IaC
found issues in 11 files
Annotations
Check warning on line 35 in code-issue-examples/iac/terraform/vpc-3-layer-example/alb_sg.tf
github-actions / Codety scanner - IaC
code-issue-examples/iac/terraform/vpc-3-layer-example/alb_sg.tf#L35
[security] [CKV_AWS_260] Ensure no security groups allow ingress from 0.0.0.0:0 to port 80
Check warning on line 35 in code-issue-examples/iac/terraform/vpc-3-layer-example/alb_sg.tf
github-actions / Codety scanner - IaC
code-issue-examples/iac/terraform/vpc-3-layer-example/alb_sg.tf#L35
[security] [CKV_AWS_23] Ensure every security group and rule has a description
Check warning on line 28 in code-issue-examples/iac/terraform/vpc-3-layer-example/app_sg.tf
github-actions / Codety scanner - IaC
code-issue-examples/iac/terraform/vpc-3-layer-example/app_sg.tf#L28
[security] [CKV_AWS_23] Ensure every security group and rule has a description
Check warning on line 35 in code-issue-examples/iac/terraform/vpc-3-layer-example/ec2.tf
github-actions / Codety scanner - IaC
code-issue-examples/iac/terraform/vpc-3-layer-example/ec2.tf#L35
[security] [CKV_AWS_79] Ensure Instance Metadata Service Version 1 is not enabled
Check warning on line 35 in code-issue-examples/iac/terraform/vpc-3-layer-example/ec2.tf
github-actions / Codety scanner - IaC
code-issue-examples/iac/terraform/vpc-3-layer-example/ec2.tf#L35
[security] [CKV_AWS_135] Ensure that EC2 is EBS optimized
Check warning on line 35 in code-issue-examples/iac/terraform/vpc-3-layer-example/ec2.tf
github-actions / Codety scanner - IaC
code-issue-examples/iac/terraform/vpc-3-layer-example/ec2.tf#L35
[security] [CKV_AWS_8] Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted
Check warning on line 35 in code-issue-examples/iac/terraform/vpc-3-layer-example/ec2.tf
github-actions / Codety scanner - IaC
code-issue-examples/iac/terraform/vpc-3-layer-example/ec2.tf#L35
[security] [CKV_AWS_126] Ensure that detailed monitoring is enabled for EC2 instances
Check warning on line 67 in code-issue-examples/iac/terraform/vpc-3-layer-example/ec2.tf
github-actions / Codety scanner - IaC
code-issue-examples/iac/terraform/vpc-3-layer-example/ec2.tf#L67
[security] [CKV_AWS_79] Ensure Instance Metadata Service Version 1 is not enabled
Check warning on line 67 in code-issue-examples/iac/terraform/vpc-3-layer-example/ec2.tf
github-actions / Codety scanner - IaC
code-issue-examples/iac/terraform/vpc-3-layer-example/ec2.tf#L67
[security] [CKV_AWS_135] Ensure that EC2 is EBS optimized
Check warning on line 67 in code-issue-examples/iac/terraform/vpc-3-layer-example/ec2.tf
github-actions / Codety scanner - IaC
code-issue-examples/iac/terraform/vpc-3-layer-example/ec2.tf#L67
[security] [CKV_AWS_8] Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted
Check warning on line 67 in code-issue-examples/iac/terraform/vpc-3-layer-example/ec2.tf
github-actions / Codety scanner - IaC
code-issue-examples/iac/terraform/vpc-3-layer-example/ec2.tf#L67
[security] [CKV_AWS_126] Ensure that detailed monitoring is enabled for EC2 instances
Check warning on line 35 in code-issue-examples/iac/terraform/vpc-3-layer-example/ec2.tf
github-actions / Codety scanner - IaC
code-issue-examples/iac/terraform/vpc-3-layer-example/ec2.tf#L35
[security] [CKV2_AWS_41] Ensure an IAM role is attached to EC2 instance
Check warning on line 67 in code-issue-examples/iac/terraform/vpc-3-layer-example/ec2.tf
github-actions / Codety scanner - IaC
code-issue-examples/iac/terraform/vpc-3-layer-example/ec2.tf#L67
[security] [CKV2_AWS_41] Ensure an IAM role is attached to EC2 instance
Check warning on line 15 in code-issue-examples/iac/terraform/vpc-3-layer-example/load-balancer.tf
github-actions / Codety scanner - IaC
code-issue-examples/iac/terraform/vpc-3-layer-example/load-balancer.tf#L15
[security] [CKV_AWS_150] Ensure that Load Balancer has deletion protection enabled
Check warning on line 15 in code-issue-examples/iac/terraform/vpc-3-layer-example/load-balancer.tf
github-actions / Codety scanner - IaC
code-issue-examples/iac/terraform/vpc-3-layer-example/load-balancer.tf#L15
[security] [CKV_AWS_131] Ensure that ALB drops HTTP headers
Check warning on line 15 in code-issue-examples/iac/terraform/vpc-3-layer-example/load-balancer.tf
github-actions / Codety scanner - IaC
code-issue-examples/iac/terraform/vpc-3-layer-example/load-balancer.tf#L15
[security] [CKV_AWS_91] Ensure the ELBv2 (Application/Network) has access logging enabled
Check warning on line 22 in code-issue-examples/iac/terraform/vpc-3-layer-example/load-balancer.tf
github-actions / Codety scanner - IaC
code-issue-examples/iac/terraform/vpc-3-layer-example/load-balancer.tf#L22
[security] [CKV_AWS_261] Ensure HTTP HTTPS Target group defines Healthcheck
Check warning on line 15 in code-issue-examples/iac/terraform/vpc-3-layer-example/load-balancer.tf
github-actions / Codety scanner - IaC
code-issue-examples/iac/terraform/vpc-3-layer-example/load-balancer.tf#L15
[security] [CKV2_AWS_28] Ensure public facing ALB are protected by WAF
Check warning on line 14 in code-issue-examples/iac/terraform/vpc-3-layer-example/subnets.tf
github-actions / Codety scanner - IaC
code-issue-examples/iac/terraform/vpc-3-layer-example/subnets.tf#L14
[security] [CKV_AWS_130] Ensure VPC subnets do not assign public IP by default
Check warning on line 29 in code-issue-examples/iac/terraform/vpc-3-layer-example/subnets.tf
github-actions / Codety scanner - IaC
code-issue-examples/iac/terraform/vpc-3-layer-example/subnets.tf#L29
[security] [CKV_AWS_130] Ensure VPC subnets do not assign public IP by default
Check warning on line 43 in code-issue-examples/iac/terraform/vpc-3-layer-example/web_sg.tf
github-actions / Codety scanner - IaC
code-issue-examples/iac/terraform/vpc-3-layer-example/web_sg.tf#L43
[security] [CKV_AWS_23] Ensure every security group and rule has a description
Check warning on line 14 in code-issue-examples/iac/terraform/vpc-3-layer-example/vpc.tf
github-actions / Codety scanner - IaC
code-issue-examples/iac/terraform/vpc-3-layer-example/vpc.tf#L14
[security] [CKV2_AWS_12] Ensure the default security group of every VPC restricts all traffic
Check warning on line 14 in code-issue-examples/iac/terraform/vpc-3-layer-example/vpc.tf
github-actions / Codety scanner - IaC
code-issue-examples/iac/terraform/vpc-3-layer-example/vpc.tf#L14
[security] [CKV2_AWS_11] Ensure VPC flow logging is enabled in all VPCs
Check warning on line 11 in code-issue-examples/iac/terraform/vpc-3-layer-example/nat_gateway.tf
github-actions / Codety scanner - IaC
code-issue-examples/iac/terraform/vpc-3-layer-example/nat_gateway.tf#L11
[security] [CKV2_AWS_19] Ensure that all EIP addresses allocated to a VPC are attached to EC2 instances
Check warning on line 40 in image/Dockerfile
github-actions / Codety scanner - IaC
image/Dockerfile#L40
[security] [CKV_DOCKER_3] Ensure that a user for the container has been created