Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: updated example path and readme paramters #32

Merged
merged 3 commits into from
Apr 24, 2024

Conversation

Tanveer143s
Copy link
Contributor

what

  • Update readme.yaml
  • Update tf-checks.yml and update example name.

why

  • Readme automation

@clouddrove-ci
Copy link
Member

Terraform Security Scan Failed

Show Output
Result #1 LOW Log group is not encrypted. 
────────────────────────────────────────────────────────────────────────────────
  main.tf:71-76
────────────────────────────────────────────────────────────────────────────────
   71    resource "aws_cloudwatch_log_group" "cloudtrail_events" {
   72      count             = var.enabled ? 1 : 0
   73      name              = var.cloudwatch_logs_group_name
   74      retention_in_days = var.cloudwatch_logs_retention_in_days
   75      tags              = module.labels.tags
   76    }
────────────────────────────────────────────────────────────────────────────────
          ID aws-cloudwatch-log-group-customer-key
      Impact Log data may be leaked if the logs are compromised. No auditing of who have viewed the logs.
  Resolution Enable CMK encryption of CloudWatch Log Groups

  More Information
  - https://aquasecurity.github.io/tfsec/latest/checks/aws/cloudwatch/log-group-customer-key/
  - https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_log_group#kms_key_id
────────────────────────────────────────────────────────────────────────────────


  timings
  ──────────────────────────────────────────
  disk i/o             82.494µs
  parsing              59.820623ms
  adaptation           140.311µs
  checks               13.195621ms
  total                73.239049ms

  counts
  ──────────────────────────────────────────
  modules downloaded   0
  modules processed    1
  blocks processed     53
  files read           4

  results
  ──────────────────────────────────────────
  passed               0
  ignored              0
  critical             0
  high                 0
  medium               0
  low                  1

  1 potential problem(s) detected.

@clouddrove-ci
Copy link
Member

Terraform Security Scan Failed

Show Output
Result #1 LOW Log group is not encrypted. 
────────────────────────────────────────────────────────────────────────────────
  main.tf:71-76
────────────────────────────────────────────────────────────────────────────────
   71    resource "aws_cloudwatch_log_group" "cloudtrail_events" {
   72      count             = var.enabled ? 1 : 0
   73      name              = var.cloudwatch_logs_group_name
   74      retention_in_days = var.cloudwatch_logs_retention_in_days
   75      tags              = module.labels.tags
   76    }
────────────────────────────────────────────────────────────────────────────────
          ID aws-cloudwatch-log-group-customer-key
      Impact Log data may be leaked if the logs are compromised. No auditing of who have viewed the logs.
  Resolution Enable CMK encryption of CloudWatch Log Groups

  More Information
  - https://aquasecurity.github.io/tfsec/latest/checks/aws/cloudwatch/log-group-customer-key/
  - https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_log_group#kms_key_id
────────────────────────────────────────────────────────────────────────────────


  timings
  ──────────────────────────────────────────
  disk i/o             122.919µs
  parsing              56.339019ms
  adaptation           137.427µs
  checks               11.442502ms
  total                68.041867ms

  counts
  ──────────────────────────────────────────
  modules downloaded   0
  modules processed    1
  blocks processed     53
  files read           4

  results
  ──────────────────────────────────────────
  passed               0
  ignored              0
  critical             0
  high                 0
  medium               0
  low                  1

  1 potential problem(s) detected.

@VishwajitNagulkar VishwajitNagulkar merged commit b02624c into master Apr 24, 2024
17 checks passed
@clouddrove-ci
Copy link
Member

Terraform Security Scan Failed

Show Output
Result #1 LOW Log group is not encrypted. 
────────────────────────────────────────────────────────────────────────────────
  main.tf:71-76
────────────────────────────────────────────────────────────────────────────────
   71    resource "aws_cloudwatch_log_group" "cloudtrail_events" {
   72      count             = var.enabled ? 1 : 0
   73      name              = var.cloudwatch_logs_group_name
   74      retention_in_days = var.cloudwatch_logs_retention_in_days
   75      tags              = module.labels.tags
   76    }
────────────────────────────────────────────────────────────────────────────────
          ID aws-cloudwatch-log-group-customer-key
      Impact Log data may be leaked if the logs are compromised. No auditing of who have viewed the logs.
  Resolution Enable CMK encryption of CloudWatch Log Groups

  More Information
  - https://aquasecurity.github.io/tfsec/latest/checks/aws/cloudwatch/log-group-customer-key/
  - https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_log_group#kms_key_id
────────────────────────────────────────────────────────────────────────────────


  timings
  ──────────────────────────────────────────
  disk i/o             133.851µs
  parsing              58.050701ms
  adaptation           146.003µs
  checks               6.593295ms
  total                64.92385ms

  counts
  ──────────────────────────────────────────
  modules downloaded   0
  modules processed    1
  blocks processed     53
  files read           4

  results
  ──────────────────────────────────────────
  passed               0
  ignored              0
  critical             0
  high                 0
  medium               0
  low                  1

  1 potential problem(s) detected.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants