Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(queries): queries categories updated #6994

Merged
merged 5 commits into from
Apr 11, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "9232306a-f839-40aa-b3ef-b352001da9a5",
"queryName": "S3 Bucket Without Versioning",
"severity": "MEDIUM",
"category": "Observability",
"category": "Backup",
"descriptionText": "S3 bucket should have versioning enabled",
"descriptionUrl": "https://docs.ansible.com/ansible/latest/collections/amazon/aws/s3_bucket_module.html#parameter-versioning",
"platform": "Ansible",
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "2081c7d6-2851-4cce-bda5-cb49d462da42",
"queryName": "Standard Price Is Not Selected",
"severity": "LOW",
"category": "Networking and Firewall",
"category": "Resource Management",
"descriptionText": "Azure Security Center provides more features for standard pricing mode, so it must be activated.",
"descriptionUrl": "https://docs.microsoft.com/en-us/azure/templates/microsoft.security/pricings?tabs=json#pricingproperties-object",
"platform": "AzureResourceManager",
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "a58d1a2d-4078-4b80-855b-84cc3f7f4540",
"queryName": "IAM Group Inline Policies",
"severity": "MEDIUM",
"category": "Encryption",
"category": "Access Control",
"descriptionText": "IAM Groups should not use inline policies and instead use managed policies. If a group is deleted, the inline policy is also deleted",
"descriptionUrl": "https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-group.html",
"platform": "CloudFormation",
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "06adef8c-c284-4de7-aad2-af43b07a8ca1",
"queryName": "IAM User LoginProfile Password Is In Plaintext",
"severity": "HIGH",
"category": "Insecure Configurations",
"category": "Secret Management",
"descriptionText": "IAM User LoginProfile Password must not be a plaintext string",
"descriptionUrl": "https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-iam-user.html",
"platform": "CloudFormation",
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "2b1d4935-9acf-48a7-8466-10d18bf51a69",
"queryName": "RDS Multi-AZ Deployment Disabled",
"severity": "MEDIUM",
"category": "Backup",
"category": "Availability",
"descriptionText": "AWS RDS Instance should have a multi-az deployment",
"descriptionUrl": "https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-rds-database-instance.html",
"platform": "CloudFormation",
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "a227ec01-f97a-4084-91a4-47b350c1db54",
"queryName": "S3 Bucket Without Versioning",
"severity": "MEDIUM",
"category": "Observability",
"category": "Backup",
"descriptionText": "S3 bucket should have versioning enabled",
"descriptionUrl": "https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-s3-bucket.html",
"platform": "CloudFormation",
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "9025b2b3-e554-4842-ba87-db7aeec36d35",
"queryName": "Unscanned ECR Image",
"severity": "LOW",
"category": "Encryption",
"category": "Observability",
"descriptionText": "Checks if the ECR Image has been scanned",
"descriptionUrl": "https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-ecr-repository.html#cfn-ecr-repository-imagescanningconfiguration",
"platform": "CloudFormation",
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "6c7cfec3-c686-4ed2-bf58-a1ec054b63fc",
"queryName": "Redis Cache Allows Non SSL Connections",
"severity": "MEDIUM",
"category": "Encryption",
"category": "Insecure Configurations",
"descriptionText": "Redis Cache resource should not allow non-SSL connections.",
"descriptionUrl": "https://doc.crds.dev/github.com/crossplane/provider-azure/cache.azure.crossplane.io/Redis/v1beta1@v0.19.0#spec-forProvider-enableNonSslPort",
"platform": "Crossplane",
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,11 +2,12 @@
"id": "71bf8cf8-f0a1-42fa-b9d2-d10525e0a38e",
"queryName": "UNIX Ports Out Of Range",
"severity": "INFO",
"category": "Availability",
"category": "Networking and Firewall",
"descriptionText": "Exposing UNIX ports out of range from 0 to 65535",
"descriptionUrl": "https://docs.docker.com/engine/reference/builder/#expose",
"platform": "Dockerfile",
"descriptionID": "fed3d812",
"cwe": "682",
"oldSeverity": "HIGH"
"oldSeverity": "HIGH",
"cloudProvider" : "common"
}
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "49e30ac8-f58e-4222-b488-3dcb90158ec1",
"queryName": "Redis Cache Allows Non SSL Connections",
"severity": "MEDIUM",
"category": "Encryption",
"category": "Insecure Configurations",
"descriptionText": "Redis Cache resource should not allow non-SSL connections.",
"descriptionUrl": "https://www.pulumi.com/registry/packages/azure-native/api-docs/cache/redis/#enablenonsslport_yaml",
"platform": "Pulumi",
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "96ed3526-0179-4c73-b1b2-372fde2e0d13",
"queryName": "Default VPC Exists",
"severity": "MEDIUM",
"category": "Observability",
"category": "Insecure Defaults",
"descriptionText": "It isn't recommended to use resources in default VPC",
"descriptionUrl": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/default_vpc",
"platform": "Terraform",
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "e542bd46-58c4-4e0f-a52a-1fb4f9548e02",
"queryName": "RDS Cluster With Backup Disabled",
"severity": "MEDIUM",
"category": "Best Practices",
"category": "Backup",
"descriptionText": "RDS Cluster backup retention period should be specifically defined",
"descriptionUrl": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/rds_cluster#backup_retention_period",
"platform": "Terraform",
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "4bd15dd9-8d5e-4008-8532-27eb0c3706d3",
"queryName": "Redis Disabled",
"severity": "LOW",
"category": "Encryption",
"category": "Insecure Configurations",
"descriptionText": "ElastiCache should have Redis enabled, since it covers Compliance Certifications such as FedRAMP, HIPAA, and PCI DSS. For more information, take a look at 'https://docs.aws.amazon.com/AmazonElastiCache/latest/mem-ug/SelectEngine.html'",
"descriptionUrl": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/elasticache_cluster#engine",
"platform": "Terraform",
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "568a4d22-3517-44a6-a7ad-6a7eed88722c",
"queryName": "S3 Bucket Without Versioning",
"severity": "MEDIUM",
"category": "Observability",
"category": "Backup",
"descriptionText": "S3 bucket should have versioning enabled",
"descriptionUrl": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/s3_bucket#versioning",
"platform": "Terraform",
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "9630336b-3fed-4096-8173-b9afdfe346a7",
"queryName": "Unscanned ECR Image",
"severity": "LOW",
"category": "Encryption",
"category": "Observability",
"descriptionText": "Checks if the ECR Image has been scanned",
"descriptionUrl": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/ecr_repository#scan_on_push",
"platform": "Terraform",
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "704fcc44-a58f-4af5-82e2-93f2a58ef918",
"queryName": "User with IAM Role",
"severity": "LOW",
"category": "Best Practices",
"category": "Access Control",
"descriptionText": "As a best practice, it is better to assign an IAM Role to a group than to a user",
"descriptionUrl": "https://registry.terraform.io/providers/hashicorp/google/latest/docs/data-sources/iam_policy#role",
"platform": "Terraform",
Expand Down
2 changes: 1 addition & 1 deletion e2e/fixtures/E2E_CLI_092_RESULT.json
Original file line number Diff line number Diff line change
Expand Up @@ -87,7 +87,7 @@
"severity": "MEDIUM",
"platform": "CloudFormation",
"cloud_provider": "AWS",
"category": "Backup",
"category": "Availability",
"experimental": false,
"description": "AWS RDS Instance should have a multi-az deployment",
"description_id": "4bdb6677",
Expand Down
Loading