From f89fcc829af8c4c8984e54df393e5a30d6ae6640 Mon Sep 17 00:00:00 2001
From: "prisma-cloud-devsecops[bot]"
<89982750+prisma-cloud-devsecops[bot]@users.noreply.github.com>
Date: Mon, 16 Oct 2023 13:06:05 +0000
Subject: [PATCH] Prisma Cloud [bot] commented
---
CloudFormation/EC2/EC2withsecuritygroup.yaml | 6 ++++++
CloudFormation/S3/S3_Website_Buckey.yaml | 3 +++
terraform/aws/main.tf | 11 ++++++++++-
terraform/azure/instance.tf | 6 ++++++
terraform/azure/networking.tf | 18 ++++++++++++++++++
terraform/azure/sql.tf | 6 ++++++
terraform/azure/storage.tf | 15 +++++++++------
terraform/gcp/bigdata.tf | 3 +++
terraform/gcp/instances.tf | 6 ++++++
9 files changed, 67 insertions(+), 7 deletions(-)
diff --git a/CloudFormation/EC2/EC2withsecuritygroup.yaml b/CloudFormation/EC2/EC2withsecuritygroup.yaml
index 08bd3d2..a783f96 100644
--- a/CloudFormation/EC2/EC2withsecuritygroup.yaml
+++ b/CloudFormation/EC2/EC2withsecuritygroup.yaml
@@ -45,6 +45,9 @@ Resources:
SecurityGroups: [!Ref 'InstanceSecurityGroup']
KeyName: !Ref 'KeyName'
ImageId: !Ref 'LatestAmiId'
+ Tags:
+ - Key: yor_trace
+ Value: 3592612b-dc99-46d2-a17a-3f03e71162ba
InstanceSecurityGroup:
Type: AWS::EC2::SecurityGroup
Properties:
@@ -54,6 +57,9 @@ Resources:
FromPort: 22
ToPort: 22
CidrIp: !Ref 'SSHLocation'
+ Tags:
+ - Key: yor_trace
+ Value: 363e4028-7b57-4413-80b3-b493cde4f357
Outputs:
InstanceId:
Description: InstanceId of the newly created EC2 instance
diff --git a/CloudFormation/S3/S3_Website_Buckey.yaml b/CloudFormation/S3/S3_Website_Buckey.yaml
index e3ac423..06911fd 100644
--- a/CloudFormation/S3/S3_Website_Buckey.yaml
+++ b/CloudFormation/S3/S3_Website_Buckey.yaml
@@ -14,6 +14,9 @@ Resources:
WebsiteConfiguration:
IndexDocument: index.html
ErrorDocument: error.html
+ Tags:
+ - Key: yor_trace
+ Value: 47fb0421-a702-4b16-94f6-9c4566b59c70
DeletionPolicy: Retain
Outputs:
WebsiteURL:
diff --git a/terraform/aws/main.tf b/terraform/aws/main.tf
index 58069e3..a1a82de 100644
--- a/terraform/aws/main.tf
+++ b/terraform/aws/main.tf
@@ -31,6 +31,9 @@ export AWS_SECRET_ACCESS_KEY=wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMAAAKEY
export AWS_DEFAULT_REGION=us-west-2
echo "
Deployed via Terraform
" | sudo tee /var/www/html/index.html
EOF
+ tags = {
+ yor_trace = "4b2c131e-93bf-4fa4-a72a-e39b8e7e6ff3"
+ }
}
@@ -38,11 +41,17 @@ EOF
resource "aws_ebs_volume" "ebs-web-storage" {
availability_zone = "${var.region}a"
size = 40
+ tags = {
+ yor_trace = "69e40cd6-8c54-4dc3-b843-c602ba352f01"
+ }
}
resource "aws_s3_bucket" "test_bucket" {
bucket = "my-test-bucket"
force_destroy = true
- acl = "public-read"
+ acl = "public-read"
+ tags = {
+ yor_trace = "3d5bfcbd-5db0-47cc-8954-43d1c47c5be3"
+ }
}
\ No newline at end of file
diff --git a/terraform/azure/instance.tf b/terraform/azure/instance.tf
index db25253..40651fe 100644
--- a/terraform/azure/instance.tf
+++ b/terraform/azure/instance.tf
@@ -25,6 +25,9 @@ resource azurerm_linux_virtual_machine "linux_machine" {
caching = "ReadWrite"
storage_account_type = "Standard_LRS"
}
+ tags = {
+ yor_trace = "63040488-399a-4bc6-a356-1a190e701e0f"
+ }
}
resource azurerm_windows_virtual_machine "windows_machine" {
@@ -46,4 +49,7 @@ resource azurerm_windows_virtual_machine "windows_machine" {
sku = "2016-Datacenter"
version = "latest"
}
+ tags = {
+ yor_trace = "4be611e9-69a7-4722-beb8-37261d82d3bc"
+ }
}
\ No newline at end of file
diff --git a/terraform/azure/networking.tf b/terraform/azure/networking.tf
index 501be33..72dc46f 100644
--- a/terraform/azure/networking.tf
+++ b/terraform/azure/networking.tf
@@ -3,6 +3,9 @@ resource "azurerm_virtual_network" "example" {
address_space = ["10.0.0.0/16"]
location = azurerm_resource_group.example.location
resource_group_name = azurerm_resource_group.example.name
+ tags = {
+ yor_trace = "15401726-12e8-4be3-a8fb-46da56928d3e"
+ }
}
resource "azurerm_subnet" "example" {
@@ -22,6 +25,9 @@ resource "azurerm_network_interface" "ni_linux" {
subnet_id = azurerm_subnet.example.id
private_ip_address_allocation = "Dynamic"
}
+ tags = {
+ yor_trace = "a22143c2-2e71-4657-a29a-7bfe5219d337"
+ }
}
resource "azurerm_network_interface" "ni_win" {
@@ -34,6 +40,9 @@ resource "azurerm_network_interface" "ni_win" {
subnet_id = azurerm_subnet.example.id
private_ip_address_allocation = "Dynamic"
}
+ tags = {
+ yor_trace = "c3169558-f5b0-4196-8dc1-81a9d1139ce6"
+ }
}
resource azurerm_network_security_group "bad_sg" {
@@ -64,12 +73,18 @@ resource azurerm_network_security_group "bad_sg" {
destination_port_range = "3389-3389"
destination_address_prefix = "*"
}
+ tags = {
+ yor_trace = "285f8010-4425-4e33-a323-2ded64a068b5"
+ }
}
resource azurerm_network_watcher "network_watcher" {
location = var.location
name = "casdemo-network-watcher-${var.environment}"
resource_group_name = azurerm_resource_group.example.name
+ tags = {
+ yor_trace = "e357daa3-6473-48d5-901b-08be1f45efc0"
+ }
}
resource azurerm_network_watcher_flow_log "flow_log" {
@@ -82,4 +97,7 @@ resource azurerm_network_watcher_flow_log "flow_log" {
enabled = false
days = 10
}
+ tags = {
+ yor_trace = "bafda0e8-15d0-4388-85f9-6034510ebcce"
+ }
}
\ No newline at end of file
diff --git a/terraform/azure/sql.tf b/terraform/azure/sql.tf
index 1b35dbc..c7c4576 100644
--- a/terraform/azure/sql.tf
+++ b/terraform/azure/sql.tf
@@ -5,6 +5,9 @@ resource "azurerm_sql_server" "example" {
version = "12.0"
administrator_login = "admin"
administrator_login_password = "Aa12345678"
+ tags = {
+ yor_trace = "4f1f397c-6784-4d15-b638-d2f9b825c4c3"
+ }
}
resource "azurerm_mssql_server_security_alert_policy" "example" {
@@ -37,4 +40,7 @@ resource "azurerm_mysql_server" "example" {
infrastructure_encryption_enabled = true
public_network_access_enabled = true
ssl_enforcement_enabled = false
+ tags = {
+ yor_trace = "3d78449e-a33f-4c8a-bae6-8afb2a53f0fb"
+ }
}
\ No newline at end of file
diff --git a/terraform/azure/storage.tf b/terraform/azure/storage.tf
index 98e7db5..5103378 100644
--- a/terraform/azure/storage.tf
+++ b/terraform/azure/storage.tf
@@ -1,8 +1,11 @@
resource "azurerm_storage_account" "test_blob" {
- name = var.st.name
- resource_group_name = var.rg_shared_name
- location = var.rg_shared_location
- account_tier = var.st.tier
- account_replication_type = var.st.replication
- public_network_access_enabled = true
+ name = var.st.name
+ resource_group_name = var.rg_shared_name
+ location = var.rg_shared_location
+ account_tier = var.st.tier
+ account_replication_type = var.st.replication
+ public_network_access_enabled = true
+ tags = {
+ yor_trace = "8a7102ec-03b4-47f3-b8f5-d3bb89cd5e5b"
+ }
}
\ No newline at end of file
diff --git a/terraform/gcp/bigdata.tf b/terraform/gcp/bigdata.tf
index 99d5135..0020b80 100644
--- a/terraform/gcp/bigdata.tf
+++ b/terraform/gcp/bigdata.tf
@@ -24,4 +24,7 @@ resource google_bigquery_dataset "dataset" {
special_group = "allAuthenticatedUsers"
role = "READER"
}
+ labels = {
+ yor_trace = "03ca38d0-fa92-4398-ae4a-6933ea74691b"
+ }
}
\ No newline at end of file
diff --git a/terraform/gcp/instances.tf b/terraform/gcp/instances.tf
index 1d92638..e2b88a3 100644
--- a/terraform/gcp/instances.tf
+++ b/terraform/gcp/instances.tf
@@ -21,8 +21,14 @@ resource google_compute_instance "server" {
enable-oslogin = false
serial-port-enable = true
}
+ labels = {
+ yor_trace = "a969f012-c2d9-41a7-9e6a-ab5b3724570e"
+ }
}
resource google_compute_disk "unencrypted_disk" {
name = "casdemo-${var.environment}-disk"
+ labels = {
+ yor_trace = "10ba8a24-d5f0-46ce-805c-c5ca66108ad8"
+ }
}
\ No newline at end of file