Skip to content

Terraform Security Scan #5

Terraform Security Scan

Terraform Security Scan #5

Triggered via schedule January 12, 2025 01:57
Status Failure
Total duration 1m 33s
Artifacts 2

security-scan.yml

on: schedule
Infrastructure-as-Code Security Scan
1m 10s
Code Dependencies Scan
2s
Web Security Scan
1m 24s
Python Security Scan
19s

Annotations

14 errors
Code Dependencies Scan
1 open Dependabot alerts found
Python Security Scan
Process completed with exit code 1.
Infrastructure-as-Code Security Scan
CKV_AWS_54: "Ensure S3 bucket has block public policy enabled"
Infrastructure-as-Code Security Scan
CKV_AWS_55: "Ensure S3 bucket has ignore public ACLs enabled"
Infrastructure-as-Code Security Scan
CKV_AWS_56: "Ensure S3 bucket has 'restrict_public_buckets' enabled"
Infrastructure-as-Code Security Scan
CKV_AWS_53: "Ensure S3 bucket has block public ACLS enabled"
Infrastructure-as-Code Security Scan
CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled"
Infrastructure-as-Code Security Scan
CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances"
Infrastructure-as-Code Security Scan
CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted"
Infrastructure-as-Code Security Scan
CKV_AWS_135: "Ensure that EC2 is EBS optimized"
Infrastructure-as-Code Security Scan
CKV_AWS_277: "Ensure no security groups allow ingress from 0.0.0.0:0 to port -1"
Infrastructure-as-Code Security Scan
CKV_AWS_25: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 3389"
Infrastructure-as-Code Security Scan
Process completed with exit code 1.
Infrastructure-as-Code Security Scan
Failed to CreateArtifact: Received non-retryable error: Failed request: (409) Conflict: an artifact with this name already exists on the workflow run

Artifacts

Produced during runtime
Name Size
infra-scan-results
1.98 KB
zap-scan-results
3.47 KB