| 0 |
CKV_AWS_1 |
data |
aws_iam_policy_document |
Ensure IAM policies that allow full "-" administrative privileges are not created |
Terraform |
| 1 |
CKV_AWS_1 |
resource |
serverless_aws |
Ensure IAM policies that allow full "-" administrative privileges are not created |
serverless |
| 2 |
CKV_AWS_2 |
resource |
aws_lb_listener |
Ensure ALB protocol is HTTPS |
Terraform |
| 3 |
CKV_AWS_2 |
resource |
AWS::ElasticLoadBalancingV2::Listener |
Ensure ALB protocol is HTTPS |
Cloudformation |
| 4 |
CKV_AWS_3 |
resource |
aws_ebs_volume |
Ensure all data stored in the EBS is securely encrypted |
Terraform |
| 5 |
CKV_AWS_3 |
resource |
AWS::EC2::Volume |
Ensure all data stored in the EBS is securely encrypted |
Cloudformation |
| 6 |
CKV_AWS_5 |
resource |
aws_elasticsearch_domain |
Ensure all data stored in the Elasticsearch is securely encrypted at rest |
Terraform |
| 7 |
CKV_AWS_5 |
resource |
AWS::Elasticsearch::Domain |
Ensure all data stored in the Elasticsearch is securely encrypted at rest |
Cloudformation |
| 8 |
CKV_AWS_6 |
resource |
aws_elasticsearch_domain |
Ensure all Elasticsearch has node-to-node encryption enabled |
Terraform |
| 9 |
CKV_AWS_6 |
resource |
AWS::Elasticsearch::Domain |
Ensure all Elasticsearch has node-to-node encryption enabled |
Cloudformation |
| 10 |
CKV_AWS_7 |
resource |
aws_kms_key |
Ensure rotation for customer created CMKs is enabled |
Terraform |
| 11 |
CKV_AWS_7 |
resource |
AWS::KMS::Key |
Ensure rotation for customer created CMKs is enabled |
Cloudformation |
| 12 |
CKV_AWS_8 |
resource |
aws_instance |
Ensure all data stored in the Launch configuration EBS is securely encrypted |
Terraform |
| 13 |
CKV_AWS_8 |
resource |
aws_launch_configuration |
Ensure all data stored in the Launch configuration EBS is securely encrypted |
Terraform |
| 14 |
CKV_AWS_8 |
resource |
AWS::AutoScaling::LaunchConfiguration |
Ensure all data stored in the Launch configuration EBS is securely encrypted |
Cloudformation |
| 15 |
CKV_AWS_9 |
resource |
aws_iam_account_password_policy |
Ensure IAM password policy expires passwords within 90 days or less |
Terraform |
| 16 |
CKV_AWS_10 |
resource |
aws_iam_account_password_policy |
Ensure IAM password policy requires minimum length of 14 or greater |
Terraform |
| 17 |
CKV_AWS_11 |
resource |
aws_iam_account_password_policy |
Ensure IAM password policy requires at least one lowercase letter |
Terraform |
| 18 |
CKV_AWS_12 |
resource |
aws_iam_account_password_policy |
Ensure IAM password policy requires at least one number |
Terraform |
| 19 |
CKV_AWS_13 |
resource |
aws_iam_account_password_policy |
Ensure IAM password policy prevents password reuse |
Terraform |
| 20 |
CKV_AWS_14 |
resource |
aws_iam_account_password_policy |
Ensure IAM password policy requires at least one symbol |
Terraform |
| 21 |
CKV_AWS_15 |
resource |
aws_iam_account_password_policy |
Ensure IAM password policy requires at least one uppercase letter |
Terraform |
| 22 |
CKV_AWS_16 |
resource |
aws_db_instance |
Ensure all data stored in the RDS is securely encrypted at rest |
Terraform |
| 23 |
CKV_AWS_16 |
resource |
AWS::RDS::DBInstance |
Ensure all data stored in the RDS is securely encrypted at rest |
Cloudformation |
| 24 |
CKV_AWS_17 |
resource |
aws_db_instance |
Ensure all data stored in the RDS bucket is not public accessible |
Terraform |
| 25 |
CKV_AWS_17 |
resource |
aws_rds_cluster_instance |
Ensure all data stored in the RDS bucket is not public accessible |
Terraform |
| 26 |
CKV_AWS_17 |
resource |
AWS::RDS::DBInstance |
Ensure all data stored in the RDS bucket is not public accessible |
Cloudformation |
| 27 |
CKV_AWS_18 |
resource |
aws_s3_bucket |
Ensure the S3 bucket has access logging enabled |
Terraform |
| 28 |
CKV_AWS_18 |
resource |
AWS::S3::Bucket |
Ensure the S3 bucket has access logging enabled |
Cloudformation |
| 29 |
CKV_AWS_19 |
resource |
aws_s3_bucket |
Ensure all data stored in the S3 bucket is securely encrypted at rest |
Terraform |
| 30 |
CKV_AWS_19 |
resource |
AWS::S3::Bucket |
Ensure the S3 bucket has server-side-encryption enabled |
Cloudformation |
| 31 |
CKV_AWS_20 |
resource |
aws_s3_bucket |
S3 Bucket has an ACL defined which allows public READ access. |
Terraform |
| 32 |
CKV_AWS_20 |
resource |
AWS::S3::Bucket |
Ensure the S3 bucket does not allow READ permissions to everyone |
Cloudformation |
| 33 |
CKV_AWS_21 |
resource |
aws_s3_bucket |
Ensure all data stored in the S3 bucket have versioning enabled |
Terraform |
| 34 |
CKV_AWS_21 |
resource |
AWS::S3::Bucket |
Ensure the S3 bucket has versioning enabled |
Cloudformation |
| 35 |
CKV_AWS_22 |
resource |
aws_sagemaker_notebook_instance |
Ensure all data stored in the Sagemaker Notebook is securely encrypted at rest |
Terraform |
| 36 |
CKV_AWS_23 |
resource |
aws_security_group |
Ensure every security groups rule has a description |
Terraform |
| 37 |
CKV_AWS_23 |
resource |
aws_security_group_rule |
Ensure every security groups rule has a description |
Terraform |
| 38 |
CKV_AWS_23 |
resource |
aws_db_security_group |
Ensure every security groups rule has a description |
Terraform |
| 39 |
CKV_AWS_23 |
resource |
aws_elasticache_security_group |
Ensure every security groups rule has a description |
Terraform |
| 40 |
CKV_AWS_23 |
resource |
aws_redshift_security_group |
Ensure every security groups rule has a description |
Terraform |
| 41 |
CKV_AWS_23 |
resource |
AWS::EC2::SecurityGroup |
Ensure every security groups rule has a description |
Cloudformation |
| 42 |
CKV_AWS_23 |
resource |
AWS::EC2::SecurityGroupIngress |
Ensure every security groups rule has a description |
Cloudformation |
| 43 |
CKV_AWS_23 |
resource |
AWS::EC2::SecurityGroupEgress |
Ensure every security groups rule has a description |
Cloudformation |
| 44 |
CKV_AWS_24 |
resource |
aws_security_group |
Ensure no security groups allow ingress from 0.0.0.0:0 to port 22 |
Terraform |
| 45 |
CKV_AWS_24 |
resource |
aws_security_group_rule |
Ensure no security groups allow ingress from 0.0.0.0:0 to port 22 |
Terraform |
| 46 |
CKV_AWS_24 |
resource |
AWS::EC2::SecurityGroup |
Ensure no security groups allow ingress from 0.0.0.0:0 to port 22 |
Cloudformation |
| 47 |
CKV_AWS_24 |
resource |
AWS::EC2::SecurityGroupIngress |
Ensure no security groups allow ingress from 0.0.0.0:0 to port 22 |
Cloudformation |
| 48 |
CKV_AWS_25 |
resource |
aws_security_group |
Ensure no security groups allow ingress from 0.0.0.0:0 to port 3389 |
Terraform |
| 49 |
CKV_AWS_25 |
resource |
aws_security_group_rule |
Ensure no security groups allow ingress from 0.0.0.0:0 to port 3389 |
Terraform |
| 50 |
CKV_AWS_25 |
resource |
AWS::EC2::SecurityGroup |
Ensure no security groups allow ingress from 0.0.0.0:0 to port 3389 |
Cloudformation |
| 51 |
CKV_AWS_25 |
resource |
AWS::EC2::SecurityGroupIngress |
Ensure no security groups allow ingress from 0.0.0.0:0 to port 3389 |
Cloudformation |
| 52 |
CKV_AWS_26 |
resource |
aws_sns_topic |
Ensure all data stored in the SNS topic is encrypted |
Terraform |
| 53 |
CKV_AWS_26 |
resource |
AWS::SNS::Topic |
Ensure all data stored in the SNS topic is encrypted |
Cloudformation |
| 54 |
CKV_AWS_27 |
resource |
aws_sqs_queue |
Ensure all data stored in the SQS queue is encrypted |
Terraform |
| 55 |
CKV_AWS_27 |
resource |
AWS::SQS::Queue |
Ensure all data stored in the SQS queue is encrypted |
Cloudformation |
| 56 |
CKV_AWS_28 |
resource |
aws_dynamodb_table |
Ensure Dynamodb point in time recovery (backup) is enabled |
Terraform |
| 57 |
CKV_AWS_28 |
resource |
AWS::DynamoDB::Table |
Ensure Dynamodb point in time recovery (backup) is enabled |
Cloudformation |
| 58 |
CKV_AWS_29 |
resource |
aws_elasticache_replication_group |
Ensure all data stored in the Elasticache Replication Group is securely encrypted at rest |
Terraform |
| 59 |
CKV_AWS_29 |
resource |
AWS::ElastiCache::ReplicationGroup |
Ensure all data stored in the Elasticache Replication Group is securely encrypted at rest |
Cloudformation |
| 60 |
CKV_AWS_30 |
resource |
aws_elasticache_replication_group |
Ensure all data stored in the Elasticache Replication Group is securely encrypted at transit |
Terraform |
| 61 |
CKV_AWS_30 |
resource |
AWS::ElastiCache::ReplicationGroup |
Ensure all data stored in the Elasticache Replication Group is securely encrypted at transit |
Cloudformation |
| 62 |
CKV_AWS_31 |
resource |
aws_elasticache_replication_group |
Ensure all data stored in the Elasticache Replication Group is securely encrypted at transit and has auth token |
Terraform |
| 63 |
CKV_AWS_31 |
resource |
AWS::ElastiCache::ReplicationGroup |
Ensure all data stored in the Elasticache Replication Group is securely encrypted at transit and has auth token |
Cloudformation |
| 64 |
CKV_AWS_32 |
resource |
aws_ecr_repository_policy |
Ensure ECR policy is not set to public |
Terraform |
| 65 |
CKV_AWS_32 |
resource |
AWS::ECR::Repository |
Ensure ECR policy is not set to public |
Cloudformation |
| 66 |
CKV_AWS_33 |
resource |
aws_ecr_repository |
Ensure ECR image scanning on push is enabled |
Terraform |
| 67 |
CKV_AWS_33 |
resource |
AWS::KMS::Key |
Ensure KMS key policy does not contain wildcard (*) principal |
Cloudformation |
| 68 |
CKV_AWS_34 |
resource |
aws_cloudfront_distribution |
Ensure cloudfront distribution ViewerProtocolPolicy is set to HTTPS |
Terraform |
| 69 |
CKV_AWS_34 |
resource |
AWS::CloudFront::Distribution |
Ensure cloudfront distribution ViewerProtocolPolicy is set to HTTPS |
Cloudformation |
| 70 |
CKV_AWS_35 |
resource |
aws_cloudtrail |
Ensure CloudTrail logs are encrypted at rest using KMS CMKs |
Terraform |
| 71 |
CKV_AWS_35 |
resource |
AWS::CloudTrail::Trail |
Ensure CloudTrail logs are encrypted at rest using KMS CMKs |
Cloudformation |
| 72 |
CKV_AWS_36 |
resource |
aws_cloudtrail |
Ensure CloudTrail log file validation is enabled |
Terraform |
| 73 |
CKV_AWS_36 |
resource |
AWS::CloudTrail::Trail |
Ensure CloudTrail log file validation is enabled |
Cloudformation |
| 74 |
CKV_AWS_37 |
resource |
aws_eks_cluster |
Ensure Amazon EKS control plane logging enabled for all log types |
Terraform |
| 75 |
CKV_AWS_38 |
resource |
aws_eks_cluster |
Ensure Amazon EKS public endpoint not accessible to 0.0.0.0/0 |
Terraform |
| 76 |
CKV_AWS_39 |
resource |
aws_eks_cluster |
Ensure Amazon EKS public endpoint disabled |
Terraform |
| 77 |
CKV_AWS_40 |
resource |
aws_iam_user_policy |
Ensure IAM policies are attached only to groups or roles (Reducing access management complexity may in-turn reduce opportunity for a principal to inadvertently receive or retain excessive privileges.) |
Terraform |
| 78 |
CKV_AWS_40 |
resource |
aws_iam_user_policy_attachment |
Ensure IAM policies are attached only to groups or roles (Reducing access management complexity may in-turn reduce opportunity for a principal to inadvertently receive or retain excessive privileges.) |
Terraform |
| 79 |
CKV_AWS_40 |
resource |
aws_iam_policy_attachment |
Ensure IAM policies are attached only to groups or roles (Reducing access management complexity may in-turn reduce opportunity for a principal to inadvertently receive or retain excessive privileges.) |
Terraform |
| 80 |
CKV_AWS_40 |
resource |
AWS::IAM::Policy |
Ensure IAM policies are attached only to groups or roles (Reducing access management complexity may in-turn reduce opportunity for a principal to inadvertently receive or retain excessive privileges.) |
Cloudformation |
| 81 |
CKV_AWS_41 |
provider |
aws |
Ensure no hard coded AWS access key and secret key exists in provider |
Terraform |
| 82 |
CKV_AWS_41 |
resource |
serverless_aws |
Ensure no hard coded AWS access key and secret key exists in provider |
serverless |
| 83 |
CKV_AWS_42 |
resource |
aws_efs_file_system |
Ensure EFS is securely encrypted |
Terraform |
| 84 |
CKV_AWS_42 |
resource |
AWS::EFS::FileSystem |
Ensure EFS is securely encrypted |
Cloudformation |
| 85 |
CKV_AWS_43 |
resource |
aws_kinesis_stream |
Ensure Kinesis Stream is securely encrypted |
Terraform |
| 86 |
CKV_AWS_43 |
resource |
AWS::Kinesis::Stream |
Ensure Kinesis Stream is securely encrypted |
Cloudformation |
| 87 |
CKV_AWS_44 |
resource |
aws_neptune_cluster |
Ensure Neptune storage is securely encrypted |
Terraform |
| 88 |
CKV_AWS_44 |
resource |
AWS::Neptune::DBCluster |
Ensure Neptune storage is securely encrypted |
Cloudformation |
| 89 |
CKV_AWS_45 |
resource |
aws_lambda_function |
Ensure no hard-coded secrets exist in lambda environment |
Terraform |
| 90 |
CKV_AWS_45 |
resource |
AWS::Lambda::Function |
Ensure no hard-coded secrets exist in lambda environment |
Cloudformation |
| 91 |
CKV_AWS_46 |
resource |
aws_instance |
Ensure no hard-coded secrets exist in EC2 user data |
Terraform |
| 92 |
CKV_AWS_46 |
resource |
AWS::EC2::Instance |
Ensure no hard-coded secrets exist in EC2 user data |
Cloudformation |
| 93 |
CKV_AWS_47 |
resource |
aws_dax_cluster |
Ensure DAX is encrypted at rest (default is unencrypted) |
Terraform |
| 94 |
CKV_AWS_47 |
resource |
AWS::DAX::Cluster |
Ensure DAX is encrypted at rest (default is unencrypted) |
Cloudformation |
| 95 |
CKV_AWS_48 |
resource |
aws_mq_broker |
Ensure MQ Broker logging is enabled |
Terraform |
| 96 |
CKV_AWS_49 |
data |
aws_iam_policy_document |
Ensure no IAM policies documents allow "*" as a statement's actions |
Terraform |
| 97 |
CKV_AWS_49 |
resource |
serverless_aws |
Ensure no IAM policies documents allow "*" as a statement's actions |
serverless |
| 98 |
CKV_AWS_50 |
resource |
aws_lambda_function |
X-ray tracing is enabled for Lambda |
Terraform |
| 99 |
CKV_AWS_51 |
resource |
aws_ecr_repository |
Ensure ECR Image Tags are immutable |
Terraform |
| 100 |
CKV_AWS_51 |
resource |
AWS::ECR::Repository |
Ensure ECR Image Tags are immutable |
Cloudformation |
| 101 |
CKV_AWS_52 |
resource |
aws_s3_bucket |
Ensure S3 bucket has MFA delete enabled |
Terraform |
| 102 |
CKV_AWS_53 |
resource |
aws_s3_bucket_public_access_block |
Ensure S3 bucket has block public ACLS enabled |
Terraform |
| 103 |
CKV_AWS_53 |
resource |
AWS::S3::Bucket |
Ensure S3 bucket has block public ACLS enabled |
Cloudformation |
| 104 |
CKV_AWS_54 |
resource |
aws_s3_bucket_public_access_block |
Ensure S3 bucket has block public policy enabled |
Terraform |
| 105 |
CKV_AWS_54 |
resource |
AWS::S3::Bucket |
Ensure S3 bucket has block public policy enabled |
Cloudformation |
| 106 |
CKV_AWS_55 |
resource |
aws_s3_bucket_public_access_block |
Ensure S3 bucket has ignore public ACLs enabled |
Terraform |
| 107 |
CKV_AWS_55 |
resource |
AWS::S3::Bucket |
Ensure S3 bucket has ignore public ACLs enabled |
Cloudformation |
| 108 |
CKV_AWS_56 |
resource |
aws_s3_bucket_public_access_block |
Ensure S3 bucket has 'restrict_public_bucket' enabled |
Terraform |
| 109 |
CKV_AWS_56 |
resource |
AWS::S3::Bucket |
Ensure S3 bucket has 'restrict_public_bucket' enabled |
Cloudformation |
| 110 |
CKV_AWS_57 |
resource |
aws_s3_bucket |
S3 Bucket has an ACL defined which allows public WRITE access. |
Terraform |
| 111 |
CKV_AWS_57 |
resource |
AWS::S3::Bucket |
Ensure the S3 bucket does not allow WRITE permissions to everyone |
Cloudformation |
| 112 |
CKV_AWS_58 |
resource |
aws_eks_cluster |
Ensure EKS Cluster has Secrets Encryption Enabled |
Terraform |
| 113 |
CKV_AWS_58 |
resource |
AWS::EKS::Cluster |
Ensure EKS Cluster has Secrets Encryption Enabled |
Cloudformation |
| 114 |
CKV_AWS_59 |
resource |
aws_api_gateway_method |
Ensure there is no open access to back-end resources through API |
Terraform |
| 115 |
CKV_AWS_59 |
resource |
AWS::ApiGateway::Method |
Ensure there is no open access to back-end resources through API |
Cloudformation |
| 116 |
CKV_AWS_60 |
resource |
aws_iam_role |
Ensure IAM role allows only specific services or principals to assume it |
Terraform |
| 117 |
CKV_AWS_61 |
resource |
aws_iam_role |
Ensure IAM role allows only specific principals in account to assume it |
Terraform |
| 118 |
CKV_AWS_61 |
resource |
AWS::IAM::Role |
Ensure IAM role allows only specific principals in account to assume it |
Cloudformation |
| 119 |
CKV_AWS_62 |
resource |
aws_iam_role_policy |
Ensure IAM policies that allow full "-" administrative privileges are not created |
Terraform |
| 120 |
CKV_AWS_62 |
resource |
aws_iam_user_policy |
Ensure IAM policies that allow full "-" administrative privileges are not created |
Terraform |
| 121 |
CKV_AWS_62 |
resource |
aws_iam_group_policy |
Ensure IAM policies that allow full "-" administrative privileges are not created |
Terraform |
| 122 |
CKV_AWS_62 |
resource |
aws_iam_policy |
Ensure IAM policies that allow full "-" administrative privileges are not created |
Terraform |
| 123 |
CKV_AWS_63 |
resource |
aws_iam_role_policy |
Ensure no IAM policies documents allow "*" as a statement's actions |
Terraform |
| 124 |
CKV_AWS_63 |
resource |
aws_iam_user_policy |
Ensure no IAM policies documents allow "*" as a statement's actions |
Terraform |
| 125 |
CKV_AWS_63 |
resource |
aws_iam_group_policy |
Ensure no IAM policies documents allow "*" as a statement's actions |
Terraform |
| 126 |
CKV_AWS_63 |
resource |
aws_iam_policy |
Ensure no IAM policies documents allow "*" as a statement's actions |
Terraform |
| 127 |
CKV_AWS_64 |
resource |
aws_redshift_cluster |
Ensure all data stored in the Redshift cluster is securely encrypted at rest |
Terraform |
| 128 |
CKV_AWS_64 |
resource |
AWS::Redshift::Cluster |
Ensure all data stored in the Redshift cluster is securely encrypted at rest |
Cloudformation |
| 129 |
CKV_AWS_65 |
resource |
aws_ecs_cluster |
Ensure container insights are enabled on ECS cluster |
Terraform |
| 130 |
CKV_AWS_65 |
resource |
AWS::ECS::Cluster |
Ensure container insights are enabled on ECS cluster |
Cloudformation |
| 131 |
CKV_AWS_66 |
resource |
aws_cloudwatch_log_group |
Ensure cloudwatch log groups specify retention days |
Terraform |
| 132 |
CKV_AWS_66 |
resource |
AWS::Logs::LogGroup |
Ensure cloudwatch log groups specify retention days |
Cloudformation |
| 133 |
CKV_AWS_67 |
resource |
aws_cloudtrail |
Ensure CloudTrail is enabled in all Regions |
Terraform |
| 134 |
CKV_AWS_67 |
resource |
AWS::CloudTrail::Trail |
Ensure CloudTrail is enabled in all Regions |
Cloudformation |
| 135 |
CKV_AWS_68 |
resource |
aws_cloudfront_distribution |
CloudFront Distribution should have WAF enabled |
Terraform |
| 136 |
CKV_AWS_68 |
resource |
AWS::CloudFront::Distribution |
CloudFront Distribution should have WAF enabled |
Cloudformation |
| 137 |
CKV_AWS_69 |
resource |
aws_mq_broker |
Ensure MQ Broker is not publicly exposed |
Terraform |
| 138 |
CKV_AWS_70 |
resource |
aws_s3_bucket |
Ensure S3 bucket does not allow an action with any Principal |
Terraform |
| 139 |
CKV_AWS_70 |
resource |
aws_s3_bucket_policy |
Ensure S3 bucket does not allow an action with any Principal |
Terraform |
| 140 |
CKV_AWS_71 |
resource |
aws_redshift_cluster |
Ensure Redshift Cluster logging is enabled |
Terraform |
| 141 |
CKV_AWS_72 |
resource |
aws_sqs_queue_policy |
Ensure SQS policy does not allow ALL (*) actions. |
Terraform |
| 142 |
CKV_AWS_73 |
resource |
aws_api_gateway_stage |
Ensure API Gateway has X-Ray Tracing enabled |
Terraform |
| 143 |
CKV_AWS_73 |
resource |
AWS::ApiGateway::Stage |
Ensure API Gateway has X-Ray Tracing enabled |
Cloudformation |
| 144 |
CKV_AWS_74 |
resource |
aws_docdb_cluster |
Ensure DocDB is encrypted at rest (default is unencrypted) |
Terraform |
| 145 |
CKV_AWS_74 |
resource |
AWS::DocDB::DBCluster |
Ensure DocDB is encrypted at rest (default is unencrypted) |
Cloudformation |
| 146 |
CKV_AWS_75 |
resource |
aws_globalaccelerator_accelerator |
Ensure Global Accelerator accelerator has flow logs enabled |
Terraform |
| 147 |
CKV_AWS_76 |
resource |
aws_api_gateway_stage |
Ensure API Gateway has Access Logging enabled |
Terraform |
| 148 |
CKV_AWS_76 |
resource |
aws_apigatewayv2_stage |
Ensure API Gateway has Access Logging enabled |
Terraform |
| 149 |
CKV_AWS_76 |
resource |
AWS::ApiGateway::Stage |
Ensure API Gateway has Access Logging enabled |
Cloudformation |
| 150 |
CKV_AWS_77 |
resource |
aws_athena_database |
Ensure Athena Database is encrypted at rest (default is unencrypted) |
Terraform |
| 151 |
CKV_AWS_78 |
resource |
aws_codebuild_project |
Ensure that CodeBuild Project encryption is not disabled |
Terraform |
| 152 |
CKV_AWS_78 |
resource |
AWS::CodeBuild::Project |
Ensure that CodeBuild Project encryption is not disabled |
Cloudformation |
| 153 |
CKV_AWS_79 |
resource |
aws_instance |
Ensure Instance Metadata Service Version 1 is not enabled |
Terraform |
| 154 |
CKV_AWS_79 |
resource |
aws_launch_template |
Ensure Instance Metadata Service Version 1 is not enabled |
Terraform |
| 155 |
CKV_AWS_80 |
resource |
aws_msk_cluster |
Ensure MSK Cluster logging is enabled |
Terraform |
| 156 |
CKV_AWS_81 |
resource |
aws_msk_cluster |
Ensure MSK Cluster encryption in rest and transit is enabled |
Terraform |
| 157 |
CKV_AWS_82 |
resource |
aws_athena_workgroup |
Ensure Athena Workgroup should enforce configuration to prevent client disabling encryption |
Terraform |
| 158 |
CKV_AWS_82 |
resource |
AWS::Athena::WorkGroup |
Ensure Athena Workgroup should enforce configuration to prevent client disabling encryption |
Cloudformation |
| 159 |
CKV_AWS_83 |
resource |
aws_elasticsearch_domain |
Ensure Elasticsearch Domain enforces HTTPS |
Terraform |
| 160 |
CKV_AWS_83 |
resource |
AWS::Elasticsearch::Domain |
Ensure Elasticsearch Domain enforces HTTPS |
Cloudformation |
| 161 |
CKV_AWS_84 |
resource |
aws_elasticsearch_domain |
Ensure Elasticsearch Domain Logging is enabled |
Terraform |
| 162 |
CKV_AWS_84 |
resource |
AWS::Elasticsearch::Domain |
Ensure Elasticsearch Domain Logging is enabled |
Cloudformation |
| 163 |
CKV_AWS_85 |
resource |
aws_docdb_cluster |
Ensure DocDB Logging is enabled |
Terraform |
| 164 |
CKV_AWS_85 |
resource |
AWS::DocDB::DBCluster |
Ensure DocDB Logging is enabled |
Cloudformation |
| 165 |
CKV_AWS_86 |
resource |
aws_cloudfront_distribution |
Ensure Cloudfront distribution has Access Logging enabled |
Terraform |
| 166 |
CKV_AWS_86 |
resource |
AWS::CloudFront::Distribution |
Ensure Cloudfront distribution has Access Logging enabled |
Cloudformation |
| 167 |
CKV_AWS_87 |
resource |
aws_redshift_cluster |
Redshift cluster should not be publicly accessible |
Terraform |
| 168 |
CKV_AWS_88 |
resource |
aws_instance |
EC2 instance should not have public IP. |
Terraform |
| 169 |
CKV_AWS_88 |
resource |
aws_launch_template |
EC2 instance should not have public IP. |
Terraform |
| 170 |
CKV_AWS_88 |
resource |
AWS::EC2::Instance |
EC2 instance should not have public IP. |
Cloudformation |
| 171 |
CKV_AWS_88 |
resource |
AWS::EC2::LaunchTemplate |
EC2 instance should not have public IP. |
Cloudformation |
| 172 |
CKV_AWS_89 |
resource |
aws_dms_replication_instance |
DMS replication instance should not be publicly accessible |
Terraform |
| 173 |
CKV_AWS_89 |
resource |
AWS::DMS::ReplicationInstance |
DMS replication instance should not be publicly accessible |
Cloudformation |
| 174 |
CKV_AWS_90 |
resource |
aws_docdb_cluster_parameter_group |
Ensure DocDB TLS is not disabled |
Terraform |
| 175 |
CKV_AWS_90 |
resource |
AWS::DocDB::DBClusterParameterGroup |
Ensure DocDB TLS is not disabled |
Cloudformation |
| 176 |
CKV_AWS_91 |
resource |
aws_lb |
Ensure the ELBv2 (Application/Network) has access logging enabled |
Terraform |
| 177 |
CKV_AWS_91 |
resource |
aws_alb |
Ensure the ELBv2 (Application/Network) has access logging enabled |
Terraform |
| 178 |
CKV_AWS_91 |
resource |
AWS::ElasticLoadBalancingV2::LoadBalancer |
Ensure the ELBv2 (Application/Network) has access logging enabled |
Cloudformation |
| 179 |
CKV_AWS_92 |
resource |
aws_elb |
Ensure the ELB has access logging enabled |
Terraform |
| 180 |
CKV_AWS_92 |
resource |
AWS::ElasticLoadBalancing::LoadBalancer |
Ensure the ELB has access logging enabled |
Cloudformation |
| 181 |
CKV_AWS_93 |
resource |
aws_s3_bucket |
Ensure S3 bucket policy does not lockout all but root user. (Prevent lockouts needing root account fixes) |
Terraform |
| 182 |
CKV_AWS_93 |
resource |
aws_s3_bucket_policy |
Ensure S3 bucket policy does not lockout all but root user. (Prevent lockouts needing root account fixes) |
Terraform |
| 183 |
CKV_AWS_94 |
resource |
aws_glue_data_catalog_encryption_settings |
Ensure Glue Data Catalog Encryption is enabled |
Terraform |
| 184 |
CKV_AWS_94 |
resource |
AWS::Glue::DataCatalogEncryptionSettings |
Ensure Glue Data Catalog Encryption is enabled |
Cloudformation |
| 185 |
CKV_AWS_95 |
resource |
AWS::ApiGatewayV2::Stage |
Ensure API Gateway V2 has Access Logging enabled |
Cloudformation |
| 186 |
CKV_AWS_96 |
resource |
aws_rds_cluster |
Ensure all data stored in Aurora is securely encrypted at rest |
Terraform |
| 187 |
CKV_AWS_96 |
resource |
AWS::RDS::DBCluster |
Ensure all data stored in Aurrora is securely encrypted at rest |
Cloudformation |
| 188 |
CKV_AWS_97 |
resource |
aws_ecs_task_definition |
Ensure Encryption in transit is enabled for EFS volumes in ECS Task definitions |
Terraform |
| 189 |
CKV_AWS_97 |
resource |
AWS::ECS::TaskDefinition |
Ensure Encryption in transit is enabled for EFS volumes in ECS Task definitions |
Cloudformation |
| 190 |
CKV_AWS_98 |
resource |
aws_sagemaker_endpoint_configuration |
Ensure all data stored in the Sagemaker Endpoint is securely encrypted at rest |
Terraform |
| 191 |
CKV_AWS_99 |
resource |
aws_glue_security_configuration |
Ensure Glue Security Configuration Encryption is enabled |
Terraform |
| 192 |
CKV_AWS_100 |
resource |
aws_eks_node_group |
Ensure Amazon EKS Node group has implict SSH access from 0.0.0.0/0 |
Terraform |
| 193 |
CKV_AWS_100 |
resource |
AWS::EKS::Nodegroup |
Ensure Amazon EKS Node group has implict SSH access from 0.0.0.0/0 |
Cloudformation |
| 194 |
CKV_AWS_101 |
resource |
aws_neptune_cluster |
Ensure Neptune logging is enabled |
Terraform |
| 195 |
CKV_AWS_102 |
resource |
aws_neptune_cluster_instance |
Ensure Neptune Cluster instance is not publicly available |
Terraform |
| 196 |
CKV_AWS_103 |
resource |
aws_lb_listener |
Ensure that load balancer is using TLS 1.2 |
Terraform |
| 197 |
CKV_AWS_104 |
resource |
aws_docdb_cluster_parameter_group |
Ensure DocDB has audit logs enabled |
Terraform |
| 198 |
CKV_AWS_105 |
resource |
aws_redshift_parameter_group |
Ensure Redshift uses ssl |
Terraform |
| 199 |
CKV_AWS_106 |
resource |
aws_ebs_encryption_by_default |
Ensure EBS default encryption is enabled |
Terraform |
| 200 |
CKV_AWS_107 |
data |
aws_iam_policy_document |
Ensure IAM policies does not allow credentials exposure |
Terraform |
| 201 |
CKV_AWS_107 |
resource |
AWS::IAM::Policy |
Ensure IAM policies does not allow credentials exposure |
Cloudformation |
| 202 |
CKV_AWS_108 |
data |
aws_iam_policy_document |
Ensure IAM policies does not allow data exfiltration |
Terraform |
| 203 |
CKV_AWS_108 |
resource |
AWS::IAM::Policy |
Ensure IAM policies does not allow data exfiltration |
Cloudformation |
| 204 |
CKV_AWS_109 |
data |
aws_iam_policy_document |
Ensure IAM policies does not allow permissions management / resource exposure without constraints |
Terraform |
| 205 |
CKV_AWS_109 |
resource |
AWS::IAM::Policy |
Ensure IAM policies does not allow permissions management without constraints |
Cloudformation |
| 206 |
CKV_AWS_110 |
data |
aws_iam_policy_document |
Ensure IAM policies does not allow privilege escalation |
Terraform |
| 207 |
CKV_AWS_110 |
resource |
AWS::IAM::Policy |
Ensure IAM policies does not allow privilege escalation |
Cloudformation |
| 208 |
CKV_AWS_111 |
data |
aws_iam_policy_document |
Ensure IAM policies does not allow write access without constraints |
Terraform |
| 209 |
CKV_AWS_111 |
resource |
AWS::IAM::Policy |
Ensure IAM policies does not allow write access without constraints |
Cloudformation |
| 210 |
CKV_AZURE_1 |
resource |
azurerm_virtual_machine |
Ensure Azure Instance does not use basic authentication(Use SSH Key Instead) |
Terraform |
| 211 |
CKV_AZURE_1 |
resource |
azurerm_linux_virtual_machine |
Ensure Azure Instance does not use basic authentication(Use SSH Key Instead) |
Terraform |
| 212 |
CKV_AZURE_1 |
resource |
Microsoft.Compute/virtualMachines |
Ensure Azure Instance does not use basic authentication(Use SSH Key Instead) |
arm |
| 213 |
CKV_AZURE_2 |
resource |
azurerm_managed_disk |
Ensure Azure managed disk has encryption enabled |
Terraform |
| 214 |
CKV_AZURE_2 |
resource |
Microsoft.Compute/disks |
Ensure Azure managed disk have encryption enabled |
arm |
| 215 |
CKV_AZURE_3 |
resource |
azurerm_storage_account |
Ensure that 'Secure transfer required' is set to 'Enabled' |
Terraform |
| 216 |
CKV_AZURE_3 |
resource |
Microsoft.Storage/storageAccounts |
Ensure that 'supportsHttpsTrafficOnly' is set to 'true' |
arm |
| 217 |
CKV_AZURE_4 |
resource |
azurerm_kubernetes_cluster |
Ensure AKS logging to Azure Monitoring is Configured |
Terraform |
| 218 |
CKV_AZURE_4 |
resource |
Microsoft.ContainerService/managedClusters |
Ensure AKS logging to Azure Monitoring is Configured |
arm |
| 219 |
CKV_AZURE_5 |
resource |
azurerm_kubernetes_cluster |
Ensure RBAC is enabled on AKS clusters |
Terraform |
| 220 |
CKV_AZURE_5 |
resource |
Microsoft.ContainerService/managedClusters |
Ensure RBAC is enabled on AKS clusters |
arm |
| 221 |
CKV_AZURE_6 |
resource |
azurerm_kubernetes_cluster |
Ensure AKS has an API Server Authorized IP Ranges enabled |
Terraform |
| 222 |
CKV_AZURE_6 |
resource |
Microsoft.ContainerService/managedClusters |
Ensure AKS has an API Server Authorized IP Ranges enabled |
arm |
| 223 |
CKV_AZURE_7 |
resource |
azurerm_kubernetes_cluster |
Ensure AKS cluster has Network Policy configured |
Terraform |
| 224 |
CKV_AZURE_7 |
resource |
Microsoft.ContainerService/managedClusters |
Ensure AKS cluster has Network Policy configured |
arm |
| 225 |
CKV_AZURE_8 |
resource |
azurerm_kubernetes_cluster |
Ensure Kube Dashboard is disabled |
Terraform |
| 226 |
CKV_AZURE_8 |
resource |
Microsoft.ContainerService/managedClusters |
Ensure Kubernetes Dashboard is disabled |
arm |
| 227 |
CKV_AZURE_9 |
resource |
azurerm_network_security_rule |
Ensure that RDP access is restricted from the internet |
Terraform |
| 228 |
CKV_AZURE_9 |
resource |
azurerm_network_security_group |
Ensure that RDP access is restricted from the internet |
Terraform |
| 229 |
CKV_AZURE_9 |
resource |
Microsoft.Network/networkSecurityGroups |
Ensure that RDP access is restricted from the internet |
arm |
| 230 |
CKV_AZURE_9 |
resource |
Microsoft.Network/networkSecurityGroups/securityRules |
Ensure that RDP access is restricted from the internet |
arm |
| 231 |
CKV_AZURE_10 |
resource |
azurerm_network_security_rule |
Ensure that SSH access is restricted from the internet |
Terraform |
| 232 |
CKV_AZURE_10 |
resource |
azurerm_network_security_group |
Ensure that SSH access is restricted from the internet |
Terraform |
| 233 |
CKV_AZURE_10 |
resource |
Microsoft.Network/networkSecurityGroups |
Ensure that SSH access is restricted from the internet |
arm |
| 234 |
CKV_AZURE_10 |
resource |
Microsoft.Network/networkSecurityGroups/securityRules |
Ensure that SSH access is restricted from the internet |
arm |
| 235 |
CKV_AZURE_11 |
resource |
azurerm_mariadb_firewall_rule |
Ensure no SQL Databases allow ingress from 0.0.0.0/0 (ANY IP) |
Terraform |
| 236 |
CKV_AZURE_11 |
resource |
azurerm_sql_firewall_rule |
Ensure no SQL Databases allow ingress from 0.0.0.0/0 (ANY IP) |
Terraform |
| 237 |
CKV_AZURE_11 |
resource |
azurerm_postgresql_firewall_rule |
Ensure no SQL Databases allow ingress from 0.0.0.0/0 (ANY IP) |
Terraform |
| 238 |
CKV_AZURE_11 |
resource |
azurerm_mysql_firewall_rule |
Ensure no SQL Databases allow ingress from 0.0.0.0/0 (ANY IP) |
Terraform |
| 239 |
CKV_AZURE_11 |
resource |
Microsoft.Sql/servers |
Ensure no SQL Databases allow ingress from 0.0.0.0/0 (ANY IP) |
arm |
| 240 |
CKV_AZURE_12 |
resource |
azurerm_network_watcher_flow_log |
Ensure that Network Security Group Flow Log retention period is 'greater than 90 days' |
Terraform |
| 241 |
CKV_AZURE_12 |
resource |
Microsoft.Network/networkWatchers/flowLogs |
Ensure that Network Security Group Flow Log retention period is 'greater than 90 days' |
arm |
| 242 |
CKV_AZURE_12 |
resource |
Microsoft.Network/networkWatchers/FlowLogs |
Ensure that Network Security Group Flow Log retention period is 'greater than 90 days' |
arm |
| 243 |
CKV_AZURE_12 |
resource |
Microsoft.Network/networkWatchers/flowLogs/ |
Ensure that Network Security Group Flow Log retention period is 'greater than 90 days' |
arm |
| 244 |
CKV_AZURE_12 |
resource |
Microsoft.Network/networkWatchers/FlowLogs/ |
Ensure that Network Security Group Flow Log retention period is 'greater than 90 days' |
arm |
| 245 |
CKV_AZURE_13 |
resource |
azurerm_app_service |
Ensure App Service Authentication is set on Azure App Service |
Terraform |
| 246 |
CKV_AZURE_13 |
resource |
Microsoft.Web/sites/config |
Ensure App Service Authentication is set on Azure App Service |
arm |
| 247 |
CKV_AZURE_13 |
resource |
config |
Ensure App Service Authentication is set on Azure App Service |
arm |
| 248 |
CKV_AZURE_14 |
resource |
azurerm_app_service |
Ensure web app redirects all HTTP traffic to HTTPS in Azure App Service |
Terraform |
| 249 |
CKV_AZURE_14 |
resource |
Microsoft.Web/sites |
Ensure web app redirects all HTTP traffic to HTTPS in Azure App Service |
arm |
| 250 |
CKV_AZURE_15 |
resource |
azurerm_app_service |
Ensure web app is using the latest version of TLS encryption |
Terraform |
| 251 |
CKV_AZURE_15 |
resource |
Microsoft.Web/sites |
Ensure web app is using the latest version of TLS encryption |
arm |
| 252 |
CKV_AZURE_16 |
resource |
azurerm_app_service |
Ensure that Register with Azure Active Directory is enabled on App Service |
Terraform |
| 253 |
CKV_AZURE_16 |
resource |
Microsoft.Web/sites |
Ensure that Register with Azure Active Directory is enabled on App Service |
arm |
| 254 |
CKV_AZURE_17 |
resource |
azurerm_app_service |
Ensure the web app has 'Client Certificates (Incoming client certificates)' set |
Terraform |
| 255 |
CKV_AZURE_17 |
resource |
Microsoft.Web/sites |
Ensure the web app has 'Client Certificates (Incoming client certificates)' set |
arm |
| 256 |
CKV_AZURE_18 |
resource |
azurerm_app_service |
Ensure that 'HTTP Version' is the latest if used to run the web app |
Terraform |
| 257 |
CKV_AZURE_18 |
resource |
Microsoft.Web/sites |
Ensure that 'HTTP Version' is the latest if used to run the web app |
arm |
| 258 |
CKV_AZURE_19 |
resource |
azurerm_security_center_subscription_pricing |
Ensure that standard pricing tier is selected |
Terraform |
| 259 |
CKV_AZURE_19 |
resource |
Microsoft.Security/pricings |
Ensure that standard pricing tier is selected |
arm |
| 260 |
CKV_AZURE_20 |
resource |
azurerm_security_center_contact |
Ensure that security contact 'Phone number' is set |
Terraform |
| 261 |
CKV_AZURE_20 |
resource |
Microsoft.Security/securityContacts |
Ensure that security contact 'Phone number' is set |
arm |
| 262 |
CKV_AZURE_21 |
resource |
azurerm_security_center_contact |
Ensure that 'Send email notification for high severity alerts' is set to 'On' |
Terraform |
| 263 |
CKV_AZURE_21 |
resource |
Microsoft.Security/securityContacts |
Ensure that 'Send email notification for high severity alerts' is set to 'On' |
arm |
| 264 |
CKV_AZURE_22 |
resource |
azurerm_security_center_contact |
Ensure that 'Send email notification for high severity alerts' is set to 'On' |
Terraform |
| 265 |
CKV_AZURE_22 |
resource |
Microsoft.Security/securityContacts |
Ensure that 'Send email notification for high severity alerts' is set to 'On' |
arm |
| 266 |
CKV_AZURE_23 |
resource |
azurerm_sql_server |
Ensure that 'Auditing' is set to 'On' for SQL servers |
Terraform |
| 267 |
CKV_AZURE_23 |
resource |
azurerm_mssql_server |
Ensure that 'Auditing' is set to 'On' for SQL servers |
Terraform |
| 268 |
CKV_AZURE_23 |
resource |
Microsoft.Sql/servers |
Ensure that 'Auditing' is set to 'Enabled' for SQL servers |
arm |
| 269 |
CKV_AZURE_24 |
resource |
azurerm_sql_server |
Ensure that 'Auditing' Retention is 'greater than 90 days' for SQL servers |
Terraform |
| 270 |
CKV_AZURE_24 |
resource |
azurerm_mssql_server |
Ensure that 'Auditing' Retention is 'greater than 90 days' for SQL servers |
Terraform |
| 271 |
CKV_AZURE_24 |
resource |
Microsoft.Sql/servers |
Ensure that 'Auditing' Retention is 'greater than 90 days' for SQL servers |
arm |
| 272 |
CKV_AZURE_25 |
resource |
azurerm_mssql_server_security_alert_policy |
Ensure that 'Threat Detection types' is set to 'All' |
Terraform |
| 273 |
CKV_AZURE_25 |
resource |
Microsoft.Sql/servers/databases |
Ensure that 'Threat Detection types' is set to 'All' |
arm |
| 274 |
CKV_AZURE_26 |
resource |
azurerm_mssql_server_security_alert_policy |
Ensure that 'Send Alerts To' is enabled for MSSQL servers |
Terraform |
| 275 |
CKV_AZURE_26 |
resource |
Microsoft.Sql/servers/databases |
Ensure that 'Send Alerts To' is enabled for MSSQL servers |
arm |
| 276 |
CKV_AZURE_27 |
resource |
azurerm_mssql_server_security_alert_policy |
Ensure that 'Email service and co-administrators' is 'Enabled' for MSSQL servers |
Terraform |
| 277 |
CKV_AZURE_27 |
resource |
Microsoft.Sql/servers/databases |
Ensure that 'Email service and co-administrators' is 'Enabled' for MSSQL servers |
arm |
| 278 |
CKV_AZURE_28 |
resource |
azurerm_mysql_server |
Ensure 'Enforce SSL connection' is set to 'ENABLED' for MySQL Database Server |
Terraform |
| 279 |
CKV_AZURE_28 |
resource |
Microsoft.DBforMySQL/servers |
Ensure 'Enforce SSL connection' is set to 'ENABLED' for MySQL Database Server |
arm |
| 280 |
CKV_AZURE_29 |
resource |
azurerm_postgresql_server |
Ensure 'Enforce SSL connection' is set to 'ENABLED' for PostgreSQL Database Server |
Terraform |
| 281 |
CKV_AZURE_29 |
resource |
Microsoft.DBforPostgreSQL/servers |
Ensure 'Enforce SSL connection' is set to 'ENABLED' for PostgreSQL Database Server |
arm |
| 282 |
CKV_AZURE_30 |
resource |
azurerm_postgresql_configuration |
Ensure server parameter 'log_checkpoints' is set to 'ON' for PostgreSQL Database Server |
Terraform |
| 283 |
CKV_AZURE_30 |
resource |
Microsoft.DBforPostgreSQL/servers/configurations |
Ensure server parameter 'log_checkpoints' is set to 'ON' for PostgreSQL Database Server |
arm |
| 284 |
CKV_AZURE_30 |
resource |
configurations |
Ensure server parameter 'log_checkpoints' is set to 'ON' for PostgreSQL Database Server |
arm |
| 285 |
CKV_AZURE_31 |
resource |
azurerm_postgresql_configuration |
Ensure server parameter 'log_connections' is set to 'ON' for PostgreSQL Database Server |
Terraform |
| 286 |
CKV_AZURE_31 |
resource |
Microsoft.DBforPostgreSQL/servers/configurations |
Ensure configuration 'log_connections' is set to 'ON' for PostgreSQL Database Server |
arm |
| 287 |
CKV_AZURE_31 |
resource |
configurations |
Ensure configuration 'log_connections' is set to 'ON' for PostgreSQL Database Server |
arm |
| 288 |
CKV_AZURE_32 |
resource |
azurerm_postgresql_configuration |
Ensure server parameter 'connection_throttling' is set to 'ON' for PostgreSQL Database Server |
Terraform |
| 289 |
CKV_AZURE_32 |
resource |
Microsoft.DBforPostgreSQL/servers/configurations |
Ensure server parameter 'connection_throttling' is set to 'ON' for PostgreSQL Database Server |
arm |
| 290 |
CKV_AZURE_32 |
resource |
configurations |
Ensure server parameter 'connection_throttling' is set to 'ON' for PostgreSQL Database Server |
arm |
| 291 |
CKV_AZURE_33 |
resource |
azurerm_storage_account |
Ensure Storage logging is enabled for Queue service for read, write and delete requests |
Terraform |
| 292 |
CKV_AZURE_33 |
resource |
Microsoft.Storage/storageAccounts/queueServices/providers/diagnosticsettings |
Ensure Storage logging is enabled for Queue service for read, write and delete requests |
arm |
| 293 |
CKV_AZURE_34 |
resource |
azurerm_storage_container |
Ensure that 'Public access level' is set to Private for blob containers |
Terraform |
| 294 |
CKV_AZURE_34 |
resource |
Microsoft.Storage/storageAccounts/blobServices/containers |
Ensure that 'Public access level' is set to Private for blob containers |
arm |
| 295 |
CKV_AZURE_34 |
resource |
containers |
Ensure that 'Public access level' is set to Private for blob containers |
arm |
| 296 |
CKV_AZURE_34 |
resource |
blobServices/containers |
Ensure that 'Public access level' is set to Private for blob containers |
arm |
| 297 |
CKV_AZURE_35 |
resource |
azurerm_storage_account |
Ensure default network access rule for Storage Accounts is set to deny |
Terraform |
| 298 |
CKV_AZURE_35 |
resource |
azurerm_storage_account_network_rules |
Ensure default network access rule for Storage Accounts is set to deny |
Terraform |
| 299 |
CKV_AZURE_35 |
resource |
Microsoft.Storage/storageAccounts |
Ensure default network access rule for Storage Accounts is set to deny |
arm |
| 300 |
CKV_AZURE_36 |
resource |
azurerm_storage_account |
Ensure 'Trusted Microsoft Services' is enabled for Storage Account access |
Terraform |
| 301 |
CKV_AZURE_36 |
resource |
azurerm_storage_account_network_rules |
Ensure 'Trusted Microsoft Services' is enabled for Storage Account access |
Terraform |
| 302 |
CKV_AZURE_36 |
resource |
Microsoft.Storage/storageAccounts |
Ensure 'Trusted Microsoft Services' is enabled for Storage Account access |
arm |
| 303 |
CKV_AZURE_37 |
resource |
azurerm_monitor_log_profile |
Ensure that Activity Log Retention is set 365 days or greater |
Terraform |
| 304 |
CKV_AZURE_37 |
resource |
microsoft.insights/logprofiles |
Ensure that Activity Log Retention is set 365 days or greater |
arm |
| 305 |
CKV_AZURE_38 |
resource |
azurerm_monitor_log_profile |
Ensure audit profile captures all the activities |
Terraform |
| 306 |
CKV_AZURE_38 |
resource |
microsoft.insights/logprofiles |
Ensure audit profile captures all the activities |
arm |
| 307 |
CKV_AZURE_39 |
resource |
azurerm_role_definition |
Ensure that no custom subscription owner roles are created |
Terraform |
| 308 |
CKV_AZURE_39 |
resource |
Microsoft.Authorization/roleDefinitions |
Ensure that no custom subscription owner roles are created |
arm |
| 309 |
CKV_AZURE_40 |
resource |
azurerm_key_vault_key |
Ensure that the expiration date is set on all keys |
Terraform |
| 310 |
CKV_AZURE_41 |
resource |
azurerm_key_vault_secret |
Ensure that the expiration date is set on all secrets |
Terraform |
| 311 |
CKV_AZURE_41 |
resource |
Microsoft.KeyVault/vaults/secrets |
Ensure that the expiration date is set on all secrets |
arm |
| 312 |
CKV_AZURE_42 |
resource |
azurerm_key_vault |
Ensure the key vault is recoverable |
Terraform |
| 313 |
CKV_AZURE_42 |
resource |
Microsoft.KeyVault/vaults |
Ensure the key vault is recoverable |
arm |
| 314 |
CKV_AZURE_43 |
resource |
azurerm_storage_account |
Ensure the Storage Account naming rules |
Terraform |
| 315 |
CKV_AZURE_44 |
resource |
azurerm_storage_account |
Ensure Storage Account is using the latest version of TLS encryption |
Terraform |
| 316 |
CKV_AZURE_45 |
resource |
azurerm_virtual_machine |
Ensure that no sensitive credentials are exposed in VM custom_data |
Terraform |
| 317 |
CKV_AZURE_46 |
resource |
azurerm_mssql_database_extended_auditing_policy |
Specifies a retention period of less than 90 days. |
Terraform |
| 318 |
CKV_AZURE_47 |
resource |
azurerm_mariadb_server |
Ensure 'Enforce SSL connection' is set to 'ENABLED' for MariaDB servers |
Terraform |
| 319 |
CKV_AZURE_48 |
resource |
azurerm_mariadb_server |
Ensure 'public network access enabled' is set to 'False' for MariaDB servers |
Terraform |
| 320 |
CKV_AZURE_49 |
resource |
azurerm_linux_virtual_machine_scale_set |
Ensure Azure linux scale set does not use basic authentication(Use SSH Key Instead) |
Terraform |
| 321 |
CKV_AZURE_50 |
resource |
azurerm_virtual_machine |
Ensure Virtual Machine Extensions are not Installed |
Terraform |
| 322 |
CKV_AZURE_50 |
resource |
azurerm_linux_virtual_machine |
Ensure Virtual Machine Extensions are not Installed |
Terraform |
| 323 |
CKV_AZURE_52 |
resource |
azurerm_mssql_server |
Ensure MSSQL is using the latest version of TLS encryption |
Terraform |
| 324 |
CKV_AZURE_53 |
resource |
azurerm_mysql_server |
Ensure 'public network access enabled' is set to 'False' for mySQL servers |
Terraform |
| 325 |
CKV_AZURE_54 |
resource |
azurerm_mysql_server |
Ensure MySQL is using the latest version of TLS encryption |
Terraform |
| 326 |
CKV_GCP_1 |
resource |
google_container_cluster |
Ensure Stackdriver Logging is set to Enabled on Kubernetes Engine Clusters |
Terraform |
| 327 |
CKV_GCP_2 |
resource |
google_compute_firewall |
Ensure Google compute firewall ingress does not allow unrestricted ssh access |
Terraform |
| 328 |
CKV_GCP_3 |
resource |
google_compute_firewall |
Ensure Google compute firewall ingress does not allow unrestricted rdp access |
Terraform |
| 329 |
CKV_GCP_4 |
resource |
google_compute_ssl_policy |
Ensure no HTTPS or SSL proxy load balancers permit SSL policies with weak cipher suites |
Terraform |
| 330 |
CKV_GCP_6 |
resource |
google_sql_database_instance |
Ensure all Cloud SQL database instance requires all incoming connections to use SSL |
Terraform |
| 331 |
CKV_GCP_7 |
resource |
google_container_cluster |
Ensure Legacy Authorization is set to Disabled on Kubernetes Engine Clusters |
Terraform |
| 332 |
CKV_GCP_8 |
resource |
google_container_cluster |
Ensure Stackdriver Monitoring is set to Enabled on Kubernetes Engine Clusters |
Terraform |
| 333 |
CKV_GCP_9 |
resource |
google_container_node_pool |
Ensure 'Automatic node repair' is enabled for Kubernetes Clusters |
Terraform |
| 334 |
CKV_GCP_10 |
resource |
google_container_node_pool |
Ensure 'Automatic node upgrade' is enabled for Kubernetes Clusters |
Terraform |
| 335 |
CKV_GCP_11 |
resource |
google_sql_database_instance |
Ensure that Cloud SQL database Instances are not open to the world |
Terraform |
| 336 |
CKV_GCP_12 |
resource |
google_container_cluster |
Ensure Network Policy is enabled on Kubernetes Engine Clusters |
Terraform |
| 337 |
CKV_GCP_13 |
resource |
google_container_cluster |
Ensure a client certificate is used by clients to authenticate to Kubernetes Engine Clusters |
Terraform |
| 338 |
CKV_GCP_14 |
resource |
google_sql_database_instance |
Ensure all Cloud SQL database instance have backup configuration enabled |
Terraform |
| 339 |
CKV_GCP_15 |
resource |
google_bigquery_dataset |
Ensure that BigQuery datasets are not anonymously or publicly accessible |
Terraform |
| 340 |
CKV_GCP_16 |
resource |
google_dns_managed_zone |
Ensure that DNSSEC is enabled for Cloud DNS |
Terraform |
| 341 |
CKV_GCP_17 |
resource |
google_dns_managed_zone |
Ensure that RSASHA1 is not used for the zone-signing and key-signing keys in Cloud DNS DNSSEC |
Terraform |
| 342 |
CKV_GCP_18 |
resource |
google_container_cluster |
Ensure GKE Control Plane is not public |
Terraform |
| 343 |
CKV_GCP_19 |
resource |
google_container_cluster |
Ensure GKE basic auth is disabled |
Terraform |
| 344 |
CKV_GCP_20 |
resource |
google_container_cluster |
Ensure master authorized networks is set to enabled in GKE clusters |
Terraform |
| 345 |
CKV_GCP_21 |
resource |
google_container_cluster |
Ensure Kubernetes Clusters are configured with Labels |
Terraform |
| 346 |
CKV_GCP_22 |
resource |
google_container_node_pool |
Ensure Container-Optimized OS (cos) is used for Kubernetes Engine Clusters Node image |
Terraform |
| 347 |
CKV_GCP_23 |
resource |
google_container_cluster |
Ensure Kubernetes Cluster is created with Alias IP ranges enabled |
Terraform |
| 348 |
CKV_GCP_24 |
resource |
google_container_cluster |
Ensure PodSecurityPolicy controller is enabled on the Kubernetes Engine Clusters |
Terraform |
| 349 |
CKV_GCP_25 |
resource |
google_container_cluster |
Ensure Kubernetes Cluster is created with Private cluster enabled |
Terraform |
| 350 |
CKV_GCP_26 |
resource |
google_compute_subnetwork |
Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network |
Terraform |
| 351 |
CKV_GCP_27 |
resource |
google_project |
Ensure that the default network does not exist in a project |
Terraform |
| 352 |
CKV_GCP_28 |
resource |
google_storage_bucket_iam_member |
Ensure that Cloud Storage bucket is not anonymously or publicly accessible |
Terraform |
| 353 |
CKV_GCP_28 |
resource |
google_storage_bucket_iam_binding |
Ensure that Cloud Storage bucket is not anonymously or publicly accessible |
Terraform |
| 354 |
CKV_GCP_29 |
resource |
google_storage_bucket |
Ensure that Cloud Storage buckets have uniform bucket-level access enabled |
Terraform |
| 355 |
CKV_GCP_30 |
resource |
google_compute_instance |
Ensure that instances are not configured to use the default service account |
Terraform |
| 356 |
CKV_GCP_31 |
resource |
google_compute_instance |
Ensure that instances are not configured to use the default service account with full access to all Cloud APIs |
Terraform |
| 357 |
CKV_GCP_32 |
resource |
google_compute_instance |
Ensure 'Block Project-wide SSH keys' is enabled for VM instances |
Terraform |
| 358 |
CKV_GCP_33 |
resource |
google_compute_project_metadata |
Ensure oslogin is enabled for a Project |
Terraform |
| 359 |
CKV_GCP_34 |
resource |
google_compute_instance |
Ensure that no instance in the project overrides the project setting for enabling OSLogin(OSLogin needs to be enabled in project metadata for all instances) |
Terraform |
| 360 |
CKV_GCP_35 |
resource |
google_compute_instance |
Ensure 'Enable connecting to serial ports' is not enabled for VM Instance |
Terraform |
| 361 |
CKV_GCP_36 |
resource |
google_compute_instance |
Ensure that IP forwarding is not enabled on Instances |
Terraform |
| 362 |
CKV_GCP_37 |
resource |
google_compute_disk |
Ensure VM disks for critical VMs are encrypted with Customer Supplied Encryption Keys (CSEK) |
Terraform |
| 363 |
CKV_GCP_38 |
resource |
google_compute_instance |
Ensure VM disks for critical VMs are encrypted with Customer Supplied Encryption Keys (CSEK) |
Terraform |
| 364 |
CKV_GCP_39 |
resource |
google_compute_instance |
Ensure Compute instances are launched with Shielded VM enabled |
Terraform |
| 365 |
CKV_GCP_40 |
resource |
google_compute_instance |
Ensure that Compute instances do not have public IP addresses |
Terraform |
| 366 |
CKV_GCP_41 |
resource |
google_project_iam_binding |
Ensure that IAM users are not assigned the Service Account User or Service Account Token Creator roles at project level |
Terraform |
| 367 |
CKV_GCP_41 |
resource |
google_project_iam_member |
Ensure that IAM users are not assigned the Service Account User or Service Account Token Creator roles at project level |
Terraform |
| 368 |
CKV_GCP_42 |
resource |
google_project_iam_member |
Ensure that Service Account has no Admin privileges |
Terraform |
| 369 |
CKV_GCP_43 |
resource |
google_kms_crypto_key |
Ensure KMS encryption keys are rotated within a period of 90 days |
Terraform |
| 370 |
CKV_GCP_44 |
resource |
google_folder_iam_member |
Ensure no roles that enable to impersonate and manage all service accounts are used at a folder level |
Terraform |
| 371 |
CKV_GCP_44 |
resource |
google_folder_iam_binding |
Ensure no roles that enable to impersonate and manage all service accounts are used at a folder level |
Terraform |
| 372 |
CKV_GCP_45 |
resource |
google_organization_iam_member |
Ensure no roles that enable to impersonate and manage all service accounts are used at an organization level |
Terraform |
| 373 |
CKV_GCP_45 |
resource |
google_organization_iam_binding |
Ensure no roles that enable to impersonate and manage all service accounts are used at an organization level |
Terraform |
| 374 |
CKV_GCP_46 |
resource |
google_project_iam_binding |
Ensure Default Service account is not used at a project level |
Terraform |
| 375 |
CKV_GCP_46 |
resource |
google_project_iam_member |
Ensure Default Service account is not used at a project level |
Terraform |
| 376 |
CKV_GCP_47 |
resource |
google_organization_iam_member |
Ensure default service account is not used at an organization level |
Terraform |
| 377 |
CKV_GCP_47 |
resource |
google_organization_iam_binding |
Ensure default service account is not used at an organization level |
Terraform |
| 378 |
CKV_GCP_48 |
resource |
google_folder_iam_member |
Ensure Default Service account is not used at a folder level |
Terraform |
| 379 |
CKV_GCP_48 |
resource |
google_folder_iam_binding |
Ensure Default Service account is not used at a folder level |
Terraform |
| 380 |
CKV_GCP_49 |
resource |
google_project_iam_binding |
Ensure no roles that enable to impersonate and manage all service accounts are used at a project level |
Terraform |
| 381 |
CKV_GCP_49 |
resource |
google_project_iam_member |
Ensure no roles that enable to impersonate and manage all service accounts are used at a project level |
Terraform |
| 382 |
CKV_GCP_50 |
resource |
google_sql_database_instance |
Ensure MySQL database 'local_infile' flag is set to 'off' |
Terraform |
| 383 |
CKV_GCP_51 |
resource |
google_sql_database_instance |
Ensure PostgreSQL database 'log_checkpoints' flag is set to 'on' |
Terraform |
| 384 |
CKV_GCP_52 |
resource |
google_sql_database_instance |
Ensure PostgreSQL database 'log_connections' flag is set to 'on' |
Terraform |
| 385 |
CKV_GCP_53 |
resource |
google_sql_database_instance |
Ensure PostgreSQL database 'log_disconnections' flag is set to 'on' |
Terraform |
| 386 |
CKV_GCP_54 |
resource |
google_sql_database_instance |
Ensure PostgreSQL database 'log_lock_waits' flag is set to 'on' |
Terraform |
| 387 |
CKV_GCP_55 |
resource |
google_sql_database_instance |
Ensure PostgreSQL database 'log_min_messages' flag is set to a valid value |
Terraform |
| 388 |
CKV_GCP_56 |
resource |
google_sql_database_instance |
Ensure PostgreSQL database 'log_temp_files flag is set to '0' |
Terraform |
| 389 |
CKV_GCP_57 |
resource |
google_sql_database_instance |
Ensure PostgreSQL database 'log_min_duration_statement' flag is set to '-1' |
Terraform |
| 390 |
CKV_GCP_58 |
resource |
google_sql_database_instance |
Ensure SQL database 'cross db ownership chaining' flag is set to 'off' |
Terraform |
| 391 |
CKV_GCP_59 |
resource |
google_sql_database_instance |
Ensure SQL database 'contained database authentication' flag is set to 'off' |
Terraform |
| 392 |
CKV_GCP_60 |
resource |
google_sql_database_instance |
Ensure SQL database do not have public IP |
Terraform |
| 393 |
CKV_GCP_62 |
resource |
google_storage_bucket |
Bucket should log access |
Terraform |
| 394 |
CKV_GCP_63 |
resource |
google_storage_bucket |
Bucket should not log to itself |
Terraform |
| 395 |
CKV_GIT_1 |
resource |
github_repository |
Ensure Repository is Private |
Terraform |
| 396 |
CKV_K8S_1 |
PodSecurityPolicy |
PodSecurityPolicy |
Do not admit containers wishing to share the host process ID namespace |
Kubernetes |
| 397 |
CKV_K8S_2 |
PodSecurityPolicy |
PodSecurityPolicy |
Do not admit privileged containers |
Kubernetes |
| 398 |
CKV_K8S_3 |
PodSecurityPolicy |
PodSecurityPolicy |
Do not admit containers wishing to share the host IPC namespace |
Kubernetes |
| 399 |
CKV_K8S_4 |
PodSecurityPolicy |
PodSecurityPolicy |
Do not admit containers wishing to share the host network namespace |
Kubernetes |
| 400 |
CKV_K8S_5 |
PodSecurityPolicy |
PodSecurityPolicy |
Containers should not run with allowPrivilegeEscalation |
Kubernetes |
| 401 |
CKV_K8S_6 |
PodSecurityPolicy |
PodSecurityPolicy |
Do not admit root containers |
Kubernetes |
| 402 |
CKV_K8S_7 |
PodSecurityPolicy |
PodSecurityPolicy |
Do not admit containers with the NET_RAW capability |
Kubernetes |
| 403 |
CKV_K8S_8 |
PodSecurityPolicy |
containers |
Liveness Probe Should be Configured |
Kubernetes |
| 404 |
CKV_K8S_9 |
PodSecurityPolicy |
containers |
Readiness Probe Should be Configured |
Kubernetes |
| 405 |
CKV_K8S_10 |
PodSecurityPolicy |
containers |
CPU requests should be set |
Kubernetes |
| 406 |
CKV_K8S_10 |
PodSecurityPolicy |
initContainers |
CPU requests should be set |
Kubernetes |
| 407 |
CKV_K8S_11 |
PodSecurityPolicy |
containers |
CPU limits should be set |
Kubernetes |
| 408 |
CKV_K8S_11 |
PodSecurityPolicy |
initContainers |
CPU limits should be set |
Kubernetes |
| 409 |
CKV_K8S_12 |
PodSecurityPolicy |
containers |
Memory requests should be set |
Kubernetes |
| 410 |
CKV_K8S_12 |
PodSecurityPolicy |
initContainers |
Memory requests should be set |
Kubernetes |
| 411 |
CKV_K8S_13 |
PodSecurityPolicy |
containers |
Memory limits should be set |
Kubernetes |
| 412 |
CKV_K8S_13 |
PodSecurityPolicy |
initContainers |
Memory limits should be set |
Kubernetes |
| 413 |
CKV_K8S_14 |
PodSecurityPolicy |
containers |
Image Tag should be fixed - not latest or blank |
Kubernetes |
| 414 |
CKV_K8S_14 |
PodSecurityPolicy |
initContainers |
Image Tag should be fixed - not latest or blank |
Kubernetes |
| 415 |
CKV_K8S_15 |
PodSecurityPolicy |
containers |
Image Pull Policy should be Always |
Kubernetes |
| 416 |
CKV_K8S_15 |
PodSecurityPolicy |
initContainers |
Image Pull Policy should be Always |
Kubernetes |
| 417 |
CKV_K8S_16 |
PodSecurityPolicy |
containers |
Container should not be privileged |
Kubernetes |
| 418 |
CKV_K8S_16 |
PodSecurityPolicy |
initContainers |
Container should not be privileged |
Kubernetes |
| 419 |
CKV_K8S_17 |
PodSecurityPolicy |
Pod |
Containers should not share the host process ID namespace |
Kubernetes |
| 420 |
CKV_K8S_17 |
PodSecurityPolicy |
Deployment |
Containers should not share the host process ID namespace |
Kubernetes |
| 421 |
CKV_K8S_17 |
PodSecurityPolicy |
DaemonSet |
Containers should not share the host process ID namespace |
Kubernetes |
| 422 |
CKV_K8S_17 |
PodSecurityPolicy |
StatefulSet |
Containers should not share the host process ID namespace |
Kubernetes |
| 423 |
CKV_K8S_17 |
PodSecurityPolicy |
ReplicaSet |
Containers should not share the host process ID namespace |
Kubernetes |
| 424 |
CKV_K8S_17 |
PodSecurityPolicy |
ReplicationController |
Containers should not share the host process ID namespace |
Kubernetes |
| 425 |
CKV_K8S_17 |
PodSecurityPolicy |
Job |
Containers should not share the host process ID namespace |
Kubernetes |
| 426 |
CKV_K8S_17 |
PodSecurityPolicy |
CronJob |
Containers should not share the host process ID namespace |
Kubernetes |
| 427 |
CKV_K8S_18 |
PodSecurityPolicy |
Pod |
Containers should not share the host IPC namespace |
Kubernetes |
| 428 |
CKV_K8S_18 |
PodSecurityPolicy |
Deployment |
Containers should not share the host IPC namespace |
Kubernetes |
| 429 |
CKV_K8S_18 |
PodSecurityPolicy |
DaemonSet |
Containers should not share the host IPC namespace |
Kubernetes |
| 430 |
CKV_K8S_18 |
PodSecurityPolicy |
StatefulSet |
Containers should not share the host IPC namespace |
Kubernetes |
| 431 |
CKV_K8S_18 |
PodSecurityPolicy |
ReplicaSet |
Containers should not share the host IPC namespace |
Kubernetes |
| 432 |
CKV_K8S_18 |
PodSecurityPolicy |
ReplicationController |
Containers should not share the host IPC namespace |
Kubernetes |
| 433 |
CKV_K8S_18 |
PodSecurityPolicy |
Job |
Containers should not share the host IPC namespace |
Kubernetes |
| 434 |
CKV_K8S_18 |
PodSecurityPolicy |
CronJob |
Containers should not share the host IPC namespace |
Kubernetes |
| 435 |
CKV_K8S_19 |
PodSecurityPolicy |
Pod |
Containers should not share the host network namespace |
Kubernetes |
| 436 |
CKV_K8S_19 |
PodSecurityPolicy |
Deployment |
Containers should not share the host network namespace |
Kubernetes |
| 437 |
CKV_K8S_19 |
PodSecurityPolicy |
DaemonSet |
Containers should not share the host network namespace |
Kubernetes |
| 438 |
CKV_K8S_19 |
PodSecurityPolicy |
StatefulSet |
Containers should not share the host network namespace |
Kubernetes |
| 439 |
CKV_K8S_19 |
PodSecurityPolicy |
ReplicaSet |
Containers should not share the host network namespace |
Kubernetes |
| 440 |
CKV_K8S_19 |
PodSecurityPolicy |
ReplicationController |
Containers should not share the host network namespace |
Kubernetes |
| 441 |
CKV_K8S_19 |
PodSecurityPolicy |
Job |
Containers should not share the host network namespace |
Kubernetes |
| 442 |
CKV_K8S_19 |
PodSecurityPolicy |
CronJob |
Containers should not share the host network namespace |
Kubernetes |
| 443 |
CKV_K8S_20 |
PodSecurityPolicy |
containers |
Containers should not run with allowPrivilegeEscalation |
Kubernetes |
| 444 |
CKV_K8S_20 |
PodSecurityPolicy |
initContainers |
Containers should not run with allowPrivilegeEscalation |
Kubernetes |
| 445 |
CKV_K8S_21 |
PodSecurityPolicy |
Service |
The default namespace should not be used |
Kubernetes |
| 446 |
CKV_K8S_21 |
PodSecurityPolicy |
Pod |
The default namespace should not be used |
Kubernetes |
| 447 |
CKV_K8S_21 |
PodSecurityPolicy |
Deployment |
The default namespace should not be used |
Kubernetes |
| 448 |
CKV_K8S_21 |
PodSecurityPolicy |
DaemonSet |
The default namespace should not be used |
Kubernetes |
| 449 |
CKV_K8S_21 |
PodSecurityPolicy |
StatefulSet |
The default namespace should not be used |
Kubernetes |
| 450 |
CKV_K8S_21 |
PodSecurityPolicy |
ReplicaSet |
The default namespace should not be used |
Kubernetes |
| 451 |
CKV_K8S_21 |
PodSecurityPolicy |
ReplicationController |
The default namespace should not be used |
Kubernetes |
| 452 |
CKV_K8S_21 |
PodSecurityPolicy |
Job |
The default namespace should not be used |
Kubernetes |
| 453 |
CKV_K8S_21 |
PodSecurityPolicy |
CronJob |
The default namespace should not be used |
Kubernetes |
| 454 |
CKV_K8S_21 |
PodSecurityPolicy |
ServiceAccount |
The default namespace should not be used |
Kubernetes |
| 455 |
CKV_K8S_21 |
PodSecurityPolicy |
Secret |
The default namespace should not be used |
Kubernetes |
| 456 |
CKV_K8S_21 |
PodSecurityPolicy |
Role |
The default namespace should not be used |
Kubernetes |
| 457 |
CKV_K8S_21 |
PodSecurityPolicy |
RoleBinding |
The default namespace should not be used |
Kubernetes |
| 458 |
CKV_K8S_21 |
PodSecurityPolicy |
ConfigMap |
The default namespace should not be used |
Kubernetes |
| 459 |
CKV_K8S_21 |
PodSecurityPolicy |
Ingress |
The default namespace should not be used |
Kubernetes |
| 460 |
CKV_K8S_22 |
PodSecurityPolicy |
containers |
Use read-only filesystem for containers where possible |
Kubernetes |
| 461 |
CKV_K8S_22 |
PodSecurityPolicy |
initContainers |
Use read-only filesystem for containers where possible |
Kubernetes |
| 462 |
CKV_K8S_23 |
PodSecurityPolicy |
Pod |
Minimize the admission of root containers |
Kubernetes |
| 463 |
CKV_K8S_23 |
PodSecurityPolicy |
Deployment |
Minimize the admission of root containers |
Kubernetes |
| 464 |
CKV_K8S_23 |
PodSecurityPolicy |
DaemonSet |
Minimize the admission of root containers |
Kubernetes |
| 465 |
CKV_K8S_23 |
PodSecurityPolicy |
StatefulSet |
Minimize the admission of root containers |
Kubernetes |
| 466 |
CKV_K8S_23 |
PodSecurityPolicy |
ReplicaSet |
Minimize the admission of root containers |
Kubernetes |
| 467 |
CKV_K8S_23 |
PodSecurityPolicy |
ReplicationController |
Minimize the admission of root containers |
Kubernetes |
| 468 |
CKV_K8S_23 |
PodSecurityPolicy |
Job |
Minimize the admission of root containers |
Kubernetes |
| 469 |
CKV_K8S_23 |
PodSecurityPolicy |
CronJob |
Minimize the admission of root containers |
Kubernetes |
| 470 |
CKV_K8S_24 |
PodSecurityPolicy |
PodSecurityPolicy |
Do not allow containers with added capability |
Kubernetes |
| 471 |
CKV_K8S_25 |
PodSecurityPolicy |
containers |
Minimize the admission of containers with added capability |
Kubernetes |
| 472 |
CKV_K8S_25 |
PodSecurityPolicy |
initContainers |
Minimize the admission of containers with added capability |
Kubernetes |
| 473 |
CKV_K8S_26 |
PodSecurityPolicy |
containers |
Do not specify hostPort unless absolutely necessary |
Kubernetes |
| 474 |
CKV_K8S_26 |
PodSecurityPolicy |
initContainers |
Do not specify hostPort unless absolutely necessary |
Kubernetes |
| 475 |
CKV_K8S_27 |
PodSecurityPolicy |
Pod |
Do not expose the docker daemon socket to containers |
Kubernetes |
| 476 |
CKV_K8S_27 |
PodSecurityPolicy |
Deployment |
Do not expose the docker daemon socket to containers |
Kubernetes |
| 477 |
CKV_K8S_27 |
PodSecurityPolicy |
DaemonSet |
Do not expose the docker daemon socket to containers |
Kubernetes |
| 478 |
CKV_K8S_27 |
PodSecurityPolicy |
StatefulSet |
Do not expose the docker daemon socket to containers |
Kubernetes |
| 479 |
CKV_K8S_27 |
PodSecurityPolicy |
ReplicaSet |
Do not expose the docker daemon socket to containers |
Kubernetes |
| 480 |
CKV_K8S_27 |
PodSecurityPolicy |
ReplicationController |
Do not expose the docker daemon socket to containers |
Kubernetes |
| 481 |
CKV_K8S_27 |
PodSecurityPolicy |
Job |
Do not expose the docker daemon socket to containers |
Kubernetes |
| 482 |
CKV_K8S_27 |
PodSecurityPolicy |
CronJob |
Do not expose the docker daemon socket to containers |
Kubernetes |
| 483 |
CKV_K8S_28 |
PodSecurityPolicy |
containers |
Minimize the admission of containers with the NET_RAW capability |
Kubernetes |
| 484 |
CKV_K8S_28 |
PodSecurityPolicy |
initContainers |
Minimize the admission of containers with the NET_RAW capability |
Kubernetes |
| 485 |
CKV_K8S_29 |
PodSecurityPolicy |
Pod |
Apply security context to your pods and containers |
Kubernetes |
| 486 |
CKV_K8S_29 |
PodSecurityPolicy |
Deployment |
Apply security context to your pods and containers |
Kubernetes |
| 487 |
CKV_K8S_29 |
PodSecurityPolicy |
DaemonSet |
Apply security context to your pods and containers |
Kubernetes |
| 488 |
CKV_K8S_29 |
PodSecurityPolicy |
StatefulSet |
Apply security context to your pods and containers |
Kubernetes |
| 489 |
CKV_K8S_29 |
PodSecurityPolicy |
ReplicaSet |
Apply security context to your pods and containers |
Kubernetes |
| 490 |
CKV_K8S_29 |
PodSecurityPolicy |
ReplicationController |
Apply security context to your pods and containers |
Kubernetes |
| 491 |
CKV_K8S_29 |
PodSecurityPolicy |
Job |
Apply security context to your pods and containers |
Kubernetes |
| 492 |
CKV_K8S_29 |
PodSecurityPolicy |
CronJob |
Apply security context to your pods and containers |
Kubernetes |
| 493 |
CKV_K8S_30 |
PodSecurityPolicy |
containers |
Apply security context to your pods and containers |
Kubernetes |
| 494 |
CKV_K8S_30 |
PodSecurityPolicy |
initContainers |
Apply security context to your pods and containers |
Kubernetes |
| 495 |
CKV_K8S_31 |
PodSecurityPolicy |
Pod |
Ensure that the seccomp profile is set to docker/default or runtime/default |
Kubernetes |
| 496 |
CKV_K8S_31 |
PodSecurityPolicy |
Deployment |
Ensure that the seccomp profile is set to docker/default or runtime/default |
Kubernetes |
| 497 |
CKV_K8S_31 |
PodSecurityPolicy |
DaemonSet |
Ensure that the seccomp profile is set to docker/default or runtime/default |
Kubernetes |
| 498 |
CKV_K8S_31 |
PodSecurityPolicy |
StatefulSet |
Ensure that the seccomp profile is set to docker/default or runtime/default |
Kubernetes |
| 499 |
CKV_K8S_31 |
PodSecurityPolicy |
ReplicaSet |
Ensure that the seccomp profile is set to docker/default or runtime/default |
Kubernetes |
| 500 |
CKV_K8S_31 |
PodSecurityPolicy |
ReplicationController |
Ensure that the seccomp profile is set to docker/default or runtime/default |
Kubernetes |
| 501 |
CKV_K8S_31 |
PodSecurityPolicy |
Job |
Ensure that the seccomp profile is set to docker/default or runtime/default |
Kubernetes |
| 502 |
CKV_K8S_31 |
PodSecurityPolicy |
CronJob |
Ensure that the seccomp profile is set to docker/default or runtime/default |
Kubernetes |
| 503 |
CKV_K8S_32 |
PodSecurityPolicy |
PodSecurityPolicy |
Ensure default seccomp profile set to docker/default or runtime/default |
Kubernetes |
| 504 |
CKV_K8S_33 |
PodSecurityPolicy |
containers |
Ensure the Kubernetes dashboard is not deployed |
Kubernetes |
| 505 |
CKV_K8S_33 |
PodSecurityPolicy |
initContainers |
Ensure the Kubernetes dashboard is not deployed |
Kubernetes |
| 506 |
CKV_K8S_34 |
PodSecurityPolicy |
containers |
Ensure that Tiller (Helm v2) is not deployed |
Kubernetes |
| 507 |
CKV_K8S_34 |
PodSecurityPolicy |
initContainers |
Ensure that Tiller (Helm v2) is not deployed |
Kubernetes |
| 508 |
CKV_K8S_35 |
PodSecurityPolicy |
containers |
Prefer using secrets as files over secrets as environment variables |
Kubernetes |
| 509 |
CKV_K8S_35 |
PodSecurityPolicy |
initContainers |
Prefer using secrets as files over secrets as environment variables |
Kubernetes |
| 510 |
CKV_K8S_36 |
PodSecurityPolicy |
PodSecurityPolicy |
Minimize the admission of containers with capabilities assigned |
Kubernetes |
| 511 |
CKV_K8S_37 |
PodSecurityPolicy |
containers |
Minimize the admission of containers with capabilities assigned |
Kubernetes |
| 512 |
CKV_K8S_37 |
PodSecurityPolicy |
initContainers |
Minimize the admission of containers with capabilities assigned |
Kubernetes |
| 513 |
CKV_K8S_38 |
PodSecurityPolicy |
Pod |
Ensure that Service Account Tokens are only mounted where necessary |
Kubernetes |
| 514 |
CKV_K8S_38 |
PodSecurityPolicy |
Deployment |
Ensure that Service Account Tokens are only mounted where necessary |
Kubernetes |
| 515 |
CKV_K8S_38 |
PodSecurityPolicy |
DaemonSet |
Ensure that Service Account Tokens are only mounted where necessary |
Kubernetes |
| 516 |
CKV_K8S_38 |
PodSecurityPolicy |
StatefulSet |
Ensure that Service Account Tokens are only mounted where necessary |
Kubernetes |
| 517 |
CKV_K8S_38 |
PodSecurityPolicy |
ReplicaSet |
Ensure that Service Account Tokens are only mounted where necessary |
Kubernetes |
| 518 |
CKV_K8S_38 |
PodSecurityPolicy |
ReplicationController |
Ensure that Service Account Tokens are only mounted where necessary |
Kubernetes |
| 519 |
CKV_K8S_38 |
PodSecurityPolicy |
Job |
Ensure that Service Account Tokens are only mounted where necessary |
Kubernetes |
| 520 |
CKV_K8S_38 |
PodSecurityPolicy |
CronJob |
Ensure that Service Account Tokens are only mounted where necessary |
Kubernetes |
| 521 |
CKV_K8S_39 |
PodSecurityPolicy |
containers |
Do not use the CAP_SYS_ADMIN linux capability |
Kubernetes |
| 522 |
CKV_K8S_39 |
PodSecurityPolicy |
initContainers |
Do not use the CAP_SYS_ADMIN linux capability |
Kubernetes |
| 523 |
CKV_K8S_40 |
PodSecurityPolicy |
Pod |
Containers should run as a high UID to avoid host conflict |
Kubernetes |
| 524 |
CKV_K8S_40 |
PodSecurityPolicy |
Deployment |
Containers should run as a high UID to avoid host conflict |
Kubernetes |
| 525 |
CKV_K8S_40 |
PodSecurityPolicy |
DaemonSet |
Containers should run as a high UID to avoid host conflict |
Kubernetes |
| 526 |
CKV_K8S_40 |
PodSecurityPolicy |
StatefulSet |
Containers should run as a high UID to avoid host conflict |
Kubernetes |
| 527 |
CKV_K8S_40 |
PodSecurityPolicy |
ReplicaSet |
Containers should run as a high UID to avoid host conflict |
Kubernetes |
| 528 |
CKV_K8S_40 |
PodSecurityPolicy |
ReplicationController |
Containers should run as a high UID to avoid host conflict |
Kubernetes |
| 529 |
CKV_K8S_40 |
PodSecurityPolicy |
Job |
Containers should run as a high UID to avoid host conflict |
Kubernetes |
| 530 |
CKV_K8S_40 |
PodSecurityPolicy |
CronJob |
Containers should run as a high UID to avoid host conflict |
Kubernetes |
| 531 |
CKV_K8S_41 |
PodSecurityPolicy |
ServiceAccount |
Ensure that default service accounts are not actively used |
Kubernetes |
| 532 |
CKV_K8S_42 |
PodSecurityPolicy |
RoleBinding |
Ensure that default service accounts are not actively used |
Kubernetes |
| 533 |
CKV_K8S_42 |
PodSecurityPolicy |
ClusterRoleBinding |
Ensure that default service accounts are not actively used |
Kubernetes |
| 534 |
CKV_K8S_43 |
PodSecurityPolicy |
containers |
Image should use digest |
Kubernetes |
| 535 |
CKV_K8S_43 |
PodSecurityPolicy |
initContainers |
Image should use digest |
Kubernetes |
| 536 |
CKV_K8S_44 |
PodSecurityPolicy |
Service |
Ensure that the Tiller Service (Helm v2) is deleted |
Kubernetes |
| 537 |
CKV_K8S_45 |
PodSecurityPolicy |
containers |
Ensure the Tiller Deployment (Helm V2) is not accessible from within the cluster |
Kubernetes |
| 538 |
CKV_K8S_45 |
PodSecurityPolicy |
initContainers |
Ensure the Tiller Deployment (Helm V2) is not accessible from within the cluster |
Kubernetes |
| 539 |
CKV_LIN_1 |
provider |
linode |
Ensure no hard coded Linode tokens exist in provider |
Terraform |
| 540 |
CKV_LIN_2 |
resource |
linode_instance |
Ensure SSH key set in authorized_keys |
Terraform |