Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

add in terraform actions #1

Closed
wants to merge 14 commits into from
Closed

add in terraform actions #1

wants to merge 14 commits into from

Conversation

zachrundle
Copy link
Owner

test

@github-advanced-security
Copy link

This pull request sets up GitHub code scanning for this repository. Once the scans have completed and the checks have passed, the analysis results for this pull request branch will appear on this overview. Once you merge this pull request, the 'Security' tab will show more code scanning analysis results (for example, for the default branch). Depending on your configuration and choice of analysis tool, future pull requests will be annotated with code scanning analysis results. For more information about GitHub code scanning, check out the documentation.

Comment on lines +1 to +7
resource "aws_s3_bucket" "my_bucket" {
bucket = "test-bucket-42353242213123"
tags = {
Name = "MyS3Bucket"
Environment = "Dev"
}
}

Check failure

Code scanning / defsec

S3 Access block should block public ACL Error

No public access block so not blocking public acls
Comment on lines +1 to +7
resource "aws_s3_bucket" "my_bucket" {
bucket = "test-bucket-42353242213123"
tags = {
Name = "MyS3Bucket"
Environment = "Dev"
}
}

Check failure

Code scanning / defsec

S3 Access block should block public policy Error

No public access block so not blocking public policies
Comment on lines +1 to +7
resource "aws_s3_bucket" "my_bucket" {
bucket = "test-bucket-42353242213123"
tags = {
Name = "MyS3Bucket"
Environment = "Dev"
}
}

Check failure

Code scanning / defsec

Unencrypted S3 bucket. Error

Bucket does not have encryption enabled
Comment on lines +1 to +7
resource "aws_s3_bucket" "my_bucket" {
bucket = "test-bucket-42353242213123"
tags = {
Name = "MyS3Bucket"
Environment = "Dev"
}
}

Check warning

Code scanning / defsec

S3 Bucket does not have logging enabled. Warning

Bucket does not have logging enabled
Comment on lines +1 to +7
resource "aws_s3_bucket" "my_bucket" {
bucket = "test-bucket-42353242213123"
tags = {
Name = "MyS3Bucket"
Environment = "Dev"
}
}

Check warning

Code scanning / defsec

S3 Data should be versioned Warning

Bucket does not have versioning enabled
Comment on lines +1 to +7
resource "aws_s3_bucket" "my_bucket" {
bucket = "test-bucket-42353242213123"
tags = {
Name = "MyS3Bucket"
Environment = "Dev"
}
}

Check failure

Code scanning / defsec

S3 encryption should use Customer Managed Keys Error

Bucket does not encrypt data with a customer managed key.
Comment on lines +1 to +7
resource "aws_s3_bucket" "my_bucket" {
bucket = "test-bucket-42353242213123"
tags = {
Name = "MyS3Bucket"
Environment = "Dev"
}
}

Check failure

Code scanning / defsec

S3 Access Block should Ignore Public Acl Error

No public access block so not ignoring public acls
Comment on lines +1 to +7
resource "aws_s3_bucket" "my_bucket" {
bucket = "test-bucket-42353242213123"
tags = {
Name = "MyS3Bucket"
Environment = "Dev"
}
}

Check failure

Code scanning / defsec

S3 Access block should restrict public bucket to limit access Error

No public access block so not restricting public buckets
Comment on lines +1 to +7
resource "aws_s3_bucket" "my_bucket" {
bucket = "test-bucket-42353242213123"
tags = {
Name = "MyS3Bucket"
Environment = "Dev"
}
}

Check notice

Code scanning / defsec

S3 buckets should each define an aws_s3_bucket_public_access_block Note

Bucket does not have a corresponding public access block.
@zachrundle zachrundle closed this Aug 12, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant