Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat(terraform): 2 new checks #6764

Merged
merged 6 commits into from
Oct 14, 2024
Merged

feat(terraform): 2 new checks #6764

merged 6 commits into from
Oct 14, 2024

Conversation

tsmithv11
Copy link
Collaborator

@tsmithv11 tsmithv11 commented Oct 11, 2024

User description

By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.

Adding 2 checks
CKV2_AWS_73 matches 45f307ff-288c-4f87-92ec-bee6d0318b27

Checklist:

  • I have performed a self-review of my own code
  • I have commented my code, particularly in hard-to-understand areas
  • I have made corresponding changes to the documentation
  • I have added tests that prove my feature, policy, or fix is effective and works
  • New and existing tests pass locally with my changes

Generated description

Dear maintainer, below is a concise technical summary of the changes proposed in this PR:

Introduce two new checks for AWS resources in Terraform: CKV2_AWS_73 and CKV_AWS_380. The CKV2_AWS_73 check ensures that AWS SQS queues use customer-managed keys (CMK) instead of AWS default keys for encryption, enhancing security by enforcing stricter key management. The CKV_AWS_380 check verifies that AWS Transfer Servers are configured with the latest security policies, ensuring compliance with up-to-date security standards. These checks are implemented in SQSEncryptionCMK.yaml and TransferServerLatestPolicy.py, respectively, with corresponding test cases added to validate their functionality.

TopicDetails
SQS Encryption Check Ensure AWS SQS queues use customer-managed keys (CMK) for encryption instead of AWS default keys.
Modified files (4)
  • checkov/terraform/checks/graph_checks/aws/SQSEncryptionCMK.yaml
  • tests/terraform/graph/checks/resources/SQSEncryptionCMK/expected.yaml
  • tests/terraform/graph/checks/resources/SQSEncryptionCMK/main.tf
  • tests/terraform/graph/checks/test_yaml_policies.py
Latest Contributors(2)
EmailCommitDate
28880387+tsmithv11@use...feat-general-Add-multi...August 29, 2024
[email protected]...fix-terraform-Temporar...July 08, 2024
Transfer Server Policy Check Ensure AWS Transfer Servers use the latest security policies to maintain compliance with security standards.
Modified files (3)
  • checkov/terraform/checks/resource/aws/TransferServerLatestPolicy.py
  • tests/terraform/checks/resource/aws/test_TransferServerLatestPolicy.py
  • tests/terraform/checks/resource/aws/example_TransferServerLatestPolicy/main.tf
Latest Contributors(0)
EmailCommitDate
This pull request is reviewed by Baz. Join @tsmithv11 and the rest of your team on (Baz).

@tsmithv11 tsmithv11 merged commit 361da72 into main Oct 14, 2024
39 of 40 checks passed
@tsmithv11 tsmithv11 deleted the new-checks-oct-24 branch October 14, 2024 07:30
pull bot pushed a commit to Julian-Louis/checkov that referenced this pull request Oct 14, 2024
* Policy1

* Check2

* Fix flake8

* operator fix

* Update TransferServerLatestPolicy.py
pull bot pushed a commit to Julian-Louis/checkov that referenced this pull request Oct 14, 2024
* Policy1

* Check2

* Fix flake8

* operator fix

* Update TransferServerLatestPolicy.py
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants