From f89fcc829af8c4c8984e54df393e5a30d6ae6640 Mon Sep 17 00:00:00 2001 From: "prisma-cloud-devsecops[bot]" <89982750+prisma-cloud-devsecops[bot]@users.noreply.github.com> Date: Mon, 16 Oct 2023 13:06:05 +0000 Subject: [PATCH] Prisma Cloud [bot] commented --- CloudFormation/EC2/EC2withsecuritygroup.yaml | 6 ++++++ CloudFormation/S3/S3_Website_Buckey.yaml | 3 +++ terraform/aws/main.tf | 11 ++++++++++- terraform/azure/instance.tf | 6 ++++++ terraform/azure/networking.tf | 18 ++++++++++++++++++ terraform/azure/sql.tf | 6 ++++++ terraform/azure/storage.tf | 15 +++++++++------ terraform/gcp/bigdata.tf | 3 +++ terraform/gcp/instances.tf | 6 ++++++ 9 files changed, 67 insertions(+), 7 deletions(-) diff --git a/CloudFormation/EC2/EC2withsecuritygroup.yaml b/CloudFormation/EC2/EC2withsecuritygroup.yaml index 08bd3d2..a783f96 100644 --- a/CloudFormation/EC2/EC2withsecuritygroup.yaml +++ b/CloudFormation/EC2/EC2withsecuritygroup.yaml @@ -45,6 +45,9 @@ Resources: SecurityGroups: [!Ref 'InstanceSecurityGroup'] KeyName: !Ref 'KeyName' ImageId: !Ref 'LatestAmiId' + Tags: + - Key: yor_trace + Value: 3592612b-dc99-46d2-a17a-3f03e71162ba InstanceSecurityGroup: Type: AWS::EC2::SecurityGroup Properties: @@ -54,6 +57,9 @@ Resources: FromPort: 22 ToPort: 22 CidrIp: !Ref 'SSHLocation' + Tags: + - Key: yor_trace + Value: 363e4028-7b57-4413-80b3-b493cde4f357 Outputs: InstanceId: Description: InstanceId of the newly created EC2 instance diff --git a/CloudFormation/S3/S3_Website_Buckey.yaml b/CloudFormation/S3/S3_Website_Buckey.yaml index e3ac423..06911fd 100644 --- a/CloudFormation/S3/S3_Website_Buckey.yaml +++ b/CloudFormation/S3/S3_Website_Buckey.yaml @@ -14,6 +14,9 @@ Resources: WebsiteConfiguration: IndexDocument: index.html ErrorDocument: error.html + Tags: + - Key: yor_trace + Value: 47fb0421-a702-4b16-94f6-9c4566b59c70 DeletionPolicy: Retain Outputs: WebsiteURL: diff --git a/terraform/aws/main.tf b/terraform/aws/main.tf index 58069e3..a1a82de 100644 --- a/terraform/aws/main.tf +++ b/terraform/aws/main.tf @@ -31,6 +31,9 @@ export AWS_SECRET_ACCESS_KEY=wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMAAAKEY export AWS_DEFAULT_REGION=us-west-2 echo "

Deployed via Terraform

" | sudo tee /var/www/html/index.html EOF + tags = { + yor_trace = "4b2c131e-93bf-4fa4-a72a-e39b8e7e6ff3" + } } @@ -38,11 +41,17 @@ EOF resource "aws_ebs_volume" "ebs-web-storage" { availability_zone = "${var.region}a" size = 40 + tags = { + yor_trace = "69e40cd6-8c54-4dc3-b843-c602ba352f01" + } } resource "aws_s3_bucket" "test_bucket" { bucket = "my-test-bucket" force_destroy = true - acl = "public-read" + acl = "public-read" + tags = { + yor_trace = "3d5bfcbd-5db0-47cc-8954-43d1c47c5be3" + } } \ No newline at end of file diff --git a/terraform/azure/instance.tf b/terraform/azure/instance.tf index db25253..40651fe 100644 --- a/terraform/azure/instance.tf +++ b/terraform/azure/instance.tf @@ -25,6 +25,9 @@ resource azurerm_linux_virtual_machine "linux_machine" { caching = "ReadWrite" storage_account_type = "Standard_LRS" } + tags = { + yor_trace = "63040488-399a-4bc6-a356-1a190e701e0f" + } } resource azurerm_windows_virtual_machine "windows_machine" { @@ -46,4 +49,7 @@ resource azurerm_windows_virtual_machine "windows_machine" { sku = "2016-Datacenter" version = "latest" } + tags = { + yor_trace = "4be611e9-69a7-4722-beb8-37261d82d3bc" + } } \ No newline at end of file diff --git a/terraform/azure/networking.tf b/terraform/azure/networking.tf index 501be33..72dc46f 100644 --- a/terraform/azure/networking.tf +++ b/terraform/azure/networking.tf @@ -3,6 +3,9 @@ resource "azurerm_virtual_network" "example" { address_space = ["10.0.0.0/16"] location = azurerm_resource_group.example.location resource_group_name = azurerm_resource_group.example.name + tags = { + yor_trace = "15401726-12e8-4be3-a8fb-46da56928d3e" + } } resource "azurerm_subnet" "example" { @@ -22,6 +25,9 @@ resource "azurerm_network_interface" "ni_linux" { subnet_id = azurerm_subnet.example.id private_ip_address_allocation = "Dynamic" } + tags = { + yor_trace = "a22143c2-2e71-4657-a29a-7bfe5219d337" + } } resource "azurerm_network_interface" "ni_win" { @@ -34,6 +40,9 @@ resource "azurerm_network_interface" "ni_win" { subnet_id = azurerm_subnet.example.id private_ip_address_allocation = "Dynamic" } + tags = { + yor_trace = "c3169558-f5b0-4196-8dc1-81a9d1139ce6" + } } resource azurerm_network_security_group "bad_sg" { @@ -64,12 +73,18 @@ resource azurerm_network_security_group "bad_sg" { destination_port_range = "3389-3389" destination_address_prefix = "*" } + tags = { + yor_trace = "285f8010-4425-4e33-a323-2ded64a068b5" + } } resource azurerm_network_watcher "network_watcher" { location = var.location name = "casdemo-network-watcher-${var.environment}" resource_group_name = azurerm_resource_group.example.name + tags = { + yor_trace = "e357daa3-6473-48d5-901b-08be1f45efc0" + } } resource azurerm_network_watcher_flow_log "flow_log" { @@ -82,4 +97,7 @@ resource azurerm_network_watcher_flow_log "flow_log" { enabled = false days = 10 } + tags = { + yor_trace = "bafda0e8-15d0-4388-85f9-6034510ebcce" + } } \ No newline at end of file diff --git a/terraform/azure/sql.tf b/terraform/azure/sql.tf index 1b35dbc..c7c4576 100644 --- a/terraform/azure/sql.tf +++ b/terraform/azure/sql.tf @@ -5,6 +5,9 @@ resource "azurerm_sql_server" "example" { version = "12.0" administrator_login = "admin" administrator_login_password = "Aa12345678" + tags = { + yor_trace = "4f1f397c-6784-4d15-b638-d2f9b825c4c3" + } } resource "azurerm_mssql_server_security_alert_policy" "example" { @@ -37,4 +40,7 @@ resource "azurerm_mysql_server" "example" { infrastructure_encryption_enabled = true public_network_access_enabled = true ssl_enforcement_enabled = false + tags = { + yor_trace = "3d78449e-a33f-4c8a-bae6-8afb2a53f0fb" + } } \ No newline at end of file diff --git a/terraform/azure/storage.tf b/terraform/azure/storage.tf index 98e7db5..5103378 100644 --- a/terraform/azure/storage.tf +++ b/terraform/azure/storage.tf @@ -1,8 +1,11 @@ resource "azurerm_storage_account" "test_blob" { - name = var.st.name - resource_group_name = var.rg_shared_name - location = var.rg_shared_location - account_tier = var.st.tier - account_replication_type = var.st.replication - public_network_access_enabled = true + name = var.st.name + resource_group_name = var.rg_shared_name + location = var.rg_shared_location + account_tier = var.st.tier + account_replication_type = var.st.replication + public_network_access_enabled = true + tags = { + yor_trace = "8a7102ec-03b4-47f3-b8f5-d3bb89cd5e5b" + } } \ No newline at end of file diff --git a/terraform/gcp/bigdata.tf b/terraform/gcp/bigdata.tf index 99d5135..0020b80 100644 --- a/terraform/gcp/bigdata.tf +++ b/terraform/gcp/bigdata.tf @@ -24,4 +24,7 @@ resource google_bigquery_dataset "dataset" { special_group = "allAuthenticatedUsers" role = "READER" } + labels = { + yor_trace = "03ca38d0-fa92-4398-ae4a-6933ea74691b" + } } \ No newline at end of file diff --git a/terraform/gcp/instances.tf b/terraform/gcp/instances.tf index 1d92638..e2b88a3 100644 --- a/terraform/gcp/instances.tf +++ b/terraform/gcp/instances.tf @@ -21,8 +21,14 @@ resource google_compute_instance "server" { enable-oslogin = false serial-port-enable = true } + labels = { + yor_trace = "a969f012-c2d9-41a7-9e6a-ab5b3724570e" + } } resource google_compute_disk "unencrypted_disk" { name = "casdemo-${var.environment}-disk" + labels = { + yor_trace = "10ba8a24-d5f0-46ce-805c-c5ca66108ad8" + } } \ No newline at end of file