-
### Community Note
* Please vote on this issue by adding a š [reaction](https://blog.github.com/2016-03-10-add-reactions-to-pull-requests-issues-and-comments/) to the original issue to help theā¦
-
- Date the tool ran
- Version of the tool (and library) that ran
- Measurement thresholds applied
- Compliance frameworks applied: none, aws-foundational-security-best-practices, cis-aws OR appliedā¦
-
**The organization:**
a. Identifies and selects the following types of information system accounts to support organizational missions/business functions: [Assignment: organization-defined informationā¦
-
**Is your feature request related to a problem? Please describe.**
When running scoutsuite for aws, the report shows a containers tab. However no information ever populates it, even in accounts usiā¦
-
https://aws.amazon.com/ko/elasticsearch-service/
-
Per [Information Integrity Procedure](https://docs.google.com/document/d/1KWBwFyWCbLVDKqUYmY05oh8XZRdI0ZSVhn64XytrjKw), SI-03(7):
The information system implements non-signature-based malicious code dā¦
-
### Is there an existing issue for this?
- [X] I have searched the existing issues
### Description of the bug
When attempting to assign a kms key as the default ebs encryption key in the ap-southeaā¦
-
### User Story
As an Analytical Platform engineer
I expect our compute environment to be up-to-date
So that we never find ourselves in a position where we have to down tools to catch up
### Value / ā¦
-
New feature request - can we enforce SCPs at the EC OU level to prevent certain regions from being used.
This could help alleviate costs of deploying GuardDuty in all regions as we would consider thā¦
stmag updated
3 years ago
-
terraform-linters/tflint#1225 fixed the case where a provider was explicitly passed to a module, but stated:
> It remains a lint error to declare a required provider when it is implicitly inheritedā¦