Skip to content

Commit

Permalink
POL-1378 Linting Updates: Security Policies (#2730)
Browse files Browse the repository at this point in the history
* update

* fix

* update

* fix

* update

* fix

* update

* update

* update

* update

* update

* update

* update
  • Loading branch information
XOmniverse authored Oct 14, 2024
1 parent 78d9786 commit 6dc1768
Show file tree
Hide file tree
Showing 172 changed files with 391 additions and 295 deletions.
74 changes: 37 additions & 37 deletions data/policy_permissions_list/master_policy_permissions_list.json
Original file line number Diff line number Diff line change
Expand Up @@ -7235,7 +7235,7 @@
{
"id": "./security/aws/aws_config_enabled/aws_config_enabled.pt",
"name": "AWS Regions Without Config Fully Enabled",
"version": "3.0.0",
"version": "3.0.1",
"providers": [
{
"name": "aws",
Expand Down Expand Up @@ -7309,7 +7309,7 @@
{
"id": "./security/aws/ebs_unencrypted_volumes/aws_unencrypted_volumes.pt",
"name": "AWS Unencrypted EBS Volumes",
"version": "5.0.0",
"version": "5.0.1",
"providers": [
{
"name": "aws",
Expand Down Expand Up @@ -7346,7 +7346,7 @@
{
"id": "./security/aws/elb_unencrypted/aws_elb_encryption.pt",
"name": "AWS Elastic Load Balancers With Unencrypted Listeners",
"version": "4.0.0",
"version": "4.0.1",
"providers": [
{
"name": "aws",
Expand Down Expand Up @@ -7393,7 +7393,7 @@
{
"id": "./security/aws/iam_access_analyzer_enabled/iam_access_analyzer_enabled.pt",
"name": "AWS Regions Without Access Analyzer Enabled",
"version": "4.0.0",
"version": "4.0.1",
"providers": [
{
"name": "aws",
Expand Down Expand Up @@ -7430,7 +7430,7 @@
{
"id": "./security/aws/iam_expired_ssl_certs/iam_expired_ssl_certs.pt",
"name": "AWS IAM Expired SSL/TLS Certificates",
"version": "3.0.0",
"version": "3.0.1",
"providers": [
{
"name": "aws",
Expand Down Expand Up @@ -7462,7 +7462,7 @@
{
"id": "./security/aws/iam_hwmfa_enabled_for_root/aws_iam_hwmfa_enabled.pt",
"name": "AWS IAM Root User Account Without Hardware MFA",
"version": "3.0.0",
"version": "3.0.1",
"providers": [
{
"name": "aws",
Expand Down Expand Up @@ -7499,7 +7499,7 @@
{
"id": "./security/aws/iam_mfa_enabled_for_iam_users/iam_mfa_enabled_for_iam_users.pt",
"name": "AWS IAM User Accounts Without MFA",
"version": "3.0.0",
"version": "3.0.1",
"providers": [
{
"name": "aws",
Expand Down Expand Up @@ -7536,7 +7536,7 @@
{
"id": "./security/aws/iam_mfa_enabled_for_root/iam_mfa_enabled.pt",
"name": "AWS IAM Root User Account Without MFA",
"version": "3.0.0",
"version": "3.0.1",
"providers": [
{
"name": "aws",
Expand Down Expand Up @@ -7573,7 +7573,7 @@
{
"id": "./security/aws/iam_min_password_length/iam_min_password_length.pt",
"name": "AWS IAM Insufficient Required Password Length",
"version": "3.0.0",
"version": "3.0.1",
"providers": [
{
"name": "aws",
Expand Down Expand Up @@ -7605,7 +7605,7 @@
{
"id": "./security/aws/iam_no_admin_iam_policies_attached/iam_no_admin_iam_policies_attached.pt",
"name": "AWS IAM Attached Admin Policies",
"version": "3.0.0",
"version": "3.0.1",
"providers": [
{
"name": "aws",
Expand Down Expand Up @@ -7642,7 +7642,7 @@
{
"id": "./security/aws/iam_no_root_access_keys/aws_iam_no_root_access_keys.pt",
"name": "AWS IAM Root Account Access Keys",
"version": "3.0.0",
"version": "3.0.1",
"providers": [
{
"name": "aws",
Expand Down Expand Up @@ -7674,7 +7674,7 @@
{
"id": "./security/aws/iam_no_root_for_tasks/iam_no_root_for_tasks.pt",
"name": "AWS IAM Root User Doing Everyday Tasks",
"version": "3.0.0",
"version": "3.0.1",
"providers": [
{
"name": "aws",
Expand Down Expand Up @@ -7711,7 +7711,7 @@
{
"id": "./security/aws/iam_one_active_key_per_user/iam_one_active_key_per_user.pt",
"name": "AWS IAM Users With Multiple Active Access Keys",
"version": "3.0.0",
"version": "3.0.1",
"providers": [
{
"name": "aws",
Expand Down Expand Up @@ -7748,7 +7748,7 @@
{
"id": "./security/aws/iam_prevent_password_reuse/iam_prevent_password_reuse.pt",
"name": "AWS IAM Password Policy Not Restricting Password Reuse",
"version": "3.0.0",
"version": "3.0.1",
"providers": [
{
"name": "aws",
Expand Down Expand Up @@ -7780,7 +7780,7 @@
{
"id": "./security/aws/iam_rotate_access_keys/iam_rotate_access_keys.pt",
"name": "AWS IAM Users With Old Access Keys",
"version": "3.0.0",
"version": "3.0.1",
"providers": [
{
"name": "aws",
Expand Down Expand Up @@ -7817,7 +7817,7 @@
{
"id": "./security/aws/iam_support_role_created/iam_support_role_created.pt",
"name": "AWS IAM Account Missing Support Role",
"version": "3.0.0",
"version": "3.0.1",
"providers": [
{
"name": "aws",
Expand Down Expand Up @@ -7854,7 +7854,7 @@
{
"id": "./security/aws/iam_unused_creds/iam_unused_creds.pt",
"name": "AWS Unused IAM Credentials",
"version": "3.0.0",
"version": "3.0.1",
"providers": [
{
"name": "aws",
Expand Down Expand Up @@ -7891,7 +7891,7 @@
{
"id": "./security/aws/iam_users_perms_via_groups_only/iam_users_perms_via_groups_only.pt",
"name": "AWS IAM Users With Directly-Attached Policies",
"version": "3.0.0",
"version": "3.0.1",
"providers": [
{
"name": "aws",
Expand Down Expand Up @@ -7933,7 +7933,7 @@
{
"id": "./security/aws/kms_rotation/kms_rotation.pt",
"name": "AWS Customer Managed Keys (CMKs) Without Rotation Enabled",
"version": "3.0.0",
"version": "3.0.1",
"providers": [
{
"name": "aws",
Expand Down Expand Up @@ -7975,7 +7975,7 @@
{
"id": "./security/aws/loadbalancer_internet_facing/aws_internet_facing_elbs.pt",
"name": "AWS Internet-Accessible Elastic Load Balancers",
"version": "4.0.0",
"version": "4.0.1",
"providers": [
{
"name": "aws",
Expand Down Expand Up @@ -8028,7 +8028,7 @@
{
"id": "./security/aws/log_cloudtrail_cloudwatch_integrated/log_cloudtrail_cloudwatch_integrated.pt",
"name": "AWS CloudTrails Not Integrated With CloudWatch",
"version": "3.0.0",
"version": "3.0.1",
"providers": [
{
"name": "aws",
Expand Down Expand Up @@ -8065,7 +8065,7 @@
{
"id": "./security/aws/log_ensure_cloudtrail_bucket_access_logging/log_ensure_cloudtrail_bucket_access_logging.pt",
"name": "AWS CloudTrail S3 Buckets Without Access Logging",
"version": "3.0.0",
"version": "3.0.1",
"providers": [
{
"name": "aws",
Expand Down Expand Up @@ -8107,7 +8107,7 @@
{
"id": "./security/aws/log_ensure_cloudtrail_bucket_not_public/log_ensure_cloudtrail_bucket_not_public.pt",
"name": "AWS Publicly Accessible CloudTrail S3 Buckets",
"version": "3.0.0",
"version": "3.0.1",
"providers": [
{
"name": "aws",
Expand Down Expand Up @@ -8154,7 +8154,7 @@
{
"id": "./security/aws/log_ensure_cloudtrail_bucket_object_logging/log_ensure_cloudtrail_bucket_object_logging.pt",
"name": "AWS CloudTrails Without Object-level Events Logging Enabled",
"version": "3.0.0",
"version": "3.0.1",
"providers": [
{
"name": "aws",
Expand Down Expand Up @@ -8191,7 +8191,7 @@
{
"id": "./security/aws/log_ensure_cloudtrail_encrypted/log_ensure_cloudtrail_encrypted.pt",
"name": "AWS CloudTrails Without Encrypted Logs",
"version": "3.0.0",
"version": "3.0.1",
"providers": [
{
"name": "aws",
Expand Down Expand Up @@ -8223,7 +8223,7 @@
{
"id": "./security/aws/log_ensure_cloudtrail_multiregion/log_ensure_cloudtrail_multiregion.pt",
"name": "AWS CloudTrail Not Enabled In All Regions",
"version": "3.0.0",
"version": "3.0.1",
"providers": [
{
"name": "aws",
Expand Down Expand Up @@ -8265,7 +8265,7 @@
{
"id": "./security/aws/log_file_validation_enabled/log_file_validation_enabled.pt",
"name": "AWS CloudTrails Without Log File Validation Enabled",
"version": "3.0.0",
"version": "3.0.1",
"providers": [
{
"name": "aws",
Expand Down Expand Up @@ -8297,7 +8297,7 @@
{
"id": "./security/aws/public_buckets/aws_public_buckets.pt",
"name": "AWS Open S3 Buckets",
"version": "3.1",
"version": "3.1.1",
"providers": [
{
"name": "aws",
Expand Down Expand Up @@ -8339,7 +8339,7 @@
{
"id": "./security/aws/rds_publicly_accessible/aws_publicly_accessible_rds_instances.pt",
"name": "AWS Publicly Accessible RDS Instances",
"version": "5.0.0",
"version": "5.0.1",
"providers": [
{
"name": "aws",
Expand Down Expand Up @@ -8393,7 +8393,7 @@
{
"id": "./security/aws/rds_unencrypted/aws_unencrypted_rds_instances.pt",
"name": "AWS Unencrypted RDS Instances",
"version": "4.0.0",
"version": "4.0.1",
"providers": [
{
"name": "aws",
Expand Down Expand Up @@ -8441,7 +8441,7 @@
{
"id": "./security/aws/s3_buckets_deny_http/s3_buckets_deny_http.pt",
"name": "AWS S3 Buckets Accepting HTTP Requests",
"version": "3.0.0",
"version": "3.0.1",
"providers": [
{
"name": "aws",
Expand Down Expand Up @@ -8488,7 +8488,7 @@
{
"id": "./security/aws/s3_buckets_without_server_access_logging/aws_s3_buckets_without_server_access_logging.pt",
"name": "AWS S3 Buckets Without Server Access Logging",
"version": "3.0.0",
"version": "3.0.1",
"providers": [
{
"name": "aws",
Expand Down Expand Up @@ -8541,7 +8541,7 @@
{
"id": "./security/aws/s3_ensure_buckets_block_public_access/s3_ensure_buckets_block_public_access.pt",
"name": "AWS S3 Buckets Without Public Access Blocked",
"version": "3.0.0",
"version": "3.0.1",
"providers": [
{
"name": "aws",
Expand Down Expand Up @@ -8588,7 +8588,7 @@
{
"id": "./security/aws/s3_ensure_mfa_delete_enabled/s3_ensure_mfa_delete_enabled.pt",
"name": "AWS S3 Buckets Without MFA Delete Enabled",
"version": "3.0.0",
"version": "3.0.1",
"providers": [
{
"name": "aws",
Expand Down Expand Up @@ -8635,7 +8635,7 @@
{
"id": "./security/aws/unencrypted_s3_buckets/aws_unencrypted_s3_buckets.pt",
"name": "AWS S3 Buckets Without Default Encryption Configuration",
"version": "3.0.0",
"version": "3.0.1",
"providers": [
{
"name": "aws",
Expand Down Expand Up @@ -8694,7 +8694,7 @@
{
"id": "./security/aws/vpcs_without_flow_logs_enabled/aws_vpcs_without_flow_logs_enabled.pt",
"name": "AWS VPCs Without FlowLogs Enabled",
"version": "4.0.0",
"version": "4.0.1",
"providers": [
{
"name": "aws",
Expand Down Expand Up @@ -9829,7 +9829,7 @@
{
"id": "./security/google/public_buckets/google_public_buckets.pt",
"name": "Google Open Buckets",
"version": "3.1",
"version": "3.1.1",
"providers": [
{
"name": "gce",
Expand Down
Loading

0 comments on commit 6dc1768

Please sign in to comment.