Terraform Security Scan #7
security-scan.yml
on: schedule
Infrastructure-as-Code Security Scan
1m 9s
Code Dependencies Scan
2s
Web Security Scan
1m 26s
Python Security Scan
24s
Annotations
14 errors
Code Dependencies Scan
1 open Dependabot alerts found
|
Python Security Scan
Process completed with exit code 1.
|
Infrastructure-as-Code Security Scan
CKV_AWS_54: "Ensure S3 bucket has block public policy enabled"
|
Infrastructure-as-Code Security Scan
CKV_AWS_53: "Ensure S3 bucket has block public ACLS enabled"
|
Infrastructure-as-Code Security Scan
CKV_AWS_55: "Ensure S3 bucket has ignore public ACLs enabled"
|
Infrastructure-as-Code Security Scan
CKV_AWS_56: "Ensure S3 bucket has 'restrict_public_buckets' enabled"
|
Infrastructure-as-Code Security Scan
CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted"
|
Infrastructure-as-Code Security Scan
CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled"
|
Infrastructure-as-Code Security Scan
CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances"
|
Infrastructure-as-Code Security Scan
CKV_AWS_135: "Ensure that EC2 is EBS optimized"
|
Infrastructure-as-Code Security Scan
CKV_AWS_277: "Ensure no security groups allow ingress from 0.0.0.0:0 to port -1"
|
Infrastructure-as-Code Security Scan
CKV_AWS_25: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 3389"
|
Infrastructure-as-Code Security Scan
Process completed with exit code 1.
|
Infrastructure-as-Code Security Scan
Failed to CreateArtifact: Received non-retryable error: Failed request: (409) Conflict: an artifact with this name already exists on the workflow run
|
Artifacts
Produced during runtime
Name | Size | |
---|---|---|
infra-scan-results
|
2.2 KB |
|
zap-scan-results
|
3.47 KB |
|