Terraform provider and AWS upgrade to #1264
This run and associated checks have been archived and are scheduled for deletion.
Learn more about checks retention
terraform-security-scan.yml
on: pull_request
terraform-security-scan
21s
Annotations
10 errors
terraform-security-scan
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
|
terraform-security-scan
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
|
terraform-security-scan
CKV_AWS_272: "Ensure AWS Lambda function is configured to validate code-signing"
|
terraform-security-scan
CKV_AWS_338: "Ensure CloudWatch log groups retains logs for at least 1 year"
|
terraform-security-scan
CKV_AWS_356: "Ensure no IAM policies documents allow "*" as a statement's resource for restrictable actions"
|
terraform-security-scan
CKV_AWS_249: "Ensure that the Execution Role ARN and the Task Role ARN are different in ECS Task definitions"
|
terraform-security-scan
CKV_AWS_332: "Ensure ECS Fargate services run on the latest Fargate platform version"
|
terraform-security-scan
CKV_AWS_338: "Ensure CloudWatch log groups retains logs for at least 1 year"
|
terraform-security-scan
CKV_AWS_272: "Ensure AWS Lambda function is configured to validate code-signing"
|
terraform-security-scan
CKV_AWS_338: "Ensure CloudWatch log groups retains logs for at least 1 year"
|