-
Notifications
You must be signed in to change notification settings - Fork 133
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Added IaC templates #10
base: main
Are you sure you want to change the base?
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Prisma Cloud has found errors in this PR ⬇️
@@ -0,0 +1,308 @@ | |||
resource "aws_instance" "web_host" { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
AWS EC2 instance not configured with Instance Metadata Service v2 (IMDSv2)
Resource: aws_instance.web_host | Bridgecrew ID: 1075559712458155008_AWS_1681209176437
| Checkov ID: CKV_AWS_79
Description
Refer the documentation for more details, https://docs.bridgecrew.io/docs/bc_aws_general_31
|
||
environment { | ||
variables = { | ||
access_key = "AKIAIOSFODNN7EXAMPLE" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
AWS Access Keys
Resource: 25910f981e85ca04baf359199dd0bd4a3ae738b6 | Bridgecrew ID: 1075559712458155008_GIT_1683117313208
| Checkov ID: CKV_SECRET_2
Description
Refer the documentation for more details, https://docs.bridgecrew.io/docs/git_secrets_2sudo apt-get install -y apache2 | ||
sudo systemctl start apache2 | ||
sudo systemctl enable apache2 | ||
export AWS_ACCESS_KEY_ID=AKIAIOSFODNN7EXAMAAA |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
AWS Access Keys
Resource: fc3f784491eba6121c3bfcc1652a2c57d27b16cb | Bridgecrew ID: 1075559712458155008_GIT_1683117313208
| Checkov ID: CKV_SECRET_2
Description
Refer the documentation for more details, https://docs.bridgecrew.io/docs/git_secrets_2@@ -23,6 +23,8 @@ RUN apt-get update && apt-get upgrade -y && apt-get install \ | |||
|
|||
# Malware end | |||
|
|||
ENV GIT_LAB="glpat-y6gpZeq5K6pgdP4AZmdL" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
GitLab Token
Resource: 7fdb9fc2fe38194a305ae90791c91d6788eb3e61 | Bridgecrew ID: 1075559712458155008_GIT_1683288422698
| Checkov ID: CKV_SECRET_44
Description
https://docs.bridgecrew.io/docs/git_secrets_44@@ -0,0 +1,308 @@ | |||
resource "aws_instance" "web_host" { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
EBS volumes do not have encrypted launch configurations
Resource: aws_instance.web_host | Bridgecrew ID: BC_AWS_GENERAL_13
| Checkov ID: CKV_AWS_8
How to Fix
resource "aws_launch_configuration" "example" {
...
instance_type = "t2.micro"
+ root_block_device {
+ encrypted = true
+ }
...
}
Description
Amazon Elastic Block Store (EBS) volumes allow you to create encrypted launch configurations when creating EC2 instances and auto scaling. When the entire EBS volume is encrypted, data stored at rest on the volume, disk I/O, snapshots created from the volume, and data in-transit between EBS and EC2 are all encrypted.Benchmarks
- PCI-DSS V3.2 3
subnet_ids = ["subnet-12345678", "subnet-abcdefgh"] | ||
} | ||
|
||
resource "aws_db_instance" "example" { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
resource "aws_db_instance" "example" { | |
resource "aws_db_instance" "example" { | |
allocated_storage = 10 | |
engine = "mysql" | |
engine_version = "8.0.21" | |
instance_class = "db.t3.micro" | |
name = "example" | |
username = "admin" | |
password = "password123" | |
db_subnet_group_name = aws_db_subnet_group.example.name | |
vpc_security_group_ids = [ | |
aws_security_group.allow_all.id, | |
] | |
} |
AWS RDS database instance is publicly accessible
Resource: aws_db_instance.example | Bridgecrew ID: 1075559712458155008_LIC_1683288370889
| Checkov ID: CKV_AWS_17
Description
https://docs.bridgecrew.io/docs/public_2🪄 Smart Fix -
Fix based on 100% past actions in this repository@@ -0,0 +1,308 @@ | |||
resource "aws_instance" "web_host" { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
AWS EC2 instance detailed monitoring disabled
Resource: aws_instance.web_host | Bridgecrew ID: BC_AWS_LOGGING_26
| Checkov ID: CKV_AWS_126
How to Fix
resource "aws_instance" "test" {
+ monitoring = true
}
Description
Enabling detailed monitoring for Amazon Elastic Compute Cloud (EC2) instances can provide you with additional data and insights about the performance and utilization of your instances. : Detailed monitoring can provide you with more data about the utilization of your instances, which can be helpful for capacity planning and optimization.🪄 Smart Fix -
Fix based on 100% past actions in this repository@@ -0,0 +1,71 @@ | |||
<?xml version="1.0" encoding="UTF-8"?> |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
org.apache.struts_struts2-core 2.5.25 / pom.xml
Total vulnerabilities: 2
Critical: 2 | High: 0 | Medium: 0 | Low: 0 |
---|
Vulnerability ID | Severity | CVSS | Fixed in | Status |
---|---|---|---|---|
CVE-2020-17530 | 9.8 | 2.5.30 |
Open | |
CVE-2021-31805 | 9.8 | 2.5.30 |
Open |
Co-authored-by: prisma-cloud-devsecops[bot] <89982750+prisma-cloud-devsecops[bot]@users.noreply.github.com>
Co-authored-by: prisma-cloud-devsecops[bot] <89982750+prisma-cloud-devsecops[bot]@users.noreply.github.com>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Prisma Cloud has found errors in this PR ⬇️
@@ -23,6 +23,8 @@ RUN apt-get update && apt-get upgrade -y && apt-get install \ | |||
|
|||
# Malware end | |||
|
|||
ENV GIT_LAB="glpat-y6gpZeq5K6pgdP4AZmdL" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
GitLab Token
Resource: 7fdb9fc2fe38194a305ae90791c91d6788eb3e61 | Policy ID: 1075559712458155008_GIT_1683288422698
| Checkov ID: CKV_SECRET_44
Description
https://docs.bridgecrew.io/docs/git_secrets_44sudo apt-get install -y apache2 | ||
sudo systemctl start apache2 | ||
sudo systemctl enable apache2 | ||
export AWS_ACCESS_KEY_ID=AKIAIOSFODNN7EXAMAAA |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
AWS Access Keys
Resource: fc3f784491eba6121c3bfcc1652a2c57d27b16cb | Policy ID: 1075559712458155008_GIT_1683117313208
| Checkov ID: CKV_SECRET_2
Description
Refer the documentation for more details, https://docs.bridgecrew.io/docs/git_secrets_2
|
||
environment { | ||
variables = { | ||
access_key = "AKIAIOSFODNN7EXAMPLE" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
AWS Access Keys
Resource: 25910f981e85ca04baf359199dd0bd4a3ae738b6 | Policy ID: 1075559712458155008_GIT_1683117313208
| Checkov ID: CKV_SECRET_2
Description
Refer the documentation for more details, https://docs.bridgecrew.io/docs/git_secrets_2vpc_security_group_ids = [ | ||
aws_security_group.allow_all.id, | ||
] | ||
publicly_accessible = true |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
publicly_accessible = true |
AWS RDS database instance is publicly accessible
Resource: aws_db_instance.example | Policy ID: 1075559712458155008_LIC_1683288370889
| Checkov ID: CKV_AWS_17
Description
https://docs.bridgecrew.io/docs/public_2
|
||
<dependencies> | ||
<!--vulnerable dependency start--> | ||
<dependency> |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
org.apache.struts:struts2-core 2.5.25 / pom.xml
Total vulnerabilities: 3
Critical: 2 | High: 1 | Medium: 0 | Low: 0 |
---|
Vulnerability ID | Severity | CVSS | Fixed in | Status |
---|---|---|---|---|
CVE-2021-31805 | 9.8 | 2.5.30 |
Open | |
CVE-2020-17530 | 9.8 | 2.5.30 |
Open | |
CVE-2023-34396 | 7.5 | 2.5.31 |
Open |
No description provided.