Skip to content

Commit 832f562

Browse files
committed
temp fix for cmk rotation
1 parent cacf406 commit 832f562

File tree

4 files changed

+8
-4
lines changed

4 files changed

+8
-4
lines changed

aws_sra_examples/terraform/common/s3/main.tf

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ resource "aws_s3_bucket" "sra_state_bucket" {
88
#checkov:skip=CKV_AWS_18: Ensure the S3 bucket has access logging enabled
99
#checkov:skip=CKV2_AWS_62: Ensure S3 buckets should have event notifications enabled
1010
#checkov:skip=CKV_AWS_144: Ensure that S3 bucket has cross-region replication enabled
11-
11+
1212
bucket = "${var.sra_state_bucket_prefix}-${data.aws_region.current.name}-${data.aws_caller_identity.current.account_id}"
1313
force_destroy = true
1414

@@ -18,6 +18,7 @@ resource "aws_s3_bucket" "sra_state_bucket" {
1818
}
1919

2020
resource "aws_s3_bucket_server_side_encryption_configuration" "sra_state_bucket_see" {
21+
#checkov:skip=CKV2_AWS_67: Ensure AWS S3 bucket encrypted with Customer Managed Key (CMK) has regular rotation
2122
bucket = aws_s3_bucket.sra_state_bucket.id
2223

2324
rule {
@@ -50,4 +51,4 @@ resource "aws_s3_bucket_public_access_block" "sra_state_bucket_public_access_blo
5051
block_public_policy = true
5152
ignore_public_acls = true
5253
restrict_public_buckets = true
53-
}
54+
}

aws_sra_examples/terraform/solutions/cloudtrail_org/s3/main.tf

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,7 @@ resource "aws_s3_bucket" "org_trail_bucket" {
1818
}
1919

2020
resource "aws_s3_bucket_server_side_encryption_configuration" "this" {
21+
#checkov:skip=CKV2_AWS_67: Ensure AWS S3 bucket encrypted with Customer Managed Key (CMK) has regular rotation
2122
bucket = aws_s3_bucket.org_trail_bucket.id
2223

2324
rule {
@@ -144,7 +145,7 @@ resource "aws_s3_bucket_policy" "org_trail_bucket_policy" {
144145
resource "aws_secretsmanager_secret" "org_trail_s3_bucket_secret" {
145146
#checkov:skip=CKV_AWS_149: Ensure that Secrets Manager secret is encrypted using KMS CMK
146147
#checkov:skip=CKV2_AWS_57: Ensure Secrets Manager secrets should have automatic rotation enabled
147-
148+
148149
count = var.sra_secrets_key_alias_arn != "" ? 1 : 0
149150

150151
name = "sra/cloudtrail_org_s3_bucket"

aws_sra_examples/terraform/solutions/guard_duty/s3/main.tf

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,7 @@ resource "aws_s3_bucket" "guardduty_delivery_bucket" {
1717
}
1818

1919
resource "aws_s3_bucket_server_side_encryption_configuration" "guardduty_see" {
20+
#checkov:skip=CKV2_AWS_67: Ensure AWS S3 bucket encrypted with Customer Managed Key (CMK) has regular rotation
2021
bucket = aws_s3_bucket.guardduty_delivery_bucket.id
2122

2223
rule {
@@ -153,4 +154,4 @@ data "aws_iam_policy_document" "guardduty_delivery_bucket_policy" {
153154
identifiers = ["guardduty.amazonaws.com"]
154155
}
155156
}
156-
}
157+
}

aws_sra_examples/terraform/solutions/macie/delivery_s3_bucket/main.tf

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,7 @@ resource "aws_s3_bucket" "macie_delivery_s3_bucket" {
1818
}
1919

2020
resource "aws_s3_bucket_server_side_encryption_configuration" "this" {
21+
#checkov:skip=CKV2_AWS_67: Ensure AWS S3 bucket encrypted with Customer Managed Key (CMK) has regular rotation
2122
bucket = aws_s3_bucket.macie_delivery_s3_bucket.id
2223

2324
rule {

0 commit comments

Comments
 (0)