You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The rule elb_with_security_group_without_inbound_rules (e200a6f3-c589-49ec-9143-7421d4a2c845) seems to misbehave when there are other AWS::EC2::SecurityGroupIngress for other security group name in the same template document and misfire.
Expected Behavior
The following template would be a valid template IMO:
Creates a Security Group ALBSecurityGroup which is open ingress from 10.0.0.0/8 and egress allow traffic only to the security group AppSecurityGroup
The security group AppSecurityGroup only allow ingress from ALB Security group ALBSecurityGroup and allow general HTTPS egress (AWS SDK, ...)
The Load Balancer LoadBalancer attach only to ALBSecurityGroup
In this template, I'm expecting kics to not fire the issue ELB With Security Group Without Inbound Rules as there is clearly a ingress rule on the ALB Attached Security group.
Description
The rule elb_with_security_group_without_inbound_rules (e200a6f3-c589-49ec-9143-7421d4a2c845) seems to misbehave when there are other
AWS::EC2::SecurityGroupIngress
for other security group name in the same template document and misfire.Expected Behavior
The following template would be a valid template IMO:
ALBSecurityGroup
which is open ingress from 10.0.0.0/8 and egress allow traffic only to the security groupAppSecurityGroup
AppSecurityGroup
only allow ingress from ALB Security groupALBSecurityGroup
and allow general HTTPS egress (AWS SDK, ...)LoadBalancer
attach only toALBSecurityGroup
In this template, I'm expecting kics to not fire the issue
ELB With Security Group Without Inbound Rules
as there is clearly a ingress rule on the ALB Attached Security group.Actual Behavior
With the command:
Kics Fired the following rule:
I suspect that the third check in https://github.com/Checkmarx/kics/blob/master/assets/queries/cloudFormation/aws/elb_with_security_group_without_inbound_rules/query.rego#L39-L47 is matching the fact that there is a
AWS::EC2::SecurityGroupIngress
resource, but the groupId is for some other security group.Steps to Reproduce the Problem
(Command line arguments and flags used)
Specifications
(N/A if not applicable)
The text was updated successfully, but these errors were encountered: