policy | Ensure Codecommit associates an approval rule | Terraform |
938 | CKV2_AWS_37 | resource | aws_macie_member_account_association | Ensure Codecommit associates an approval rule | Terraform |
939 | CKV2_AWS_37 | resource | aws_macie_s3_bucket_association | Ensure Codecommit associates an approval rule | Terraform |
940 | CKV2_AWS_37 | resource | aws_main_route_table_association | Ensure Codecommit associates an approval rule | Terraform |
941 | CKV2_AWS_37 | resource | aws_media_convert_queue | Ensure Codecommit associates an approval rule | Terraform |
942 | CKV2_AWS_37 | resource | aws_media_package_channel | Ensure Codecommit associates an approval rule | Terraform |
943 | CKV2_AWS_37 | resource | aws_media_store_container | Ensure Codecommit associates an approval rule | Terraform |
944 | CKV2_AWS_37 | resource | aws_media_store_container_policy | Ensure Codecommit associates an approval rule | Terraform |
945 | CKV2_AWS_37 | resource | aws_mq_broker | Ensure Codecommit associates an approval rule | Terraform |
946 | CKV2_AWS_37 | resource | aws_mq_configuration | Ensure Codecommit associates an approval rule | Terraform |
947 | CKV2_AWS_37 | resource | aws_msk_cluster | Ensure Codecommit associates an approval rule | Terraform |
948 | CKV2_AWS_37 | resource | aws_msk_configuration | Ensure Codecommit associates an approval rule | Terraform |
949 | CKV2_AWS_37 | resource | aws_nat_gateway | Ensure Codecommit associates an approval rule | Terraform |
950 | CKV2_AWS_37 | resource | aws_neptune_cluster | Ensure Codecommit associates an approval rule | Terraform |
951 | CKV2_AWS_37 | resource | aws_neptune_cluster_instance | Ensure Codecommit associates an approval rule | Terraform |
952 | CKV2_AWS_37 | resource | aws_neptune_cluster_parameter_group | Ensure Codecommit associates an approval rule | Terraform |
953 | CKV2_AWS_37 | resource | aws_neptune_cluster_snapshot | Ensure Codecommit associates an approval rule | Terraform |
954 | CKV2_AWS_37 | resource | aws_neptune_event_subscription | Ensure Codecommit associates an approval rule | Terraform |
955 | CKV2_AWS_37 | resource | aws_neptune_parameter_group | Ensure Codecommit associates an approval rule | Terraform |
956 | CKV2_AWS_37 | resource | aws_neptune_subnet_group | Ensure Codecommit associates an approval rule | Terraform |
957 | CKV2_AWS_37 | resource | aws_network_acl | Ensure Codecommit associates an approval rule | Terraform |
958 | CKV2_AWS_37 | resource | aws_network_acl_rule | Ensure Codecommit associates an approval rule | Terraform |
959 | CKV2_AWS_37 | resource | aws_network_interface | Ensure Codecommit associates an approval rule | Terraform |
960 | CKV2_AWS_37 | resource | aws_network_interface_attachment | Ensure Codecommit associates an approval rule | Terraform |
961 | CKV2_AWS_37 | resource | aws_network_interface_sg_attachment | Ensure Codecommit associates an approval rule | Terraform |
962 | CKV2_AWS_37 | resource | aws_opsworks_application | Ensure Codecommit associates an approval rule | Terraform |
963 | CKV2_AWS_37 | resource | aws_opsworks_custom_layer | Ensure Codecommit associates an approval rule | Terraform |
964 | CKV2_AWS_37 | resource | aws_opsworks_ganglia_layer | Ensure Codecommit associates an approval rule | Terraform |
965 | CKV2_AWS_37 | resource | aws_opsworks_haproxy_layer | Ensure Codecommit associates an approval rule | Terraform |
966 | CKV2_AWS_37 | resource | aws_opsworks_instance | Ensure Codecommit associates an approval rule | Terraform |
967 | CKV2_AWS_37 | resource | aws_opsworks_java_app_layer | Ensure Codecommit associates an approval rule | Terraform |
968 | CKV2_AWS_37 | resource | aws_opsworks_memcached_layer | Ensure Codecommit associates an approval rule | Terraform |
969 | CKV2_AWS_37 | resource | aws_opsworks_mysql_layer | Ensure Codecommit associates an approval rule | Terraform |
970 | CKV2_AWS_37 | resource | aws_opsworks_nodejs_app_layer | Ensure Codecommit associates an approval rule | Terraform |
971 | CKV2_AWS_37 | resource | aws_opsworks_permission | Ensure Codecommit associates an approval rule | Terraform |
972 | CKV2_AWS_37 | resource | aws_opsworks_php_app_layer | Ensure Codecommit associates an approval rule | Terraform |
973 | CKV2_AWS_37 | resource | aws_opsworks_rails_app_layer | Ensure Codecommit associates an approval rule | Terraform |
974 | CKV2_AWS_37 | resource | aws_opsworks_rds_db_instance | Ensure Codecommit associates an approval rule | Terraform |
975 | CKV2_AWS_37 | resource | aws_opsworks_stack | Ensure Codecommit associates an approval rule | Terraform |
976 | CKV2_AWS_37 | resource | aws_opsworks_static_web_layer | Ensure Codecommit associates an approval rule | Terraform |
977 | CKV2_AWS_37 | resource | aws_opsworks_user_profile | Ensure Codecommit associates an approval rule | Terraform |
978 | CKV2_AWS_37 | resource | aws_organizations_account | Ensure Codecommit associates an approval rule | Terraform |
979 | CKV2_AWS_37 | resource | aws_organizations_organization | Ensure Codecommit associates an approval rule | Terraform |
980 | CKV2_AWS_37 | resource | aws_organizations_organizational_unit | Ensure Codecommit associates an approval rule | Terraform |
981 | CKV2_AWS_37 | resource | aws_organizations_policy | Ensure Codecommit associates an approval rule | Terraform |
982 | CKV2_AWS_37 | resource | aws_organizations_policy_attachment | Ensure Codecommit associates an approval rule | Terraform |
983 | CKV2_AWS_37 | resource | aws_pinpoint_adm_channel | Ensure Codecommit associates an approval rule | Terraform |
984 | CKV2_AWS_37 | resource | aws_pinpoint_apns_channel | Ensure Codecommit associates an approval rule | Terraform |
985 | CKV2_AWS_37 | resource | aws_pinpoint_apns_sandbox_channel | Ensure Codecommit associates an approval rule | Terraform |
986 | CKV2_AWS_37 | resource | aws_pinpoint_apns_voip_channel | Ensure Codecommit associates an approval rule | Terraform |
987 | CKV2_AWS_37 | resource | aws_pinpoint_apns_voip_sandbox_channel | Ensure Codecommit associates an approval rule | Terraform |
988 | CKV2_AWS_37 | resource | aws_pinpoint_app | Ensure Codecommit associates an approval rule | Terraform |
989 | CKV2_AWS_37 | resource | aws_pinpoint_baidu_channel | Ensure Codecommit associates an approval rule | Terraform |
990 | CKV2_AWS_37 | resource | aws_pinpoint_email_channel | Ensure Codecommit associates an approval rule | Terraform |
991 | CKV2_AWS_37 | resource | aws_pinpoint_event_stream | Ensure Codecommit associates an approval rule | Terraform |
992 | CKV2_AWS_37 | resource | aws_pinpoint_gcm_channel | Ensure Codecommit associates an approval rule | Terraform |
993 | CKV2_AWS_37 | resource | aws_pinpoint_sms_channel | Ensure Codecommit associates an approval rule | Terraform |
994 | CKV2_AWS_37 | resource | aws_placement_group | Ensure Codecommit associates an approval rule | Terraform |
995 | CKV2_AWS_37 | resource | aws_proxy_protocol_policy | Ensure Codecommit associates an approval rule | Terraform |
996 | CKV2_AWS_37 | resource | aws_qldb_ledger | Ensure Codecommit associates an approval rule | Terraform |
997 | CKV2_AWS_37 | resource | aws_quicksight_group | Ensure Codecommit associates an approval rule | Terraform |
998 | CKV2_AWS_37 | resource | aws_quicksight_user | Ensure Codecommit associates an approval rule | Terraform |
999 | CKV2_AWS_37 | resource | aws_ram_principal_association | Ensure Codecommit associates an approval rule | Terraform |
1000 | CKV2_AWS_37 | resource | aws_ram_resource_association | Ensure Codecommit associates an approval rule | Terraform |
1001 | CKV2_AWS_37 | resource | aws_ram_resource_share | Ensure Codecommit associates an approval rule | Terraform |
1002 | CKV2_AWS_37 | resource | aws_ram_resource_share_accepter | Ensure Codecommit associates an approval rule | Terraform |
1003 | CKV2_AWS_37 | resource | aws_rds_cluster | Ensure Codecommit associates an approval rule | Terraform |
1004 | CKV2_AWS_37 | resource | aws_rds_cluster_endpoint | Ensure Codecommit associates an approval rule | Terraform |
1005 | CKV2_AWS_37 | resource | aws_rds_cluster_instance | Ensure Codecommit associates an approval rule | Terraform |
1006 | CKV2_AWS_37 | resource | aws_rds_cluster_parameter_group | Ensure Codecommit associates an approval rule | Terraform |
1007 | CKV2_AWS_37 | resource | aws_rds_global_cluster | Ensure Codecommit associates an approval rule | Terraform |
1008 | CKV2_AWS_37 | resource | aws_redshift_cluster | Ensure Codecommit associates an approval rule | Terraform |
1009 | CKV2_AWS_37 | resource | aws_redshift_event_subscription | Ensure Codecommit associates an approval rule | Terraform |
1010 | CKV2_AWS_37 | resource | aws_redshift_parameter_group | Ensure Codecommit associates an approval rule | Terraform |
1011 | CKV2_AWS_37 | resource | aws_redshift_security_group | Ensure Codecommit associates an approval rule | Terraform |
1012 | CKV2_AWS_37 | resource | aws_redshift_snapshot_copy_grant | Ensure Codecommit associates an approval rule | Terraform |
1013 | CKV2_AWS_37 | resource | aws_redshift_snapshot_schedule | Ensure Codecommit associates an approval rule | Terraform |
1014 | CKV2_AWS_37 | resource | aws_redshift_snapshot_schedule_association | Ensure Codecommit associates an approval rule | Terraform |
1015 | CKV2_AWS_37 | resource | aws_redshift_subnet_group | Ensure Codecommit associates an approval rule | Terraform |
1016 | CKV2_AWS_37 | resource | aws_resourcegroups_group | Ensure Codecommit associates an approval rule | Terraform |
1017 | CKV2_AWS_37 | resource | aws_root | Ensure Codecommit associates an approval rule | Terraform |
1018 | CKV2_AWS_37 | resource | aws_root_access_key | Ensure Codecommit associates an approval rule | Terraform |
1019 | CKV2_AWS_37 | resource | aws_route | Ensure Codecommit associates an approval rule | Terraform |
1020 | CKV2_AWS_37 | resource | aws_route53_delegation_set | Ensure Codecommit associates an approval rule | Terraform |
1021 | CKV2_AWS_37 | resource | aws_route53_health_check | Ensure Codecommit associates an approval rule | Terraform |
1022 | CKV2_AWS_37 | resource | aws_route53_query_log | Ensure Codecommit associates an approval rule | Terraform |
1023 | CKV2_AWS_37 | resource | aws_route53_record | Ensure Codecommit associates an approval rule | Terraform |
1024 | CKV2_AWS_37 | resource | aws_route53_resolver_endpoint | Ensure Codecommit associates an approval rule | Terraform |
1025 | CKV2_AWS_37 | resource | aws_route53_resolver_rule | Ensure Codecommit associates an approval rule | Terraform |
1026 | CKV2_AWS_37 | resource | aws_route53_resolver_rule_association | Ensure Codecommit associates an approval rule | Terraform |
1027 | CKV2_AWS_37 | resource | aws_route53_vpc_association_authorization | Ensure Codecommit associates an approval rule | Terraform |
1028 | CKV2_AWS_37 | resource | aws_route53_zone | Ensure Codecommit associates an approval rule | Terraform |
1029 | CKV2_AWS_37 | resource | aws_route53_zone_association | Ensure Codecommit associates an approval rule | Terraform |
1030 | CKV2_AWS_37 | resource | aws_route_table | Ensure Codecommit associates an approval rule | Terraform |
1031 | CKV2_AWS_37 | resource | aws_route_table_association | Ensure Codecommit associates an approval rule | Terraform |
1032 | CKV2_AWS_37 | resource | aws_s3_access_point | Ensure Codecommit associates an approval rule | Terraform |
1033 | CKV2_AWS_37 | resource | aws_s3_account_public_access_block | Ensure Codecommit associates an approval rule | Terraform |
1034 | CKV2_AWS_37 | resource | aws_s3_bucket | Ensure Codecommit associates an approval rule | Terraform |
1035 | CKV2_AWS_37 | resource | aws_s3_bucket_analytics_configuration | Ensure Codecommit associates an approval rule | Terraform |
1036 | CKV2_AWS_37 | resource | aws_s3_bucket_inventory | Ensure Codecommit associates an approval rule | Terraform |
1037 | CKV2_AWS_37 | resource | aws_s3_bucket_metric | Ensure Codecommit associates an approval rule | Terraform |
1038 | CKV2_AWS_37 | resource | aws_s3_bucket_notification | Ensure Codecommit associates an approval rule | Terraform |
1039 | CKV2_AWS_37 | resource | aws_s3_bucket_object | Ensure Codecommit associates an approval rule | Terraform |
1040 | CKV2_AWS_37 | resource | aws_s3_bucket_policy | Ensure Codecommit associates an approval rule | Terraform |
1041 | CKV2_AWS_37 | resource | aws_s3_bucket_public_access_block | Ensure Codecommit associates an approval rule | Terraform |
1042 | CKV2_AWS_37 | resource | aws_sagemaker_endpoint | Ensure Codecommit associates an approval rule | Terraform |
1043 | CKV2_AWS_37 | resource | aws_sagemaker_endpoint_configuration | Ensure Codecommit associates an approval rule | Terraform |
1044 | CKV2_AWS_37 | resource | aws_sagemaker_model | Ensure Codecommit associates an approval rule | Terraform |
1045 | CKV2_AWS_37 | resource | aws_sagemaker_notebook_instance | Ensure Codecommit associates an approval rule | Terraform |
1046 | CKV2_AWS_37 | resource | aws_sagemaker_notebook_instance_lifecycle_configuration | Ensure Codecommit associates an approval rule | Terraform |
1047 | CKV2_AWS_37 | resource | aws_secretsmanager_secret | Ensure Codecommit associates an approval rule | Terraform |
1048 | CKV2_AWS_37 | resource | aws_secretsmanager_secret_rotation | Ensure Codecommit associates an approval rule | Terraform |
1049 | CKV2_AWS_37 | resource | aws_secretsmanager_secret_version | Ensure Codecommit associates an approval rule | Terraform |
1050 | CKV2_AWS_37 | resource | aws_security_group | Ensure Codecommit associates an approval rule | Terraform |
1051 | CKV2_AWS_37 | resource | aws_security_group_rule | Ensure Codecommit associates an approval rule | Terraform |
1052 | CKV2_AWS_37 | resource | aws_securityhub_account | Ensure Codecommit associates an approval rule | Terraform |
1053 | CKV2_AWS_37 | resource | aws_securityhub_member | Ensure Codecommit associates an approval rule | Terraform |
1054 | CKV2_AWS_37 | resource | aws_securityhub_product_subscription | Ensure Codecommit associates an approval rule | Terraform |
1055 | CKV2_AWS_37 | resource | aws_securityhub_standards_subscription | Ensure Codecommit associates an approval rule | Terraform |
1056 | CKV2_AWS_37 | resource | aws_service_discovery_http_namespace | Ensure Codecommit associates an approval rule | Terraform |
1057 | CKV2_AWS_37 | resource | aws_service_discovery_private_dns_namespace | Ensure Codecommit associates an approval rule | Terraform |
1058 | CKV2_AWS_37 | resource | aws_service_discovery_public_dns_namespace | Ensure Codecommit associates an approval rule | Terraform |
1059 | CKV2_AWS_37 | resource | aws_service_discovery_service | Ensure Codecommit associates an approval rule | Terraform |
1060 | CKV2_AWS_37 | resource | aws_servicecatalog_portfolio | Ensure Codecommit associates an approval rule | Terraform |
1061 | CKV2_AWS_37 | resource | aws_servicequotas_service_quota | Ensure Codecommit associates an approval rule | Terraform |
1062 | CKV2_AWS_37 | resource | aws_ses_active_receipt_rule_set | Ensure Codecommit associates an approval rule | Terraform |
1063 | CKV2_AWS_37 | resource | aws_ses_configuration_set | Ensure Codecommit associates an approval rule | Terraform |
1064 | CKV2_AWS_37 | resource | aws_ses_domain_dkim | Ensure Codecommit associates an approval rule | Terraform |
1065 | CKV2_AWS_37 | resource | aws_ses_domain_identity | Ensure Codecommit associates an approval rule | Terraform |
1066 | CKV2_AWS_37 | resource | aws_ses_domain_identity_verification | Ensure Codecommit associates an approval rule | Terraform |
1067 | CKV2_AWS_37 | resource | aws_ses_domain_mail_from | Ensure Codecommit associates an approval rule | Terraform |
1068 | CKV2_AWS_37 | resource | aws_ses_email_identity | Ensure Codecommit associates an approval rule | Terraform |
1069 | CKV2_AWS_37 | resource | aws_ses_event_destination | Ensure Codecommit associates an approval rule | Terraform |
1070 | CKV2_AWS_37 | resource | aws_ses_identity_notification_topic | Ensure Codecommit associates an approval rule | Terraform |
1071 | CKV2_AWS_37 | resource | aws_ses_identity_policy | Ensure Codecommit associates an approval rule | Terraform |
1072 | CKV2_AWS_37 | resource | aws_ses_receipt_filter | Ensure Codecommit associates an approval rule | Terraform |
1073 | CKV2_AWS_37 | resource | aws_ses_receipt_rule | Ensure Codecommit associates an approval rule | Terraform |
1074 | CKV2_AWS_37 | resource | aws_ses_receipt_rule_set | Ensure Codecommit associates an approval rule | Terraform |
1075 | CKV2_AWS_37 | resource | aws_ses_template | Ensure Codecommit associates an approval rule | Terraform |
1076 | CKV2_AWS_37 | resource | aws_sfn_activity | Ensure Codecommit associates an approval rule | Terraform |
1077 | CKV2_AWS_37 | resource | aws_sfn_state_machine | Ensure Codecommit associates an approval rule | Terraform |
1078 | CKV2_AWS_37 | resource | aws_shield_protection | Ensure Codecommit associates an approval rule | Terraform |
1079 | CKV2_AWS_37 | resource | aws_simpledb_domain | Ensure Codecommit associates an approval rule | Terraform |
1080 | CKV2_AWS_37 | resource | aws_snapshot_create_volume_permission | Ensure Codecommit associates an approval rule | Terraform |
1081 | CKV2_AWS_37 | resource | aws_sns_platform_application | Ensure Codecommit associates an approval rule | Terraform |
1082 | CKV2_AWS_37 | resource | aws_sns_sms_preferences | Ensure Codecommit associates an approval rule | Terraform |
1083 | CKV2_AWS_37 | resource | aws_sns_topic | Ensure Codecommit associates an approval rule | Terraform |
1084 | CKV2_AWS_37 | resource | aws_sns_topic_policy | Ensure Codecommit associates an approval rule | Terraform |
1085 | CKV2_AWS_37 | resource | aws_sns_topic_subscription | Ensure Codecommit associates an approval rule | Terraform |
1086 | CKV2_AWS_37 | resource | aws_spot_datafeed_subscription | Ensure Codecommit associates an approval rule | Terraform |
1087 | CKV2_AWS_37 | resource | aws_spot_fleet_request | Ensure Codecommit associates an approval rule | Terraform |
1088 | CKV2_AWS_37 | resource | aws_spot_instance_request | Ensure Codecommit associates an approval rule | Terraform |
1089 | CKV2_AWS_37 | resource | aws_sqs_queue | Ensure Codecommit associates an approval rule | Terraform |
1090 | CKV2_AWS_37 | resource | aws_sqs_queue_policy | Ensure Codecommit associates an approval rule | Terraform |
1091 | CKV2_AWS_37 | resource | aws_ssm_activation | Ensure Codecommit associates an approval rule | Terraform |
1092 | CKV2_AWS_37 | resource | aws_ssm_association | Ensure Codecommit associates an approval rule | Terraform |
1093 | CKV2_AWS_37 | resource | aws_ssm_document | Ensure Codecommit associates an approval rule | Terraform |
1094 | CKV2_AWS_37 | resource | aws_ssm_maintenance_window | Ensure Codecommit associates an approval rule | Terraform |
1095 | CKV2_AWS_37 | resource | aws_ssm_maintenance_window_target | Ensure Codecommit associates an approval rule | Terraform |
1096 | CKV2_AWS_37 | resource | aws_ssm_maintenance_window_task | Ensure Codecommit associates an approval rule | Terraform |
1097 | CKV2_AWS_37 | resource | aws_ssm_parameter | Ensure Codecommit associates an approval rule | Terraform |
1098 | CKV2_AWS_37 | resource | aws_ssm_patch_baseline | Ensure Codecommit associates an approval rule | Terraform |
1099 | CKV2_AWS_37 | resource | aws_ssm_patch_group | Ensure Codecommit associates an approval rule | Terraform |
1100 | CKV2_AWS_37 | resource | aws_ssm_resource_data_sync | Ensure Codecommit associates an approval rule | Terraform |
1101 | CKV2_AWS_37 | resource | aws_storagegateway_cache | Ensure Codecommit associates an approval rule | Terraform |
1102 | CKV2_AWS_37 | resource | aws_storagegateway_cached_iscsi_volume | Ensure Codecommit associates an approval rule | Terraform |
1103 | CKV2_AWS_37 | resource | aws_storagegateway_gateway | Ensure Codecommit associates an approval rule | Terraform |
1104 | CKV2_AWS_37 | resource | aws_storagegateway_nfs_file_share | Ensure Codecommit associates an approval rule | Terraform |
1105 | CKV2_AWS_37 | resource | aws_storagegateway_smb_file_share | Ensure Codecommit associates an approval rule | Terraform |
1106 | CKV2_AWS_37 | resource | aws_storagegateway_upload_buffer | Ensure Codecommit associates an approval rule | Terraform |
1107 | CKV2_AWS_37 | resource | aws_storagegateway_working_storage | Ensure Codecommit associates an approval rule | Terraform |
1108 | CKV2_AWS_37 | resource | aws_subnet | Ensure Codecommit associates an approval rule | Terraform |
1109 | CKV2_AWS_37 | resource | aws_swf_domain | Ensure Codecommit associates an approval rule | Terraform |
1110 | CKV2_AWS_37 | resource | aws_transfer_server | Ensure Codecommit associates an approval rule | Terraform |
1111 | CKV2_AWS_37 | resource | aws_transfer_ssh_key | Ensure Codecommit associates an approval rule | Terraform |
1112 | CKV2_AWS_37 | resource | aws_transfer_user | Ensure Codecommit associates an approval rule | Terraform |
1113 | CKV2_AWS_37 | resource | aws_volume_attachment | Ensure Codecommit associates an approval rule | Terraform |
1114 | CKV2_AWS_37 | resource | aws_vpc | Ensure Codecommit associates an approval rule | Terraform |
1115 | CKV2_AWS_37 | resource | aws_vpc_dhcp_options | Ensure Codecommit associates an approval rule | Terraform |
1116 | CKV2_AWS_37 | resource | aws_vpc_dhcp_options_association | Ensure Codecommit associates an approval rule | Terraform |
1117 | CKV2_AWS_37 | resource | aws_vpc_endpoint | Ensure Codecommit associates an approval rule | Terraform |
1118 | CKV2_AWS_37 | resource | aws_vpc_endpoint_connection_notification | Ensure Codecommit associates an approval rule | Terraform |
1119 | CKV2_AWS_37 | resource | aws_vpc_endpoint_route_table_association | Ensure Codecommit associates an approval rule | Terraform |
1120 | CKV2_AWS_37 | resource | aws_vpc_endpoint_service | Ensure Codecommit associates an approval rule | Terraform |
1121 | CKV2_AWS_37 | resource | aws_vpc_endpoint_service_allowed_principal | Ensure Codecommit associates an approval rule | Terraform |
1122 | CKV2_AWS_37 | resource | aws_vpc_endpoint_subnet_association | Ensure Codecommit associates an approval rule | Terraform |
1123 | CKV2_AWS_37 | resource | aws_vpc_ipv4_cidr_block_association | Ensure Codecommit associates an approval rule | Terraform |
1124 | CKV2_AWS_37 | resource | aws_vpc_peering_connection | Ensure Codecommit associates an approval rule | Terraform |
1125 | CKV2_AWS_37 | resource | aws_vpc_peering_connection_accepter | Ensure Codecommit associates an approval rule | Terraform |
1126 | CKV2_AWS_37 | resource | aws_vpc_peering_connection_options | Ensure Codecommit associates an approval rule | Terraform |
1127 | CKV2_AWS_37 | resource | aws_vpn_connection | Ensure Codecommit associates an approval rule | Terraform |
1128 | CKV2_AWS_37 | resource | aws_vpn_connection_route | Ensure Codecommit associates an approval rule | Terraform |
1129 | CKV2_AWS_37 | resource | aws_vpn_gateway | Ensure Codecommit associates an approval rule | Terraform |
1130 | CKV2_AWS_37 | resource | aws_vpn_gateway_attachment | Ensure Codecommit associates an approval rule | Terraform |
1131 | CKV2_AWS_37 | resource | aws_vpn_gateway_route_propagation | Ensure Codecommit associates an approval rule | Terraform |
1132 | CKV2_AWS_37 | resource | aws_waf_byte_match_set | Ensure Codecommit associates an approval rule | Terraform |
1133 | CKV2_AWS_37 | resource | aws_waf_geo_match_set | Ensure Codecommit associates an approval rule | Terraform |
1134 | CKV2_AWS_37 | resource | aws_waf_ipset | Ensure Codecommit associates an approval rule | Terraform |
1135 | CKV2_AWS_37 | resource | aws_waf_rate_based_rule | Ensure Codecommit associates an approval rule | Terraform |
1136 | CKV2_AWS_37 | resource | aws_waf_regex_match_set | Ensure Codecommit associates an approval rule | Terraform |
1137 | CKV2_AWS_37 | resource | aws_waf_regex_pattern_set | Ensure Codecommit associates an approval rule | Terraform |
1138 | CKV2_AWS_37 | resource | aws_waf_rule | Ensure Codecommit associates an approval rule | Terraform |
1139 | CKV2_AWS_37 | resource | aws_waf_rule_group | Ensure Codecommit associates an approval rule | Terraform |
1140 | CKV2_AWS_37 | resource | aws_waf_size_constraint_set | Ensure Codecommit associates an approval rule | Terraform |
1141 | CKV2_AWS_37 | resource | aws_waf_sql_injection_match_set | Ensure Codecommit associates an approval rule | Terraform |
1142 | CKV2_AWS_37 | resource | aws_waf_web_acl | Ensure Codecommit associates an approval rule | Terraform |
1143 | CKV2_AWS_37 | resource | aws_waf_xss_match_set | Ensure Codecommit associates an approval rule | Terraform |
1144 | CKV2_AWS_37 | resource | aws_wafregional_byte_match_set | Ensure Codecommit associates an approval rule | Terraform |
1145 | CKV2_AWS_37 | resource | aws_wafregional_geo_match_set | Ensure Codecommit associates an approval rule | Terraform |
1146 | CKV2_AWS_37 | resource | aws_wafregional_ipset | Ensure Codecommit associates an approval rule | Terraform |
1147 | CKV2_AWS_37 | resource | aws_wafregional_rate_based_rule | Ensure Codecommit associates an approval rule | Terraform |
1148 | CKV2_AWS_37 | resource | aws_wafregional_regex_match_set | Ensure Codecommit associates an approval rule | Terraform |
1149 | CKV2_AWS_37 | resource | aws_wafregional_regex_pattern_set | Ensure Codecommit associates an approval rule | Terraform |
1150 | CKV2_AWS_37 | resource | aws_wafregional_rule | Ensure Codecommit associates an approval rule | Terraform |
1151 | CKV2_AWS_37 | resource | aws_wafregional_rule_group | Ensure Codecommit associates an approval rule | Terraform |
1152 | CKV2_AWS_37 | resource | aws_wafregional_size_constraint_set | Ensure Codecommit associates an approval rule | Terraform |
1153 | CKV2_AWS_37 | resource | aws_wafregional_sql_injection_match_set | Ensure Codecommit associates an approval rule | Terraform |
1154 | CKV2_AWS_37 | resource | aws_wafregional_web_acl | Ensure Codecommit associates an approval rule | Terraform |
1155 | CKV2_AWS_37 | resource | aws_wafregional_web_acl_association | Ensure Codecommit associates an approval rule | Terraform |
1156 | CKV2_AWS_37 | resource | aws_wafregional_xss_match_set | Ensure Codecommit associates an approval rule | Terraform |
1157 | CKV2_AWS_37 | resource | aws_wafv2_ip_set | Ensure Codecommit associates an approval rule | Terraform |
1158 | CKV2_AWS_37 | resource | aws_wafv2_regex_pattern_set | Ensure Codecommit associates an approval rule | Terraform |
1159 | CKV2_AWS_37 | resource | aws_wafv2_rule_group | Ensure Codecommit associates an approval rule | Terraform |
1160 | CKV2_AWS_37 | resource | aws_wafv2_web_acl | Ensure Codecommit associates an approval rule | Terraform |
1161 | CKV2_AWS_37 | resource | aws_wafv2_web_acl_association | Ensure Codecommit associates an approval rule | Terraform |
1162 | CKV2_AWS_37 | resource | aws_wafv2_web_acl_logging_configuration | Ensure Codecommit associates an approval rule | Terraform |
1163 | CKV2_AWS_37 | resource | aws_worklink_fleet | Ensure Codecommit associates an approval rule | Terraform |
1164 | CKV2_AWS_37 | resource | aws_worklink_website_certificate_authority_association | Ensure Codecommit associates an approval rule | Terraform |
1165 | CKV2_AWS_37 | resource | aws_workspaces_directory | Ensure Codecommit associates an approval rule | Terraform |
1166 | CKV2_AWS_37 | resource | aws_workspaces_ip_group | Ensure Codecommit associates an approval rule | Terraform |
1167 | CKV2_AWS_37 | resource | aws_workspaces_workspace | Ensure Codecommit associates an approval rule | Terraform |
1168 | CKV2_AWS_37 | resource | aws_xray_sampling_rule | Ensure Codecommit associates an approval rule | Terraform |
1169 | CKV2_AWS_38 | resource | aws_route53_zone | Ensure Domain Name System Security Extensions (DNSSEC) signing is enabled for Amazon Route 53 public hosted zones | Terraform |
1170 | CKV2_AWS_39 | resource | aws_route53_zone | Ensure Domain Name System (DNS) query logging is enabled for Amazon Route 53 hosted zones | Terraform |
1171 | CKV_AZURE_1 | resource | Microsoft.Compute/virtualMachines | Ensure Azure Instance does not use basic authentication(Use SSH Key Instead) | arm |
1172 | CKV_AZURE_1 | resource | Microsoft.Compute/virtualMachines | Ensure Azure Instance does not use basic authentication(Use SSH Key Instead) | Bicep |
1173 | CKV_AZURE_1 | resource | azurerm_linux_virtual_machine | Ensure Azure Instance does not use basic authentication(Use SSH Key Instead) | Terraform |
1174 | CKV_AZURE_1 | resource | azurerm_virtual_machine | Ensure Azure Instance does not use basic authentication(Use SSH Key Instead) | Terraform |
1175 | CKV_AZURE_2 | resource | Microsoft.Compute/disks | Ensure Azure managed disk have encryption enabled | arm |
1176 | CKV_AZURE_2 | resource | Microsoft.Compute/disks | Ensure Azure managed disk have encryption enabled | Bicep |
1177 | CKV_AZURE_2 | resource | azurerm_managed_disk | Ensure Azure managed disk has encryption enabled | Terraform |
1178 | CKV_AZURE_3 | resource | Microsoft.Storage/storageAccounts | Ensure that 'supportsHttpsTrafficOnly' is set to 'true' | arm |
1179 | CKV_AZURE_3 | resource | Microsoft.Storage/storageAccounts | Ensure that 'supportsHttpsTrafficOnly' is set to 'true' | Bicep |
1180 | CKV_AZURE_3 | resource | azurerm_storage_account | Ensure that 'Secure transfer required' is set to 'Enabled' | Terraform |
1181 | CKV_AZURE_4 | resource | Microsoft.ContainerService/managedClusters | Ensure AKS logging to Azure Monitoring is Configured | arm |
1182 | CKV_AZURE_4 | resource | Microsoft.ContainerService/managedClusters | Ensure AKS logging to Azure Monitoring is Configured | Bicep |
1183 | CKV_AZURE_4 | resource | azurerm_kubernetes_cluster | Ensure AKS logging to Azure Monitoring is Configured | Terraform |
1184 | CKV_AZURE_5 | resource | Microsoft.ContainerService/managedClusters | Ensure RBAC is enabled on AKS clusters | arm |
1185 | CKV_AZURE_5 | resource | Microsoft.ContainerService/managedClusters | Ensure RBAC is enabled on AKS clusters | Bicep |
1186 | CKV_AZURE_5 | resource | azurerm_kubernetes_cluster | Ensure RBAC is enabled on AKS clusters | Terraform |
1187 | CKV_AZURE_6 | resource | Microsoft.ContainerService/managedClusters | Ensure AKS has an API Server Authorized IP Ranges enabled | arm |
1188 | CKV_AZURE_6 | resource | Microsoft.ContainerService/managedClusters | Ensure AKS has an API Server Authorized IP Ranges enabled | Bicep |
1189 | CKV_AZURE_6 | resource | azurerm_kubernetes_cluster | Ensure AKS has an API Server Authorized IP Ranges enabled | Terraform |
1190 | CKV_AZURE_7 | resource | Microsoft.ContainerService/managedClusters | Ensure AKS cluster has Network Policy configured | arm |
1191 | CKV_AZURE_7 | resource | Microsoft.ContainerService/managedClusters | Ensure AKS cluster has Network Policy configured | Bicep |
1192 | CKV_AZURE_7 | resource | azurerm_kubernetes_cluster | Ensure AKS cluster has Network Policy configured | Terraform |
1193 | CKV_AZURE_8 | resource | Microsoft.ContainerService/managedClusters | Ensure Kubernetes Dashboard is disabled | arm |
1194 | CKV_AZURE_8 | resource | Microsoft.ContainerService/managedClusters | Ensure Kubernetes Dashboard is disabled | Bicep |
1195 | CKV_AZURE_8 | resource | azurerm_kubernetes_cluster | Ensure Kubernetes Dashboard is disabled | Terraform |
1196 | CKV_AZURE_9 | resource | Microsoft.Network/networkSecurityGroups | Ensure that RDP access is restricted from the internet | arm |
1197 | CKV_AZURE_9 | resource | Microsoft.Network/networkSecurityGroups | Ensure that RDP access is restricted from the internet | Bicep |
1198 | CKV_AZURE_9 | resource | Microsoft.Network/networkSecurityGroups/securityRules | Ensure that RDP access is restricted from the internet | arm |
1199 | CKV_AZURE_9 | resource | Microsoft.Network/networkSecurityGroups/securityRules | Ensure that RDP access is restricted from the internet | Bicep |
1200 | CKV_AZURE_9 | resource | azurerm_network_security_group | Ensure that RDP access is restricted from the internet | Terraform |
1201 | CKV_AZURE_9 | resource | azurerm_network_security_rule | Ensure that RDP access is restricted from the internet | Terraform |
1202 | CKV_AZURE_10 | resource | Microsoft.Network/networkSecurityGroups | Ensure that SSH access is restricted from the internet | arm |
1203 | CKV_AZURE_10 | resource | Microsoft.Network/networkSecurityGroups | Ensure that SSH access is restricted from the internet | Bicep |
1204 | CKV_AZURE_10 | resource | Microsoft.Network/networkSecurityGroups/securityRules | Ensure that SSH access is restricted from the internet | arm |
1205 | CKV_AZURE_10 | resource | Microsoft.Network/networkSecurityGroups/securityRules | Ensure that SSH access is restricted from the internet | Bicep |
1206 | CKV_AZURE_10 | resource | azurerm_network_security_group | Ensure that SSH access is restricted from the internet | Terraform |
1207 | CKV_AZURE_10 | resource | azurerm_network_security_rule | Ensure that SSH access is restricted from the internet | Terraform |
1208 | CKV_AZURE_11 | resource | Microsoft.Sql/servers | Ensure no SQL Databases allow ingress from 0.0.0.0/0 (ANY IP) | arm |
1209 | CKV_AZURE_11 | resource | Microsoft.Sql/servers | Ensure no SQL Databases allow ingress from 0.0.0.0/0 (ANY IP) | Bicep |
1210 | CKV_AZURE_11 | resource | azurerm_mariadb_firewall_rule | Ensure no SQL Databases allow ingress from 0.0.0.0/0 (ANY IP) | Terraform |
1211 | CKV_AZURE_11 | resource | azurerm_mysql_firewall_rule | Ensure no SQL Databases allow ingress from 0.0.0.0/0 (ANY IP) | Terraform |
1212 | CKV_AZURE_11 | resource | azurerm_postgresql_firewall_rule | Ensure no SQL Databases allow ingress from 0.0.0.0/0 (ANY IP) | Terraform |
1213 | CKV_AZURE_11 | resource | azurerm_sql_firewall_rule | Ensure no SQL Databases allow ingress from 0.0.0.0/0 (ANY IP) | Terraform |
1214 | CKV_AZURE_12 | resource | Microsoft.Network/networkWatchers/FlowLogs | Ensure that Network Security Group Flow Log retention period is 'greater than 90 days' | arm |
1215 | CKV_AZURE_12 | resource | Microsoft.Network/networkWatchers/FlowLogs | Ensure that Network Security Group Flow Log retention period is 'greater than 90 days' | Bicep |
1216 | CKV_AZURE_12 | resource | Microsoft.Network/networkWatchers/FlowLogs/ | Ensure that Network Security Group Flow Log retention period is 'greater than 90 days' | arm |
1217 | CKV_AZURE_12 | resource | Microsoft.Network/networkWatchers/FlowLogs/ | Ensure that Network Security Group Flow Log retention period is 'greater than 90 days' | Bicep |
1218 | CKV_AZURE_12 | resource | Microsoft.Network/networkWatchers/flowLogs | Ensure that Network Security Group Flow Log retention period is 'greater than 90 days' | arm |
1219 | CKV_AZURE_12 | resource | Microsoft.Network/networkWatchers/flowLogs | Ensure that Network Security Group Flow Log retention period is 'greater than 90 days' | Bicep |
1220 | CKV_AZURE_12 | resource | Microsoft.Network/networkWatchers/flowLogs/ | Ensure that Network Security Group Flow Log retention period is 'greater than 90 days' | arm |
1221 | CKV_AZURE_12 | resource | Microsoft.Network/networkWatchers/flowLogs/ | Ensure that Network Security Group Flow Log retention period is 'greater than 90 days' | Bicep |
1222 | CKV_AZURE_12 | resource | azurerm_network_watcher_flow_log | Ensure that Network Security Group Flow Log retention period is 'greater than 90 days' | Terraform |
1223 | CKV_AZURE_13 | resource | Microsoft.Web/sites/config | Ensure App Service Authentication is set on Azure App Service | arm |
1224 | CKV_AZURE_13 | resource | Microsoft.Web/sites/config | Ensure App Service Authentication is set on Azure App Service | Bicep |
1225 | CKV_AZURE_13 | resource | azurerm_app_service | Ensure App Service Authentication is set on Azure App Service | Terraform |
1226 | CKV_AZURE_13 | resource | config | Ensure App Service Authentication is set on Azure App Service | arm |
1227 | CKV_AZURE_13 | resource | config | Ensure App Service Authentication is set on Azure App Service | Bicep |
1228 | CKV_AZURE_14 | resource | Microsoft.Web/sites | Ensure web app redirects all HTTP traffic to HTTPS in Azure App Service | arm |
1229 | CKV_AZURE_14 | resource | Microsoft.Web/sites | Ensure web app redirects all HTTP traffic to HTTPS in Azure App Service | Bicep |
1230 | CKV_AZURE_14 | resource | azurerm_app_service | Ensure web app redirects all HTTP traffic to HTTPS in Azure App Service | Terraform |
1231 | CKV_AZURE_15 | resource | Microsoft.Web/sites | Ensure web app is using the latest version of TLS encryption | arm |
1232 | CKV_AZURE_15 | resource | Microsoft.Web/sites | Ensure web app is using the latest version of TLS encryption | Bicep |
1233 | CKV_AZURE_15 | resource | azurerm_app_service | Ensure web app is using the latest version of TLS encryption | Terraform |
1234 | CKV_AZURE_16 | resource | Microsoft.Web/sites | Ensure that Register with Azure Active Directory is enabled on App Service | arm |
1235 | CKV_AZURE_16 | resource | Microsoft.Web/sites | Ensure that Register with Azure Active Directory is enabled on App Service | Bicep |
1236 | CKV_AZURE_16 | resource | azurerm_app_service | Ensure that Register with Azure Active Directory is enabled on App Service | Terraform |
1237 | CKV_AZURE_17 | resource | Microsoft.Web/sites | Ensure the web app has 'Client Certificates (Incoming client certificates)' set | arm |
1238 | CKV_AZURE_17 | resource | Microsoft.Web/sites | Ensure the web app has 'Client Certificates (Incoming client certificates)' set | Bicep |
1239 | CKV_AZURE_17 | resource | azurerm_app_service | Ensure the web app has 'Client Certificates (Incoming client certificates)' set | Terraform |
1240 | CKV_AZURE_18 | resource | Microsoft.Web/sites | Ensure that 'HTTP Version' is the latest if used to run the web app | arm |
1241 | CKV_AZURE_18 | resource | Microsoft.Web/sites | Ensure that 'HTTP Version' is the latest if used to run the web app | Bicep |
1242 | CKV_AZURE_18 | resource | azurerm_app_service | Ensure that 'HTTP Version' is the latest if used to run the web app | Terraform |
1243 | CKV_AZURE_19 | resource | Microsoft.Security/pricings | Ensure that standard pricing tier is selected | arm |
1244 | CKV_AZURE_19 | resource | Microsoft.Security/pricings | Ensure that standard pricing tier is selected | Bicep |
1245 | CKV_AZURE_19 | resource | azurerm_security_center_subscription_pricing | Ensure that standard pricing tier is selected | Terraform |
1246 | CKV_AZURE_20 | resource | Microsoft.Security/securityContacts | Ensure that security contact 'Phone number' is set | arm |
1247 | CKV_AZURE_20 | resource | Microsoft.Security/securityContacts | Ensure that security contact 'Phone number' is set | Bicep |
1248 | CKV_AZURE_20 | resource | azurerm_security_center_contact | Ensure that security contact 'Phone number' is set | Terraform |
1249 | CKV_AZURE_21 | resource | Microsoft.Security/securityContacts | Ensure that 'Send email notification for high severity alerts' is set to 'On' | arm |
1250 | CKV_AZURE_21 | resource | Microsoft.Security/securityContacts | Ensure that 'Send email notification for high severity alerts' is set to 'On' | Bicep |
1251 | CKV_AZURE_21 | resource | azurerm_security_center_contact | Ensure that 'Send email notification for high severity alerts' is set to 'On' | Terraform |
1252 | CKV_AZURE_22 | resource | Microsoft.Security/securityContacts | Ensure that 'Send email notification for high severity alerts' is set to 'On' | arm |
1253 | CKV_AZURE_22 | resource | Microsoft.Security/securityContacts | Ensure that 'Send email notification for high severity alerts' is set to 'On' | Bicep |
1254 | CKV_AZURE_22 | resource | azurerm_security_center_contact | Ensure that 'Send email notification for high severity alerts' is set to 'On' | Terraform |
1255 | CKV_AZURE_23 | resource | Microsoft.Sql/servers | Ensure that 'Auditing' is set to 'Enabled' for SQL servers | arm |
1256 | CKV_AZURE_23 | resource | Microsoft.Sql/servers | Ensure that 'Auditing' is set to 'On' for SQL servers | Bicep |
1257 | CKV_AZURE_23 | resource | Microsoft.Sql/servers/auditingSettings | Ensure that 'Auditing' is set to 'On' for SQL servers | Bicep |
1258 | CKV_AZURE_23 | resource | Microsoft.Sql/servers/databases | Ensure that 'Auditing' is set to 'Enabled' for SQL servers | arm |
1259 | CKV_AZURE_23 | resource | Microsoft.Sql/servers/databases | Ensure that 'Auditing' is set to 'On' for SQL servers | Bicep |
1260 | CKV_AZURE_23 | resource | Microsoft.Sql/servers/databases/auditingSettings | Ensure that 'Auditing' is set to 'On' for SQL servers | Bicep |
1261 | CKV_AZURE_23 | resource | azurerm_mssql_server | Ensure that 'Auditing' is set to 'On' for SQL servers | Terraform |
1262 | CKV_AZURE_23 | resource | azurerm_mssql_server_extended_auditing_policy | Ensure that 'Auditing' is set to 'On' for SQL servers | Terraform |
1263 | CKV_AZURE_23 | resource | azurerm_sql_server | Ensure that 'Auditing' is set to 'On' for SQL servers | Terraform |
1264 | CKV_AZURE_24 | resource | Microsoft.Sql/servers | Ensure that 'Auditing' Retention is 'greater than 90 days' for SQL servers | arm |
1265 | CKV_AZURE_24 | resource | Microsoft.Sql/servers | Ensure that 'Auditing' Retention is 'greater than 90 days' for SQL servers | Bicep |
1266 | CKV_AZURE_24 | resource | azurerm_mssql_server | Ensure that 'Auditing' Retention is 'greater than 90 days' for SQL servers | Terraform |
1267 | CKV_AZURE_24 | resource | azurerm_mssql_server_extended_auditing_policy | Ensure that 'Auditing' Retention is 'greater than 90 days' for SQL servers | Terraform |
1268 | CKV_AZURE_24 | resource | azurerm_sql_server | Ensure that 'Auditing' Retention is 'greater than 90 days' for SQL servers | Terraform |
1269 | CKV_AZURE_25 | resource | Microsoft.Sql/servers/databases | Ensure that 'Threat Detection types' is set to 'All' | arm |
1270 | CKV_AZURE_25 | resource | Microsoft.Sql/servers/databases | Ensure that 'Threat Detection types' is set to 'All' | Bicep |
1271 | CKV_AZURE_25 | resource | azurerm_mssql_server_security_alert_policy | Ensure that 'Threat Detection types' is set to 'All' | Terraform |
1272 | CKV_AZURE_26 | resource | Microsoft.Sql/servers/databases | Ensure that 'Send Alerts To' is enabled for MSSQL servers | arm |
1273 | CKV_AZURE_26 | resource | Microsoft.Sql/servers/databases | Ensure that 'Send Alerts To' is enabled for MSSQL servers | Bicep |
1274 | CKV_AZURE_26 | resource | azurerm_mssql_server_security_alert_policy | Ensure that 'Send Alerts To' is enabled for MSSQL servers | Terraform |
1275 | CKV_AZURE_27 | resource | Microsoft.Sql/servers/databases | Ensure that 'Email service and co-administrators' is 'Enabled' for MSSQL servers | arm |
1276 | CKV_AZURE_27 | resource | Microsoft.Sql/servers/databases | Ensure that 'Email service and co-administrators' is 'Enabled' for MSSQL servers | Bicep |
1277 | CKV_AZURE_27 | resource | azurerm_mssql_server_security_alert_policy | Ensure that 'Email service and co-administrators' is 'Enabled' for MSSQL servers | Terraform |
1278 | CKV_AZURE_28 | resource | Microsoft.DBforMySQL/servers | Ensure 'Enforce SSL connection' is set to 'ENABLED' for MySQL Database Server | arm |
1279 | CKV_AZURE_28 | resource | Microsoft.DBforMySQL/servers | Ensure 'Enforce SSL connection' is set to 'ENABLED' for MySQL Database Server | Bicep |
1280 | CKV_AZURE_28 | resource | azurerm_mysql_server | Ensure 'Enforce SSL connection' is set to 'ENABLED' for MySQL Database Server | Terraform |
1281 | CKV_AZURE_29 | resource | Microsoft.DBforPostgreSQL/servers | Ensure 'Enforce SSL connection' is set to 'ENABLED' for PostgreSQL Database Server | arm |
1282 | CKV_AZURE_29 | resource | Microsoft.DBforPostgreSQL/servers | Ensure 'Enforce SSL connection' is set to 'ENABLED' for PostgreSQL Database Server | Bicep |
1283 | CKV_AZURE_29 | resource | azurerm_postgresql_server | Ensure 'Enforce SSL connection' is set to 'ENABLED' for PostgreSQL Database Server | Terraform |
1284 | CKV_AZURE_30 | resource | Microsoft.DBforPostgreSQL/servers/configurations | Ensure server parameter 'log_checkpoints' is set to 'ON' for PostgreSQL Database Server | arm |
1285 | CKV_AZURE_30 | resource | Microsoft.DBforPostgreSQL/servers/configurations | Ensure server parameter 'log_checkpoints' is set to 'ON' for PostgreSQL Database Server | Bicep |
1286 | CKV_AZURE_30 | resource | azurerm_postgresql_configuration | Ensure server parameter 'log_checkpoints' is set to 'ON' for PostgreSQL Database Server | Terraform |
1287 | CKV_AZURE_30 | resource | configurations | Ensure server parameter 'log_checkpoints' is set to 'ON' for PostgreSQL Database Server | arm |
1288 | CKV_AZURE_30 | resource | configurations | Ensure server parameter 'log_checkpoints' is set to 'ON' for PostgreSQL Database Server | Bicep |
1289 | CKV_AZURE_31 | resource | Microsoft.DBforPostgreSQL/servers/configurations | Ensure configuration 'log_connections' is set to 'ON' for PostgreSQL Database Server | arm |
1290 | CKV_AZURE_31 | resource | Microsoft.DBforPostgreSQL/servers/configurations | Ensure configuration 'log_connections' is set to 'ON' for PostgreSQL Database Server | Bicep |
1291 | CKV_AZURE_31 | resource | azurerm_postgresql_configuration | Ensure server parameter 'log_connections' is set to 'ON' for PostgreSQL Database Server | Terraform |
1292 | CKV_AZURE_31 | resource | configurations | Ensure configuration 'log_connections' is set to 'ON' for PostgreSQL Database Server | arm |
1293 | CKV_AZURE_31 | resource | configurations | Ensure configuration 'log_connections' is set to 'ON' for PostgreSQL Database Server | Bicep |
1294 | CKV_AZURE_32 | resource | Microsoft.DBforPostgreSQL/servers/configurations | Ensure server parameter 'connection_throttling' is set to 'ON' for PostgreSQL Database Server | arm |
1295 | CKV_AZURE_32 | resource | Microsoft.DBforPostgreSQL/servers/configurations | Ensure server parameter 'connection_throttling' is set to 'ON' for PostgreSQL Database Server | Bicep |
1296 | CKV_AZURE_32 | resource | azurerm_postgresql_configuration | Ensure server parameter 'connection_throttling' is set to 'ON' for PostgreSQL Database Server | Terraform |
1297 | CKV_AZURE_32 | resource | configurations | Ensure server parameter 'connection_throttling' is set to 'ON' for PostgreSQL Database Server | arm |
1298 | CKV_AZURE_32 | resource | configurations | Ensure server parameter 'connection_throttling' is set to 'ON' for PostgreSQL Database Server | Bicep |
1299 | CKV_AZURE_33 | resource | Microsoft.Storage/storageAccounts/queueServices/providers/diagnosticsettings | Ensure Storage logging is enabled for Queue service for read, write and delete requests | arm |
1300 | CKV_AZURE_33 | resource | Microsoft.Storage/storageAccounts/queueServices/providers/diagnosticsettings | Ensure Storage logging is enabled for Queue service for read, write and delete requests | Bicep |
1301 | CKV_AZURE_33 | resource | azurerm_storage_account | Ensure Storage logging is enabled for Queue service for read, write and delete requests | Terraform |
1302 | CKV_AZURE_34 | resource | Microsoft.Storage/storageAccounts/blobServices/containers | Ensure that 'Public access level' is set to Private for blob containers | arm |
1303 | CKV_AZURE_34 | resource | Microsoft.Storage/storageAccounts/blobServices/containers | Ensure that 'Public access level' is set to Private for blob containers | Bicep |
1304 | CKV_AZURE_34 | resource | azurerm_storage_container | Ensure that 'Public access level' is set to Private for blob containers | Terraform |
1305 | CKV_AZURE_34 | resource | blobServices/containers | Ensure that 'Public access level' is set to Private for blob containers | arm |
1306 | CKV_AZURE_34 | resource | blobServices/containers | Ensure that 'Public access level' is set to Private for blob containers | Bicep |
1307 | CKV_AZURE_34 | resource | containers | Ensure that 'Public access level' is set to Private for blob containers | arm |
1308 | CKV_AZURE_34 | resource | containers | Ensure that 'Public access level' is set to Private for blob containers | Bicep |
1309 | CKV_AZURE_35 | resource | Microsoft.Storage/storageAccounts | Ensure default network access rule for Storage Accounts is set to deny | arm |
1310 | CKV_AZURE_35 | resource | Microsoft.Storage/storageAccounts | Ensure default network access rule for Storage Accounts is set to deny | Bicep |
1311 | CKV_AZURE_35 | resource | azurerm_storage_account | Ensure default network access rule for Storage Accounts is set to deny | Terraform |
1312 | CKV_AZURE_35 | resource | azurerm_storage_account_network_rules | Ensure default network access rule for Storage Accounts is set to deny | Terraform |
1313 | CKV_AZURE_36 | resource | Microsoft.Storage/storageAccounts | Ensure 'Trusted Microsoft Services' is enabled for Storage Account access | arm |
1314 | CKV_AZURE_36 | resource | Microsoft.Storage/storageAccounts | Ensure 'Trusted Microsoft Services' is enabled for Storage Account access | Bicep |
1315 | CKV_AZURE_36 | resource | azurerm_storage_account | Ensure 'Trusted Microsoft Services' is enabled for Storage Account access | Terraform |
1316 | CKV_AZURE_36 | resource | azurerm_storage_account_network_rules | Ensure 'Trusted Microsoft Services' is enabled for Storage Account access | Terraform |
1317 | CKV_AZURE_37 | resource | Microsoft.Insights/logprofiles | Ensure that Activity Log Retention is set 365 days or greater | arm |
1318 | CKV_AZURE_37 | resource | Microsoft.Insights/logprofiles | Ensure that Activity Log Retention is set 365 days or greater | Bicep |
1319 | CKV_AZURE_37 | resource | azurerm_monitor_log_profile | Ensure that Activity Log Retention is set 365 days or greater | Terraform |
1320 | CKV_AZURE_38 | resource | Microsoft.Insights/logprofiles | Ensure audit profile captures all the activities | arm |
1321 | CKV_AZURE_38 | resource | Microsoft.Insights/logprofiles | Ensure audit profile captures all the activities | Bicep |
1322 | CKV_AZURE_38 | resource | azurerm_monitor_log_profile | Ensure audit profile captures all the activities | Terraform |
1323 | CKV_AZURE_39 | resource | Microsoft.Authorization/roleDefinitions | Ensure that no custom subscription owner roles are created | arm |
1324 | CKV_AZURE_39 | resource | Microsoft.Authorization/roleDefinitions | Ensure that no custom subscription owner roles are created | Bicep |
1325 | CKV_AZURE_39 | resource | azurerm_role_definition | Ensure that no custom subscription owner roles are created | Terraform |
1326 | CKV_AZURE_40 | resource | azurerm_key_vault_key | Ensure that the expiration date is set on all keys | Terraform |
1327 | CKV_AZURE_41 | resource | Microsoft.KeyVault/vaults/secrets | Ensure that the expiration date is set on all secrets | arm |
1328 | CKV_AZURE_41 | resource | Microsoft.KeyVault/vaults/secrets | Ensure that the expiration date is set on all secrets | Bicep |
1329 | CKV_AZURE_41 | resource | azurerm_key_vault_secret | Ensure that the expiration date is set on all secrets | Terraform |
1330 | CKV_AZURE_42 | resource | Microsoft.KeyVault/vaults | Ensure the key vault is recoverable | arm |
1331 | CKV_AZURE_42 | resource | Microsoft.KeyVault/vaults | Ensure the key vault is recoverable | Bicep |
1332 | CKV_AZURE_42 | resource | azurerm_key_vault | Ensure the key vault is recoverable | Terraform |
1333 | CKV_AZURE_43 | resource | azurerm_storage_account | Ensure Storage Accounts adhere to the naming rules | Terraform |
1334 | CKV_AZURE_44 | resource | azurerm_storage_account | Ensure Storage Account is using the latest version of TLS encryption | Terraform |
1335 | CKV_AZURE_45 | resource | azurerm_virtual_machine | Ensure that no sensitive credentials are exposed in VM custom_data | Terraform |
1336 | CKV_AZURE_47 | resource | Microsoft.DBforMariaDB/servers | Ensure 'Enforce SSL connection' is set to 'ENABLED' for MariaDB servers | arm |
1337 | CKV_AZURE_47 | resource | Microsoft.DBforMariaDB/servers | Ensure 'Enforce SSL connection' is set to 'ENABLED' for MariaDB servers | Bicep |
1338 | CKV_AZURE_47 | resource | azurerm_mariadb_server | Ensure 'Enforce SSL connection' is set to 'ENABLED' for MariaDB servers | Terraform |
1339 | CKV_AZURE_48 | resource | azurerm_mariadb_server | Ensure 'public network access enabled' is set to 'False' for MariaDB servers | Terraform |
1340 | CKV_AZURE_49 | resource | Microsoft.Compute/virtualMachineScaleSets | Ensure Azure linux scale set does not use basic authentication(Use SSH Key Instead) | arm |
1341 | CKV_AZURE_49 | resource | Microsoft.Compute/virtualMachineScaleSets | Ensure Azure linux scale set does not use basic authentication(Use SSH Key Instead) | Bicep |
1342 | CKV_AZURE_49 | resource | azurerm_linux_virtual_machine_scale_set | Ensure Azure linux scale set does not use basic authentication(Use SSH Key Instead) | Terraform |
1343 | CKV_AZURE_50 | resource | azurerm_linux_virtual_machine | Ensure Virtual Machine Extensions are not Installed | Terraform |
1344 | CKV_AZURE_50 | resource | azurerm_windows_virtual_machine | Ensure Virtual Machine Extensions are not Installed | Terraform |
1345 | CKV_AZURE_52 | resource | azurerm_mssql_server | Ensure MSSQL is using the latest version of TLS encryption | Terraform |
1346 | CKV_AZURE_53 | resource | azurerm_mysql_server | Ensure 'public network access enabled' is set to 'False' for mySQL servers | Terraform |
1347 | CKV_AZURE_54 | resource | azurerm_mysql_server | Ensure MySQL is using the latest version of TLS encryption | Terraform |
1348 | CKV_AZURE_55 | resource | azurerm_security_center_subscription_pricing | Ensure that Azure Defender is set to On for Servers | Terraform |
1349 | CKV_AZURE_56 | resource | azurerm_function_app | Ensure that function apps enables Authentication | Terraform |
1350 | CKV_AZURE_57 | resource | azurerm_app_service | Ensure that CORS disallows every resource to access app services | Terraform |
1351 | CKV_AZURE_58 | resource | azurerm_synapse_workspace | Ensure that Azure Synapse workspaces enables managed virtual networks | Terraform |
1352 | CKV_AZURE_59 | resource | azurerm_storage_account | Ensure that Storage accounts disallow public access | Terraform |
1353 | CKV_AZURE_60 | resource | azurerm_storage_account | Ensure that storage account enables secure transfer | Terraform |
1354 | CKV_AZURE_61 | resource | azurerm_security_center_subscription_pricing | Ensure that Azure Defender is set to On for App Service | Terraform |
1355 | CKV_AZURE_62 | resource | azurerm_function_app | Ensure function apps are not accessible from all regions | Terraform |
1356 | CKV_AZURE_63 | resource | azurerm_app_service | Ensure that App service enables HTTP logging | Terraform |
1357 | CKV_AZURE_64 | resource | azurerm_storage_sync | Ensure that Azure File Sync disables public network access | Terraform |
1358 | CKV_AZURE_65 | resource | azurerm_app_service | Ensure that App service enables detailed error messages | Terraform |
1359 | CKV_AZURE_66 | resource | azurerm_app_service | Ensure that App service enables failed request tracing | Terraform |
1360 | CKV_AZURE_67 | resource | azurerm_function_app | Ensure that 'HTTP Version' is the latest, if used to run the Function app | Terraform |
1361 | CKV_AZURE_67 | resource | azurerm_function_app_slot | Ensure that 'HTTP Version' is the latest, if used to run the Function app | Terraform |
1362 | CKV_AZURE_68 | resource | azurerm_postgresql_server | Ensure that PostgreSQL server disables public network access | Terraform |
1363 | CKV_AZURE_69 | resource | azurerm_security_center_subscription_pricing | Ensure that Azure Defender is set to On for Azure SQL database servers | Terraform |
1364 | CKV_AZURE_70 | resource | azurerm_function_app | Ensure that Function apps is only accessible over HTTPS | Terraform |
1365 | CKV_AZURE_71 | resource | azurerm_app_service | Ensure that Managed identity provider is enabled for app services | Terraform |
1366 | CKV_AZURE_72 | resource | azurerm_app_service | Ensure that remote debugging is not enabled for app services | Terraform |
1367 | CKV_AZURE_73 | resource | azurerm_automation_variable_bool | Ensure that Automation account variables are encrypted | Terraform |
1368 | CKV_AZURE_73 | resource | azurerm_automation_variable_datetime | Ensure that Automation account variables are encrypted | Terraform |
1369 | CKV_AZURE_73 | resource | azurerm_automation_variable_int | Ensure that Automation account variables are encrypted | Terraform |
1370 | CKV_AZURE_73 | resource | azurerm_automation_variable_string | Ensure that Automation account variables are encrypted | Terraform |
1371 | CKV_AZURE_74 | resource | azurerm_kusto_cluster | Ensure that Azure Data Explorer uses disk encryption | Terraform |
1372 | CKV_AZURE_75 | resource | azurerm_kusto_cluster | Ensure that Azure Data Explorer uses double encryption | Terraform |
1373 | CKV_AZURE_76 | resource | azurerm_batch_account | Ensure that Azure Batch account uses key vault to encrypt data | Terraform |
1374 | CKV_AZURE_77 | resource | azurerm_network_security_group | Ensure that UDP Services are restricted from the Internet | Terraform |
1375 | CKV_AZURE_77 | resource | azurerm_network_security_rule | Ensure that UDP Services are restricted from the Internet | Terraform |
1376 | CKV_AZURE_78 | resource | azurerm_app_service | Ensure FTP deployments are disabled | Terraform |
1377 | CKV_AZURE_79 | resource | azurerm_security_center_subscription_pricing | Ensure that Azure Defender is set to On for SQL servers on machines | Terraform |
1378 | CKV_AZURE_80 | resource | azurerm_app_service | Ensure that 'Net Framework' version is the latest, if used as a part of the web app | Terraform |
1379 | CKV_AZURE_81 | resource | azurerm_app_service | Ensure that 'PHP version' is the latest, if used to run the web app | Terraform |
1380 | CKV_AZURE_82 | resource | azurerm_app_service | Ensure that 'Python version' is the latest, if used to run the web app | Terraform |
1381 | CKV_AZURE_83 | resource | azurerm_app_service | Ensure that 'Java version' is the latest, if used to run the web app | Terraform |
1382 | CKV_AZURE_84 | resource | azurerm_security_center_subscription_pricing | Ensure that Azure Defender is set to On for Storage | Terraform |
1383 | CKV_AZURE_85 | resource | azurerm_security_center_subscription_pricing | Ensure that Azure Defender is set to On for Kubernetes | Terraform |
1384 | CKV_AZURE_86 | resource | azurerm_security_center_subscription_pricing | Ensure that Azure Defender is set to On for Container Registries | Terraform |
1385 | CKV_AZURE_87 | resource | azurerm_security_center_subscription_pricing | Ensure that Azure Defender is set to On for Key Vault | Terraform |
1386 | CKV_AZURE_88 | resource | azurerm_app_service | Ensure that app services use Azure Files | Terraform |
1387 | CKV_AZURE_89 | resource | azurerm_redis_cache | Ensure that Azure Cache for Redis disables public network access | Terraform |
1388 | CKV_AZURE_91 | resource | azurerm_redis_cache | Ensure that only SSL are enabled for Cache for Redis | Terraform |
1389 | CKV_AZURE_92 | resource | azurerm_linux_virtual_machine | Ensure that Virtual Machines use managed disks | Terraform |
1390 | CKV_AZURE_92 | resource | azurerm_windows_virtual_machine | Ensure that Virtual Machines use managed disks | Terraform |
1391 | CKV_AZURE_93 | resource | azurerm_managed_disk | Ensure that managed disks use a specific set of disk encryption sets for the customer-managed key encryption | Terraform |
1392 | CKV_AZURE_94 | resource | azurerm_mysql_server | Ensure that My SQL server enables geo-redundant backups | Terraform |
1393 | CKV_AZURE_95 | resource | azurerm_virtual_machine_scale_set | Ensure that automatic OS image patching is enabled for Virtual Machine Scale Sets | Terraform |
1394 | CKV_AZURE_96 | resource | azurerm_mysql_server | Ensure that MySQL server enables infrastructure encryption | Terraform |
1395 | CKV_AZURE_97 | resource | azurerm_linux_virtual_machine_scale_set | Ensure that Virtual machine scale sets have encryption at host enabled | Terraform |
1396 | CKV_AZURE_97 | resource | azurerm_windows_virtual_machine_scale_set | Ensure that Virtual machine scale sets have encryption at host enabled | Terraform |
1397 | CKV_AZURE_98 | resource | azurerm_container_group | Ensure that Azure Container group is deployed into virtual network | Terraform |
1398 | CKV_AZURE_99 | resource | azurerm_cosmosdb_account | Ensure Cosmos DB accounts have restricted access | Terraform |
1399 | CKV_AZURE_100 | resource | azurerm_cosmosdb_account | Ensure that Cosmos DB accounts have customer-managed keys to encrypt data at rest | Terraform |
1400 | CKV_AZURE_101 | resource | azurerm_cosmosdb_account | Ensure that Azure Cosmos DB disables public network access | Terraform |
1401 | CKV_AZURE_102 | resource | azurerm_postgresql_server | Ensure that PostgreSQL server enables geo-redundant backups | Terraform |
1402 | CKV_AZURE_103 | resource | azurerm_data_factory | Ensure that Azure Data Factory uses Git repository for source control | Terraform |
1403 | CKV_AZURE_104 | resource | azurerm_data_factory | Ensure that Azure Data factory public network access is disabled | Terraform |
1404 | CKV_AZURE_105 | resource | azurerm_data_lake_store | Ensure that Data Lake Store accounts enables encryption | Terraform |
1405 | CKV_AZURE_106 | resource | azurerm_eventgrid_domain | Ensure that Azure Event Grid Domain public network access is disabled | Terraform |
1406 | CKV_AZURE_107 | resource | azurerm_api_management | Ensure that API management services use virtual networks | Terraform |
1407 | CKV_AZURE_108 | resource | azurerm_iothub | Ensure that Azure IoT Hub disables public network access | Terraform |
1408 | CKV_AZURE_109 | resource | azurerm_key_vault | Ensure that key vault allows firewall rules settings | Terraform |
1409 | CKV_AZURE_110 | resource | azurerm_key_vault | Ensure that key vault enables purge protection | Terraform |
1410 | CKV_AZURE_111 | resource | azurerm_key_vault | Ensure that key vault enables soft delete | Terraform |
1411 | CKV_AZURE_112 | resource | azurerm_key_vault_key | Ensure that key vault key is backed by HSM | Terraform |
1412 | CKV_AZURE_113 | resource | azurerm_mssql_server | Ensure that SQL server disables public network access | Terraform |
1413 | CKV_AZURE_114 | resource | azurerm_key_vault_secret | Ensure that key vault secrets have "content_type" set | Terraform |
1414 | CKV_AZURE_115 | resource | azurerm_kubernetes_cluster | Ensure that AKS enables private clusters | Terraform |
1415 | CKV_AZURE_116 | resource | azurerm_kubernetes_cluster | Ensure that AKS uses Azure Policies Add-on | Terraform |
1416 | CKV_AZURE_117 | resource | azurerm_kubernetes_cluster | Ensure that AKS uses disk encryption set | Terraform |
1417 | CKV_AZURE_118 | resource | azurerm_network_interface | Ensure that Network Interfaces disable IP forwarding | Terraform |
1418 | CKV_AZURE_119 | resource | azurerm_network_interface | Ensure that Network Interfaces don't use public IPs | Terraform |
1419 | CKV_AZURE_120 | resource | azurerm_application_gateway | Ensure that Application Gateway enables WAF | Terraform |
1420 | CKV_AZURE_120 | resource | azurerm_web_application_firewall_policy | Ensure that Application Gateway enables WAF | Terraform |
1421 | CKV_AZURE_121 | resource | azurerm_frontdoor | Ensure that Azure Front Door enables WAF | Terraform |
1422 | CKV_AZURE_122 | resource | azurerm_web_application_firewall_policy | Ensure that Application Gateway uses WAF in "Detection" or "Prevention" modes | Terraform |
1423 | CKV_AZURE_123 | resource | azurerm_frontdoor_firewall_policy | Ensure that Azure Front Door uses WAF in "Detection" or "Prevention" modes | Terraform |
1424 | CKV_AZURE_124 | resource | azurerm_search_service | Ensure that Azure Cognitive Search disables public network access | Terraform |
1425 | CKV_AZURE_125 | resource | azurerm_service_fabric_cluster | Ensures that Service Fabric use three levels of protection available | Terraform |
1426 | CKV_AZURE_126 | resource | azurerm_service_fabric_cluster | Ensures that Active Directory is used for authentication for Service Fabric | Terraform |
1427 | CKV_AZURE_127 | resource | azurerm_mysql_server | Ensure that My SQL server enables Threat detection policy | Terraform |
1428 | CKV_AZURE_128 | resource | azurerm_postgresql_server | Ensure that PostgreSQL server enables Threat detection policy | Terraform |
1429 | CKV_AZURE_129 | resource | azurerm_mariadb_server | Ensure that MariaDB server enables geo-redundant backups | Terraform |
1430 | CKV_AZURE_130 | resource | azurerm_postgresql_server | Ensure that PostgreSQL server enables infrastructure encryption | Terraform |
1431 | CKV_AZURE_131 | resource | azurerm_security_center_contact | Ensure that 'Security contact emails' is set | Terraform |
1432 | CKV_AZURE_131 | parameter | secureString | SecureString parameter should not have hardcoded default values | arm |
1433 | CKV_AZURE_131 | parameter | string | SecureString parameter should not have hardcoded default values | Bicep |
1434 | CKV_AZURE_132 | resource | Microsoft.DocumentDB/databaseAccounts | Ensure cosmosdb does not allow privileged escalation by restricting management plane changes | arm |
1435 | CKV_AZURE_132 | resource | Microsoft.DocumentDB/databaseAccounts | Ensure cosmosdb does not allow privileged escalation by restricting management plane changes | Bicep |
1436 | CKV_AZURE_132 | resource | azurerm_cosmosdb_account | Ensure cosmosdb does not allow privileged escalation by restricting management plane changes | Terraform |
1437 | CKV_AZURE_133 | resource | azurerm_frontdoor_firewall_policy | Ensure Front Door WAF prevents message lookup in Log4j2. See CVE-2021-44228 aka log4jshell | Terraform |
1438 | CKV_AZURE_134 | resource | azurerm_cognitive_account | Ensure that Cognitive Services accounts disable public network access | Terraform |
1439 | CKV_AZURE_135 | resource | azurerm_web_application_firewall_policy | Ensure Application Gateway WAF prevents message lookup in Log4j2. See CVE-2021-44228 aka log4jshell | Terraform |
1440 | CKV_AZURE_136 | resource | azurerm_postgresql_flexible_server | Ensure that PostgreSQL Flexible server enables geo-redundant backups | Terraform |
1441 | CKV_AZURE_137 | resource | azurerm_container_registry | Ensure ACR admin account is disabled | Terraform |
1442 | CKV_AZURE_138 | resource | azurerm_container_registry | Ensures that ACR disables anonymous pulling of images | Terraform |
1443 | CKV_AZURE_139 | resource | azurerm_container_registry | Ensure ACR set to disable public networking | Terraform |
1444 | CKV_AZURE_140 | resource | azurerm_cosmosdb_account | Ensure that Local Authentication is disabled on CosmosDB | Terraform |
1445 | CKV_AZURE_141 | resource | azurerm_kubernetes_cluster | Ensure AKS local admin account is disabled | Terraform |
1446 | CKV_AZURE_142 | resource | azurerm_machine_learning_compute_cluster | Ensure Machine Learning Compute Cluster Local Authentication is disabled | Terraform |
1447 | CKV_AZURE_143 | resource | azurerm_kubernetes_cluster | Ensure AKS cluster nodes do not have public IP addresses | Terraform |
1448 | CKV_AZURE_144 | resource | azurerm_machine_learning_workspace | Ensure that Public Access is disabled for Machine Learning Workspace | Terraform |
1449 | CKV_AZURE_145 | resource | azurerm_function_app | Ensure Function app is using the latest version of TLS encryption | Terraform |
1450 | CKV_AZURE_146 | resource | azurerm_postgresql_configuration | Ensure server parameter 'log_retention' is set to 'ON' for PostgreSQL Database Server | Terraform |
1451 | CKV_AZURE_147 | resource | azurerm_postgresql_server | Ensure PostgreSQL is using the latest version of TLS encryption | Terraform |
1452 | CKV_AZURE_148 | resource | azurerm_redis_cache | Ensure Redis Cache is using the latest version of TLS encryption | Terraform |
1453 | CKV_AZURE_149 | resource | azurerm_linux_virtual_machine | Ensure that Virtual machine does not enable password authentication | Terraform |
1454 | CKV_AZURE_149 | resource | azurerm_linux_virtual_machine_scale_set | Ensure that Virtual machine does not enable password authentication | Terraform |
1455 | CKV_AZURE_150 | resource | azurerm_machine_learning_compute_cluster | Ensure Machine Learning Compute Cluster Minimum Nodes Set To 0 | Terraform |
1456 | CKV_AZURE_151 | resource | azurerm_windows_virtual_machine | Ensure Windows VM enables encryption | Terraform |
1457 | CKV_AZURE_152 | resource | azurerm_api_management | Ensure Client Certificates are enforced for API management | Terraform |
1458 | CKV_AZURE_153 | resource | azurerm_app_service_slot | Ensure web app redirects all HTTP traffic to HTTPS in Azure App Service Slot | Terraform |
1459 | CKV_AZURE_154 | resource | azurerm_app_service_slot | Ensure the App service slot is using the latest version of TLS encryption | Terraform |
1460 | CKV_AZURE_155 | resource | azurerm_app_service_slot | Ensure debugging is disabled for the App service slot | Terraform |
1461 | CKV_AZURE_156 | resource | azurerm_mssql_database_extended_auditing_policy | Ensure default Auditing policy for a SQL Server is configured to capture and retain the activity logs | Terraform |
1462 | CKV_AZURE_157 | resource | azurerm_synapse_workspace | Ensure that Synapse workspace has data_exfiltration_protection_enabled | Terraform |
1463 | CKV_AZURE_158 | resource | azurerm_databricks_workspace | Ensure that databricks workspace has not public | Terraform |
1464 | CKV_AZURE_159 | resource | azurerm_function_app | Ensure function app builtin logging is enabled | Terraform |
1465 | CKV_AZURE_159 | resource | azurerm_function_app_slot | Ensure function app builtin logging is enabled | Terraform |
1466 | CKV_AZURE_160 | resource | azurerm_network_security_group | Ensure that HTTP (port 80) access is restricted from the internet | Terraform |
1467 | CKV_AZURE_160 | resource | azurerm_network_security_rule | Ensure that HTTP (port 80) access is restricted from the internet | Terraform |
1468 | CKV_AZURE_161 | resource | azurerm_spring_cloud_api_portal | Ensures Spring Cloud API Portal is enabled on for HTTPS | Terraform |
1469 | CKV_AZURE_162 | resource | azurerm_spring_cloud_api_portal | Ensures Spring Cloud API Portal Public Access Is Disabled | Terraform |
1470 | CKV2_AZURE_1 | resource | azurerm_storage_account | Ensure storage for critical data are encrypted with Customer Managed Key | Terraform |
1471 | CKV2_AZURE_2 | resource | azurerm_mssql_server_security_alert_policy | Ensure that Vulnerability Assessment (VA) is enabled on a SQL server by setting a Storage Account | Terraform |
1472 | CKV2_AZURE_2 | resource | azurerm_sql_server | Ensure that Vulnerability Assessment (VA) is enabled on a SQL server by setting a Storage Account | Terraform |
1473 | CKV2_AZURE_3 | resource | azurerm_mssql_server | Ensure that VA setting Periodic Recurring Scans is enabled on a SQL server | Terraform |
1474 | CKV2_AZURE_3 | resource | azurerm_mssql_server_security_alert_policy | Ensure that VA setting Periodic Recurring Scans is enabled on a SQL server | Terraform |
1475 | CKV2_AZURE_3 | resource | azurerm_mssql_server_vulnerability_assessment | Ensure that VA setting Periodic Recurring Scans is enabled on a SQL server | Terraform |
1476 | CKV2_AZURE_3 | resource | azurerm_sql_server | Ensure that VA setting Periodic Recurring Scans is enabled on a SQL server | Terraform |
1477 | CKV2_AZURE_4 | resource | azurerm_mssql_server | Ensure Azure SQL server ADS VA Send scan reports to is configured | Terraform |
1478 | CKV2_AZURE_4 | resource | azurerm_mssql_server_security_alert_policy | Ensure Azure SQL server ADS VA Send scan reports to is configured | Terraform |
1479 | CKV2_AZURE_4 | resource | azurerm_mssql_server_vulnerability_assessment | Ensure Azure SQL server ADS VA Send scan reports to is configured | Terraform |
1480 | CKV2_AZURE_4 | resource | azurerm_sql_server | Ensure Azure SQL server ADS VA Send scan reports to is configured | Terraform |
1481 | CKV2_AZURE_5 | resource | azurerm_mssql_server | Ensure that VA setting 'Also send email notifications to admins and subscription owners' is set for a SQL server | Terraform |
1482 | CKV2_AZURE_5 | resource | azurerm_mssql_server_security_alert_policy | Ensure that VA setting 'Also send email notifications to admins and subscription owners' is set for a SQL server | Terraform |
1483 | CKV2_AZURE_5 | resource | azurerm_mssql_server_vulnerability_assessment | Ensure that VA setting 'Also send email notifications to admins and subscription owners' is set for a SQL server | Terraform |
1484 | CKV2_AZURE_5 | resource | azurerm_sql_server | Ensure that VA setting 'Also send email notifications to admins and subscription owners' is set for a SQL server | Terraform |
1485 | CKV2_AZURE_6 | resource | azurerm_sql_firewall_rule | Ensure 'Allow access to Azure services' for PostgreSQL Database Server is disabled | Terraform |
1486 | CKV2_AZURE_6 | resource | azurerm_sql_server | Ensure 'Allow access to Azure services' for PostgreSQL Database Server is disabled | Terraform |
1487 | CKV2_AZURE_7 | resource | azurerm_sql_server | Ensure that Azure Active Directory Admin is configured | Terraform |
1488 | CKV2_AZURE_8 | resource | azurerm_monitor_activity_log_alert | Ensure the storage container storing the activity logs is not publicly accessible | Terraform |
1489 | CKV2_AZURE_8 | resource | azurerm_storage_account | Ensure the storage container storing the activity logs is not publicly accessible | Terraform |
1490 | CKV2_AZURE_8 | resource | azurerm_storage_container | Ensure the storage container storing the activity logs is not publicly accessible | Terraform |
1491 | CKV2_AZURE_9 | resource | azurerm_virtual_machine | Ensure Virtual Machines are utilizing Managed Disks | Terraform |
1492 | CKV2_AZURE_10 | resource | azurerm_virtual_machine | Ensure that Microsoft Antimalware is configured to automatically updates for Virtual Machines | Terraform |
1493 | CKV2_AZURE_10 | resource | azurerm_virtual_machine_extension | Ensure that Microsoft Antimalware is configured to automatically updates for Virtual Machines | Terraform |
1494 | CKV2_AZURE_11 | resource | azurerm_kusto_cluster | Ensure that Azure Data Explorer encryption at rest uses a customer-managed key | Terraform |
1495 | CKV2_AZURE_12 | resource | azurerm_virtual_machine | Ensure that virtual machines are backed up using Azure Backup | Terraform |
1496 | CKV2_AZURE_13 | resource | azurerm_mssql_server_security_alert_policy | Ensure that sql servers enables data security policy | Terraform |
1497 | CKV2_AZURE_13 | resource | azurerm_sql_server | Ensure that sql servers enables data security policy | Terraform |
1498 | CKV2_AZURE_14 | resource | azurerm_managed_disk | Ensure that Unattached disks are encrypted | Terraform |
1499 | CKV2_AZURE_14 | resource | azurerm_virtual_machine | Ensure that Unattached disks are encrypted | Terraform |
1500 | CKV2_AZURE_15 | resource | azurerm_data_factory | Ensure that Azure data factories are encrypted with a customer-managed key | Terraform |
1501 | CKV2_AZURE_16 | resource | azurerm_mysql_server | Ensure that MySQL server enables customer-managed key for encryption | Terraform |
1502 | CKV2_AZURE_16 | resource | azurerm_mysql_server_key | Ensure that MySQL server enables customer-managed key for encryption | Terraform |
1503 | CKV2_AZURE_17 | resource | azurerm_postgresql_server | Ensure that PostgreSQL server enables customer-managed key for encryption | Terraform |
1504 | CKV2_AZURE_17 | resource | azurerm_postgresql_server_key | Ensure that PostgreSQL server enables customer-managed key for encryption | Terraform |
1505 | CKV2_AZURE_18 | resource | azurerm_storage_account | Ensure that Storage Accounts use customer-managed key for encryption | Terraform |
1506 | CKV2_AZURE_18 | resource | azurerm_storage_account_customer_managed_key | Ensure that Storage Accounts use customer-managed key for encryption | Terraform |
1507 | CKV2_AZURE_19 | resource | azurerm_synapse_workspace | Ensure that Azure Synapse workspaces have no IP firewall rules attached | Terraform |
1508 | CKV2_AZURE_20 | resource | azurerm_log_analytics_storage_insights | Ensure Storage logging is enabled for Table service for read requests | Terraform |
1509 | CKV2_AZURE_20 | resource | azurerm_storage_account | Ensure Storage logging is enabled for Table service for read requests | Terraform |
1510 | CKV2_AZURE_20 | resource | azurerm_storage_table | Ensure Storage logging is enabled for Table service for read requests | Terraform |
1511 | CKV2_AZURE_21 | resource | azurerm_log_analytics_storage_insights | Ensure Storage logging is enabled for Blob service for read requests | Terraform |
1512 | CKV2_AZURE_21 | resource | azurerm_storage_account | Ensure Storage logging is enabled for Blob service for read requests | Terraform |
1513 | CKV2_AZURE_21 | resource | azurerm_storage_container | Ensure Storage logging is enabled for Blob service for read requests | Terraform |
1514 | CKV2_AZURE_22 | resource | azurerm_cognitive_account | Ensure that Cognitive Services enables customer-managed key for encryption | Terraform |
1515 | CKV2_AZURE_22 | resource | azurerm_cognitive_account_customer_managed_key | Ensure that Cognitive Services enables customer-managed key for encryption | Terraform |
1516 | CKV_BCW_1 | provider | bridgecrew | Ensure no hard coded API token exist in the provider | Terraform |
1517 | CKV_BITBUCKET_1 | bitbucket_configuration | * | Merge requests should require at least 2 approvals | bitbucket_configuration |
1518 | CKV_BITBUCKETPIPELINES_1 | bitbucket_pipelines | [{image:image,startline:startline,endline:endline}] | Ensure the pipeline image uses a non latest version tag | bitbucket_pipelines |
1519 | CKV_BITBUCKETPIPELINES_1 | bitbucket_pipelines | pipelines..[][][][].step.{image: image, startline: startline, endline:endline} | Ensure the pipeline image uses a non latest version tag | bitbucket_pipelines |
1520 | CKV_BITBUCKETPIPELINES_1 | bitbucket_pipelines | pipelines.default[].step.{image: image, startline: startline, endline:endline} | Ensure the pipeline image uses a non latest version tag | bitbucket_pipelines |
1521 | CKV_CIRCLECIPIPELINES_1 | circleci_pipelines | jobs.*.docker[].{image: image, startline: startline, endline:endline} | Ensure the pipeline image uses a non latest version tag | circleci_pipelines |
1522 | CKV_CIRCLECIPIPELINES_2 | circleci_pipelines | jobs.*.docker[].{image: image, startline: startline, endline:endline} | Ensure the pipeline image version is referenced via hash not arbitrary tag. | circleci_pipelines |
1523 | CKV_CIRCLECIPIPELINES_3 | circleci_pipelines | orbs.{orbs: @} | Ensure mutable development orbs are not used. | circleci_pipelines |
1524 | CKV_CIRCLECIPIPELINES_4 | circleci_pipelines | orbs.{orbs: @} | Ensure unversioned volatile orbs are not used. | circleci_pipelines |
1525 | CKV_CIRCLECIPIPELINES_5 | circleci_pipelines | jobs.*.steps[] | Suspicious use of netcat with IP address | circleci_pipelines |
1526 | CKV_CIRCLECIPIPELINES_6 | circleci_pipelines | jobs.*.steps[] | Ensure run commands are not vulnerable to shell injection | circleci_pipelines |
1527 | CKV_CIRCLECIPIPELINES_7 | circleci_pipelines | jobs.*.steps[] | Suspicious use of curl in run task | circleci_pipelines |
1528 | CKV_DIO_1 | resource | digitalocean_spaces_bucket | Ensure the Spaces bucket has versioning enabled | Terraform |
1529 | CKV_DIO_2 | resource | digitalocean_droplet | Ensure the droplet specifies an SSH key | Terraform |
1530 | CKV_DIO_3 | resource | digitalocean_spaces_bucket | Ensure the Spaces bucket is private | Terraform |
1531 | CKV_DIO_4 | resource | digitalocean_firewall | Ensure the firewall ingress is not wide open | Terraform |
1532 | CKV_DOCKER_1 | dockerfile | EXPOSE | Ensure port 22 is not exposed | dockerfile |
1533 | CKV_DOCKER_2 | dockerfile | * | Ensure that HEALTHCHECK instructions have been added to container images | dockerfile |
1534 | CKV_DOCKER_3 | dockerfile | * | Ensure that a user for the container has been created | dockerfile |
1535 | CKV_DOCKER_4 | dockerfile | ADD | Ensure that COPY is used instead of ADD in Dockerfiles | dockerfile |
1536 | CKV_DOCKER_5 | dockerfile | RUN | Ensure update instructions are not use alone in the Dockerfile | dockerfile |
1537 | CKV_DOCKER_6 | dockerfile | MAINTAINER | Ensure that LABEL maintainer is used instead of MAINTAINER (deprecated) | dockerfile |
1538 | CKV_DOCKER_7 | dockerfile | FROM | Ensure the base image uses a non latest version tag | dockerfile |
1539 | CKV_DOCKER_8 | dockerfile | USER | Ensure the last USER is not root | dockerfile |
1540 | CKV_DOCKER_9 | dockerfile | RUN | Ensure that APT isn't used | dockerfile |
1541 | CKV_DOCKER_10 | dockerfile | WORKDIR | Ensure that WORKDIR values are absolute paths | dockerfile |
1542 | CKV_DOCKER_11 | dockerfile | FROM | Ensure From Alias are unique for multistage builds. | dockerfile |
1543 | CKV_GCP_1 | resource | google_container_cluster | Ensure Stackdriver Logging is set to Enabled on Kubernetes Engine Clusters | Terraform |
1544 | CKV_GCP_2 | resource | google_compute_firewall | Ensure Google compute firewall ingress does not allow unrestricted ssh access | Terraform |
1545 | CKV_GCP_3 | resource | google_compute_firewall | Ensure Google compute firewall ingress does not allow unrestricted rdp access | Terraform |
1546 | CKV_GCP_4 | resource | google_compute_ssl_policy | Ensure no HTTPS or SSL proxy load balancers permit SSL policies with weak cipher suites | Terraform |
1547 | CKV_GCP_6 | resource | google_sql_database_instance | Ensure all Cloud SQL database instance requires all incoming connections to use SSL | Terraform |
1548 | CKV_GCP_7 | resource | google_container_cluster | Ensure Legacy Authorization is set to Disabled on Kubernetes Engine Clusters | Terraform |
1549 | CKV_GCP_8 | resource | google_container_cluster | Ensure Stackdriver Monitoring is set to Enabled on Kubernetes Engine Clusters | Terraform |
1550 | CKV_GCP_9 | resource | google_container_node_pool | Ensure 'Automatic node repair' is enabled for Kubernetes Clusters | Terraform |
1551 | CKV_GCP_10 | resource | google_container_node_pool | Ensure 'Automatic node upgrade' is enabled for Kubernetes Clusters | Terraform |
1552 | CKV_GCP_11 | resource | google_sql_database_instance | Ensure that Cloud SQL database Instances are not open to the world | Terraform |
1553 | CKV_GCP_12 | resource | google_container_cluster | Ensure Network Policy is enabled on Kubernetes Engine Clusters | Terraform |
1554 | CKV_GCP_13 | resource | google_container_cluster | Ensure client certificate authentication to Kubernetes Engine Clusters is disabled | Terraform |
1555 | CKV_GCP_14 | resource | google_sql_database_instance | Ensure all Cloud SQL database instance have backup configuration enabled | Terraform |
1556 | CKV_GCP_15 | resource | google_bigquery_dataset | Ensure that BigQuery datasets are not anonymously or publicly accessible | Terraform |
1557 | CKV_GCP_16 | resource | google_dns_managed_zone | Ensure that DNSSEC is enabled for Cloud DNS | Terraform |
1558 | CKV_GCP_17 | resource | google_dns_managed_zone | Ensure that RSASHA1 is not used for the zone-signing and key-signing keys in Cloud DNS DNSSEC | Terraform |
1559 | CKV_GCP_18 | resource | google_container_cluster | Ensure GKE Control Plane is not public | Terraform |
1560 | CKV_GCP_19 | resource | google_container_cluster | Ensure GKE basic auth is disabled | Terraform |
1561 | CKV_GCP_20 | resource | google_container_cluster | Ensure master authorized networks is set to enabled in GKE clusters | Terraform |
1562 | CKV_GCP_21 | resource | google_container_cluster | Ensure Kubernetes Clusters are configured with Labels | Terraform |
1563 | CKV_GCP_22 | resource | google_container_node_pool | Ensure Container-Optimized OS (cos) is used for Kubernetes Engine Clusters Node image | Terraform |
1564 | CKV_GCP_23 | resource | google_container_cluster | Ensure Kubernetes Cluster is created with Alias IP ranges enabled | Terraform |
1565 | CKV_GCP_24 | resource | google_container_cluster | Ensure PodSecurityPolicy controller is enabled on the Kubernetes Engine Clusters | Terraform |
1566 | CKV_GCP_25 | resource | google_container_cluster | Ensure Kubernetes Cluster is created with Private cluster enabled | Terraform |
1567 | CKV_GCP_26 | resource | google_compute_subnetwork | Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network | Terraform |
1568 | CKV_GCP_27 | resource | google_project | Ensure that the default network does not exist in a project | Terraform |
1569 | CKV_GCP_28 | resource | google_storage_bucket_iam_binding | Ensure that Cloud Storage bucket is not anonymously or publicly accessible | Terraform |
1570 | CKV_GCP_28 | resource | google_storage_bucket_iam_member | Ensure that Cloud Storage bucket is not anonymously or publicly accessible | Terraform |
1571 | CKV_GCP_29 | resource | google_storage_bucket | Ensure that Cloud Storage buckets have uniform bucket-level access enabled | Terraform |
1572 | CKV_GCP_30 | resource | google_compute_instance | Ensure that instances are not configured to use the default service account | Terraform |
1573 | CKV_GCP_30 | resource | google_compute_instance_from_template | Ensure that instances are not configured to use the default service account | Terraform |
1574 | CKV_GCP_30 | resource | google_compute_instance_template | Ensure that instances are not configured to use the default service account | Terraform |
1575 | CKV_GCP_31 | resource | google_compute_instance | Ensure that instances are not configured to use the default service account with full access to all Cloud APIs | Terraform |
1576 | CKV_GCP_31 | resource | google_compute_instance_from_template | Ensure that instances are not configured to use the default service account with full access to all Cloud APIs | Terraform |
1577 | CKV_GCP_31 | resource | google_compute_instance_template | Ensure that instances are not configured to use the default service account with full access to all Cloud APIs | Terraform |
1578 | CKV_GCP_32 | resource | google_compute_instance | Ensure 'Block Project-wide SSH keys' is enabled for VM instances | Terraform |
1579 | CKV_GCP_32 | resource | google_compute_instance_from_template | Ensure 'Block Project-wide SSH keys' is enabled for VM instances | Terraform |
1580 | CKV_GCP_32 | resource | google_compute_instance_template | Ensure 'Block Project-wide SSH keys' is enabled for VM instances | Terraform |
1581 | CKV_GCP_33 | resource | google_compute_project_metadata | Ensure oslogin is enabled for a Project | Terraform |
1582 | CKV_GCP_34 | resource | google_compute_instance | Ensure that no instance in the project overrides the project setting for enabling OSLogin(OSLogin needs to be enabled in project metadata for all instances) | Terraform |
1583 | CKV_GCP_34 | resource | google_compute_instance_from_template | Ensure that no instance in the project overrides the project setting for enabling OSLogin(OSLogin needs to be enabled in project metadata for all instances) | Terraform |
1584 | CKV_GCP_34 | resource | google_compute_instance_template | Ensure that no instance in the project overrides the project setting for enabling OSLogin(OSLogin needs to be enabled in project metadata for all instances) | Terraform |
1585 | CKV_GCP_35 | resource | google_compute_instance | Ensure 'Enable connecting to serial ports' is not enabled for VM Instance | Terraform |
1586 | CKV_GCP_35 | resource | google_compute_instance_from_template | Ensure 'Enable connecting to serial ports' is not enabled for VM Instance | Terraform |
1587 | CKV_GCP_35 | resource | google_compute_instance_template | Ensure 'Enable connecting to serial ports' is not enabled for VM Instance | Terraform |
1588 | CKV_GCP_36 | resource | google_compute_instance | Ensure that IP forwarding is not enabled on Instances | Terraform |
1589 | CKV_GCP_36 | resource | google_compute_instance_from_template | Ensure that IP forwarding is not enabled on Instances | Terraform |
1590 | CKV_GCP_36 | resource | google_compute_instance_template | Ensure that IP forwarding is not enabled on Instances | Terraform |
1591 | CKV_GCP_37 | resource | google_compute_disk | Ensure VM disks for critical VMs are encrypted with Customer Supplied Encryption Keys (CSEK) | Terraform |
1592 | CKV_GCP_38 | resource | google_compute_instance | Ensure VM disks for critical VMs are encrypted with Customer Supplied Encryption Keys (CSEK) | Terraform |
1593 | CKV_GCP_39 | resource | google_compute_instance | Ensure Compute instances are launched with Shielded VM enabled | Terraform |
1594 | CKV_GCP_39 | resource | google_compute_instance_from_template | Ensure Compute instances are launched with Shielded VM enabled | Terraform |
1595 | CKV_GCP_39 | resource | google_compute_instance_template | Ensure Compute instances are launched with Shielded VM enabled | Terraform |
1596 | CKV_GCP_40 | resource | google_compute_instance | Ensure that Compute instances do not have public IP addresses | Terraform |
1597 | CKV_GCP_40 | resource | google_compute_instance_from_template | Ensure that Compute instances do not have public IP addresses | Terraform |
1598 | CKV_GCP_40 | resource | google_compute_instance_template | Ensure that Compute instances do not have public IP addresses | Terraform |
1599 | CKV_GCP_41 | resource | google_project_iam_binding | Ensure that IAM users are not assigned the Service Account User or Service Account Token Creator roles at project level | Terraform |
1600 | CKV_GCP_41 | resource | google_project_iam_member | Ensure that IAM users are not assigned the Service Account User or Service Account Token Creator roles at project level | Terraform |
1601 | CKV_GCP_42 | resource | google_project_iam_member | Ensure that Service Account has no Admin privileges | Terraform |
1602 | CKV_GCP_43 | resource | google_kms_crypto_key | Ensure KMS encryption keys are rotated within a period of 90 days | Terraform |
1603 | CKV_GCP_44 | resource | google_folder_iam_binding | Ensure no roles that enable to impersonate and manage all service accounts are used at a folder level | Terraform |
1604 | CKV_GCP_44 | resource | google_folder_iam_member | Ensure no roles that enable to impersonate and manage all service accounts are used at a folder level | Terraform |
1605 | CKV_GCP_45 | resource | google_organization_iam_binding | Ensure no roles that enable to impersonate and manage all service accounts are used at an organization level | Terraform |
1606 | CKV_GCP_45 | resource | google_organization_iam_member | Ensure no roles that enable to impersonate and manage all service accounts are used at an organization level | Terraform |
1607 | CKV_GCP_46 | resource | google_project_iam_binding | Ensure Default Service account is not used at a project level | Terraform |
1608 | CKV_GCP_46 | resource | google_project_iam_member | Ensure Default Service account is not used at a project level | Terraform |
1609 | CKV_GCP_47 | resource | google_organization_iam_binding | Ensure default service account is not used at an organization level | Terraform |
1610 | CKV_GCP_47 | resource | google_organization_iam_member | Ensure default service account is not used at an organization level | Terraform |
1611 | CKV_GCP_48 | resource | google_folder_iam_binding | Ensure Default Service account is not used at a folder level | Terraform |
1612 | CKV_GCP_48 | resource | google_folder_iam_member | Ensure Default Service account is not used at a folder level | Terraform |
1613 | CKV_GCP_49 | resource | google_project_iam_binding | Ensure roles do not impersonate or manage Service Accounts used at project level | Terraform |
1614 | CKV_GCP_49 | resource | google_project_iam_member | Ensure roles do not impersonate or manage Service Accounts used at project level | Terraform |
1615 | CKV_GCP_50 | resource | google_sql_database_instance | Ensure MySQL database 'local_infile' flag is set to 'off' | Terraform |
1616 | CKV_GCP_51 | resource | google_sql_database_instance | Ensure PostgreSQL database 'log_checkpoints' flag is set to 'on' | Terraform |
1617 | CKV_GCP_52 | resource | google_sql_database_instance | Ensure PostgreSQL database 'log_connections' flag is set to 'on' | Terraform |
1618 | CKV_GCP_53 | resource | google_sql_database_instance | Ensure PostgreSQL database 'log_disconnections' flag is set to 'on' | Terraform |
1619 | CKV_GCP_54 | resource | google_sql_database_instance | Ensure PostgreSQL database 'log_lock_waits' flag is set to 'on' | Terraform |
1620 | CKV_GCP_55 | resource | google_sql_database_instance | Ensure PostgreSQL database 'log_min_messages' flag is set to a valid value | Terraform |
1621 | CKV_GCP_56 | resource | google_sql_database_instance | Ensure PostgreSQL database 'log_temp_files flag is set to '0' | Terraform |
1622 | CKV_GCP_57 | resource | google_sql_database_instance | Ensure PostgreSQL database 'log_min_duration_statement' flag is set to '-1' | Terraform |
1623 | CKV_GCP_58 | resource | google_sql_database_instance | Ensure SQL database 'cross db ownership chaining' flag is set to 'off' | Terraform |
1624 | CKV_GCP_59 | resource | google_sql_database_instance | Ensure SQL database 'contained database authentication' flag is set to 'off' | Terraform |
1625 | CKV_GCP_60 | resource | google_sql_database_instance | Ensure Cloud SQL database does not have public IP | Terraform |
1626 | CKV_GCP_61 | resource | google_container_cluster | Enable VPC Flow Logs and Intranode Visibility | Terraform |
1627 | CKV_GCP_62 | resource | google_storage_bucket | Bucket should log access | Terraform |
1628 | CKV_GCP_63 | resource | google_storage_bucket | Bucket should not log to itself | Terraform |
1629 | CKV_GCP_64 | resource | google_container_cluster | Ensure clusters are created with Private Nodes | Terraform |
1630 | CKV_GCP_65 | resource | google_container_cluster | Manage Kubernetes RBAC users with Google Groups for GKE | Terraform |
1631 | CKV_GCP_66 | resource | google_container_cluster | Ensure use of Binary Authorization | Terraform |
1632 | CKV_GCP_67 | resource | google_container_cluster | Ensure legacy Compute Engine instance metadata APIs are Disabled | Terraform |
1633 | CKV_GCP_68 | resource | google_container_cluster | Ensure Secure Boot for Shielded GKE Nodes is Enabled | Terraform |
1634 | CKV_GCP_68 | resource | google_container_node_pool | Ensure Secure Boot for Shielded GKE Nodes is Enabled | Terraform |
1635 | CKV_GCP_69 | resource | google_container_cluster | Ensure the GKE Metadata Server is Enabled | Terraform |
1636 | CKV_GCP_69 | resource | google_container_node_pool | Ensure the GKE Metadata Server is Enabled | Terraform |
1637 | CKV_GCP_70 | resource | google_container_cluster | Ensure the GKE Release Channel is set | Terraform |
1638 | CKV_GCP_71 | resource | google_container_cluster | Ensure Shielded GKE Nodes are Enabled | Terraform |
1639 | CKV_GCP_72 | resource | google_container_cluster | Ensure Integrity Monitoring for Shielded GKE Nodes is Enabled | Terraform |
1640 | CKV_GCP_72 | resource | google_container_node_pool | Ensure Integrity Monitoring for Shielded GKE Nodes is Enabled | Terraform |
1641 | CKV_GCP_73 | resource | google_compute_security_policy | Ensure Cloud Armor prevents message lookup in Log4j2. See CVE-2021-44228 aka log4jshell | Terraform |
1642 | CKV_GCP_74 | resource | google_compute_subnetwork | Ensure that private_ip_google_access is enabled for Subnet | Terraform |
1643 | CKV_GCP_75 | resource | google_compute_firewall | Ensure Google compute firewall ingress does not allow unrestricted FTP access | Terraform |
1644 | CKV_GCP_76 | resource | google_compute_subnetwork | Ensure that Private google access is enabled for IPV6 | Terraform |
1645 | CKV_GCP_77 | resource | google_compute_firewall | Ensure Google compute firewall ingress does not allow on ftp port | Terraform |
1646 | CKV_GCP_78 | resource | google_storage_bucket | Ensure Cloud storage has versioning enabled | Terraform |
1647 | CKV_GCP_79 | resource | google_sql_database_instance | Ensure SQL database is using latest Major version | Terraform |
1648 | CKV_GCP_80 | resource | google_bigquery_table | Ensure Big Query Tables are encrypted with Customer Supplied Encryption Keys (CSEK) | Terraform |
1649 | CKV_GCP_81 | resource | google_bigquery_dataset | Ensure Big Query Tables are encrypted with Customer Supplied Encryption Keys (CSEK) | Terraform |
1650 | CKV_GCP_82 | resource | google_kms_crypto_key | Ensure KMS keys are protected from deletion | Terraform |
1651 | CKV_GCP_83 | resource | google_pubsub_topic | Ensure PubSub Topics are encrypted with Customer Supplied Encryption Keys (CSEK) | Terraform |
1652 | CKV_GCP_84 | resource | google_artifact_registry_repository | Ensure Artifact Registry Repositories are encrypted with Customer Supplied Encryption Keys (CSEK) | Terraform |
1653 | CKV_GCP_85 | resource | google_bigtable_instance | Ensure Big Table Instances are encrypted with Customer Supplied Encryption Keys (CSEK) | Terraform |
1654 | CKV_GCP_86 | resource | google_cloudbuild_worker_pool | Ensure Cloud build workers are private | Terraform |
1655 | CKV_GCP_87 | resource | google_data_fusion_instance | Ensure Data fusion instances are private | Terraform |
1656 | CKV_GCP_88 | resource | google_compute_firewall | Ensure Google compute firewall ingress does not allow unrestricted mysql access | Terraform |
1657 | CKV_GCP_89 | resource | google_notebooks_instance | Ensure Vertex AI instances are private | Terraform |
1658 | CKV_GCP_90 | resource | google_dataflow_job | Ensure data flow jobs are encrypted with Customer Supplied Encryption Keys (CSEK) | Terraform |
1659 | CKV_GCP_91 | resource | google_dataproc_cluster | Ensure Dataproc cluster is encrypted with Customer Supplied Encryption Keys (CSEK) | Terraform |
1660 | CKV_GCP_92 | resource | google_vertex_ai_dataset | Ensure Vertex AI datasets uses a CMK (Customer Manager Key) | Terraform |
1661 | CKV_GCP_93 | resource | google_spanner_database | Ensure Spanner Database is encrypted with Customer Supplied Encryption Keys (CSEK) | Terraform |
1662 | CKV_GCP_94 | resource | google_dataflow_job | Ensure Dataflow jobs are private | Terraform |
1663 | CKV_GCP_95 | resource | google_redis_instance | Ensure Memorystore for Redis has AUTH enabled | Terraform |
1664 | CKV_GCP_96 | resource | google_vertex_ai_metadata_store | Ensure Vertex AI Metadata Store uses a CMK (Customer Manager Key) | Terraform |
1665 | CKV_GCP_97 | resource | google_redis_instance | Ensure Memorystore for Redis uses intransit encryption | Terraform |
1666 | CKV_GCP_98 | resource | google_dataproc_cluster_iam_binding | Ensure that Dataproc clusters are not anonymously or publicly accessible | Terraform |
1667 | CKV_GCP_98 | resource | google_dataproc_cluster_iam_member | Ensure that Dataproc clusters are not anonymously or publicly accessible | Terraform |
1668 | CKV_GCP_99 | resource | google_pubsub_topic_iam_binding | Ensure that Pub/Sub Topics are not anonymously or publicly accessible | Terraform |
1669 | CKV_GCP_99 | resource | google_pubsub_topic_iam_member | Ensure that Pub/Sub Topics are not anonymously or publicly accessible | Terraform |
1670 | CKV_GCP_100 | resource | google_bigquery_table_iam_binding | Ensure that BigQuery Tables are not anonymously or publicly accessible | Terraform |
1671 | CKV_GCP_100 | resource | google_bigquery_table_iam_member | Ensure that BigQuery Tables are not anonymously or publicly accessible | Terraform |
1672 | CKV_GCP_101 | resource | google_artifact_registry_repository_iam_binding | Ensure that Artifact Registry repositories are not anonymously or publicly accessible | Terraform |
1673 | CKV_GCP_101 | resource | google_artifact_registry_repository_iam_member | Ensure that Artifact Registry repositories are not anonymously or publicly accessible | Terraform |
1674 | CKV_GCP_102 | resource | google_cloud_run_service_iam_binding | Ensure that GCP Cloud Run services are not anonymously or publicly accessible | Terraform |
1675 | CKV_GCP_102 | resource | google_cloud_run_service_iam_member | Ensure that GCP Cloud Run services are not anonymously or publicly accessible | Terraform |
1676 | CKV_GCP_103 | resource | google_dataproc_cluster | Ensure Dataproc Clusters do not have public IPs | Terraform |
1677 | CKV_GCP_104 | resource | google_data_fusion_instance | Ensure Datafusion has stack driver logging enabled | Terraform |
1678 | CKV_GCP_105 | resource | google_data_fusion_instance | Ensure Datafusion has stack driver monitoring enabled | Terraform |
1679 | CKV_GCP_106 | resource | google_compute_firewall | Ensure Google compute firewall ingress does not allow unrestricted http port 80 access | Terraform |
1680 | CKV_GCP_107 | resource | google_cloudfunctions_function_iam_binding | Cloud functions should not be public | Terraform |
1681 | CKV_GCP_107 | resource | google_cloudfunctions_function_iam_member | Cloud functions should not be public | Terraform |
1682 | CKV_GCP_108 | resource | google_sql_database_instance | Ensure hostnames are logged for GCP PostgreSQL databases | Terraform |
1683 | CKV_GCP_109 | resource | google_sql_database_instance | Ensure the GCP PostgreSQL database log levels are set to ERROR or lower | Terraform |
1684 | CKV_GCP_110 | resource | google_sql_database_instance | Ensure pgAudit is enabled for your GCP PostgreSQL database | Terraform |
1685 | CKV_GCP_111 | resource | google_sql_database_instance | Ensure GCP PostgreSQL logs SQL statements | Terraform |
1686 | CKV2_GCP_1 | resource | google_project_default_service_accounts | Ensure GKE clusters are not running using the Compute Engine default service account | Terraform |
1687 | CKV2_GCP_2 | resource | google_compute_network | Ensure legacy networks do not exist for a project | Terraform |
1688 | CKV2_GCP_3 | resource | google_service_account_key | Ensure that there are only GCP-managed service account keys for each service account | Terraform |
1689 | CKV2_GCP_4 | resource | google_logging_folder_sink | Ensure that retention policies on log buckets are configured using Bucket Lock | Terraform |
1690 | CKV2_GCP_4 | resource | google_logging_organization_sink | Ensure that retention policies on log buckets are configured using Bucket Lock | Terraform |
1691 | CKV2_GCP_4 | resource | google_logging_project_sink | Ensure that retention policies on log buckets are configured using Bucket Lock | Terraform |
1692 | CKV2_GCP_4 | resource | google_storage_bucket | Ensure that retention policies on log buckets are configured using Bucket Lock | Terraform |
1693 | CKV2_GCP_5 | resource | google_project | Ensure that Cloud Audit Logging is configured properly across all services and all users from a project | Terraform |
1694 | CKV2_GCP_5 | resource | google_project_iam_audit_config | Ensure that Cloud Audit Logging is configured properly across all services and all users from a project | Terraform |
1695 | CKV2_GCP_6 | resource | google_kms_crypto_key | Ensure that Cloud KMS cryptokeys are not anonymously or publicly accessible | Terraform |
1696 | CKV2_GCP_6 | resource | google_kms_crypto_key_iam_binding | Ensure that Cloud KMS cryptokeys are not anonymously or publicly accessible | Terraform |
1697 | CKV2_GCP_6 | resource | google_kms_crypto_key_iam_member | Ensure that Cloud KMS cryptokeys are not anonymously or publicly accessible | Terraform |
1698 | CKV2_GCP_7 | resource | google_sql_database_instance | Ensure that a MySQL database instance does not allow anyone to connect with administrative privileges | Terraform |
1699 | CKV2_GCP_7 | resource | google_sql_user | Ensure that a MySQL database instance does not allow anyone to connect with administrative privileges | Terraform |
1700 | CKV2_GCP_8 | resource | google_kms_key_ring | Ensure that Cloud KMS Key Rings are not anonymously or publicly accessible | Terraform |
1701 | CKV2_GCP_8 | resource | google_kms_key_ring_iam_binding | Ensure that Cloud KMS Key Rings are not anonymously or publicly accessible | Terraform |
1702 | CKV2_GCP_8 | resource | google_kms_key_ring_iam_member | Ensure that Cloud KMS Key Rings are not anonymously or publicly accessible | Terraform |
1703 | CKV2_GCP_9 | resource | google_container_registry | Ensure that Container Registry repositories are not anonymously or publicly accessible | Terraform |
1704 | CKV2_GCP_9 | resource | google_storage_bucket_iam_binding | Ensure that Container Registry repositories are not anonymously or publicly accessible | Terraform |
1705 | CKV2_GCP_9 | resource | google_storage_bucket_iam_member | Ensure that Container Registry repositories are not anonymously or publicly accessible | Terraform |
1706 | CKV_GHA_1 | jobs | jobs | Ensure ACTIONS_ALLOW_UNSECURE_COMMANDS isn't true on environment variables | github_actions |
1707 | CKV_GHA_1 | jobs | jobs.*.steps[] | Ensure ACTIONS_ALLOW_UNSECURE_COMMANDS isn't true on environment variables | github_actions |
1708 | CKV_GHA_2 | jobs | jobs | Ensure run commands are not vulnerable to shell injection | github_actions |
1709 | CKV_GHA_2 | jobs | jobs.*.steps[] | Ensure run commands are not vulnerable to shell injection | github_actions |
1710 | CKV_GHA_3 | jobs | jobs | Suspicious use of curl with secrets | github_actions |
1711 | CKV_GHA_3 | jobs | jobs.*.steps[] | Suspicious use of curl with secrets | github_actions |
1712 | CKV_GHA_4 | jobs | jobs | Suspicious use of netcat with IP address | github_actions |
1713 | CKV_GHA_4 | jobs | jobs.*.steps[] | Suspicious use of netcat with IP address | github_actions |
1714 | CKV_GHA_5 | jobs | jobs | Found artifact build without evidence of cosign sign execution in pipeline | github_actions |
1715 | CKV_GHA_6 | jobs | jobs | Found artifact build without evidence of cosign sbom attestation in pipeline | github_actions |
1716 | CKV_GHA_7 | jobs | on | The build output cannot be affected by user parameters other than the build entry point and the top-level source location. GitHub Actions workflow_dispatch inputs MUST be empty. | github_actions |
1717 | CKV_GIT_1 | resource | github_repository | Ensure GitHub repository is Private | Terraform |
1718 | CKV_GIT_2 | resource | github_repository_webhook | Ensure GitHub repository webhooks are using HTTPS | Terraform |
1719 | CKV_GIT_3 | resource | github_repository | Ensure GitHub repository has vulnerability alerts enabled | Terraform |
1720 | CKV_GIT_4 | resource | github_actions_environment_secret | Ensure GitHub Actions secrets are encrypted | Terraform |
1721 | CKV_GIT_4 | resource | github_actions_organization_secret | Ensure GitHub Actions secrets are encrypted | Terraform |
1722 | CKV_GIT_4 | resource | github_actions_secret | Ensure GitHub Actions secrets are encrypted | Terraform |
1723 | CKV_GIT_5 | resource | github_branch_protection | GitHub pull requests should require at least 2 approvals | Terraform |
1724 | CKV_GIT_5 | resource | github_branch_protection_v3 | GitHub pull requests should require at least 2 approvals | Terraform |
1725 | CKV_GIT_6 | resource | github_branch_protection | Ensure GitHub branch protection rules requires signed commits | Terraform |
1726 | CKV_GIT_6 | resource | github_branch_protection_v3 | Ensure GitHub branch protection rules requires signed commits | Terraform |
1727 | CKV2_GIT_1 | resource | github_repository | Ensure each Repository has branch protection associated | Terraform |
1728 | CKV_GITHUB_1 | github_configuration | * | Ensure GitHub organization security settings require 2FA | github_configuration |
1729 | CKV_GITHUB_2 | github_configuration | * | Ensure GitHub organization security settings require SSO | github_configuration |
1730 | CKV_GITHUB_3 | github_configuration | * | Ensure GitHub organization security settings has IP allow list enabled | github_configuration |
1731 | CKV_GITHUB_4 | github_configuration | * | Ensure GitHub branch protection rules requires signed commits | github_configuration |
1732 | CKV_GITHUB_5 | github_configuration | * | Ensure GitHub branch protection rules does not allow force pushes | github_configuration |
1733 | CKV_GITHUB_6 | github_configuration | * | Ensure GitHub organization webhooks are using HTTPS | github_configuration |
1734 | CKV_GITHUB_7 | github_configuration | * | Ensure GitHub repository webhooks are using HTTPS | github_configuration |
1735 | CKV_GITHUB_8 | github_configuration | * | Ensure GitHub branch protection rules requires linear history | github_configuration |
1736 | CKV_GITHUB_9 | github_configuration | * | Ensure 2 admins are set for each repository | github_configuration |
1737 | CKV_GITHUB_10 | github_configuration | * | Ensure branch protection rules are enforced on administrators | github_configuration |
1738 | CKV_GITLAB_1 | gitlab_configuration | * | Merge requests should require at least 2 approvals | gitlab_configuration |
1739 | CKV_GITLAB_2 | gitlab_configuration | * | Ensure all Gitlab groups require two factor authentication | gitlab_configuration |
1740 | CKV_GITLABCI_1 | jobs | *.script[] | Suspicious use of curl with CI environment variables in script | gitlab_ci |
1741 | CKV_GITLABCI_2 | jobs | *.rules | Avoid creating rules that generate double pipelines | gitlab_ci |
1742 | CKV_GLB_1 | resource | gitlab_project | Ensure at least two approving reviews are required to merge a GitLab MR | Terraform |
1743 | CKV_GLB_2 | resource | gitlab_branch_protection | Ensure GitLab branch protection rules does not allow force pushes | Terraform |
1744 | CKV_GLB_3 | resource | gitlab_project | Ensure GitLab prevent secrets is enabled | Terraform |
1745 | CKV_GLB_4 | resource | gitlab_project | Ensure GitLab commits are signed | Terraform |
1746 | CKV_K8S_1 | resource | PodSecurityPolicy | Do not admit containers wishing to share the host process ID namespace | Kubernetes |
1747 | CKV_K8S_1 | resource | kubernetes_pod_security_policy | Do not admit containers wishing to share the host process ID namespace | Terraform |
1748 | CKV_K8S_2 | resource | PodSecurityPolicy | Do not admit privileged containers | Kubernetes |
1749 | CKV_K8S_2 | resource | kubernetes_pod_security_policy | Do not admit privileged containers | Terraform |
1750 | CKV_K8S_3 | resource | PodSecurityPolicy | Do not admit containers wishing to share the host IPC namespace | Kubernetes |
1751 | CKV_K8S_3 | resource | kubernetes_pod_security_policy | Do not admit containers wishing to share the host IPC namespace | Terraform |
1752 | CKV_K8S_4 | resource | PodSecurityPolicy | Do not admit containers wishing to share the host network namespace | Kubernetes |
1753 | CKV_K8S_4 | resource | kubernetes_pod_security_policy | Do not admit containers wishing to share the host network namespace | Terraform |
1754 | CKV_K8S_5 | resource | PodSecurityPolicy | Containers should not run with allowPrivilegeEscalation | Kubernetes |
1755 | CKV_K8S_5 | resource | kubernetes_pod_security_policy | Containers should not run with allowPrivilegeEscalation | Terraform |
1756 | CKV_K8S_6 | resource | PodSecurityPolicy | Do not admit root containers | Kubernetes |
1757 | CKV_K8S_6 | resource | kubernetes_pod_security_policy | Do not admit root containers | Terraform |
1758 | CKV_K8S_7 | resource | PodSecurityPolicy | Do not admit containers with the NET_RAW capability | Kubernetes |
1759 | CKV_K8S_7 | resource | kubernetes_pod_security_policy | Do not admit containers with the NET_RAW capability | Terraform |
1760 | CKV_K8S_8 | resource | DaemonSet | Liveness Probe Should be Configured | Kubernetes |
1761 | CKV_K8S_8 | resource | Deployment | Liveness Probe Should be Configured | Kubernetes |
1762 | CKV_K8S_8 | resource | DeploymentConfig | Liveness Probe Should be Configured | Kubernetes |
1763 | CKV_K8S_8 | resource | Pod | Liveness Probe Should be Configured | Kubernetes |
1764 | CKV_K8S_8 | resource | PodTemplate | Liveness Probe Should be Configured | Kubernetes |
1765 | CKV_K8S_8 | resource | ReplicaSet | Liveness Probe Should be Configured | Kubernetes |
1766 | CKV_K8S_8 | resource | ReplicationController | Liveness Probe Should be Configured | Kubernetes |
1767 | CKV_K8S_8 | resource | StatefulSet | Liveness Probe Should be Configured | Kubernetes |
1768 | CKV_K8S_8 | resource | kubernetes_pod | Liveness Probe Should be Configured | Terraform |
1769 | CKV_K8S_9 | resource | DaemonSet | Readiness Probe Should be Configured | Kubernetes |
1770 | CKV_K8S_9 | resource | Deployment | Readiness Probe Should be Configured | Kubernetes |
1771 | CKV_K8S_9 | resource | DeploymentConfig | Readiness Probe Should be Configured | Kubernetes |
1772 | CKV_K8S_9 | resource | Pod | Readiness Probe Should be Configured | Kubernetes |
1773 | CKV_K8S_9 | resource | PodTemplate | Readiness Probe Should be Configured | Kubernetes |
1774 | CKV_K8S_9 | resource | ReplicaSet | Readiness Probe Should be Configured | Kubernetes |
1775 | CKV_K8S_9 | resource | ReplicationController | Readiness Probe Should be Configured | Kubernetes |
1776 | CKV_K8S_9 | resource | StatefulSet | Readiness Probe Should be Configured | Kubernetes |
1777 | CKV_K8S_9 | resource | kubernetes_pod | Readiness Probe Should be Configured | Terraform |
1778 | CKV_K8S_10 | resource | CronJob | CPU requests should be set | Kubernetes |
1779 | CKV_K8S_10 | resource | DaemonSet | CPU requests should be set | Kubernetes |
1780 | CKV_K8S_10 | resource | Deployment | CPU requests should be set | Kubernetes |
1781 | CKV_K8S_10 | resource | DeploymentConfig | CPU requests should be set | Kubernetes |
1782 | CKV_K8S_10 | resource | Job | CPU requests should be set | Kubernetes |
1783 | CKV_K8S_10 | resource | Pod | CPU requests should be set | Kubernetes |
1784 | CKV_K8S_10 | resource | PodTemplate | CPU requests should be set | Kubernetes |
1785 | CKV_K8S_10 | resource | ReplicaSet | CPU requests should be set | Kubernetes |
1786 | CKV_K8S_10 | resource | ReplicationController | CPU requests should be set | Kubernetes |
1787 | CKV_K8S_10 | resource | StatefulSet | CPU requests should be set | Kubernetes |
1788 | CKV_K8S_10 | resource | kubernetes_pod | CPU requests should be set | Terraform |
1789 | CKV_K8S_11 | resource | CronJob | CPU limits should be set | Kubernetes |
1790 | CKV_K8S_11 | resource | DaemonSet | CPU limits should be set | Kubernetes |
1791 | CKV_K8S_11 | resource | Deployment | CPU limits should be set | Kubernetes |
1792 | CKV_K8S_11 | resource | DeploymentConfig | CPU limits should be set | Kubernetes |
1793 | CKV_K8S_11 | resource | Job | CPU limits should be set | Kubernetes |
1794 | CKV_K8S_11 | resource | Pod | CPU limits should be set | Kubernetes |
1795 | CKV_K8S_11 | resource | PodTemplate | CPU limits should be set | Kubernetes |
1796 | CKV_K8S_11 | resource | ReplicaSet | CPU limits should be set | Kubernetes |
1797 | CKV_K8S_11 | resource | ReplicationController | CPU limits should be set | Kubernetes |
1798 | CKV_K8S_11 | resource | StatefulSet | CPU limits should be set | Kubernetes |
1799 | CKV_K8S_11 | resource | kubernetes_pod | CPU Limits should be set | Terraform |
1800 | CKV_K8S_12 | resource | CronJob | Memory requests should be set | Kubernetes |
1801 | CKV_K8S_12 | resource | DaemonSet | Memory requests should be set | Kubernetes |
1802 | CKV_K8S_12 | resource | Deployment | Memory requests should be set | Kubernetes |
1803 | CKV_K8S_12 | resource | DeploymentConfig | Memory requests should be set | Kubernetes |
1804 | CKV_K8S_12 | resource | Job | Memory requests should be set | Kubernetes |
1805 | CKV_K8S_12 | resource | Pod | Memory requests should be set | Kubernetes |
1806 | CKV_K8S_12 | resource | PodTemplate | Memory requests should be set | Kubernetes |
1807 | CKV_K8S_12 | resource | ReplicaSet | Memory requests should be set | Kubernetes |
1808 | CKV_K8S_12 | resource | ReplicationController | Memory requests should be set | Kubernetes |
1809 | CKV_K8S_12 | resource | StatefulSet | Memory requests should be set | Kubernetes |
1810 | CKV_K8S_12 | resource | kubernetes_pod | Memory Limits should be set | Terraform |
1811 | CKV_K8S_13 | resource | CronJob | Memory limits should be set | Kubernetes |
1812 | CKV_K8S_13 | resource | DaemonSet | Memory limits should be set | Kubernetes |
1813 | CKV_K8S_13 | resource | Deployment | Memory limits should be set | Kubernetes |
1814 | CKV_K8S_13 | resource | DeploymentConfig | Memory limits should be set | Kubernetes |
1815 | CKV_K8S_13 | resource | Job | Memory limits should be set | Kubernetes |
1816 | CKV_K8S_13 | resource | Pod | Memory limits should be set | Kubernetes |
1817 | CKV_K8S_13 | resource | PodTemplate | Memory limits should be set | Kubernetes |
1818 | CKV_K8S_13 | resource | ReplicaSet | Memory limits should be set | Kubernetes |
1819 | CKV_K8S_13 | resource | ReplicationController | Memory limits should be set | Kubernetes |
1820 | CKV_K8S_13 | resource | StatefulSet | Memory limits should be set | Kubernetes |
1821 | CKV_K8S_13 | resource | kubernetes_pod | Memory requests should be set | Terraform |
1822 | CKV_K8S_14 | resource | CronJob | Image Tag should be fixed - not latest or blank | Kubernetes |
1823 | CKV_K8S_14 | resource | DaemonSet | Image Tag should be fixed - not latest or blank | Kubernetes |
1824 | CKV_K8S_14 | resource | Deployment | Image Tag should be fixed - not latest or blank | Kubernetes |
1825 | CKV_K8S_14 | resource | DeploymentConfig | Image Tag should be fixed - not latest or blank | Kubernetes |
1826 | CKV_K8S_14 | resource | Job | Image Tag should be fixed - not latest or blank | Kubernetes |
1827 | CKV_K8S_14 | resource | Pod | Image Tag should be fixed - not latest or blank | Kubernetes |
1828 | CKV_K8S_14 | resource | PodTemplate | Image Tag should be fixed - not latest or blank | Kubernetes |
1829 | CKV_K8S_14 | resource | ReplicaSet | Image Tag should be fixed - not latest or blank | Kubernetes |
1830 | CKV_K8S_14 | resource | ReplicationController | Image Tag should be fixed - not latest or blank | Kubernetes |
1831 | CKV_K8S_14 | resource | StatefulSet | Image Tag should be fixed - not latest or blank | Kubernetes |
1832 | CKV_K8S_14 | resource | kubernetes_pod | Image Tag should be fixed - not latest or blank | Terraform |
1833 | CKV_K8S_15 | resource | CronJob | Image Pull Policy should be Always | Kubernetes |
1834 | CKV_K8S_15 | resource | DaemonSet | Image Pull Policy should be Always | Kubernetes |
1835 | CKV_K8S_15 | resource | Deployment | Image Pull Policy should be Always | Kubernetes |
1836 | CKV_K8S_15 | resource | DeploymentConfig | Image Pull Policy should be Always | Kubernetes |
1837 | CKV_K8S_15 | resource | Job | Image Pull Policy should be Always | Kubernetes |
1838 | CKV_K8S_15 | resource | Pod | Image Pull Policy should be Always | Kubernetes |
1839 | CKV_K8S_15 | resource | PodTemplate | Image Pull Policy should be Always | Kubernetes |
1840 | CKV_K8S_15 | resource | ReplicaSet | Image Pull Policy should be Always | Kubernetes |
1841 | CKV_K8S_15 | resource | ReplicationController | Image Pull Policy should be Always | Kubernetes |
1842 | CKV_K8S_15 | resource | StatefulSet | Image Pull Policy should be Always | Kubernetes |
1843 | CKV_K8S_15 | resource | kubernetes_pod | Image Pull Policy should be Always | Terraform |
1844 | CKV_K8S_16 | resource | CronJob | Container should not be privileged | Kubernetes |
1845 | CKV_K8S_16 | resource | DaemonSet | Container should not be privileged | Kubernetes |
1846 | CKV_K8S_16 | resource | Deployment | Container should not be privileged | Kubernetes |
1847 | CKV_K8S_16 | resource | DeploymentConfig | Container should not be privileged | Kubernetes |
1848 | CKV_K8S_16 | resource | Job | Container should not be privileged | Kubernetes |
1849 | CKV_K8S_16 | resource | Pod | Container should not be privileged | Kubernetes |
1850 | CKV_K8S_16 | resource | PodTemplate | Container should not be privileged | Kubernetes |
1851 | CKV_K8S_16 | resource | ReplicaSet | Container should not be privileged | Kubernetes |
1852 | CKV_K8S_16 | resource | ReplicationController | Container should not be privileged | Kubernetes |
1853 | CKV_K8S_16 | resource | StatefulSet | Container should not be privileged | Kubernetes |
1854 | CKV_K8S_16 | resource | kubernetes_pod | Do not admit privileged containers | Terraform |
1855 | CKV_K8S_17 | resource | CronJob | Containers should not share the host process ID namespace | Kubernetes |
1856 | CKV_K8S_17 | resource | DaemonSet | Containers should not share the host process ID namespace | Kubernetes |
1857 | CKV_K8S_17 | resource | Deployment | Containers should not share the host process ID namespace | Kubernetes |
1858 | CKV_K8S_17 | resource | Job | Containers should not share the host process ID namespace | Kubernetes |
1859 | CKV_K8S_17 | resource | Pod | Containers should not share the host process ID namespace | Kubernetes |
1860 | CKV_K8S_17 | resource | ReplicaSet | Containers should not share the host process ID namespace | Kubernetes |
1861 | CKV_K8S_17 | resource | ReplicationController | Containers should not share the host process ID namespace | Kubernetes |
1862 | CKV_K8S_17 | resource | StatefulSet | Containers should not share the host process ID namespace | Kubernetes |
1863 | CKV_K8S_17 | resource | kubernetes_pod | Do not admit containers wishing to share the host process ID namespace | Terraform |
1864 | CKV_K8S_18 | resource | CronJob | Containers should not share the host IPC namespace | Kubernetes |
1865 | CKV_K8S_18 | resource | DaemonSet | Containers should not share the host IPC namespace | Kubernetes |
1866 | CKV_K8S_18 | resource | Deployment | Containers should not share the host IPC namespace | Kubernetes |
1867 | CKV_K8S_18 | resource | Job | Containers should not share the host IPC namespace | Kubernetes |
1868 | CKV_K8S_18 | resource | Pod | Containers should not share the host IPC namespace | Kubernetes |
1869 | CKV_K8S_18 | resource | ReplicaSet | Containers should not share the host IPC namespace | Kubernetes |
1870 | CKV_K8S_18 | resource | ReplicationController | Containers should not share the host IPC namespace | Kubernetes |
1871 | CKV_K8S_18 | resource | StatefulSet | Containers should not share the host IPC namespace | Kubernetes |
1872 | CKV_K8S_18 | resource | kubernetes_pod | Do not admit containers wishing to share the host IPC namespace | Terraform |
1873 | CKV_K8S_19 | resource | CronJob | Containers should not share the host network namespace | Kubernetes |
1874 | CKV_K8S_19 | resource | DaemonSet | Containers should not share the host network namespace | Kubernetes |
1875 | CKV_K8S_19 | resource | Deployment | Containers should not share the host network namespace | Kubernetes |
1876 | CKV_K8S_19 | resource | Job | Containers should not share the host network namespace | Kubernetes |
1877 | CKV_K8S_19 | resource | Pod | Containers should not share the host network namespace | Kubernetes |
1878 | CKV_K8S_19 | resource | ReplicaSet | Containers should not share the host network namespace | Kubernetes |
1879 | CKV_K8S_19 | resource | ReplicationController | Containers should not share the host network namespace | Kubernetes |
1880 | CKV_K8S_19 | resource | StatefulSet | Containers should not share the host network namespace | Kubernetes |
1881 | CKV_K8S_19 | resource | kubernetes_pod | Do not admit containers wishing to share the host network namespace | Terraform |
1882 | CKV_K8S_20 | resource | CronJob | Containers should not run with allowPrivilegeEscalation | Kubernetes |
1883 | CKV_K8S_20 | resource | DaemonSet | Containers should not run with allowPrivilegeEscalation | Kubernetes |
1884 | CKV_K8S_20 | resource | Deployment | Containers should not run with allowPrivilegeEscalation | Kubernetes |
1885 | CKV_K8S_20 | resource | DeploymentConfig | Containers should not run with allowPrivilegeEscalation | Kubernetes |
1886 | CKV_K8S_20 | resource | Job | Containers should not run with allowPrivilegeEscalation | Kubernetes |
1887 | CKV_K8S_20 | resource | Pod | Containers should not run with allowPrivilegeEscalation | Kubernetes |
1888 | CKV_K8S_20 | resource | PodTemplate | Containers should not run with allowPrivilegeEscalation | Kubernetes |
1889 | CKV_K8S_20 | resource | ReplicaSet | Containers should not run with allowPrivilegeEscalation | Kubernetes |
1890 | CKV_K8S_20 | resource | ReplicationController | Containers should not run with allowPrivilegeEscalation | Kubernetes |
1891 | CKV_K8S_20 | resource | StatefulSet | Containers should not run with allowPrivilegeEscalation | Kubernetes |
1892 | CKV_K8S_20 | resource | kubernetes_pod | Containers should not run with allowPrivilegeEscalation | Terraform |
1893 | CKV_K8S_21 | resource | ConfigMap | The default namespace should not be used | Kubernetes |
1894 | CKV_K8S_21 | resource | CronJob | The default namespace should not be used | Kubernetes |
1895 | CKV_K8S_21 | resource | DaemonSet | The default namespace should not be used | Kubernetes |
1896 | CKV_K8S_21 | resource | Deployment | The default namespace should not be used | Kubernetes |
1897 | CKV_K8S_21 | resource | Ingress | The default namespace should not be used | Kubernetes |
1898 | CKV_K8S_21 | resource | Job | The default namespace should not be used | Kubernetes |
1899 | CKV_K8S_21 | resource | Pod | The default namespace should not be used | Kubernetes |
1900 | CKV_K8S_21 | resource | ReplicaSet | The default namespace should not be used | Kubernetes |
1901 | CKV_K8S_21 | resource | ReplicationController | The default namespace should not be used | Kubernetes |
1902 | CKV_K8S_21 | resource | Role | The default namespace should not be used | Kubernetes |
1903 | CKV_K8S_21 | resource | RoleBinding | The default namespace should not be used | Kubernetes |
1904 | CKV_K8S_21 | resource | Secret | The default namespace should not be used | Kubernetes |
1905 | CKV_K8S_21 | resource | Service | The default namespace should not be used | Kubernetes |
1906 | CKV_K8S_21 | resource | ServiceAccount | The default namespace should not be used | Kubernetes |
1907 | CKV_K8S_21 | resource | StatefulSet | The default namespace should not be used | Kubernetes |
1908 | CKV_K8S_21 | resource | kubernetes_config_map | The default namespace should not be used | Terraform |
1909 | CKV_K8S_21 | resource | kubernetes_cron_job | The default namespace should not be used | Terraform |
1910 | CKV_K8S_21 | resource | kubernetes_daemonset | The default namespace should not be used | Terraform |
1911 | CKV_K8S_21 | resource | kubernetes_deployment | The default namespace should not be used | Terraform |
1912 | CKV_K8S_21 | resource | kubernetes_ingress | The default namespace should not be used | Terraform |
1913 | CKV_K8S_21 | resource | kubernetes_job | The default namespace should not be used | Terraform |
1914 | CKV_K8S_21 | resource | kubernetes_pod | The default namespace should not be used | Terraform |
1915 | CKV_K8S_21 | resource | kubernetes_replication_controller | The default namespace should not be used | Terraform |
1916 | CKV_K8S_21 | resource | kubernetes_role_binding | The default namespace should not be used | Terraform |
1917 | CKV_K8S_21 | resource | kubernetes_secret | The default namespace should not be used | Terraform |
1918 | CKV_K8S_21 | resource | kubernetes_service | The default namespace should not be used | Terraform |
1919 | CKV_K8S_21 | resource | kubernetes_service_account | The default namespace should not be used | Terraform |
1920 | CKV_K8S_21 | resource | kubernetes_stateful_set | The default namespace should not be used | Terraform |
1921 | CKV_K8S_22 | resource | CronJob | Use read-only filesystem for containers where possible | Kubernetes |
1922 | CKV_K8S_22 | resource | DaemonSet | Use read-only filesystem for containers where possible | Kubernetes |
1923 | CKV_K8S_22 | resource | Deployment | Use read-only filesystem for containers where possible | Kubernetes |
1924 | CKV_K8S_22 | resource | DeploymentConfig | Use read-only filesystem for containers where possible | Kubernetes |
1925 | CKV_K8S_22 | resource | Job | Use read-only filesystem for containers where possible | Kubernetes |
1926 | CKV_K8S_22 | resource | Pod | Use read-only filesystem for containers where possible | Kubernetes |
1927 | CKV_K8S_22 | resource | PodTemplate | Use read-only filesystem for containers where possible | Kubernetes |
1928 | CKV_K8S_22 | resource | ReplicaSet | Use read-only filesystem for containers where possible | Kubernetes |
1929 | CKV_K8S_22 | resource | ReplicationController | Use read-only filesystem for containers where possible | Kubernetes |
1930 | CKV_K8S_22 | resource | StatefulSet | Use read-only filesystem for containers where possible | Kubernetes |
1931 | CKV_K8S_22 | resource | kubernetes_pod | Use read-only filesystem for containers where possible | Terraform |
1932 | CKV_K8S_23 | resource | CronJob | Minimize the admission of root containers | Kubernetes |
1933 | CKV_K8S_23 | resource | DaemonSet | Minimize the admission of root containers | Kubernetes |
1934 | CKV_K8S_23 | resource | Deployment | Minimize the admission of root containers | Kubernetes |
1935 | CKV_K8S_23 | resource | Job | Minimize the admission of root containers | Kubernetes |
1936 | CKV_K8S_23 | resource | Pod | Minimize the admission of root containers | Kubernetes |
1937 | CKV_K8S_23 | resource | ReplicaSet | Minimize the admission of root containers | Kubernetes |
1938 | CKV_K8S_23 | resource | ReplicationController | Minimize the admission of root containers | Kubernetes |
1939 | CKV_K8S_23 | resource | StatefulSet | Minimize the admission of root containers | Kubernetes |
1940 | CKV_K8S_24 | resource | PodSecurityPolicy | Do not allow containers with added capability | Kubernetes |
1941 | CKV_K8S_24 | resource | kubernetes_pod_security_policy | Do not allow containers with added capability | Terraform |
1942 | CKV_K8S_25 | resource | CronJob | Minimize the admission of containers with added capability | Kubernetes |
1943 | CKV_K8S_25 | resource | DaemonSet | Minimize the admission of containers with added capability | Kubernetes |
1944 | CKV_K8S_25 | resource | Deployment | Minimize the admission of containers with added capability | Kubernetes |
1945 | CKV_K8S_25 | resource | DeploymentConfig | Minimize the admission of containers with added capability | Kubernetes |
1946 | CKV_K8S_25 | resource | Job | Minimize the admission of containers with added capability | Kubernetes |
1947 | CKV_K8S_25 | resource | Pod | Minimize the admission of containers with added capability | Kubernetes |
1948 | CKV_K8S_25 | resource | PodTemplate | Minimize the admission of containers with added capability | Kubernetes |
1949 | CKV_K8S_25 | resource | ReplicaSet | Minimize the admission of containers with added capability | Kubernetes |
1950 | CKV_K8S_25 | resource | ReplicationController | Minimize the admission of containers with added capability | Kubernetes |
1951 | CKV_K8S_25 | resource | StatefulSet | Minimize the admission of containers with added capability | Kubernetes |
1952 | CKV_K8S_25 | resource | kubernetes_pod | Minimize the admission of containers with added capability | Terraform |
1953 | CKV_K8S_26 | resource | CronJob | Do not specify hostPort unless absolutely necessary | Kubernetes |
1954 | CKV_K8S_26 | resource | DaemonSet | Do not specify hostPort unless absolutely necessary | Kubernetes |
1955 | CKV_K8S_26 | resource | Deployment | Do not specify hostPort unless absolutely necessary | Kubernetes |
1956 | CKV_K8S_26 | resource | DeploymentConfig | Do not specify hostPort unless absolutely necessary | Kubernetes |
1957 | CKV_K8S_26 | resource | Job | Do not specify hostPort unless absolutely necessary | Kubernetes |
1958 | CKV_K8S_26 | resource | Pod | Do not specify hostPort unless absolutely necessary | Kubernetes |
1959 | CKV_K8S_26 | resource | PodTemplate | Do not specify hostPort unless absolutely necessary | Kubernetes |
1960 | CKV_K8S_26 | resource | ReplicaSet | Do not specify hostPort unless absolutely necessary | Kubernetes |
1961 | CKV_K8S_26 | resource | ReplicationController | Do not specify hostPort unless absolutely necessary | Kubernetes |
1962 | CKV_K8S_26 | resource | StatefulSet | Do not specify hostPort unless absolutely necessary | Kubernetes |
1963 | CKV_K8S_26 | resource | kubernetes_pod | Do not specify hostPort unless absolutely necessary | Terraform |
1964 | CKV_K8S_27 | resource | CronJob | Do not expose the docker daemon socket to containers | Kubernetes |
1965 | CKV_K8S_27 | resource | DaemonSet | Do not expose the docker daemon socket to containers | Kubernetes |
1966 | CKV_K8S_27 | resource | Deployment | Do not expose the docker daemon socket to containers | Kubernetes |
1967 | CKV_K8S_27 | resource | Job | Do not expose the docker daemon socket to containers | Kubernetes |
1968 | CKV_K8S_27 | resource | Pod | Do not expose the docker daemon socket to containers | Kubernetes |
1969 | CKV_K8S_27 | resource | ReplicaSet | Do not expose the docker daemon socket to containers | Kubernetes |
1970 | CKV_K8S_27 | resource | ReplicationController | Do not expose the docker daemon socket to containers | Kubernetes |
1971 | CKV_K8S_27 | resource | StatefulSet | Do not expose the docker daemon socket to containers | Kubernetes |
1972 | CKV_K8S_27 | resource | kubernetes_daemonset | Do not expose the docker daemon socket to containers | Terraform |
1973 | CKV_K8S_27 | resource | kubernetes_deployment | Do not expose the docker daemon socket to containers | Terraform |
1974 | CKV_K8S_27 | resource | kubernetes_pod | Do not expose the docker daemon socket to containers | Terraform |
1975 | CKV_K8S_28 | resource | CronJob | Minimize the admission of containers with the NET_RAW capability | Kubernetes |
1976 | CKV_K8S_28 | resource | DaemonSet | Minimize the admission of containers with the NET_RAW capability | Kubernetes |
1977 | CKV_K8S_28 | resource | Deployment | Minimize the admission of containers with the NET_RAW capability | Kubernetes |
1978 | CKV_K8S_28 | resource | DeploymentConfig | Minimize the admission of containers with the NET_RAW capability | Kubernetes |
1979 | CKV_K8S_28 | resource | Job | Minimize the admission of containers with the NET_RAW capability | Kubernetes |
1980 | CKV_K8S_28 | resource | Pod | Minimize the admission of containers with the NET_RAW capability | Kubernetes |
1981 | CKV_K8S_28 | resource | PodTemplate | Minimize the admission of containers with the NET_RAW capability | Kubernetes |
1982 | CKV_K8S_28 | resource | ReplicaSet | Minimize the admission of containers with the NET_RAW capability | Kubernetes |
1983 | CKV_K8S_28 | resource | ReplicationController | Minimize the admission of containers with the NET_RAW capability | Kubernetes |
1984 | CKV_K8S_28 | resource | StatefulSet | Minimize the admission of containers with the NET_RAW capability | Kubernetes |
1985 | CKV_K8S_28 | resource | kubernetes_pod | Minimize the admission of containers with the NET_RAW capability | Terraform |
1986 | CKV_K8S_29 | resource | CronJob | Apply security context to your pods and containers | Kubernetes |
1987 | CKV_K8S_29 | resource | DaemonSet | Apply security context to your pods and containers | Kubernetes |
1988 | CKV_K8S_29 | resource | Deployment | Apply security context to your pods and containers | Kubernetes |
1989 | CKV_K8S_29 | resource | Job | Apply security context to your pods and containers | Kubernetes |
1990 | CKV_K8S_29 | resource | Pod | Apply security context to your pods and containers | Kubernetes |
1991 | CKV_K8S_29 | resource | ReplicaSet | Apply security context to your pods and containers | Kubernetes |
1992 | CKV_K8S_29 | resource | ReplicationController | Apply security context to your pods and containers | Kubernetes |
1993 | CKV_K8S_29 | resource | StatefulSet | Apply security context to your pods and containers | Kubernetes |
1994 | CKV_K8S_29 | resource | kubernetes_daemonset | Apply security context to your pods and containers | Terraform |
1995 | CKV_K8S_29 | resource | kubernetes_deployment | Apply security context to your pods and containers | Terraform |
1996 | CKV_K8S_29 | resource | kubernetes_pod | Apply security context to your pods and containers | Terraform |
1997 | CKV_K8S_30 | resource | CronJob | Apply security context to your pods and containers | Kubernetes |
1998 | CKV_K8S_30 | resource | DaemonSet | Apply security context to your pods and containers | Kubernetes |
1999 | CKV_K8S_30 | resource | Deployment | Apply security context to your pods and containers | Kubernetes |
2000 | CKV_K8S_30 | resource | DeploymentConfig | Apply security context to your pods and containers | Kubernetes |
2001 | CKV_K8S_30 | resource | Job | Apply security context to your pods and containers | Kubernetes |
2002 | CKV_K8S_30 | resource | Pod | Apply security context to your pods and containers | Kubernetes |
2003 | CKV_K8S_30 | resource | PodTemplate | Apply security context to your pods and containers | Kubernetes |
2004 | CKV_K8S_30 | resource | ReplicaSet | Apply security context to your pods and containers | Kubernetes |
2005 | CKV_K8S_30 | resource | ReplicationController | Apply security context to your pods and containers | Kubernetes |
2006 | CKV_K8S_30 | resource | StatefulSet | Apply security context to your pods and containers | Kubernetes |
2007 | CKV_K8S_30 | resource | kubernetes_pod | Apply security context to your pods and containers | Terraform |
2008 | CKV_K8S_31 | resource | CronJob | Ensure that the seccomp profile is set to docker/default or runtime/default | Kubernetes |
2009 | CKV_K8S_31 | resource | DaemonSet | Ensure that the seccomp profile is set to docker/default or runtime/default | Kubernetes |
2010 | CKV_K8S_31 | resource | Deployment | Ensure that the seccomp profile is set to docker/default or runtime/default | Kubernetes |
2011 | CKV_K8S_31 | resource | Job | Ensure that the seccomp profile is set to docker/default or runtime/default | Kubernetes |
2012 | CKV_K8S_31 | resource | Pod | Ensure that the seccomp profile is set to docker/default or runtime/default | Kubernetes |
2013 | CKV_K8S_31 | resource | ReplicaSet | Ensure that the seccomp profile is set to docker/default or runtime/default | Kubernetes |
2014 | CKV_K8S_31 | resource | ReplicationController | Ensure that the seccomp profile is set to docker/default or runtime/default | Kubernetes |
2015 | CKV_K8S_31 | resource | StatefulSet | Ensure that the seccomp profile is set to docker/default or runtime/default | Kubernetes |
2016 | CKV_K8S_32 | resource | PodSecurityPolicy | Ensure default seccomp profile set to docker/default or runtime/default | Kubernetes |
2017 | CKV_K8S_32 | resource | kubernetes_pod_security_policy | Ensure default seccomp profile set to docker/default or runtime/default | Terraform |
2018 | CKV_K8S_33 | resource | CronJob | Ensure the Kubernetes dashboard is not deployed | Kubernetes |
2019 | CKV_K8S_33 | resource | DaemonSet | Ensure the Kubernetes dashboard is not deployed | Kubernetes |
2020 | CKV_K8S_33 | resource | Deployment | Ensure the Kubernetes dashboard is not deployed | Kubernetes |
2021 | CKV_K8S_33 | resource | DeploymentConfig | Ensure the Kubernetes dashboard is not deployed | Kubernetes |
2022 | CKV_K8S_33 | resource | Job | Ensure the Kubernetes dashboard is not deployed | Kubernetes |
2023 | CKV_K8S_33 | resource | Pod | Ensure the Kubernetes dashboard is not deployed | Kubernetes |
2024 | CKV_K8S_33 | resource | PodTemplate | Ensure the Kubernetes dashboard is not deployed | Kubernetes |
2025 | CKV_K8S_33 | resource | ReplicaSet | Ensure the Kubernetes dashboard is not deployed | Kubernetes |
2026 | CKV_K8S_33 | resource | ReplicationController | Ensure the Kubernetes dashboard is not deployed | Kubernetes |
2027 | CKV_K8S_33 | resource | StatefulSet | Ensure the Kubernetes dashboard is not deployed | Kubernetes |
2028 | CKV_K8S_34 | resource | CronJob | Ensure that Tiller (Helm v2) is not deployed | Kubernetes |
2029 | CKV_K8S_34 | resource | DaemonSet | Ensure that Tiller (Helm v2) is not deployed | Kubernetes |
2030 | CKV_K8S_34 | resource | Deployment | Ensure that Tiller (Helm v2) is not deployed | Kubernetes |
2031 | CKV_K8S_34 | resource | DeploymentConfig | Ensure that Tiller (Helm v2) is not deployed | Kubernetes |
2032 | CKV_K8S_34 | resource | Job | Ensure that Tiller (Helm v2) is not deployed | Kubernetes |
2033 | CKV_K8S_34 | resource | Pod | Ensure that Tiller (Helm v2) is not deployed | Kubernetes |
2034 | CKV_K8S_34 | resource | PodTemplate | Ensure that Tiller (Helm v2) is not deployed | Kubernetes |
2035 | CKV_K8S_34 | resource | ReplicaSet | Ensure that Tiller (Helm v2) is not deployed | Kubernetes |
2036 | CKV_K8S_34 | resource | ReplicationController | Ensure that Tiller (Helm v2) is not deployed | Kubernetes |
2037 | CKV_K8S_34 | resource | StatefulSet | Ensure that Tiller (Helm v2) is not deployed | Kubernetes |
2038 | CKV_K8S_34 | resource | kubernetes_pod | Ensure that Tiller (Helm v2) is not deployed | Terraform |
2039 | CKV_K8S_35 | resource | CronJob | Prefer using secrets as files over secrets as environment variables | Kubernetes |
2040 | CKV_K8S_35 | resource | DaemonSet | Prefer using secrets as files over secrets as environment variables | Kubernetes |
2041 | CKV_K8S_35 | resource | Deployment | Prefer using secrets as files over secrets as environment variables | Kubernetes |
2042 | CKV_K8S_35 | resource | DeploymentConfig | Prefer using secrets as files over secrets as environment variables | Kubernetes |
2043 | CKV_K8S_35 | resource | Job | Prefer using secrets as files over secrets as environment variables | Kubernetes |
2044 | CKV_K8S_35 | resource | Pod | Prefer using secrets as files over secrets as environment variables | Kubernetes |
2045 | CKV_K8S_35 | resource | PodTemplate | Prefer using secrets as files over secrets as environment variables | Kubernetes |
2046 | CKV_K8S_35 | resource | ReplicaSet | Prefer using secrets as files over secrets as environment variables | Kubernetes |
2047 | CKV_K8S_35 | resource | ReplicationController | Prefer using secrets as files over secrets as environment variables | Kubernetes |
2048 | CKV_K8S_35 | resource | StatefulSet | Prefer using secrets as files over secrets as environment variables | Kubernetes |
2049 | CKV_K8S_35 | resource | kubernetes_pod | Prefer using secrets as files over secrets as environment variables | Terraform |
2050 | CKV_K8S_36 | resource | PodSecurityPolicy | Minimize the admission of containers with capabilities assigned | Kubernetes |
2051 | CKV_K8S_36 | resource | kubernetes_pod_security_policy | Minimise the admission of containers with capabilities assigned | Terraform |
2052 | CKV_K8S_37 | resource | CronJob | Minimize the admission of containers with capabilities assigned | Kubernetes |
2053 | CKV_K8S_37 | resource | DaemonSet | Minimize the admission of containers with capabilities assigned | Kubernetes |
2054 | CKV_K8S_37 | resource | Deployment | Minimize the admission of containers with capabilities assigned | Kubernetes |
2055 | CKV_K8S_37 | resource | DeploymentConfig | Minimize the admission of containers with capabilities assigned | Kubernetes |
2056 | CKV_K8S_37 | resource | Job | Minimize the admission of containers with capabilities assigned | Kubernetes |
2057 | CKV_K8S_37 | resource | Pod | Minimize the admission of containers with capabilities assigned | Kubernetes |
2058 | CKV_K8S_37 | resource | PodTemplate | Minimize the admission of containers with capabilities assigned | Kubernetes |
2059 | CKV_K8S_37 | resource | ReplicaSet | Minimize the admission of containers with capabilities assigned | Kubernetes |
2060 | CKV_K8S_37 | resource | ReplicationController | Minimize the admission of containers with capabilities assigned | Kubernetes |
2061 | CKV_K8S_37 | resource | StatefulSet | Minimize the admission of containers with capabilities assigned | Kubernetes |
2062 | CKV_K8S_37 | resource | kubernetes_pod | Minimise the admission of containers with capabilities assigned | Terraform |
2063 | CKV_K8S_38 | resource | CronJob | Ensure that Service Account Tokens are only mounted where necessary | Kubernetes |
2064 | CKV_K8S_38 | resource | DaemonSet | Ensure that Service Account Tokens are only mounted where necessary | Kubernetes |
2065 | CKV_K8S_38 | resource | Deployment | Ensure that Service Account Tokens are only mounted where necessary | Kubernetes |
2066 | CKV_K8S_38 | resource | Job | Ensure that Service Account Tokens are only mounted where necessary | Kubernetes |
2067 | CKV_K8S_38 | resource | Pod | Ensure that Service Account Tokens are only mounted where necessary | Kubernetes |
2068 | CKV_K8S_38 | resource | ReplicaSet | Ensure that Service Account Tokens are only mounted where necessary | Kubernetes |
2069 | CKV_K8S_38 | resource | ReplicationController | Ensure that Service Account Tokens are only mounted where necessary | Kubernetes |
2070 | CKV_K8S_38 | resource | StatefulSet | Ensure that Service Account Tokens are only mounted where necessary | Kubernetes |
2071 | CKV_K8S_39 | resource | CronJob | Do not use the CAP_SYS_ADMIN linux capability | Kubernetes |
2072 | CKV_K8S_39 | resource | DaemonSet | Do not use the CAP_SYS_ADMIN linux capability | Kubernetes |
2073 | CKV_K8S_39 | resource | Deployment | Do not use the CAP_SYS_ADMIN linux capability | Kubernetes |
2074 | CKV_K8S_39 | resource | DeploymentConfig | Do not use the CAP_SYS_ADMIN linux capability | Kubernetes |
2075 | CKV_K8S_39 | resource | Job | Do not use the CAP_SYS_ADMIN linux capability | Kubernetes |
2076 | CKV_K8S_39 | resource | Pod | Do not use the CAP_SYS_ADMIN linux capability | Kubernetes |
2077 | CKV_K8S_39 | resource | PodTemplate | Do not use the CAP_SYS_ADMIN linux capability | Kubernetes |
2078 | CKV_K8S_39 | resource | ReplicaSet | Do not use the CAP_SYS_ADMIN linux capability | Kubernetes |
2079 | CKV_K8S_39 | resource | ReplicationController | Do not use the CAP_SYS_ADMIN linux capability | Kubernetes |
2080 | CKV_K8S_39 | resource | StatefulSet | Do not use the CAP_SYS_ADMIN linux capability | Kubernetes |
2081 | CKV_K8S_39 | resource | kubernetes_pod | Do not use the CAP_SYS_ADMIN linux capability | Terraform |
2082 | CKV_K8S_40 | resource | CronJob | Containers should run as a high UID to avoid host conflict | Kubernetes |
2083 | CKV_K8S_40 | resource | DaemonSet | Containers should run as a high UID to avoid host conflict | Kubernetes |
2084 | CKV_K8S_40 | resource | Deployment | Containers should run as a high UID to avoid host conflict | Kubernetes |
2085 | CKV_K8S_40 | resource | Job | Containers should run as a high UID to avoid host conflict | Kubernetes |
2086 | CKV_K8S_40 | resource | Pod | Containers should run as a high UID to avoid host conflict | Kubernetes |
2087 | CKV_K8S_40 | resource | ReplicaSet | Containers should run as a high UID to avoid host conflict | Kubernetes |
2088 | CKV_K8S_40 | resource | ReplicationController | Containers should run as a high UID to avoid host conflict | Kubernetes |
2089 | CKV_K8S_40 | resource | StatefulSet | Containers should run as a high UID to avoid host conflict | Kubernetes |
2090 | CKV_K8S_41 | resource | ServiceAccount | Ensure that default service accounts are not actively used | Kubernetes |
2091 | CKV_K8S_41 | resource | kubernetes_service_account | Ensure that default service accounts are not actively used | Terraform |
2092 | CKV_K8S_42 | resource | ClusterRoleBinding | Ensure that default service accounts are not actively used | Kubernetes |
2093 | CKV_K8S_42 | resource | RoleBinding | Ensure that default service accounts are not actively used | Kubernetes |
2094 | CKV_K8S_42 | resource | kubernetes_cluster_role_binding | Ensure that default service accounts are not actively used | Terraform |
2095 | CKV_K8S_42 | resource | kubernetes_role_binding | Ensure that default service accounts are not actively used | Terraform |
2096 | CKV_K8S_43 | resource | CronJob | Image should use digest | Kubernetes |
2097 | CKV_K8S_43 | resource | DaemonSet | Image should use digest | Kubernetes |
2098 | CKV_K8S_43 | resource | Deployment | Image should use digest | Kubernetes |
2099 | CKV_K8S_43 | resource | DeploymentConfig | Image should use digest | Kubernetes |
2100 | CKV_K8S_43 | resource | Job | Image should use digest | Kubernetes |
2101 | CKV_K8S_43 | resource | Pod | Image should use digest | Kubernetes |
2102 | CKV_K8S_43 | resource | PodTemplate | Image should use digest | Kubernetes |
2103 | CKV_K8S_43 | resource | ReplicaSet | Image should use digest | Kubernetes |
2104 | CKV_K8S_43 | resource | ReplicationController | Image should use digest | Kubernetes |
2105 | CKV_K8S_43 | resource | StatefulSet | Image should use digest | Kubernetes |
2106 | CKV_K8S_43 | resource | kubernetes_pod | Image should use digest | Terraform |
2107 | CKV_K8S_44 | resource | Service | Ensure that the Tiller Service (Helm v2) is deleted | Kubernetes |
2108 | CKV_K8S_44 | resource | kubernetes_service | Ensure that the Tiller Service (Helm v2) is deleted | Terraform |
2109 | CKV_K8S_45 | resource | CronJob | Ensure the Tiller Deployment (Helm V2) is not accessible from within the cluster | Kubernetes |
2110 | CKV_K8S_45 | resource | DaemonSet | Ensure the Tiller Deployment (Helm V2) is not accessible from within the cluster | Kubernetes |
2111 | CKV_K8S_45 | resource | Deployment | Ensure the Tiller Deployment (Helm V2) is not accessible from within the cluster | Kubernetes |
2112 | CKV_K8S_45 | resource | DeploymentConfig | Ensure the Tiller Deployment (Helm V2) is not accessible from within the cluster | Kubernetes |
2113 | CKV_K8S_45 | resource | Job | Ensure the Tiller Deployment (Helm V2) is not accessible from within the cluster | Kubernetes |
2114 | CKV_K8S_45 | resource | Pod | Ensure the Tiller Deployment (Helm V2) is not accessible from within the cluster | Kubernetes |
2115 | CKV_K8S_45 | resource | PodTemplate | Ensure the Tiller Deployment (Helm V2) is not accessible from within the cluster | Kubernetes |
2116 | CKV_K8S_45 | resource | ReplicaSet | Ensure the Tiller Deployment (Helm V2) is not accessible from within the cluster | Kubernetes |
2117 | CKV_K8S_45 | resource | ReplicationController | Ensure the Tiller Deployment (Helm V2) is not accessible from within the cluster | Kubernetes |
2118 | CKV_K8S_45 | resource | StatefulSet | Ensure the Tiller Deployment (Helm V2) is not accessible from within the cluster | Kubernetes |
2119 | CKV_K8S_49 | resource | ClusterRole | Minimize wildcard use in Roles and ClusterRoles | Kubernetes |
2120 | CKV_K8S_49 | resource | Role | Minimize wildcard use in Roles and ClusterRoles | Kubernetes |
2121 | CKV_K8S_49 | resource | kubernetes_cluster_role | Minimize wildcard use in Roles and ClusterRoles | Terraform |
2122 | CKV_K8S_49 | resource | kubernetes_role | Minimize wildcard use in Roles and ClusterRoles | Terraform |
2123 | CKV_K8S_68 | resource | CronJob | Ensure that the --anonymous-auth argument is set to false | Kubernetes |
2124 | CKV_K8S_68 | resource | DaemonSet | Ensure that the --anonymous-auth argument is set to false | Kubernetes |
2125 | CKV_K8S_68 | resource | Deployment | Ensure that the --anonymous-auth argument is set to false | Kubernetes |
2126 | CKV_K8S_68 | resource | DeploymentConfig | Ensure that the --anonymous-auth argument is set to false | Kubernetes |
2127 | CKV_K8S_68 | resource | Job | Ensure that the --anonymous-auth argument is set to false | Kubernetes |
2128 | CKV_K8S_68 | resource | Pod | Ensure that the --anonymous-auth argument is set to false | Kubernetes |
2129 | CKV_K8S_68 | resource | PodTemplate | Ensure that the --anonymous-auth argument is set to false | Kubernetes |
2130 | CKV_K8S_68 | resource | ReplicaSet | Ensure that the --anonymous-auth argument is set to false | Kubernetes |
2131 | CKV_K8S_68 | resource | ReplicationController | Ensure that the --anonymous-auth argument is set to false | Kubernetes |
2132 | CKV_K8S_68 | resource | StatefulSet | Ensure that the --anonymous-auth argument is set to false | Kubernetes |
2133 | CKV_K8S_69 | resource | CronJob | Ensure that the --basic-auth-file argument is not set | Kubernetes |
2134 | CKV_K8S_69 | resource | DaemonSet | Ensure that the --basic-auth-file argument is not set | Kubernetes |
2135 | CKV_K8S_69 | resource | Deployment | Ensure that the --basic-auth-file argument is not set | Kubernetes |
2136 | CKV_K8S_69 | resource | DeploymentConfig | Ensure that the --basic-auth-file argument is not set | Kubernetes |
2137 | CKV_K8S_69 | resource | Job | Ensure that the --basic-auth-file argument is not set | Kubernetes |
2138 | CKV_K8S_69 | resource | Pod | Ensure that the --basic-auth-file argument is not set | Kubernetes |
2139 | CKV_K8S_69 | resource | PodTemplate | Ensure that the --basic-auth-file argument is not set | Kubernetes |
2140 | CKV_K8S_69 | resource | ReplicaSet | Ensure that the --basic-auth-file argument is not set | Kubernetes |
2141 | CKV_K8S_69 | resource | ReplicationController | Ensure that the --basic-auth-file argument is not set | Kubernetes |
2142 | CKV_K8S_69 | resource | StatefulSet | Ensure that the --basic-auth-file argument is not set | Kubernetes |
2143 | CKV_K8S_70 | resource | CronJob | Ensure that the --token-auth-file argument is not set | Kubernetes |
2144 | CKV_K8S_70 | resource | DaemonSet | Ensure that the --token-auth-file argument is not set | Kubernetes |
2145 | CKV_K8S_70 | resource | Deployment | Ensure that the --token-auth-file argument is not set | Kubernetes |
2146 | CKV_K8S_70 | resource | DeploymentConfig | Ensure that the --token-auth-file argument is not set | Kubernetes |
2147 | CKV_K8S_70 | resource | Job | Ensure that the --token-auth-file argument is not set | Kubernetes |
2148 | CKV_K8S_70 | resource | Pod | Ensure that the --token-auth-file argument is not set | Kubernetes |
2149 | CKV_K8S_70 | resource | PodTemplate | Ensure that the --token-auth-file argument is not set | Kubernetes |
2150 | CKV_K8S_70 | resource | ReplicaSet | Ensure that the --token-auth-file argument is not set | Kubernetes |
2151 | CKV_K8S_70 | resource | ReplicationController | Ensure that the --token-auth-file argument is not set | Kubernetes |
2152 | CKV_K8S_70 | resource | StatefulSet | Ensure that the --token-auth-file argument is not set | Kubernetes |
2153 | CKV_K8S_71 | resource | CronJob | Ensure that the --kubelet-https argument is set to true | Kubernetes |
2154 | CKV_K8S_71 | resource | DaemonSet | Ensure that the --kubelet-https argument is set to true | Kubernetes |
2155 | CKV_K8S_71 | resource | Deployment | Ensure that the --kubelet-https argument is set to true | Kubernetes |
2156 | CKV_K8S_71 | resource | DeploymentConfig | Ensure that the --kubelet-https argument is set to true | Kubernetes |
2157 | CKV_K8S_71 | resource | Job | Ensure that the --kubelet-https argument is set to true | Kubernetes |
2158 | CKV_K8S_71 | resource | Pod | Ensure that the --kubelet-https argument is set to true | Kubernetes |
2159 | CKV_K8S_71 | resource | PodTemplate | Ensure that the --kubelet-https argument is set to true | Kubernetes |
2160 | CKV_K8S_71 | resource | ReplicaSet | Ensure that the --kubelet-https argument is set to true | Kubernetes |
2161 | CKV_K8S_71 | resource | ReplicationController | Ensure that the --kubelet-https argument is set to true | Kubernetes |
2162 | CKV_K8S_71 | resource | StatefulSet | Ensure that the --kubelet-https argument is set to true | Kubernetes |
2163 | CKV_K8S_72 | resource | CronJob | Ensure that the --kubelet-client-certificate and --kubelet-client-key arguments are set as appropriate | Kubernetes |
2164 | CKV_K8S_72 | resource | DaemonSet | Ensure that the --kubelet-client-certificate and --kubelet-client-key arguments are set as appropriate | Kubernetes |
2165 | CKV_K8S_72 | resource | Deployment | Ensure that the --kubelet-client-certificate and --kubelet-client-key arguments are set as appropriate | Kubernetes |
2166 | CKV_K8S_72 | resource | DeploymentConfig | Ensure that the --kubelet-client-certificate and --kubelet-client-key arguments are set as appropriate | Kubernetes |
2167 | CKV_K8S_72 | resource | Job | Ensure that the --kubelet-client-certificate and --kubelet-client-key arguments are set as appropriate | Kubernetes |
2168 | CKV_K8S_72 | resource | Pod | Ensure that the --kubelet-client-certificate and --kubelet-client-key arguments are set as appropriate | Kubernetes |
2169 | CKV_K8S_72 | resource | PodTemplate | Ensure that the --kubelet-client-certificate and --kubelet-client-key arguments are set as appropriate | Kubernetes |
2170 | CKV_K8S_72 | resource | ReplicaSet | Ensure that the --kubelet-client-certificate and --kubelet-client-key arguments are set as appropriate | Kubernetes |
2171 | CKV_K8S_72 | resource | ReplicationController | Ensure that the --kubelet-client-certificate and --kubelet-client-key arguments are set as appropriate | Kubernetes |
2172 | CKV_K8S_72 | resource | StatefulSet | Ensure that the --kubelet-client-certificate and --kubelet-client-key arguments are set as appropriate | Kubernetes |
2173 | CKV_K8S_73 | resource | CronJob | Ensure that the --kubelet-certificate-authority argument is set as appropriate | Kubernetes |
2174 | CKV_K8S_73 | resource | DaemonSet | Ensure that the --kubelet-certificate-authority argument is set as appropriate | Kubernetes |
2175 | CKV_K8S_73 | resource | Deployment | Ensure that the --kubelet-certificate-authority argument is set as appropriate | Kubernetes |
2176 | CKV_K8S_73 | resource | DeploymentConfig | Ensure that the --kubelet-certificate-authority argument is set as appropriate | Kubernetes |
2177 | CKV_K8S_73 | resource | Job | Ensure that the --kubelet-certificate-authority argument is set as appropriate | Kubernetes |
2178 | CKV_K8S_73 | resource | Pod | Ensure that the --kubelet-certificate-authority argument is set as appropriate | Kubernetes |
2179 | CKV_K8S_73 | resource | PodTemplate | Ensure that the --kubelet-certificate-authority argument is set as appropriate | Kubernetes |
2180 | CKV_K8S_73 | resource | ReplicaSet | Ensure that the --kubelet-certificate-authority argument is set as appropriate | Kubernetes |
2181 | CKV_K8S_73 | resource | ReplicationController | Ensure that the --kubelet-certificate-authority argument is set as appropriate | Kubernetes |
2182 | CKV_K8S_73 | resource | StatefulSet | Ensure that the --kubelet-certificate-authority argument is set as appropriate | Kubernetes |
2183 | CKV_K8S_74 | resource | CronJob | Ensure that the --authorization-mode argument is not set to AlwaysAllow | Kubernetes |
2184 | CKV_K8S_74 | resource | DaemonSet | Ensure that the --authorization-mode argument is not set to AlwaysAllow | Kubernetes |
2185 | CKV_K8S_74 | resource | Deployment | Ensure that the --authorization-mode argument is not set to AlwaysAllow | Kubernetes |
2186 | CKV_K8S_74 | resource | DeploymentConfig | Ensure that the --authorization-mode argument is not set to AlwaysAllow | Kubernetes |
2187 | CKV_K8S_74 | resource | Job | Ensure that the --authorization-mode argument is not set to AlwaysAllow | Kubernetes |
2188 | CKV_K8S_74 | resource | Pod | Ensure that the --authorization-mode argument is not set to AlwaysAllow | Kubernetes |
2189 | CKV_K8S_74 | resource | PodTemplate | Ensure that the --authorization-mode argument is not set to AlwaysAllow | Kubernetes |
2190 | CKV_K8S_74 | resource | ReplicaSet | Ensure that the --authorization-mode argument is not set to AlwaysAllow | Kubernetes |
2191 | CKV_K8S_74 | resource | ReplicationController | Ensure that the --authorization-mode argument is not set to AlwaysAllow | Kubernetes |
2192 | CKV_K8S_74 | resource | StatefulSet | Ensure that the --authorization-mode argument is not set to AlwaysAllow | Kubernetes |
2193 | CKV_K8S_75 | resource | CronJob | Ensure that the --authorization-mode argument includes Node | Kubernetes |
2194 | CKV_K8S_75 | resource | DaemonSet | Ensure that the --authorization-mode argument includes Node | Kubernetes |
2195 | CKV_K8S_75 | resource | Deployment | Ensure that the --authorization-mode argument includes Node | Kubernetes |
2196 | CKV_K8S_75 | resource | DeploymentConfig | Ensure that the --authorization-mode argument includes Node | Kubernetes |
2197 | CKV_K8S_75 | resource | Job | Ensure that the --authorization-mode argument includes Node | Kubernetes |
2198 | CKV_K8S_75 | resource | Pod | Ensure that the --authorization-mode argument includes Node | Kubernetes |
2199 | CKV_K8S_75 | resource | PodTemplate | Ensure that the --authorization-mode argument includes Node | Kubernetes |
2200 | CKV_K8S_75 | resource | ReplicaSet | Ensure that the --authorization-mode argument includes Node | Kubernetes |
2201 | CKV_K8S_75 | resource | ReplicationController | Ensure that the --authorization-mode argument includes Node | Kubernetes |
2202 | CKV_K8S_75 | resource | StatefulSet | Ensure that the --authorization-mode argument includes Node | Kubernetes |
2203 | CKV_K8S_77 | resource | CronJob | Ensure that the --authorization-mode argument includes RBAC | Kubernetes |
2204 | CKV_K8S_77 | resource | DaemonSet | Ensure that the --authorization-mode argument includes RBAC | Kubernetes |
2205 | CKV_K8S_77 | resource | Deployment | Ensure that the --authorization-mode argument includes RBAC | Kubernetes |
2206 | CKV_K8S_77 | resource | DeploymentConfig | Ensure that the --authorization-mode argument includes RBAC | Kubernetes |
2207 | CKV_K8S_77 | resource | Job | Ensure that the --authorization-mode argument includes RBAC | Kubernetes |
2208 | CKV_K8S_77 | resource | Pod | Ensure that the --authorization-mode argument includes RBAC | Kubernetes |
2209 | CKV_K8S_77 | resource | PodTemplate | Ensure that the --authorization-mode argument includes RBAC | Kubernetes |
2210 | CKV_K8S_77 | resource | ReplicaSet | Ensure that the --authorization-mode argument includes RBAC | Kubernetes |
2211 | CKV_K8S_77 | resource | ReplicationController | Ensure that the --authorization-mode argument includes RBAC | Kubernetes |
2212 | CKV_K8S_77 | resource | StatefulSet | Ensure that the --authorization-mode argument includes RBAC | Kubernetes |
2213 | CKV_K8S_78 | resource | AdmissionConfiguration | Ensure that the admission control plugin EventRateLimit is set | Kubernetes |
2214 | CKV_K8S_79 | resource | CronJob | Ensure that the admission control plugin AlwaysAdmit is not set | Kubernetes |
2215 | CKV_K8S_79 | resource | DaemonSet | Ensure that the admission control plugin AlwaysAdmit is not set | Kubernetes |
2216 | CKV_K8S_79 | resource | Deployment | Ensure that the admission control plugin AlwaysAdmit is not set | Kubernetes |
2217 | CKV_K8S_79 | resource | DeploymentConfig | Ensure that the admission control plugin AlwaysAdmit is not set | Kubernetes |
2218 | CKV_K8S_79 | resource | Job | Ensure that the admission control plugin AlwaysAdmit is not set | Kubernetes |
2219 | CKV_K8S_79 | resource | Pod | Ensure that the admission control plugin AlwaysAdmit is not set | Kubernetes |
2220 | CKV_K8S_79 | resource | PodTemplate | Ensure that the admission control plugin AlwaysAdmit is not set | Kubernetes |
2221 | CKV_K8S_79 | resource | ReplicaSet | Ensure that the admission control plugin AlwaysAdmit is not set | Kubernetes |
2222 | CKV_K8S_79 | resource | ReplicationController | Ensure that the admission control plugin AlwaysAdmit is not set | Kubernetes |
2223 | CKV_K8S_79 | resource | StatefulSet | Ensure that the admission control plugin AlwaysAdmit is not set | Kubernetes |
2224 | CKV_K8S_80 | resource | CronJob | Ensure that the admission control plugin AlwaysPullImages is set | Kubernetes |
2225 | CKV_K8S_80 | resource | DaemonSet | Ensure that the admission control plugin AlwaysPullImages is set | Kubernetes |
2226 | CKV_K8S_80 | resource | Deployment | Ensure that the admission control plugin AlwaysPullImages is set | Kubernetes |
2227 | CKV_K8S_80 | resource | DeploymentConfig | Ensure that the admission control plugin AlwaysPullImages is set | Kubernetes |
2228 | CKV_K8S_80 | resource | Job | Ensure that the admission control plugin AlwaysPullImages is set | Kubernetes |
2229 | CKV_K8S_80 | resource | Pod | Ensure that the admission control plugin AlwaysPullImages is set | Kubernetes |
2230 | CKV_K8S_80 | resource | PodTemplate | Ensure that the admission control plugin AlwaysPullImages is set | Kubernetes |
2231 | CKV_K8S_80 | resource | ReplicaSet | Ensure that the admission control plugin AlwaysPullImages is set | Kubernetes |
2232 | CKV_K8S_80 | resource | ReplicationController | Ensure that the admission control plugin AlwaysPullImages is set | Kubernetes |
2233 | CKV_K8S_80 | resource | StatefulSet | Ensure that the admission control plugin AlwaysPullImages is set | Kubernetes |
2234 | CKV_K8S_81 | resource | CronJob | Ensure that the admission control plugin SecurityContextDeny is set if PodSecurityPolicy is not used | Kubernetes |
2235 | CKV_K8S_81 | resource | DaemonSet | Ensure that the admission control plugin SecurityContextDeny is set if PodSecurityPolicy is not used | Kubernetes |
2236 | CKV_K8S_81 | resource | Deployment | Ensure that the admission control plugin SecurityContextDeny is set if PodSecurityPolicy is not used | Kubernetes |
2237 | CKV_K8S_81 | resource | DeploymentConfig | Ensure that the admission control plugin SecurityContextDeny is set if PodSecurityPolicy is not used | Kubernetes |
2238 | CKV_K8S_81 | resource | Job | Ensure that the admission control plugin SecurityContextDeny is set if PodSecurityPolicy is not used | Kubernetes |
2239 | CKV_K8S_81 | resource | Pod | Ensure that the admission control plugin SecurityContextDeny is set if PodSecurityPolicy is not used | Kubernetes |
2240 | CKV_K8S_81 | resource | PodTemplate | Ensure that the admission control plugin SecurityContextDeny is set if PodSecurityPolicy is not used | Kubernetes |
2241 | CKV_K8S_81 | resource | ReplicaSet | Ensure that the admission control plugin SecurityContextDeny is set if PodSecurityPolicy is not used | Kubernetes |
2242 | CKV_K8S_81 | resource | ReplicationController | Ensure that the admission control plugin SecurityContextDeny is set if PodSecurityPolicy is not used | Kubernetes |
2243 | CKV_K8S_81 | resource | StatefulSet | Ensure that the admission control plugin SecurityContextDeny is set if PodSecurityPolicy is not used | Kubernetes |
2244 | CKV_K8S_82 | resource | CronJob | Ensure that the admission control plugin ServiceAccount is set | Kubernetes |
2245 | CKV_K8S_82 | resource | DaemonSet | Ensure that the admission control plugin ServiceAccount is set | Kubernetes |
2246 | CKV_K8S_82 | resource | Deployment | Ensure that the admission control plugin ServiceAccount is set | Kubernetes |
2247 | CKV_K8S_82 | resource | DeploymentConfig | Ensure that the admission control plugin ServiceAccount is set | Kubernetes |
2248 | CKV_K8S_82 | resource | Job | Ensure that the admission control plugin ServiceAccount is set | Kubernetes |
2249 | CKV_K8S_82 | resource | Pod | Ensure that the admission control plugin ServiceAccount is set | Kubernetes |
2250 | CKV_K8S_82 | resource | PodTemplate | Ensure that the admission control plugin ServiceAccount is set | Kubernetes |
2251 | CKV_K8S_82 | resource | ReplicaSet | Ensure that the admission control plugin ServiceAccount is set | Kubernetes |
2252 | CKV_K8S_82 | resource | ReplicationController | Ensure that the admission control plugin ServiceAccount is set | Kubernetes |
2253 | CKV_K8S_82 | resource | StatefulSet | Ensure that the admission control plugin ServiceAccount is set | Kubernetes |
2254 | CKV_K8S_83 | resource | CronJob | Ensure that the admission control plugin NamespaceLifecycle is set | Kubernetes |
2255 | CKV_K8S_83 | resource | DaemonSet | Ensure that the admission control plugin NamespaceLifecycle is set | Kubernetes |
2256 | CKV_K8S_83 | resource | Deployment | Ensure that the admission control plugin NamespaceLifecycle is set | Kubernetes |
2257 | CKV_K8S_83 | resource | DeploymentConfig | Ensure that the admission control plugin NamespaceLifecycle is set | Kubernetes |
2258 | CKV_K8S_83 | resource | Job | Ensure that the admission control plugin NamespaceLifecycle is set | Kubernetes |
2259 | CKV_K8S_83 | resource | Pod | Ensure that the admission control plugin NamespaceLifecycle is set | Kubernetes |
2260 | CKV_K8S_83 | resource | PodTemplate | Ensure that the admission control plugin NamespaceLifecycle is set | Kubernetes |
2261 | CKV_K8S_83 | resource | ReplicaSet | Ensure that the admission control plugin NamespaceLifecycle is set | Kubernetes |
2262 | CKV_K8S_83 | resource | ReplicationController | Ensure that the admission control plugin NamespaceLifecycle is set | Kubernetes |
2263 | CKV_K8S_83 | resource | StatefulSet | Ensure that the admission control plugin NamespaceLifecycle is set | Kubernetes |
2264 | CKV_K8S_84 | resource | CronJob | Ensure that the admission control plugin PodSecurityPolicy is set | Kubernetes |
2265 | CKV_K8S_84 | resource | DaemonSet | Ensure that the admission control plugin PodSecurityPolicy is set | Kubernetes |
2266 | CKV_K8S_84 | resource | Deployment | Ensure that the admission control plugin PodSecurityPolicy is set | Kubernetes |
2267 | CKV_K8S_84 | resource | DeploymentConfig | Ensure that the admission control plugin PodSecurityPolicy is set | Kubernetes |
2268 | CKV_K8S_84 | resource | Job | Ensure that the admission control plugin PodSecurityPolicy is set | Kubernetes |
2269 | CKV_K8S_84 | resource | Pod | Ensure that the admission control plugin PodSecurityPolicy is set | Kubernetes |
2270 | CKV_K8S_84 | resource | PodTemplate | Ensure that the admission control plugin PodSecurityPolicy is set | Kubernetes |
2271 | CKV_K8S_84 | resource | ReplicaSet | Ensure that the admission control plugin PodSecurityPolicy is set | Kubernetes |
2272 | CKV_K8S_84 | resource | ReplicationController | Ensure that the admission control plugin PodSecurityPolicy is set | Kubernetes |
2273 | CKV_K8S_84 | resource | StatefulSet | Ensure that the admission control plugin PodSecurityPolicy is set | Kubernetes |
2274 | CKV_K8S_85 | resource | CronJob | Ensure that the admission control plugin NodeRestriction is set | Kubernetes |
2275 | CKV_K8S_85 | resource | DaemonSet | Ensure that the admission control plugin NodeRestriction is set | Kubernetes |
2276 | CKV_K8S_85 | resource | Deployment | Ensure that the admission control plugin NodeRestriction is set | Kubernetes |
2277 | CKV_K8S_85 | resource | DeploymentConfig | Ensure that the admission control plugin NodeRestriction is set | Kubernetes |
2278 | CKV_K8S_85 | resource | Job | Ensure that the admission control plugin NodeRestriction is set | Kubernetes |
2279 | CKV_K8S_85 | resource | Pod | Ensure that the admission control plugin NodeRestriction is set | Kubernetes |
2280 | CKV_K8S_85 | resource | PodTemplate | Ensure that the admission control plugin NodeRestriction is set | Kubernetes |
2281 | CKV_K8S_85 | resource | ReplicaSet | Ensure that the admission control plugin NodeRestriction is set | Kubernetes |
2282 | CKV_K8S_85 | resource | ReplicationController | Ensure that the admission control plugin NodeRestriction is set | Kubernetes |
2283 | CKV_K8S_85 | resource | StatefulSet | Ensure that the admission control plugin NodeRestriction is set | Kubernetes |
2284 | CKV_K8S_86 | resource | CronJob | Ensure that the --insecure-bind-address argument is not set | Kubernetes |
2285 | CKV_K8S_86 | resource | DaemonSet | Ensure that the --insecure-bind-address argument is not set | Kubernetes |
2286 | CKV_K8S_86 | resource | Deployment | Ensure that the --insecure-bind-address argument is not set | Kubernetes |
2287 | CKV_K8S_86 | resource | DeploymentConfig | Ensure that the --insecure-bind-address argument is not set | Kubernetes |
2288 | CKV_K8S_86 | resource | Job | Ensure that the --insecure-bind-address argument is not set | Kubernetes |
2289 | CKV_K8S_86 | resource | Pod | Ensure that the --insecure-bind-address argument is not set | Kubernetes |
2290 | CKV_K8S_86 | resource | PodTemplate | Ensure that the --insecure-bind-address argument is not set | Kubernetes |
2291 | CKV_K8S_86 | resource | ReplicaSet | Ensure that the --insecure-bind-address argument is not set | Kubernetes |
2292 | CKV_K8S_86 | resource | ReplicationController | Ensure that the --insecure-bind-address argument is not set | Kubernetes |
2293 | CKV_K8S_86 | resource | StatefulSet | Ensure that the --insecure-bind-address argument is not set | Kubernetes |
2294 | CKV_K8S_88 | resource | CronJob | Ensure that the --insecure-port argument is set to 0 | Kubernetes |
2295 | CKV_K8S_88 | resource | DaemonSet | Ensure that the --insecure-port argument is set to 0 | Kubernetes |
2296 | CKV_K8S_88 | resource | Deployment | Ensure that the --insecure-port argument is set to 0 | Kubernetes |
2297 | CKV_K8S_88 | resource | DeploymentConfig | Ensure that the --insecure-port argument is set to 0 | Kubernetes |
2298 | CKV_K8S_88 | resource | Job | Ensure that the --insecure-port argument is set to 0 | Kubernetes |
2299 | CKV_K8S_88 | resource | Pod | Ensure that the --insecure-port argument is set to 0 | Kubernetes |
2300 | CKV_K8S_88 | resource | PodTemplate | Ensure that the --insecure-port argument is set to 0 | Kubernetes |
2301 | CKV_K8S_88 | resource | ReplicaSet | Ensure that the --insecure-port argument is set to 0 | Kubernetes |
2302 | CKV_K8S_88 | resource | ReplicationController | Ensure that the --insecure-port argument is set to 0 | Kubernetes |
2303 | CKV_K8S_88 | resource | StatefulSet | Ensure that the --insecure-port argument is set to 0 | Kubernetes |
2304 | CKV_K8S_89 | resource | CronJob | Ensure that the --secure-port argument is not set to 0 | Kubernetes |
2305 | CKV_K8S_89 | resource | DaemonSet | Ensure that the --secure-port argument is not set to 0 | Kubernetes |
2306 | CKV_K8S_89 | resource | Deployment | Ensure that the --secure-port argument is not set to 0 | Kubernetes |
2307 | CKV_K8S_89 | resource | DeploymentConfig | Ensure that the --secure-port argument is not set to 0 | Kubernetes |
2308 | CKV_K8S_89 | resource | Job | Ensure that the --secure-port argument is not set to 0 | Kubernetes |
2309 | CKV_K8S_89 | resource | Pod | Ensure that the --secure-port argument is not set to 0 | Kubernetes |
2310 | CKV_K8S_89 | resource | PodTemplate | Ensure that the --secure-port argument is not set to 0 | Kubernetes |
2311 | CKV_K8S_89 | resource | ReplicaSet | Ensure that the --secure-port argument is not set to 0 | Kubernetes |
2312 | CKV_K8S_89 | resource | ReplicationController | Ensure that the --secure-port argument is not set to 0 | Kubernetes |
2313 | CKV_K8S_89 | resource | StatefulSet | Ensure that the --secure-port argument is not set to 0 | Kubernetes |
2314 | CKV_K8S_90 | resource | CronJob | Ensure that the --profiling argument is set to false | Kubernetes |
2315 | CKV_K8S_90 | resource | DaemonSet | Ensure that the --profiling argument is set to false | Kubernetes |
2316 | CKV_K8S_90 | resource | Deployment | Ensure that the --profiling argument is set to false | Kubernetes |
2317 | CKV_K8S_90 | resource | DeploymentConfig | Ensure that the --profiling argument is set to false | Kubernetes |
2318 | CKV_K8S_90 | resource | Job | Ensure that the --profiling argument is set to false | Kubernetes |
2319 | CKV_K8S_90 | resource | Pod | Ensure that the --profiling argument is set to false | Kubernetes |
2320 | CKV_K8S_90 | resource | PodTemplate | Ensure that the --profiling argument is set to false | Kubernetes |
2321 | CKV_K8S_90 | resource | ReplicaSet | Ensure that the --profiling argument is set to false | Kubernetes |
2322 | CKV_K8S_90 | resource | ReplicationController | Ensure that the --profiling argument is set to false | Kubernetes |
2323 | CKV_K8S_90 | resource | StatefulSet | Ensure that the --profiling argument is set to false | Kubernetes |
2324 | CKV_K8S_91 | resource | CronJob | Ensure that the --audit-log-path argument is set | Kubernetes |
2325 | CKV_K8S_91 | resource | DaemonSet | Ensure that the --audit-log-path argument is set | Kubernetes |
2326 | CKV_K8S_91 | resource | Deployment | Ensure that the --audit-log-path argument is set | Kubernetes |
2327 | CKV_K8S_91 | resource | DeploymentConfig | Ensure that the --audit-log-path argument is set | Kubernetes |
2328 | CKV_K8S_91 | resource | Job | Ensure that the --audit-log-path argument is set | Kubernetes |
2329 | CKV_K8S_91 | resource | Pod | Ensure that the --audit-log-path argument is set | Kubernetes |
2330 | CKV_K8S_91 | resource | PodTemplate | Ensure that the --audit-log-path argument is set | Kubernetes |
2331 | CKV_K8S_91 | resource | ReplicaSet | Ensure that the --audit-log-path argument is set | Kubernetes |
2332 | CKV_K8S_91 | resource | ReplicationController | Ensure that the --audit-log-path argument is set | Kubernetes |
2333 | CKV_K8S_91 | resource | StatefulSet | Ensure that the --audit-log-path argument is set | Kubernetes |
2334 | CKV_K8S_92 | resource | CronJob | Ensure that the --audit-log-maxage argument is set to 30 or as appropriate | Kubernetes |
2335 | CKV_K8S_92 | resource | DaemonSet | Ensure that the --audit-log-maxage argument is set to 30 or as appropriate | Kubernetes |
2336 | CKV_K8S_92 | resource | Deployment | Ensure that the --audit-log-maxage argument is set to 30 or as appropriate | Kubernetes |
2337 | CKV_K8S_92 | resource | DeploymentConfig | Ensure that the --audit-log-maxage argument is set to 30 or as appropriate | Kubernetes |
2338 | CKV_K8S_92 | resource | Job | Ensure that the --audit-log-maxage argument is set to 30 or as appropriate | Kubernetes |
2339 | CKV_K8S_92 | resource | Pod | Ensure that the --audit-log-maxage argument is set to 30 or as appropriate | Kubernetes |
2340 | CKV_K8S_92 | resource | PodTemplate | Ensure that the --audit-log-maxage argument is set to 30 or as appropriate | Kubernetes |
2341 | CKV_K8S_92 | resource | ReplicaSet | Ensure that the --audit-log-maxage argument is set to 30 or as appropriate | Kubernetes |
2342 | CKV_K8S_92 | resource | ReplicationController | Ensure that the --audit-log-maxage argument is set to 30 or as appropriate | Kubernetes |
2343 | CKV_K8S_92 | resource | StatefulSet | Ensure that the --audit-log-maxage argument is set to 30 or as appropriate | Kubernetes |
2344 | CKV_K8S_93 | resource | CronJob | Ensure that the --audit-log-maxbackup argument is set to 10 or as appropriate | Kubernetes |
2345 | CKV_K8S_93 | resource | DaemonSet | Ensure that the --audit-log-maxbackup argument is set to 10 or as appropriate | Kubernetes |
2346 | CKV_K8S_93 | resource | Deployment | Ensure that the --audit-log-maxbackup argument is set to 10 or as appropriate | Kubernetes |
2347 | CKV_K8S_93 | resource | DeploymentConfig | Ensure that the --audit-log-maxbackup argument is set to 10 or as appropriate | Kubernetes |
2348 | CKV_K8S_93 | resource | Job | Ensure that the --audit-log-maxbackup argument is set to 10 or as appropriate | Kubernetes |
2349 | CKV_K8S_93 | resource | Pod | Ensure that the --audit-log-maxbackup argument is set to 10 or as appropriate | Kubernetes |
2350 | CKV_K8S_93 | resource | PodTemplate | Ensure that the --audit-log-maxbackup argument is set to 10 or as appropriate | Kubernetes |
2351 | CKV_K8S_93 | resource | ReplicaSet | Ensure that the --audit-log-maxbackup argument is set to 10 or as appropriate | Kubernetes |
2352 | CKV_K8S_93 | resource | ReplicationController | Ensure that the --audit-log-maxbackup argument is set to 10 or as appropriate | Kubernetes |
2353 | CKV_K8S_93 | resource | StatefulSet | Ensure that the --audit-log-maxbackup argument is set to 10 or as appropriate | Kubernetes |
2354 | CKV_K8S_94 | resource | CronJob | Ensure that the --audit-log-maxsize argument is set to 100 or as appropriate | Kubernetes |
2355 | CKV_K8S_94 | resource | DaemonSet | Ensure that the --audit-log-maxsize argument is set to 100 or as appropriate | Kubernetes |
2356 | CKV_K8S_94 | resource | Deployment | Ensure that the --audit-log-maxsize argument is set to 100 or as appropriate | Kubernetes |
2357 | CKV_K8S_94 | resource | DeploymentConfig | Ensure that the --audit-log-maxsize argument is set to 100 or as appropriate | Kubernetes |
2358 | CKV_K8S_94 | resource | Job | Ensure that the --audit-log-maxsize argument is set to 100 or as appropriate | Kubernetes |
2359 | CKV_K8S_94 | resource | Pod | Ensure that the --audit-log-maxsize argument is set to 100 or as appropriate | Kubernetes |
2360 | CKV_K8S_94 | resource | PodTemplate | Ensure that the --audit-log-maxsize argument is set to 100 or as appropriate | Kubernetes |
2361 | CKV_K8S_94 | resource | ReplicaSet | Ensure that the --audit-log-maxsize argument is set to 100 or as appropriate | Kubernetes |
2362 | CKV_K8S_94 | resource | ReplicationController | Ensure that the --audit-log-maxsize argument is set to 100 or as appropriate | Kubernetes |
2363 | CKV_K8S_94 | resource | StatefulSet | Ensure that the --audit-log-maxsize argument is set to 100 or as appropriate | Kubernetes |
2364 | CKV_K8S_95 | resource | CronJob | Ensure that the --request-timeout argument is set as appropriate | Kubernetes |
2365 | CKV_K8S_95 | resource | DaemonSet | Ensure that the --request-timeout argument is set as appropriate | Kubernetes |
2366 | CKV_K8S_95 | resource | Deployment | Ensure that the --request-timeout argument is set as appropriate | Kubernetes |
2367 | CKV_K8S_95 | resource | DeploymentConfig | Ensure that the --request-timeout argument is set as appropriate | Kubernetes |
2368 | CKV_K8S_95 | resource | Job | Ensure that the --request-timeout argument is set as appropriate | Kubernetes |
2369 | CKV_K8S_95 | resource | Pod | Ensure that the --request-timeout argument is set as appropriate | Kubernetes |
2370 | CKV_K8S_95 | resource | PodTemplate | Ensure that the --request-timeout argument is set as appropriate | Kubernetes |
2371 | CKV_K8S_95 | resource | ReplicaSet | Ensure that the --request-timeout argument is set as appropriate | Kubernetes |
2372 | CKV_K8S_95 | resource | ReplicationController | Ensure that the --request-timeout argument is set as appropriate | Kubernetes |
2373 | CKV_K8S_95 | resource | StatefulSet | Ensure that the --request-timeout argument is set as appropriate | Kubernetes |
2374 | CKV_K8S_96 | resource | CronJob | Ensure that the --service-account-lookup argument is set to true | Kubernetes |
2375 | CKV_K8S_96 | resource | DaemonSet | Ensure that the --service-account-lookup argument is set to true | Kubernetes |
2376 | CKV_K8S_96 | resource | Deployment | Ensure that the --service-account-lookup argument is set to true | Kubernetes |
2377 | CKV_K8S_96 | resource | DeploymentConfig | Ensure that the --service-account-lookup argument is set to true | Kubernetes |
2378 | CKV_K8S_96 | resource | Job | Ensure that the --service-account-lookup argument is set to true | Kubernetes |
2379 | CKV_K8S_96 | resource | Pod | Ensure that the --service-account-lookup argument is set to true | Kubernetes |
2380 | CKV_K8S_96 | resource | PodTemplate | Ensure that the --service-account-lookup argument is set to true | Kubernetes |
2381 | CKV_K8S_96 | resource | ReplicaSet | Ensure that the --service-account-lookup argument is set to true | Kubernetes |
2382 | CKV_K8S_96 | resource | ReplicationController | Ensure that the --service-account-lookup argument is set to true | Kubernetes |
2383 | CKV_K8S_96 | resource | StatefulSet | Ensure that the --service-account-lookup argument is set to true | Kubernetes |
2384 | CKV_K8S_97 | resource | CronJob | Ensure that the --service-account-key-file argument is set as appropriate | Kubernetes |
2385 | CKV_K8S_97 | resource | DaemonSet | Ensure that the --service-account-key-file argument is set as appropriate | Kubernetes |
2386 | CKV_K8S_97 | resource | Deployment | Ensure that the --service-account-key-file argument is set as appropriate | Kubernetes |
2387 | CKV_K8S_97 | resource | DeploymentConfig | Ensure that the --service-account-key-file argument is set as appropriate | Kubernetes |
2388 | CKV_K8S_97 | resource | Job | Ensure that the --service-account-key-file argument is set as appropriate | Kubernetes |
2389 | CKV_K8S_97 | resource | Pod | Ensure that the --service-account-key-file argument is set as appropriate | Kubernetes |
2390 | CKV_K8S_97 | resource | PodTemplate | Ensure that the --service-account-key-file argument is set as appropriate | Kubernetes |
2391 | CKV_K8S_97 | resource | ReplicaSet | Ensure that the --service-account-key-file argument is set as appropriate | Kubernetes |
2392 | CKV_K8S_97 | resource | ReplicationController | Ensure that the --service-account-key-file argument is set as appropriate | Kubernetes |
2393 | CKV_K8S_97 | resource | StatefulSet | Ensure that the --service-account-key-file argument is set as appropriate | Kubernetes |
2394 | CKV_K8S_99 | resource | CronJob | Ensure that the --etcd-certfile and --etcd-keyfile arguments are set as appropriate | Kubernetes |
2395 | CKV_K8S_99 | resource | DaemonSet | Ensure that the --etcd-certfile and --etcd-keyfile arguments are set as appropriate | Kubernetes |
2396 | CKV_K8S_99 | resource | Deployment | Ensure that the --etcd-certfile and --etcd-keyfile arguments are set as appropriate | Kubernetes |
2397 | CKV_K8S_99 | resource | DeploymentConfig | Ensure that the --etcd-certfile and --etcd-keyfile arguments are set as appropriate | Kubernetes |
2398 | CKV_K8S_99 | resource | Job | Ensure that the --etcd-certfile and --etcd-keyfile arguments are set as appropriate | Kubernetes |
2399 | CKV_K8S_99 | resource | Pod | Ensure that the --etcd-certfile and --etcd-keyfile arguments are set as appropriate | Kubernetes |
2400 | CKV_K8S_99 | resource | PodTemplate | Ensure that the --etcd-certfile and --etcd-keyfile arguments are set as appropriate | Kubernetes |
2401 | CKV_K8S_99 | resource | ReplicaSet | Ensure that the --etcd-certfile and --etcd-keyfile arguments are set as appropriate | Kubernetes |
2402 | CKV_K8S_99 | resource | ReplicationController | Ensure that the --etcd-certfile and --etcd-keyfile arguments are set as appropriate | Kubernetes |
2403 | CKV_K8S_99 | resource | StatefulSet | Ensure that the --etcd-certfile and --etcd-keyfile arguments are set as appropriate | Kubernetes |
2404 | CKV_K8S_100 | resource | CronJob | Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate | Kubernetes |
2405 | CKV_K8S_100 | resource | DaemonSet | Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate | Kubernetes |
2406 | CKV_K8S_100 | resource | Deployment | Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate | Kubernetes |
2407 | CKV_K8S_100 | resource | DeploymentConfig | Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate | Kubernetes |
2408 | CKV_K8S_100 | resource | Job | Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate | Kubernetes |
2409 | CKV_K8S_100 | resource | Pod | Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate | Kubernetes |
2410 | CKV_K8S_100 | resource | PodTemplate | Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate | Kubernetes |
2411 | CKV_K8S_100 | resource | ReplicaSet | Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate | Kubernetes |
2412 | CKV_K8S_100 | resource | ReplicationController | Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate | Kubernetes |
2413 | CKV_K8S_100 | resource | StatefulSet | Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate | Kubernetes |
2414 | CKV_K8S_102 | resource | CronJob | Ensure that the --etcd-cafile argument is set as appropriate | Kubernetes |
2415 | CKV_K8S_102 | resource | DaemonSet | Ensure that the --etcd-cafile argument is set as appropriate | Kubernetes |
2416 | CKV_K8S_102 | resource | Deployment | Ensure that the --etcd-cafile argument is set as appropriate | Kubernetes |
2417 | CKV_K8S_102 | resource | DeploymentConfig | Ensure that the --etcd-cafile argument is set as appropriate | Kubernetes |
2418 | CKV_K8S_102 | resource | Job | Ensure that the --etcd-cafile argument is set as appropriate | Kubernetes |
2419 | CKV_K8S_102 | resource | Pod | Ensure that the --etcd-cafile argument is set as appropriate | Kubernetes |
2420 | CKV_K8S_102 | resource | PodTemplate | Ensure that the --etcd-cafile argument is set as appropriate | Kubernetes |
2421 | CKV_K8S_102 | resource | ReplicaSet | Ensure that the --etcd-cafile argument is set as appropriate | Kubernetes |
2422 | CKV_K8S_102 | resource | ReplicationController | Ensure that the --etcd-cafile argument is set as appropriate | Kubernetes |
2423 | CKV_K8S_102 | resource | StatefulSet | Ensure that the --etcd-cafile argument is set as appropriate | Kubernetes |
2424 | CKV_K8S_104 | resource | CronJob | Ensure that encryption providers are appropriately configured | Kubernetes |
2425 | CKV_K8S_104 | resource | DaemonSet | Ensure that encryption providers are appropriately configured | Kubernetes |
2426 | CKV_K8S_104 | resource | Deployment | Ensure that encryption providers are appropriately configured | Kubernetes |
2427 | CKV_K8S_104 | resource | DeploymentConfig | Ensure that encryption providers are appropriately configured | Kubernetes |
2428 | CKV_K8S_104 | resource | Job | Ensure that encryption providers are appropriately configured | Kubernetes |
2429 | CKV_K8S_104 | resource | Pod | Ensure that encryption providers are appropriately configured | Kubernetes |
2430 | CKV_K8S_104 | resource | PodTemplate | Ensure that encryption providers are appropriately configured | Kubernetes |
2431 | CKV_K8S_104 | resource | ReplicaSet | Ensure that encryption providers are appropriately configured | Kubernetes |
2432 | CKV_K8S_104 | resource | ReplicationController | Ensure that encryption providers are appropriately configured | Kubernetes |
2433 | CKV_K8S_104 | resource | StatefulSet | Ensure that encryption providers are appropriately configured | Kubernetes |
2434 | CKV_K8S_105 | resource | CronJob | Ensure that the API Server only makes use of Strong Cryptographic Ciphers | Kubernetes |
2435 | CKV_K8S_105 | resource | DaemonSet | Ensure that the API Server only makes use of Strong Cryptographic Ciphers | Kubernetes |
2436 | CKV_K8S_105 | resource | Deployment | Ensure that the API Server only makes use of Strong Cryptographic Ciphers | Kubernetes |
2437 | CKV_K8S_105 | resource | DeploymentConfig | Ensure that the API Server only makes use of Strong Cryptographic Ciphers | Kubernetes |
2438 | CKV_K8S_105 | resource | Job | Ensure that the API Server only makes use of Strong Cryptographic Ciphers | Kubernetes |
2439 | CKV_K8S_105 | resource | Pod | Ensure that the API Server only makes use of Strong Cryptographic Ciphers | Kubernetes |
2440 | CKV_K8S_105 | resource | PodTemplate | Ensure that the API Server only makes use of Strong Cryptographic Ciphers | Kubernetes |
2441 | CKV_K8S_105 | resource | ReplicaSet | Ensure that the API Server only makes use of Strong Cryptographic Ciphers | Kubernetes |
2442 | CKV_K8S_105 | resource | ReplicationController | Ensure that the API Server only makes use of Strong Cryptographic Ciphers | Kubernetes |
2443 | CKV_K8S_105 | resource | StatefulSet | Ensure that the API Server only makes use of Strong Cryptographic Ciphers | Kubernetes |
2444 | CKV_K8S_106 | resource | CronJob | Ensure that the --terminated-pod-gc-threshold argument is set as appropriate | Kubernetes |
2445 | CKV_K8S_106 | resource | DaemonSet | Ensure that the --terminated-pod-gc-threshold argument is set as appropriate | Kubernetes |
2446 | CKV_K8S_106 | resource | Deployment | Ensure that the --terminated-pod-gc-threshold argument is set as appropriate | Kubernetes |
2447 | CKV_K8S_106 | resource | DeploymentConfig | Ensure that the --terminated-pod-gc-threshold argument is set as appropriate | Kubernetes |
2448 | CKV_K8S_106 | resource | Job | Ensure that the --terminated-pod-gc-threshold argument is set as appropriate | Kubernetes |
2449 | CKV_K8S_106 | resource | Pod | Ensure that the --terminated-pod-gc-threshold argument is set as appropriate | Kubernetes |
2450 | CKV_K8S_106 | resource | PodTemplate | Ensure that the --terminated-pod-gc-threshold argument is set as appropriate | Kubernetes |
2451 | CKV_K8S_106 | resource | ReplicaSet | Ensure that the --terminated-pod-gc-threshold argument is set as appropriate | Kubernetes |
2452 | CKV_K8S_106 | resource | ReplicationController | Ensure that the --terminated-pod-gc-threshold argument is set as appropriate | Kubernetes |
2453 | CKV_K8S_106 | resource | StatefulSet | Ensure that the --terminated-pod-gc-threshold argument is set as appropriate | Kubernetes |
2454 | CKV_K8S_107 | resource | CronJob | Ensure that the --profiling argument is set to false | Kubernetes |
2455 | CKV_K8S_107 | resource | DaemonSet | Ensure that the --profiling argument is set to false | Kubernetes |
2456 | CKV_K8S_107 | resource | Deployment | Ensure that the --profiling argument is set to false | Kubernetes |
2457 | CKV_K8S_107 | resource | DeploymentConfig | Ensure that the --profiling argument is set to false | Kubernetes |
2458 | CKV_K8S_107 | resource | Job | Ensure that the --profiling argument is set to false | Kubernetes |
2459 | CKV_K8S_107 | resource | Pod | Ensure that the --profiling argument is set to false | Kubernetes |
2460 | CKV_K8S_107 | resource | PodTemplate | Ensure that the --profiling argument is set to false | Kubernetes |
2461 | CKV_K8S_107 | resource | ReplicaSet | Ensure that the --profiling argument is set to false | Kubernetes |
2462 | CKV_K8S_107 | resource | ReplicationController | Ensure that the --profiling argument is set to false | Kubernetes |
2463 | CKV_K8S_107 | resource | StatefulSet | Ensure that the --profiling argument is set to false | Kubernetes |
2464 | CKV_K8S_108 | resource | CronJob | Ensure that the --use-service-account-credentials argument is set to true | Kubernetes |
2465 | CKV_K8S_108 | resource | DaemonSet | Ensure that the --use-service-account-credentials argument is set to true | Kubernetes |
2466 | CKV_K8S_108 | resource | Deployment | Ensure that the --use-service-account-credentials argument is set to true | Kubernetes |
2467 | CKV_K8S_108 | resource | DeploymentConfig | Ensure that the --use-service-account-credentials argument is set to true | Kubernetes |
2468 | CKV_K8S_108 | resource | Job | Ensure that the --use-service-account-credentials argument is set to true | Kubernetes |
2469 | CKV_K8S_108 | resource | Pod | Ensure that the --use-service-account-credentials argument is set to true | Kubernetes |
2470 | CKV_K8S_108 | resource | PodTemplate | Ensure that the --use-service-account-credentials argument is set to true | Kubernetes |
2471 | CKV_K8S_108 | resource | ReplicaSet | Ensure that the --use-service-account-credentials argument is set to true | Kubernetes |
2472 | CKV_K8S_108 | resource | ReplicationController | Ensure that the --use-service-account-credentials argument is set to true | Kubernetes |
2473 | CKV_K8S_108 | resource | StatefulSet | Ensure that the --use-service-account-credentials argument is set to true | Kubernetes |
2474 | CKV_K8S_110 | resource | CronJob | Ensure that the --service-account-private-key-file argument is set as appropriate | Kubernetes |
2475 | CKV_K8S_110 | resource | DaemonSet | Ensure that the --service-account-private-key-file argument is set as appropriate | Kubernetes |
2476 | CKV_K8S_110 | resource | Deployment | Ensure that the --service-account-private-key-file argument is set as appropriate | Kubernetes |
2477 | CKV_K8S_110 | resource | DeploymentConfig | Ensure that the --service-account-private-key-file argument is set as appropriate | Kubernetes |
2478 | CKV_K8S_110 | resource | Job | Ensure that the --service-account-private-key-file argument is set as appropriate | Kubernetes |
2479 | CKV_K8S_110 | resource | Pod | Ensure that the --service-account-private-key-file argument is set as appropriate | Kubernetes |
2480 | CKV_K8S_110 | resource | PodTemplate | Ensure that the --service-account-private-key-file argument is set as appropriate | Kubernetes |
2481 | CKV_K8S_110 | resource | ReplicaSet | Ensure that the --service-account-private-key-file argument is set as appropriate | Kubernetes |
2482 | CKV_K8S_110 | resource | ReplicationController | Ensure that the --service-account-private-key-file argument is set as appropriate | Kubernetes |
2483 | CKV_K8S_110 | resource | StatefulSet | Ensure that the --service-account-private-key-file argument is set as appropriate | Kubernetes |
2484 | CKV_K8S_111 | resource | CronJob | Ensure that the --root-ca-file argument is set as appropriate | Kubernetes |
2485 | CKV_K8S_111 | resource | DaemonSet | Ensure that the --root-ca-file argument is set as appropriate | Kubernetes |
2486 | CKV_K8S_111 | resource | Deployment | Ensure that the --root-ca-file argument is set as appropriate | Kubernetes |
2487 | CKV_K8S_111 | resource | DeploymentConfig | Ensure that the --root-ca-file argument is set as appropriate | Kubernetes |
2488 | CKV_K8S_111 | resource | Job | Ensure that the --root-ca-file argument is set as appropriate | Kubernetes |
2489 | CKV_K8S_111 | resource | Pod | Ensure that the --root-ca-file argument is set as appropriate | Kubernetes |
2490 | CKV_K8S_111 | resource | PodTemplate | Ensure that the --root-ca-file argument is set as appropriate | Kubernetes |
2491 | CKV_K8S_111 | resource | ReplicaSet | Ensure that the --root-ca-file argument is set as appropriate | Kubernetes |
2492 | CKV_K8S_111 | resource | ReplicationController | Ensure that the --root-ca-file argument is set as appropriate | Kubernetes |
2493 | CKV_K8S_111 | resource | StatefulSet | Ensure that the --root-ca-file argument is set as appropriate | Kubernetes |
2494 | CKV_K8S_112 | resource | CronJob | Ensure that the RotateKubeletServerCertificate argument is set to true | Kubernetes |
2495 | CKV_K8S_112 | resource | DaemonSet | Ensure that the RotateKubeletServerCertificate argument is set to true | Kubernetes |
2496 | CKV_K8S_112 | resource | Deployment | Ensure that the RotateKubeletServerCertificate argument is set to true | Kubernetes |
2497 | CKV_K8S_112 | resource | DeploymentConfig | Ensure that the RotateKubeletServerCertificate argument is set to true | Kubernetes |
2498 | CKV_K8S_112 | resource | Job | Ensure that the RotateKubeletServerCertificate argument is set to true | Kubernetes |
2499 | CKV_K8S_112 | resource | Pod | Ensure that the RotateKubeletServerCertificate argument is set to true | Kubernetes |
2500 | CKV_K8S_112 | resource | PodTemplate | Ensure that the RotateKubeletServerCertificate argument is set to true | Kubernetes |
2501 | CKV_K8S_112 | resource | ReplicaSet | Ensure that the RotateKubeletServerCertificate argument is set to true | Kubernetes |
2502 | CKV_K8S_112 | resource | ReplicationController | Ensure that the RotateKubeletServerCertificate argument is set to true | Kubernetes |
2503 | CKV_K8S_112 | resource | StatefulSet | Ensure that the RotateKubeletServerCertificate argument is set to true | Kubernetes |
2504 | CKV_K8S_113 | resource | CronJob | Ensure that the --bind-address argument is set to 127.0.0.1 | Kubernetes |
2505 | CKV_K8S_113 | resource | DaemonSet | Ensure that the --bind-address argument is set to 127.0.0.1 | Kubernetes |
2506 | CKV_K8S_113 | resource | Deployment | Ensure that the --bind-address argument is set to 127.0.0.1 | Kubernetes |
2507 | CKV_K8S_113 | resource | DeploymentConfig | Ensure that the --bind-address argument is set to 127.0.0.1 | Kubernetes |
2508 | CKV_K8S_113 | resource | Job | Ensure that the --bind-address argument is set to 127.0.0.1 | Kubernetes |
2509 | CKV_K8S_113 | resource | Pod | Ensure that the --bind-address argument is set to 127.0.0.1 | Kubernetes |
2510 | CKV_K8S_113 | resource | PodTemplate | Ensure that the --bind-address argument is set to 127.0.0.1 | Kubernetes |
2511 | CKV_K8S_113 | resource | ReplicaSet | Ensure that the --bind-address argument is set to 127.0.0.1 | Kubernetes |
2512 | CKV_K8S_113 | resource | ReplicationController | Ensure that the --bind-address argument is set to 127.0.0.1 | Kubernetes |
2513 | CKV_K8S_113 | resource | StatefulSet | Ensure that the --bind-address argument is set to 127.0.0.1 | Kubernetes |
2514 | CKV_K8S_114 | resource | CronJob | Ensure that the --profiling argument is set to false | Kubernetes |
2515 | CKV_K8S_114 | resource | DaemonSet | Ensure that the --profiling argument is set to false | Kubernetes |
2516 | CKV_K8S_114 | resource | Deployment | Ensure that the --profiling argument is set to false | Kubernetes |
2517 | CKV_K8S_114 | resource | DeploymentConfig | Ensure that the --profiling argument is set to false | Kubernetes |
2518 | CKV_K8S_114 | resource | Job | Ensure that the --profiling argument is set to false | Kubernetes |
2519 | CKV_K8S_114 | resource | Pod | Ensure that the --profiling argument is set to false | Kubernetes |
2520 | CKV_K8S_114 | resource | PodTemplate | Ensure that the --profiling argument is set to false | Kubernetes |
2521 | CKV_K8S_114 | resource | ReplicaSet | Ensure that the --profiling argument is set to false | Kubernetes |
2522 | CKV_K8S_114 | resource | ReplicationController | Ensure that the --profiling argument is set to false | Kubernetes |
2523 | CKV_K8S_114 | resource | StatefulSet | Ensure that the --profiling argument is set to false | Kubernetes |
2524 | CKV_K8S_115 | resource | CronJob | Ensure that the --bind-address argument is set to 127.0.0.1 | Kubernetes |
2525 | CKV_K8S_115 | resource | DaemonSet | Ensure that the --bind-address argument is set to 127.0.0.1 | Kubernetes |
2526 | CKV_K8S_115 | resource | Deployment | Ensure that the --bind-address argument is set to 127.0.0.1 | Kubernetes |
2527 | CKV_K8S_115 | resource | DeploymentConfig | Ensure that the --bind-address argument is set to 127.0.0.1 | Kubernetes |
2528 | CKV_K8S_115 | resource | Job | Ensure that the --bind-address argument is set to 127.0.0.1 | Kubernetes |
2529 | CKV_K8S_115 | resource | Pod | Ensure that the --bind-address argument is set to 127.0.0.1 | Kubernetes |
2530 | CKV_K8S_115 | resource | PodTemplate | Ensure that the --bind-address argument is set to 127.0.0.1 | Kubernetes |
2531 | CKV_K8S_115 | resource | ReplicaSet | Ensure that the --bind-address argument is set to 127.0.0.1 | Kubernetes |
2532 | CKV_K8S_115 | resource | ReplicationController | Ensure that the --bind-address argument is set to 127.0.0.1 | Kubernetes |
2533 | CKV_K8S_115 | resource | StatefulSet | Ensure that the --bind-address argument is set to 127.0.0.1 | Kubernetes |
2534 | CKV_K8S_116 | resource | CronJob | Ensure that the --cert-file and --key-file arguments are set as appropriate | Kubernetes |
2535 | CKV_K8S_116 | resource | DaemonSet | Ensure that the --cert-file and --key-file arguments are set as appropriate | Kubernetes |
2536 | CKV_K8S_116 | resource | Deployment | Ensure that the --cert-file and --key-file arguments are set as appropriate | Kubernetes |
2537 | CKV_K8S_116 | resource | DeploymentConfig | Ensure that the --cert-file and --key-file arguments are set as appropriate | Kubernetes |
2538 | CKV_K8S_116 | resource | Job | Ensure that the --cert-file and --key-file arguments are set as appropriate | Kubernetes |
2539 | CKV_K8S_116 | resource | Pod | Ensure that the --cert-file and --key-file arguments are set as appropriate | Kubernetes |
2540 | CKV_K8S_116 | resource | PodTemplate | Ensure that the --cert-file and --key-file arguments are set as appropriate | Kubernetes |
2541 | CKV_K8S_116 | resource | ReplicaSet | Ensure that the --cert-file and --key-file arguments are set as appropriate | Kubernetes |
2542 | CKV_K8S_116 | resource | ReplicationController | Ensure that the --cert-file and --key-file arguments are set as appropriate | Kubernetes |
2543 | CKV_K8S_116 | resource | StatefulSet | Ensure that the --cert-file and --key-file arguments are set as appropriate | Kubernetes |
2544 | CKV_K8S_117 | resource | CronJob | Ensure that the --client-cert-auth argument is set to true | Kubernetes |
2545 | CKV_K8S_117 | resource | DaemonSet | Ensure that the --client-cert-auth argument is set to true | Kubernetes |
2546 | CKV_K8S_117 | resource | Deployment | Ensure that the --client-cert-auth argument is set to true | Kubernetes |
2547 | CKV_K8S_117 | resource | DeploymentConfig | Ensure that the --client-cert-auth argument is set to true | Kubernetes |
2548 | CKV_K8S_117 | resource | Job | Ensure that the --client-cert-auth argument is set to true | Kubernetes |
2549 | CKV_K8S_117 | resource | Pod | Ensure that the --client-cert-auth argument is set to true | Kubernetes |
2550 | CKV_K8S_117 | resource | PodTemplate | Ensure that the --client-cert-auth argument is set to true | Kubernetes |
2551 | CKV_K8S_117 | resource | ReplicaSet | Ensure that the --client-cert-auth argument is set to true | Kubernetes |
2552 | CKV_K8S_117 | resource | ReplicationController | Ensure that the --client-cert-auth argument is set to true | Kubernetes |
2553 | CKV_K8S_117 | resource | StatefulSet | Ensure that the --client-cert-auth argument is set to true | Kubernetes |
2554 | CKV_K8S_118 | resource | CronJob | Ensure that the --auto-tls argument is not set to true | Kubernetes |
2555 | CKV_K8S_118 | resource | DaemonSet | Ensure that the --auto-tls argument is not set to true | Kubernetes |
2556 | CKV_K8S_118 | resource | Deployment | Ensure that the --auto-tls argument is not set to true | Kubernetes |
2557 | CKV_K8S_118 | resource | DeploymentConfig | Ensure that the --auto-tls argument is not set to true | Kubernetes |
2558 | CKV_K8S_118 | resource | Job | Ensure that the --auto-tls argument is not set to true | Kubernetes |
2559 | CKV_K8S_118 | resource | Pod | Ensure that the --auto-tls argument is not set to true | Kubernetes |
2560 | CKV_K8S_118 | resource | PodTemplate | Ensure that the --auto-tls argument is not set to true | Kubernetes |
2561 | CKV_K8S_118 | resource | ReplicaSet | Ensure that the --auto-tls argument is not set to true | Kubernetes |
2562 | CKV_K8S_118 | resource | ReplicationController | Ensure that the --auto-tls argument is not set to true | Kubernetes |
2563 | CKV_K8S_118 | resource | StatefulSet | Ensure that the --auto-tls argument is not set to true | Kubernetes |
2564 | CKV_K8S_119 | resource | CronJob | Ensure that the --peer-cert-file and --peer-key-file arguments are set as appropriate | Kubernetes |
2565 | CKV_K8S_119 | resource | DaemonSet | Ensure that the --peer-cert-file and --peer-key-file arguments are set as appropriate | Kubernetes |
2566 | CKV_K8S_119 | resource | Deployment | Ensure that the --peer-cert-file and --peer-key-file arguments are set as appropriate | Kubernetes |
2567 | CKV_K8S_119 | resource | DeploymentConfig | Ensure that the --peer-cert-file and --peer-key-file arguments are set as appropriate | Kubernetes |
2568 | CKV_K8S_119 | resource | Job | Ensure that the --peer-cert-file and --peer-key-file arguments are set as appropriate | Kubernetes |
2569 | CKV_K8S_119 | resource | Pod | Ensure that the --peer-cert-file and --peer-key-file arguments are set as appropriate | Kubernetes |
2570 | CKV_K8S_119 | resource | PodTemplate | Ensure that the --peer-cert-file and --peer-key-file arguments are set as appropriate | Kubernetes |
2571 | CKV_K8S_119 | resource | ReplicaSet | Ensure that the --peer-cert-file and --peer-key-file arguments are set as appropriate | Kubernetes |
2572 | CKV_K8S_119 | resource | ReplicationController | Ensure that the --peer-cert-file and --peer-key-file arguments are set as appropriate | Kubernetes |
2573 | CKV_K8S_119 | resource | StatefulSet | Ensure that the --peer-cert-file and --peer-key-file arguments are set as appropriate | Kubernetes |
2574 | CKV_K8S_121 | resource | Pod | Ensure that the --peer-client-cert-auth argument is set to true | Kubernetes |
2575 | CKV_K8S_138 | resource | CronJob | Ensure that the --anonymous-auth argument is set to false | Kubernetes |
2576 | CKV_K8S_138 | resource | DaemonSet | Ensure that the --anonymous-auth argument is set to false | Kubernetes |
2577 | CKV_K8S_138 | resource | Deployment | Ensure that the --anonymous-auth argument is set to false | Kubernetes |
2578 | CKV_K8S_138 | resource | DeploymentConfig | Ensure that the --anonymous-auth argument is set to false | Kubernetes |
2579 | CKV_K8S_138 | resource | Job | Ensure that the --anonymous-auth argument is set to false | Kubernetes |
2580 | CKV_K8S_138 | resource | Pod | Ensure that the --anonymous-auth argument is set to false | Kubernetes |
2581 | CKV_K8S_138 | resource | PodTemplate | Ensure that the --anonymous-auth argument is set to false | Kubernetes |
2582 | CKV_K8S_138 | resource | ReplicaSet | Ensure that the --anonymous-auth argument is set to false | Kubernetes |
2583 | CKV_K8S_138 | resource | ReplicationController | Ensure that the --anonymous-auth argument is set to false | Kubernetes |
2584 | CKV_K8S_138 | resource | StatefulSet | Ensure that the --anonymous-auth argument is set to false | Kubernetes |
2585 | CKV_K8S_139 | resource | CronJob | Ensure that the --authorization-mode argument is not set to AlwaysAllow | Kubernetes |
2586 | CKV_K8S_139 | resource | DaemonSet | Ensure that the --authorization-mode argument is not set to AlwaysAllow | Kubernetes |
2587 | CKV_K8S_139 | resource | Deployment | Ensure that the --authorization-mode argument is not set to AlwaysAllow | Kubernetes |
2588 | CKV_K8S_139 | resource | DeploymentConfig | Ensure that the --authorization-mode argument is not set to AlwaysAllow | Kubernetes |
2589 | CKV_K8S_139 | resource | Job | Ensure that the --authorization-mode argument is not set to AlwaysAllow | Kubernetes |
2590 | CKV_K8S_139 | resource | Pod | Ensure that the --authorization-mode argument is not set to AlwaysAllow | Kubernetes |
2591 | CKV_K8S_139 | resource | PodTemplate | Ensure that the --authorization-mode argument is not set to AlwaysAllow | Kubernetes |
2592 | CKV_K8S_139 | resource | ReplicaSet | Ensure that the --authorization-mode argument is not set to AlwaysAllow | Kubernetes |
2593 | CKV_K8S_139 | resource | ReplicationController | Ensure that the --authorization-mode argument is not set to AlwaysAllow | Kubernetes |
2594 | CKV_K8S_139 | resource | StatefulSet | Ensure that the --authorization-mode argument is not set to AlwaysAllow | Kubernetes |
2595 | CKV_K8S_140 | resource | CronJob | Ensure that the --client-ca-file argument is set as appropriate | Kubernetes |
2596 | CKV_K8S_140 | resource | DaemonSet | Ensure that the --client-ca-file argument is set as appropriate | Kubernetes |
2597 | CKV_K8S_140 | resource | Deployment | Ensure that the --client-ca-file argument is set as appropriate | Kubernetes |
2598 | CKV_K8S_140 | resource | DeploymentConfig | Ensure that the --client-ca-file argument is set as appropriate | Kubernetes |
2599 | CKV_K8S_140 | resource | Job | Ensure that the --client-ca-file argument is set as appropriate | Kubernetes |
2600 | CKV_K8S_140 | resource | Pod | Ensure that the --client-ca-file argument is set as appropriate | Kubernetes |
2601 | CKV_K8S_140 | resource | PodTemplate | Ensure that the --client-ca-file argument is set as appropriate | Kubernetes |
2602 | CKV_K8S_140 | resource | ReplicaSet | Ensure that the --client-ca-file argument is set as appropriate | Kubernetes |
2603 | CKV_K8S_140 | resource | ReplicationController | Ensure that the --client-ca-file argument is set as appropriate | Kubernetes |
2604 | CKV_K8S_140 | resource | StatefulSet | Ensure that the --client-ca-file argument is set as appropriate | Kubernetes |
2605 | CKV_K8S_141 | resource | CronJob | Ensure that the --read-only-port argument is set to 0 | Kubernetes |
2606 | CKV_K8S_141 | resource | DaemonSet | Ensure that the --read-only-port argument is set to 0 | Kubernetes |
2607 | CKV_K8S_141 | resource | Deployment | Ensure that the --read-only-port argument is set to 0 | Kubernetes |
2608 | CKV_K8S_141 | resource | DeploymentConfig | Ensure that the --read-only-port argument is set to 0 | Kubernetes |
2609 | CKV_K8S_141 | resource | Job | Ensure that the --read-only-port argument is set to 0 | Kubernetes |
2610 | CKV_K8S_141 | resource | Pod | Ensure that the --read-only-port argument is set to 0 | Kubernetes |
2611 | CKV_K8S_141 | resource | PodTemplate | Ensure that the --read-only-port argument is set to 0 | Kubernetes |
2612 | CKV_K8S_141 | resource | ReplicaSet | Ensure that the --read-only-port argument is set to 0 | Kubernetes |
2613 | CKV_K8S_141 | resource | ReplicationController | Ensure that the --read-only-port argument is set to 0 | Kubernetes |
2614 | CKV_K8S_141 | resource | StatefulSet | Ensure that the --read-only-port argument is set to 0 | Kubernetes |
2615 | CKV_K8S_143 | resource | CronJob | Ensure that the --streaming-connection-idle-timeout argument is not set to 0 | Kubernetes |
2616 | CKV_K8S_143 | resource | DaemonSet | Ensure that the --streaming-connection-idle-timeout argument is not set to 0 | Kubernetes |
2617 | CKV_K8S_143 | resource | Deployment | Ensure that the --streaming-connection-idle-timeout argument is not set to 0 | Kubernetes |
2618 | CKV_K8S_143 | resource | DeploymentConfig | Ensure that the --streaming-connection-idle-timeout argument is not set to 0 | Kubernetes |
2619 | CKV_K8S_143 | resource | Job | Ensure that the --streaming-connection-idle-timeout argument is not set to 0 | Kubernetes |
2620 | CKV_K8S_143 | resource | Pod | Ensure that the --streaming-connection-idle-timeout argument is not set to 0 | Kubernetes |
2621 | CKV_K8S_143 | resource | PodTemplate | Ensure that the --streaming-connection-idle-timeout argument is not set to 0 | Kubernetes |
2622 | CKV_K8S_143 | resource | ReplicaSet | Ensure that the --streaming-connection-idle-timeout argument is not set to 0 | Kubernetes |
2623 | CKV_K8S_143 | resource | ReplicationController | Ensure that the --streaming-connection-idle-timeout argument is not set to 0 | Kubernetes |
2624 | CKV_K8S_143 | resource | StatefulSet | Ensure that the --streaming-connection-idle-timeout argument is not set to 0 | Kubernetes |
2625 | CKV_K8S_144 | resource | CronJob | Ensure that the --protect-kernel-defaults argument is set to true | Kubernetes |
2626 | CKV_K8S_144 | resource | DaemonSet | Ensure that the --protect-kernel-defaults argument is set to true | Kubernetes |
2627 | CKV_K8S_144 | resource | Deployment | Ensure that the --protect-kernel-defaults argument is set to true | Kubernetes |
2628 | CKV_K8S_144 | resource | DeploymentConfig | Ensure that the --protect-kernel-defaults argument is set to true | Kubernetes |
2629 | CKV_K8S_144 | resource | Job | Ensure that the --protect-kernel-defaults argument is set to true | Kubernetes |
2630 | CKV_K8S_144 | resource | Pod | Ensure that the --protect-kernel-defaults argument is set to true | Kubernetes |
2631 | CKV_K8S_144 | resource | PodTemplate | Ensure that the --protect-kernel-defaults argument is set to true | Kubernetes |
2632 | CKV_K8S_144 | resource | ReplicaSet | Ensure that the --protect-kernel-defaults argument is set to true | Kubernetes |
2633 | CKV_K8S_144 | resource | ReplicationController | Ensure that the --protect-kernel-defaults argument is set to true | Kubernetes |
2634 | CKV_K8S_144 | resource | StatefulSet | Ensure that the --protect-kernel-defaults argument is set to true | Kubernetes |
2635 | CKV_K8S_145 | resource | CronJob | Ensure that the --make-iptables-util-chains argument is set to true | Kubernetes |
2636 | CKV_K8S_145 | resource | DaemonSet | Ensure that the --make-iptables-util-chains argument is set to true | Kubernetes |
2637 | CKV_K8S_145 | resource | Deployment | Ensure that the --make-iptables-util-chains argument is set to true | Kubernetes |
2638 | CKV_K8S_145 | resource | DeploymentConfig | Ensure that the --make-iptables-util-chains argument is set to true | Kubernetes |
2639 | CKV_K8S_145 | resource | Job | Ensure that the --make-iptables-util-chains argument is set to true | Kubernetes |
2640 | CKV_K8S_145 | resource | Pod | Ensure that the --make-iptables-util-chains argument is set to true | Kubernetes |
2641 | CKV_K8S_145 | resource | PodTemplate | Ensure that the --make-iptables-util-chains argument is set to true | Kubernetes |
2642 | CKV_K8S_145 | resource | ReplicaSet | Ensure that the --make-iptables-util-chains argument is set to true | Kubernetes |
2643 | CKV_K8S_145 | resource | ReplicationController | Ensure that the --make-iptables-util-chains argument is set to true | Kubernetes |
2644 | CKV_K8S_145 | resource | StatefulSet | Ensure that the --make-iptables-util-chains argument is set to true | Kubernetes |
2645 | CKV_K8S_146 | resource | CronJob | Ensure that the --hostname-override argument is not set | Kubernetes |
2646 | CKV_K8S_146 | resource | DaemonSet | Ensure that the --hostname-override argument is not set | Kubernetes |
2647 | CKV_K8S_146 | resource | Deployment | Ensure that the --hostname-override argument is not set | Kubernetes |
2648 | CKV_K8S_146 | resource | DeploymentConfig | Ensure that the --hostname-override argument is not set | Kubernetes |
2649 | CKV_K8S_146 | resource | Job | Ensure that the --hostname-override argument is not set | Kubernetes |
2650 | CKV_K8S_146 | resource | Pod | Ensure that the --hostname-override argument is not set | Kubernetes |
2651 | CKV_K8S_146 | resource | PodTemplate | Ensure that the --hostname-override argument is not set | Kubernetes |
2652 | CKV_K8S_146 | resource | ReplicaSet | Ensure that the --hostname-override argument is not set | Kubernetes |
2653 | CKV_K8S_146 | resource | ReplicationController | Ensure that the --hostname-override argument is not set | Kubernetes |
2654 | CKV_K8S_146 | resource | StatefulSet | Ensure that the --hostname-override argument is not set | Kubernetes |
2655 | CKV_K8S_147 | resource | CronJob | Ensure that the --event-qps argument is set to 0 or a level which ensures appropriate event capture | Kubernetes |
2656 | CKV_K8S_147 | resource | DaemonSet | Ensure that the --event-qps argument is set to 0 or a level which ensures appropriate event capture | Kubernetes |
2657 | CKV_K8S_147 | resource | Deployment | Ensure that the --event-qps argument is set to 0 or a level which ensures appropriate event capture | Kubernetes |
2658 | CKV_K8S_147 | resource | DeploymentConfig | Ensure that the --event-qps argument is set to 0 or a level which ensures appropriate event capture | Kubernetes |
2659 | CKV_K8S_147 | resource | Job | Ensure that the --event-qps argument is set to 0 or a level which ensures appropriate event capture | Kubernetes |
2660 | CKV_K8S_147 | resource | Pod | Ensure that the --event-qps argument is set to 0 or a level which ensures appropriate event capture | Kubernetes |
2661 | CKV_K8S_147 | resource | PodTemplate | Ensure that the --event-qps argument is set to 0 or a level which ensures appropriate event capture | Kubernetes |
2662 | CKV_K8S_147 | resource | ReplicaSet | Ensure that the --event-qps argument is set to 0 or a level which ensures appropriate event capture | Kubernetes |
2663 | CKV_K8S_147 | resource | ReplicationController | Ensure that the --event-qps argument is set to 0 or a level which ensures appropriate event capture | Kubernetes |
2664 | CKV_K8S_147 | resource | StatefulSet | Ensure that the --event-qps argument is set to 0 or a level which ensures appropriate event capture | Kubernetes |
2665 | CKV_K8S_148 | resource | CronJob | Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate | Kubernetes |
2666 | CKV_K8S_148 | resource | DaemonSet | Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate | Kubernetes |
2667 | CKV_K8S_148 | resource | Deployment | Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate | Kubernetes |
2668 | CKV_K8S_148 | resource | DeploymentConfig | Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate | Kubernetes |
2669 | CKV_K8S_148 | resource | Job | Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate | Kubernetes |
2670 | CKV_K8S_148 | resource | Pod | Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate | Kubernetes |
2671 | CKV_K8S_148 | resource | PodTemplate | Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate | Kubernetes |
2672 | CKV_K8S_148 | resource | ReplicaSet | Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate | Kubernetes |
2673 | CKV_K8S_148 | resource | ReplicationController | Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate | Kubernetes |
2674 | CKV_K8S_148 | resource | StatefulSet | Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate | Kubernetes |
2675 | CKV_K8S_149 | resource | CronJob | Ensure that the --rotate-certificates argument is not set to false | Kubernetes |
2676 | CKV_K8S_149 | resource | DaemonSet | Ensure that the --rotate-certificates argument is not set to false | Kubernetes |
2677 | CKV_K8S_149 | resource | Deployment | Ensure that the --rotate-certificates argument is not set to false | Kubernetes |
2678 | CKV_K8S_149 | resource | DeploymentConfig | Ensure that the --rotate-certificates argument is not set to false | Kubernetes |
2679 | CKV_K8S_149 | resource | Job | Ensure that the --rotate-certificates argument is not set to false | Kubernetes |
2680 | CKV_K8S_149 | resource | Pod | Ensure that the --rotate-certificates argument is not set to false | Kubernetes |
2681 | CKV_K8S_149 | resource | PodTemplate | Ensure that the --rotate-certificates argument is not set to false | Kubernetes |
2682 | CKV_K8S_149 | resource | ReplicaSet | Ensure that the --rotate-certificates argument is not set to false | Kubernetes |
2683 | CKV_K8S_149 | resource | ReplicationController | Ensure that the --rotate-certificates argument is not set to false | Kubernetes |
2684 | CKV_K8S_149 | resource | StatefulSet | Ensure that the --rotate-certificates argument is not set to false | Kubernetes |
2685 | CKV_K8S_151 | resource | CronJob | Ensure that the Kubelet only makes use of Strong Cryptographic Ciphers | Kubernetes |
2686 | CKV_K8S_151 | resource | DaemonSet | Ensure that the Kubelet only makes use of Strong Cryptographic Ciphers | Kubernetes |
2687 | CKV_K8S_151 | resource | Deployment | Ensure that the Kubelet only makes use of Strong Cryptographic Ciphers | Kubernetes |
2688 | CKV_K8S_151 | resource | DeploymentConfig | Ensure that the Kubelet only makes use of Strong Cryptographic Ciphers | Kubernetes |
2689 | CKV_K8S_151 | resource | Job | Ensure that the Kubelet only makes use of Strong Cryptographic Ciphers | Kubernetes |
2690 | CKV_K8S_151 | resource | Pod | Ensure that the Kubelet only makes use of Strong Cryptographic Ciphers | Kubernetes |
2691 | CKV_K8S_151 | resource | PodTemplate | Ensure that the Kubelet only makes use of Strong Cryptographic Ciphers | Kubernetes |
2692 | CKV_K8S_151 | resource | ReplicaSet | Ensure that the Kubelet only makes use of Strong Cryptographic Ciphers | Kubernetes |
2693 | CKV_K8S_151 | resource | ReplicationController | Ensure that the Kubelet only makes use of Strong Cryptographic Ciphers | Kubernetes |
2694 | CKV_K8S_151 | resource | StatefulSet | Ensure that the Kubelet only makes use of Strong Cryptographic Ciphers | Kubernetes |
2695 | CKV_K8S_152 | resource | Ingress | Prevent NGINX Ingress annotation snippets which contain LUA code execution. See CVE-2021-25742 | Kubernetes |
2696 | CKV_K8S_153 | resource | Ingress | Prevent All NGINX Ingress annotation snippets. See CVE-2021-25742 | Kubernetes |
2697 | CKV_K8S_154 | resource | Ingress | Prevent NGINX Ingress annotation snippets which contain alias statements See CVE-2021-25742 | Kubernetes |
2698 | CKV_K8S_155 | resource | ClusterRole | Minimize ClusterRoles that grant control over validating or mutating admission webhook configurations | Kubernetes |
2699 | CKV_K8S_156 | resource | ClusterRole | Minimize ClusterRoles that grant permissions to approve CertificateSigningRequests | Kubernetes |
2700 | CKV_K8S_157 | resource | ClusterRole | Minimize Roles and ClusterRoles that grant permissions to bind RoleBindings or ClusterRoleBindings | Kubernetes |
2701 | CKV_K8S_157 | resource | Role | Minimize Roles and ClusterRoles that grant permissions to bind RoleBindings or ClusterRoleBindings | Kubernetes |
2702 | CKV_K8S_158 | resource | ClusterRole | Minimize Roles and ClusterRoles that grant permissions to escalate Roles or ClusterRoles | Kubernetes |
2703 | CKV_K8S_158 | resource | Role | Minimize Roles and ClusterRoles that grant permissions to escalate Roles or ClusterRoles | Kubernetes |
2704 | CKV_LIN_1 | provider | linode | Ensure no hard coded Linode tokens exist in provider | Terraform |
2705 | CKV_LIN_2 | resource | linode_instance | Ensure SSH key set in authorized_keys | Terraform |
2706 | CKV_LIN_3 | resource | linode_user | Ensure email is set | Terraform |
2707 | CKV_LIN_4 | resource | linode_user | Ensure username is set | Terraform |
2708 | CKV_LIN_5 | resource | linode_firewall | Ensure Inbound Firewall Policy is not set to ACCEPT | Terraform |
2709 | CKV_LIN_6 | resource | linode_firewall | Ensure Outbound Firewall Policy is not set to ACCEPT | Terraform |
2710 | CKV_NCP_1 | resource | ncloud_lb_target_group | Ensure HTTP HTTPS Target group defines Healthcheck | Terraform |
2711 | CKV_NCP_002 | resource | ncloud_access_control_group | Ensure every access control groups rule has a description | Terraform |
2712 | CKV_NCP_002 | resource | ncloud_access_control_group_rule | Ensure every access control groups rule has a description | Terraform |
2713 | CKV_OCI_1 | provider | oci | Ensure no hard coded OCI private key in provider | Terraform |
2714 | CKV_OCI_2 | resource | oci_core_volume | Ensure OCI Block Storage Block Volume has backup enabled | Terraform |
2715 | CKV_OCI_3 | resource | oci_core_volume | OCI Block Storage Block Volumes are not encrypted with a Customer Managed Key (CMK) | Terraform |
2716 | CKV_OCI_4 | resource | oci_core_instance | Ensure OCI Compute Instance boot volume has in-transit data encryption enabled | Terraform |
2717 | CKV_OCI_5 | resource | oci_core_instance | Ensure OCI Compute Instance has Legacy MetaData service endpoint disabled | Terraform |
2718 | CKV_OCI_6 | resource | oci_core_instance | Ensure OCI Compute Instance has monitoring enabled | Terraform |
2719 | CKV_OCI_7 | resource | oci_objectstorage_bucket | Ensure OCI Object Storage bucket can emit object events | Terraform |
2720 | CKV_OCI_8 | resource | oci_objectstorage_bucket | Ensure OCI Object Storage has versioning enabled | Terraform |
2721 | CKV_OCI_9 | resource | oci_objectstorage_bucket | Ensure OCI Object Storage is encrypted with Customer Managed Key | Terraform |
2722 | CKV_OCI_10 | resource | oci_objectstorage_bucket | Ensure OCI Object Storage is not Public | Terraform |
2723 | CKV_OCI_11 | resource | oci_identity_authentication_policy | OCI IAM password policy - must contain lower case | Terraform |
2724 | CKV_OCI_12 | resource | oci_identity_authentication_policy | OCI IAM password policy - must contain Numeric characters | Terraform |
2725 | CKV_OCI_13 | resource | oci_identity_authentication_policy | OCI IAM password policy - must contain Special characters | Terraform |
2726 | CKV_OCI_14 | resource | oci_identity_authentication_policy | OCI IAM password policy - must contain Uppercase characters | Terraform |
2727 | CKV_OCI_15 | resource | oci_file_storage_file_system | Ensure OCI File System is Encrypted with a customer Managed Key | Terraform |
2728 | CKV_OCI_16 | resource | oci_core_security_list | Ensure VCN has an inbound security list | Terraform |
2729 | CKV_OCI_17 | resource | oci_core_security_list | Ensure VCN inbound security lists are stateless | Terraform |
2730 | CKV_OCI_18 | resource | oci_identity_authentication_policy | OCI IAM password policy for local (non-federated) users has a minimum length of 14 characters | Terraform |
2731 | CKV_OCI_19 | resource | oci_core_security_list | Ensure no security list allow ingress from 0.0.0.0:0 to port 22. | Terraform |
2732 | CKV_OCI_20 | resource | oci_core_security_list | Ensure no security list allow ingress from 0.0.0.0:0 to port 3389. | Terraform |
2733 | CKV_OCI_21 | resource | oci_core_network_security_group_security_rule | Ensure security group has stateless ingress security rules | Terraform |
2734 | CKV_OCI_22 | resource | oci_core_network_security_group_security_rule | Ensure no security groups rules allow ingress from 0.0.0.0/0 to port 22 | Terraform |
2735 | CKV2_OCI_1 | resource | oci_identity_group | Ensure administrator users are not associated with API keys | Terraform |
2736 | CKV2_OCI_1 | resource | oci_identity_user | Ensure administrator users are not associated with API keys | Terraform |
2737 | CKV2_OCI_1 | resource | oci_identity_user_group_membership | Ensure administrator users are not associated with API keys | Terraform |
2738 | CKV_OPENAPI_1 | resource | securityDefinitions | Ensure that securityDefinitions is defined and not empty - version 2.0 files | OpenAPI |
2739 | CKV_OPENAPI_2 | resource | security | Ensure that if the security scheme is not of type 'oauth2', the array value must be empty - version 2.0 files | OpenAPI |
2740 | CKV_OPENAPI_3 | resource | components | Ensure that security schemes don't allow cleartext credentials over unencrypted channel - version 3.x.y files | OpenAPI |
2741 | CKV_OPENAPI_4 | resource | security | Ensure that the global security field has rules defined | OpenAPI |
2742 | CKV_OPENAPI_5 | resource | security | Ensure that security operations is not empty. | OpenAPI |
2743 | CKV_OPENAPI_6 | resource | security | Ensure that security requirement defined in securityDefinitions - version 2.0 files | OpenAPI |
2744 | CKV_OPENAPI_7 | resource | security | Ensure that the path scheme does not support unencrypted HTTP connection where all transmissions are open to interception- version 2.0 files | OpenAPI |
2745 | CKV_OPENSTACK_1 | provider | openstack | Ensure no hard coded OpenStack password, token, or application_credential_secret exists in provider | Terraform |
2746 | CKV_OPENSTACK_2 | resource | openstack_compute_secgroup_v2 | Ensure no security groups allow ingress from 0.0.0.0:0 to port 22 (tcp / udp) | Terraform |
2747 | CKV_OPENSTACK_2 | resource | openstack_networking_secgroup_rule_v2 | Ensure no security groups allow ingress from 0.0.0.0:0 to port 22 (tcp / udp) | Terraform |
2748 | CKV_OPENSTACK_3 | resource | openstack_compute_secgroup_v2 | Ensure no security groups allow ingress from 0.0.0.0:0 to port 3389 (tcp / udp) | Terraform |
2749 | CKV_OPENSTACK_3 | resource | openstack_networking_secgroup_rule_v2 | Ensure no security groups allow ingress from 0.0.0.0:0 to port 3389 (tcp / udp) | Terraform |
2750 | CKV_OPENSTACK_4 | resource | openstack_compute_instance_v2 | Ensure that instance does not use basic credentials | Terraform |
2751 | CKV_OPENSTACK_5 | resource | openstack_fw_rule_v1 | Ensure firewall rule set a destination IP | Terraform |
2752 | CKV_PAN_1 | provider | panos | Ensure no hard coded PAN-OS credentials exist in provider | Terraform |
2753 | CKV_PAN_2 | resource | panos_management_profile | Ensure plain-text management HTTP is not enabled for an Interface Management Profile | Terraform |
2754 | CKV_PAN_3 | resource | panos_management_profile | Ensure plain-text management Telnet is not enabled for an Interface Management Profile | Terraform |
2755 | CKV_PAN_4 | resource | panos_security_policy | Ensure DSRI is not enabled within security policies | Terraform |
2756 | CKV_PAN_4 | resource | panos_security_rule_group | Ensure DSRI is not enabled within security policies | Terraform |
2757 | CKV_PAN_5 | resource | panos_security_policy | Ensure security rules do not have 'applications' set to 'any' | Terraform |
2758 | CKV_PAN_5 | resource | panos_security_rule_group | Ensure security rules do not have 'applications' set to 'any' | Terraform |
2759 | CKV_PAN_6 | resource | panos_security_policy | Ensure security rules do not have 'services' set to 'any' | Terraform |
2760 | CKV_PAN_6 | resource | panos_security_rule_group | Ensure security rules do not have 'services' set to 'any' | Terraform |
2761 | CKV_PAN_7 | resource | panos_security_policy | Ensure security rules do not have 'source_addresses' and 'destination_addresses' both containing values of 'any' | Terraform |
2762 | CKV_PAN_7 | resource | panos_security_rule_group | Ensure security rules do not have 'source_addresses' and 'destination_addresses' both containing values of 'any' | Terraform |
2763 | CKV_PAN_8 | resource | panos_security_policy | Ensure description is populated within security policies | Terraform |
2764 | CKV_PAN_8 | resource | panos_security_rule_group | Ensure description is populated within security policies | Terraform |
2765 | CKV_PAN_9 | resource | panos_security_policy | Ensure a Log Forwarding Profile is selected for each security policy rule | Terraform |
2766 | CKV_PAN_9 | resource | panos_security_rule_group | Ensure a Log Forwarding Profile is selected for each security policy rule | Terraform |
2767 | CKV_PAN_10 | resource | panos_security_policy | Ensure logging at session end is enabled within security policies | Terraform |
2768 | CKV_PAN_10 | resource | panos_security_rule_group | Ensure logging at session end is enabled within security policies | Terraform |
2769 | CKV_PAN_11 | resource | panos_ipsec_crypto_profile | Ensure IPsec profiles do not specify use of insecure encryption algorithms | Terraform |
2770 | CKV_PAN_11 | resource | panos_panorama_ipsec_crypto_profile | Ensure IPsec profiles do not specify use of insecure encryption algorithms | Terraform |
2771 | CKV_PAN_12 | resource | panos_ipsec_crypto_profile | Ensure IPsec profiles do not specify use of insecure authentication algorithms | Terraform |
2772 | CKV_PAN_12 | resource | panos_panorama_ipsec_crypto_profile | Ensure IPsec profiles do not specify use of insecure authentication algorithms | Terraform |
2773 | CKV_PAN_13 | resource | panos_ipsec_crypto_profile | Ensure IPsec profiles do not specify use of insecure protocols | Terraform |
2774 | CKV_PAN_13 | resource | panos_panorama_ipsec_crypto_profile | Ensure IPsec profiles do not specify use of insecure protocols | Terraform |
2775 | CKV_PAN_14 | resource | panos_panorama_zone | Ensure a Zone Protection Profile is defined within Security Zones | Terraform |
2776 | CKV_PAN_14 | resource | panos_zone | Ensure a Zone Protection Profile is defined within Security Zones | Terraform |
2777 | CKV_PAN_14 | resource | panos_zone_entry | Ensure a Zone Protection Profile is defined within Security Zones | Terraform |
2778 | CKV_PAN_15 | resource | panos_panorama_zone | Ensure an Include ACL is defined for a Zone when User-ID is enabled | Terraform |
2779 | CKV_PAN_15 | resource | panos_zone | Ensure an Include ACL is defined for a Zone when User-ID is enabled | Terraform |
2780 | CKV_SECRET_1 | Artifactory Credentials | secrets | Artifactory Credentials | secrets |
2781 | CKV_SECRET_2 | AWS Access Key | secrets | AWS Access Key | secrets |
2782 | CKV_SECRET_3 | Azure Storage Account access key | secrets | Azure Storage Account access key | secrets |
2783 | CKV_SECRET_4 | Basic Auth Credentials | secrets | Basic Auth Credentials | secrets |
2784 | CKV_SECRET_5 | Cloudant Credentials | secrets | Cloudant Credentials | secrets |
2785 | CKV_SECRET_6 | Base64 High Entropy String | secrets | Base64 High Entropy String | secrets |
2786 | CKV_SECRET_7 | IBM Cloud IAM Key | secrets | IBM Cloud IAM Key | secrets |
2787 | CKV_SECRET_8 | IBM COS HMAC Credentials | secrets | IBM COS HMAC Credentials | secrets |
2788 | CKV_SECRET_9 | JSON Web Token | secrets | JSON Web Token | secrets |
2789 | CKV_SECRET_10 | Secret Keyword | secrets | Secret Keyword | secrets |
2790 | CKV_SECRET_11 | Mailchimp Access Key | secrets | Mailchimp Access Key | secrets |
2791 | CKV_SECRET_12 | NPM tokens | secrets | NPM tokens | secrets |
2792 | CKV_SECRET_13 | Private Key | secrets | Private Key | secrets |
2793 | CKV_SECRET_14 | Slack Token | secrets | Slack Token | secrets |
2794 | CKV_SECRET_15 | SoftLayer Credentials | secrets | SoftLayer Credentials | secrets |
2795 | CKV_SECRET_16 | Square OAuth Secret | secrets | Square OAuth Secret | secrets |
2796 | CKV_SECRET_17 | Stripe Access Key | secrets | Stripe Access Key | secrets |
2797 | CKV_SECRET_18 | Twilio API Key | secrets | Twilio API Key | secrets |
2798 | CKV_SECRET_19 | Hex High Entropy String | secrets | Hex High Entropy String | secrets |
2799 | CKV_YC_1 | resource | yandex_mdb_clickhouse_cluster | Ensure security group is assigned to database cluster. | Terraform |
2800 | CKV_YC_1 | resource | yandex_mdb_elasticsearch_cluster | Ensure security group is assigned to database cluster. | Terraform |
2801 | CKV_YC_1 | resource | yandex_mdb_greenplum_cluster | Ensure security group is assigned to database cluster. | Terraform |
2802 | CKV_YC_1 | resource | yandex_mdb_kafka_cluster | Ensure security group is assigned to database cluster. | Terraform |
2803 | CKV_YC_1 | resource | yandex_mdb_mongodb_cluster | Ensure security group is assigned to database cluster. | Terraform |
2804 | CKV_YC_1 | resource | yandex_mdb_mysql_cluster | Ensure security group is assigned to database cluster. | Terraform |
2805 | CKV_YC_1 | resource | yandex_mdb_postgresql_cluster | Ensure security group is assigned to database cluster. | Terraform |
2806 | CKV_YC_1 | resource | yandex_mdb_redis_cluster | Ensure security group is assigned to database cluster. | Terraform |
2807 | CKV_YC_1 | resource | yandex_mdb_sqlserver_cluster | Ensure security group is assigned to database cluster. | Terraform |
2808 | CKV_YC_2 | resource | yandex_compute_instance | Ensure compute instance does not have public IP. | Terraform |
2809 | CKV_YC_3 | resource | yandex_storage_bucket | Ensure storage bucket is encrypted. | Terraform |
2810 | CKV_YC_4 | resource | yandex_compute_instance | Ensure compute instance does not have serial console enabled. | Terraform |
2811 | CKV_YC_5 | resource | yandex_kubernetes_cluster | Ensure Kubernetes cluster does not have public IP address. | Terraform |
2812 | CKV_YC_6 | resource | yandex_kubernetes_node_group | Ensure Kubernetes cluster node group does not have public IP addresses. | Terraform |
2813 | CKV_YC_7 | resource | yandex_kubernetes_cluster | Ensure Kubernetes cluster auto-upgrade is enabled. | Terraform |
2814 | CKV_YC_8 | resource | yandex_kubernetes_node_group | Ensure Kubernetes node group auto-upgrade is enabled. | Terraform |
2815 | CKV_YC_9 | resource | yandex_kms_symmetric_key | Ensure KMS symmetric key is rotated. | Terraform |
2816 | CKV_YC_10 | resource | yandex_kubernetes_cluster | Ensure etcd database is encrypted with KMS key. | Terraform |
2817 | CKV_YC_11 | resource | yandex_compute_instance | Ensure security group is assigned to network interface. | Terraform |
2818 | CKV_YC_12 | resource | yandex_mdb_clickhouse_cluster | Ensure public IP is not assigned to database cluster. | Terraform |
2819 | CKV_YC_12 | resource | yandex_mdb_elasticsearch_cluster | Ensure public IP is not assigned to database cluster. | Terraform |
2820 | CKV_YC_12 | resource | yandex_mdb_greenplum_cluster | Ensure public IP is not assigned to database cluster. | Terraform |
2821 | CKV_YC_12 | resource | yandex_mdb_kafka_cluster | Ensure public IP is not assigned to database cluster. | Terraform |
2822 | CKV_YC_12 | resource | yandex_mdb_mongodb_cluster | Ensure public IP is not assigned to database cluster. | Terraform |
2823 | CKV_YC_12 | resource | yandex_mdb_mysql_cluster | Ensure public IP is not assigned to database cluster. | Terraform |
2824 | CKV_YC_12 | resource | yandex_mdb_postgresql_cluster | Ensure public IP is not assigned to database cluster. | Terraform |
2825 | CKV_YC_12 | resource | yandex_mdb_sqlserver_cluster | Ensure public IP is not assigned to database cluster. | Terraform |
2826 | CKV_YC_13 | resource | yandex_resourcemanager_cloud_iam_binding | Ensure cloud member does not have elevated access. | Terraform |
2827 | CKV_YC_13 | resource | yandex_resourcemanager_cloud_iam_member | Ensure cloud member does not have elevated access. | Terraform |
2828 | CKV_YC_14 | resource | yandex_kubernetes_cluster | Ensure security group is assigned to Kubernetes cluster. | Terraform |
2829 | CKV_YC_15 | resource | yandex_kubernetes_node_group | Ensure security group is assigned to Kubernetes node group. | Terraform |
2830 | CKV_YC_16 | resource | yandex_kubernetes_cluster | Ensure network policy is assigned to Kubernetes cluster. | Terraform |
2831 | CKV_YC_17 | resource | yandex_storage_bucket | Ensure storage bucket does not have public access permissions. | Terraform |
2832 | CKV_YC_18 | resource | yandex_compute_instance_group | Ensure compute instance group does not have public IP. | Terraform |
2833 | CKV_YC_19 | resource | yandex_vpc_security_group | Ensure security group does not contain allow-all rules. | Terraform |
2834 | CKV_YC_20 | resource | yandex_vpc_security_group_rule | Ensure security group rule is not allow-all. | Terraform |
2835 | CKV_YC_21 | resource | yandex_organizationmanager_organization_iam_binding | Ensure organization member does not have elevated access. | Terraform |
2836 | CKV_YC_21 | resource | yandex_organizationmanager_organization_iam_member | Ensure organization member does not have elevated access. | Terraform |
2837 | CKV_YC_22 | resource | yandex_compute_instance_group | Ensure compute instance group has security group assigned. | Terraform |
2838 | CKV_YC_23 | resource | yandex_resourcemanager_folder_iam_binding | Ensure folder member does not have elevated access. | Terraform |
2839 | CKV_YC_23 | resource | yandex_resourcemanager_folder_iam_member | Ensure folder member does not have elevated access. | Terraform |
2840 | CKV_YC_24 | resource | yandex_organizationmanager_organization_iam_binding | Ensure passport account is not used for assignment. Use service accounts and federated accounts where possible. | Terraform |
2841 | CKV_YC_24 | resource | yandex_organizationmanager_organization_iam_member | Ensure passport account is not used for assignment. Use service accounts and federated accounts where possible. | Terraform |
2842 | CKV_YC_24 | resource | yandex_resourcemanager_cloud_iam_binding | Ensure passport account is not used for assignment. Use service accounts and federated accounts where possible. | Terraform |
2843 | CKV_YC_24 | resource | yandex_resourcemanager_cloud_iam_member | Ensure passport account is not used for assignment. Use service accounts and federated accounts where possible. | Terraform |
2844 | CKV_YC_24 | resource | yandex_resourcemanager_folder_iam_binding | Ensure passport account is not used for assignment. Use service accounts and federated accounts where possible. | Terraform |
2845 | CKV_YC_24 | resource | yandex_resourcemanager_folder_iam_member | Ensure passport account is not used for assignment. Use service accounts and federated accounts where possible. | Terraform |