diff --git a/plugins/aws/eks/eksKubernetesVersion.spec.js b/plugins/aws/eks/eksKubernetesVersion.spec.js index b53206f8d2..0997f85358 100644 --- a/plugins/aws/eks/eksKubernetesVersion.spec.js +++ b/plugins/aws/eks/eksKubernetesVersion.spec.js @@ -82,7 +82,7 @@ describe('eksKubernetesVersion', function () { "cluster": { "name": "mycluster", "arn": "arn:aws:eks:us-east-1:012345678911:cluster/mycluster", - "version": "1.27", + "version": "1.29", } } ); diff --git a/plugins/azure/mysqlserver/mysqlFlexibleServerCMKEncrypted.js b/plugins/azure/mysqlserver/mysqlFlexibleServerCMKEncrypted.js index dbc0ee75ca..29b0b57100 100644 --- a/plugins/azure/mysqlserver/mysqlFlexibleServerCMKEncrypted.js +++ b/plugins/azure/mysqlserver/mysqlFlexibleServerCMKEncrypted.js @@ -2,13 +2,13 @@ const async = require('async'); const helpers = require('../../../helpers/azure'); module.exports = { - title: 'MySQL Flexible Server CMK Encrypted', + title: 'MySQL Flexible Server Data CMK Encrypted', category: 'MySQL Server', domain: 'Databases', severity: 'High', - description: 'Ensures that MySQL flexible servers are encrypted using CMK.', + description: 'Ensures that MySQL flexible servers data is encrypted using CMK.', more_info: 'MySQL flexible server allows you to encrypt data using customer-managed keys (CMK) instead of using platform-managed keys, which are enabled by default. Using CMK encryption offers enhanced security and compliance, allowing centralized management and control of encryption keys through Azure Key Vault. It adds an extra layer of protection against unauthorized access to sensitive data stored in the database.', - recommended_action: 'Modify MySQL flexible server and disable public network access.', + recommended_action: 'Ensure that MySQL flexible server have CMK encryption enabled.', link: 'https://learn.microsoft.com/en-us/azure/mysql/flexible-server/concepts-customer-managed-key', apis: ['servers:listMysqlFlexibleServer'], realtime_triggers: ['microsoftdbformysql:flexibleservers:write','microsoftdbformysql:flexibleservers:delete'], @@ -39,9 +39,9 @@ module.exports = { if (!flexibleServer.id) continue; if (flexibleServer.dataEncryption && flexibleServer.dataEncryption.primaryKeyURI ) { - helpers.addResult(results, 0, 'MySQL flexible server is encrypted using CMK', location, flexibleServer.id); + helpers.addResult(results, 0, 'MySQL flexible server data is encrypted using CMK', location, flexibleServer.id); } else { - helpers.addResult(results, 2, 'MySQL flexible server is not encrypted using CMK', location, flexibleServer.id); + helpers.addResult(results, 2, 'MySQL flexible server data is not encrypted using CMK', location, flexibleServer.id); } } rcb(); diff --git a/plugins/azure/mysqlserver/mysqlFlexibleServerCMKEncrypted.spec.js b/plugins/azure/mysqlserver/mysqlFlexibleServerCMKEncrypted.spec.js index 418c8a2f7a..17341ed4e1 100644 --- a/plugins/azure/mysqlserver/mysqlFlexibleServerCMKEncrypted.spec.js +++ b/plugins/azure/mysqlserver/mysqlFlexibleServerCMKEncrypted.spec.js @@ -39,7 +39,7 @@ describe('mysqlFlexibleServerManagedIdentity', function() { const callback = (err, results) => { expect(results.length).to.equal(1); expect(results[0].status).to.equal(2); - expect(results[0].message).to.include('MySQL flexible server is not encrypted using CMK'); + expect(results[0].message).to.include('MySQL flexible server data is not encrypted using CMK'); expect(results[0].region).to.equal('eastus'); done() }; @@ -62,7 +62,7 @@ describe('mysqlFlexibleServerManagedIdentity', function() { const callback = (err, results) => { expect(results.length).to.equal(1); expect(results[0].status).to.equal(0); - expect(results[0].message).to.include('MySQL flexible server is encrypted using CMK'); + expect(results[0].message).to.include('MySQL flexible server data is encrypted using CMK'); expect(results[0].region).to.equal('eastus'); done() };