Skip to content
This repository has been archived by the owner on Dec 10, 2021. It is now read-only.

Terraform AWS module for regular ECR vulnerability scanning and notification to Slack.

License

Notifications You must be signed in to change notification settings

animoto/terraform-aws-ecr-scanner

 
 

Repository files navigation

AWS ECR Vulnerability Scaning Terraform module

================================================

The module will trigger vulnerability scanning on all images in account ECR and will report the results to Slack channel.

Architecture

The module will deploy CloudWatch rule to shcedule the scan, Step Function to orchestrate the lamgdas, and two lambda functions. One for triggering the scan and second to read the results and report the outcame.

Basic usage

module "ecr-regular-scanning" {
  source = "<module path>"

  slack_channel = "<slack_channel_name>"
  slack_webhook_url = "<slack_webhook>"

}

You can set the levels of vulnerability, you want to get notified by changing risk_levels variable.

Default value is: "HIGH, CRITICAL"

You can get alarms for the following levels: HIGH, MEDIUM, INFORMATIONAL, LOW, CRITICAL, UNDEFINED.

About

Terraform AWS module for regular ECR vulnerability scanning and notification to Slack.

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages

  • HCL 56.0%
  • Python 44.0%