Skip to content

Terraform provider and AWS upgrade to #1264

Terraform provider and AWS upgrade to

Terraform provider and AWS upgrade to #1264

Triggered via pull request August 9, 2023 13:27
Status Failure
Total duration 30s
Artifacts
This run and associated checks have been archived and are scheduled for deletion. Learn more about checks retention

terraform-security-scan.yml

on: pull_request
terraform-security-scan
21s
terraform-security-scan
Fit to window
Zoom out
Zoom in

Annotations

10 errors
terraform-security-scan
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
terraform-security-scan
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
terraform-security-scan
CKV_AWS_272: "Ensure AWS Lambda function is configured to validate code-signing"
terraform-security-scan
CKV_AWS_338: "Ensure CloudWatch log groups retains logs for at least 1 year"
terraform-security-scan
CKV_AWS_356: "Ensure no IAM policies documents allow "*" as a statement's resource for restrictable actions"
terraform-security-scan
CKV_AWS_249: "Ensure that the Execution Role ARN and the Task Role ARN are different in ECS Task definitions"
terraform-security-scan
CKV_AWS_332: "Ensure ECS Fargate services run on the latest Fargate platform version"
terraform-security-scan
CKV_AWS_338: "Ensure CloudWatch log groups retains logs for at least 1 year"
terraform-security-scan
CKV_AWS_272: "Ensure AWS Lambda function is configured to validate code-signing"
terraform-security-scan
CKV_AWS_338: "Ensure CloudWatch log groups retains logs for at least 1 year"