-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
disable dev #27
disable dev #27
Conversation
Terraform Format and Style 🖌
|
check_id | file | resource | check_name | guideline | |
---|---|---|---|---|---|
0 | CKV2_AZURE_41 | /modules/storage/main.tf | module.storage[0].azurerm_storage_account.blob | Ensure storage account is configured with SAS expiration policy | https://docs.prismacloud.io/en/enterprise-edition/policy-reference/azure-policies/azure-iam-policies/bc-azure-2-41 |
1 | CKV2_AZURE_40 | /modules/storage/main.tf | module.storage[0].azurerm_storage_account.blob | Ensure storage account is not configured with Shared Key authorization | https://docs.prismacloud.io/en/enterprise-edition/policy-reference/azure-policies/azure-iam-policies/bc-azure-2-40 |
2 | CKV2_AZURE_31 | /modules/network/subnets/main.tf | module.network[0].module.subnets.azurerm_subnet.endpoint | Ensure VNET subnet is configured with a Network Security Group (NSG) | https://docs.prismacloud.io/en/enterprise-edition/policy-reference/azure-policies/azure-general-policies/bc-azure-2-31 |
3 | CKV2_AZURE_31 | /modules/network/subnets/main.tf | module.network[0].module.subnets.azurerm_subnet.integration | Ensure VNET subnet is configured with a Network Security Group (NSG) | https://docs.prismacloud.io/en/enterprise-edition/policy-reference/azure-policies/azure-general-policies/bc-azure-2-31 |
Pusher: @dbwest, Action: pull_request
, Working Directory: ``, Workflow: Terraform Dev
disable env
Terraform Format and Style 🖌
|
check_id | file | resource | check_name | guideline | |
---|---|---|---|---|---|
0 | CKV_AZURE_59 | /modules/storage/main.tf | module.storage.azurerm_storage_account.blob | Ensure that Storage accounts disallow public access | https://docs.prismacloud.io/en/enterprise-edition/policy-reference/azure-policies/azure-networking-policies/ensure-that-storage-accounts-disallow-public-access |
1 | CKV2_AZURE_41 | /modules/storage/main.tf | module.storage.azurerm_storage_account.blob | Ensure storage account is configured with SAS expiration policy | https://docs.prismacloud.io/en/enterprise-edition/policy-reference/azure-policies/azure-iam-policies/bc-azure-2-41 |
2 | CKV2_AZURE_40 | /modules/storage/main.tf | module.storage.azurerm_storage_account.blob | Ensure storage account is not configured with Shared Key authorization | https://docs.prismacloud.io/en/enterprise-edition/policy-reference/azure-policies/azure-iam-policies/bc-azure-2-40 |
3 | CKV2_AZURE_31 | /modules/network/subnets/main.tf | module.network.module.subnets.azurerm_subnet.endpoint | Ensure VNET subnet is configured with a Network Security Group (NSG) | https://docs.prismacloud.io/en/enterprise-edition/policy-reference/azure-policies/azure-general-policies/bc-azure-2-31 |
4 | CKV2_AZURE_31 | /modules/network/subnets/main.tf | module.network.module.subnets.azurerm_subnet.integration | Ensure VNET subnet is configured with a Network Security Group (NSG) | https://docs.prismacloud.io/en/enterprise-edition/policy-reference/azure-policies/azure-general-policies/bc-azure-2-31 |
Pusher: @dbwest, Action: pull_request
, Working Directory: ``, Workflow: Terraform Dev
No description provided.