File tree 4 files changed +8
-4
lines changed
aws_sra_examples/terraform
4 files changed +8
-4
lines changed Original file line number Diff line number Diff line change @@ -8,7 +8,7 @@ resource "aws_s3_bucket" "sra_state_bucket" {
8
8
# checkov:skip=CKV_AWS_18: Ensure the S3 bucket has access logging enabled
9
9
# checkov:skip=CKV2_AWS_62: Ensure S3 buckets should have event notifications enabled
10
10
# checkov:skip=CKV_AWS_144: Ensure that S3 bucket has cross-region replication enabled
11
-
11
+
12
12
bucket = " ${ var . sra_state_bucket_prefix } -${ data . aws_region . current . name } -${ data . aws_caller_identity . current . account_id } "
13
13
force_destroy = true
14
14
@@ -18,6 +18,7 @@ resource "aws_s3_bucket" "sra_state_bucket" {
18
18
}
19
19
20
20
resource "aws_s3_bucket_server_side_encryption_configuration" "sra_state_bucket_see" {
21
+ # checkov:skip=CKV2_AWS_67: Ensure AWS S3 bucket encrypted with Customer Managed Key (CMK) has regular rotation
21
22
bucket = aws_s3_bucket. sra_state_bucket . id
22
23
23
24
rule {
@@ -50,4 +51,4 @@ resource "aws_s3_bucket_public_access_block" "sra_state_bucket_public_access_blo
50
51
block_public_policy = true
51
52
ignore_public_acls = true
52
53
restrict_public_buckets = true
53
- }
54
+ }
Original file line number Diff line number Diff line change @@ -18,6 +18,7 @@ resource "aws_s3_bucket" "org_trail_bucket" {
18
18
}
19
19
20
20
resource "aws_s3_bucket_server_side_encryption_configuration" "this" {
21
+ # checkov:skip=CKV2_AWS_67: Ensure AWS S3 bucket encrypted with Customer Managed Key (CMK) has regular rotation
21
22
bucket = aws_s3_bucket. org_trail_bucket . id
22
23
23
24
rule {
@@ -144,7 +145,7 @@ resource "aws_s3_bucket_policy" "org_trail_bucket_policy" {
144
145
resource "aws_secretsmanager_secret" "org_trail_s3_bucket_secret" {
145
146
# checkov:skip=CKV_AWS_149: Ensure that Secrets Manager secret is encrypted using KMS CMK
146
147
# checkov:skip=CKV2_AWS_57: Ensure Secrets Manager secrets should have automatic rotation enabled
147
-
148
+
148
149
count = var. sra_secrets_key_alias_arn != " " ? 1 : 0
149
150
150
151
name = " sra/cloudtrail_org_s3_bucket"
Original file line number Diff line number Diff line change @@ -17,6 +17,7 @@ resource "aws_s3_bucket" "guardduty_delivery_bucket" {
17
17
}
18
18
19
19
resource "aws_s3_bucket_server_side_encryption_configuration" "guardduty_see" {
20
+ # checkov:skip=CKV2_AWS_67: Ensure AWS S3 bucket encrypted with Customer Managed Key (CMK) has regular rotation
20
21
bucket = aws_s3_bucket. guardduty_delivery_bucket . id
21
22
22
23
rule {
@@ -153,4 +154,4 @@ data "aws_iam_policy_document" "guardduty_delivery_bucket_policy" {
153
154
identifiers = [" guardduty.amazonaws.com" ]
154
155
}
155
156
}
156
- }
157
+ }
Original file line number Diff line number Diff line change @@ -18,6 +18,7 @@ resource "aws_s3_bucket" "macie_delivery_s3_bucket" {
18
18
}
19
19
20
20
resource "aws_s3_bucket_server_side_encryption_configuration" "this" {
21
+ # checkov:skip=CKV2_AWS_67: Ensure AWS S3 bucket encrypted with Customer Managed Key (CMK) has regular rotation
21
22
bucket = aws_s3_bucket. macie_delivery_s3_bucket . id
22
23
23
24
rule {
You can’t perform that action at this time.
0 commit comments