Closed az-kennedy closed 7 months ago
🌟 No Terraform files were modified in this PR or all modified Terraform files passed the Checkov checks. Good job! 🌟
🌟 No Terraform files were modified in this PR or all modified Terraform files passed the Checkov checks. Good job! 🌟
🌟 No Terraform files were modified in this PR or all modified Terraform files passed the Checkov checks. Good job! 🌟
🌟 No Terraform files were modified in this PR or all modified Terraform files passed the Checkov checks. Good job! 🌟
🌟 No Terraform files were modified in this PR or all modified Terraform files passed the Checkov checks. Good job! 🌟
Pushed some code changes, everything is working correctly
🌟 No Terraform files were modified in this PR or all modified Terraform files passed the Checkov checks. Good job! 🌟
File | Check ID | Description | Resource | Checkov Result |
---|---|---|---|---|
/cloudtrail.tf | CKV_AWS_338 | Ensure CloudWatch log groups retains logs for at least 1 year | aws_cloudwatch_log_group.cloudtrail_log_group | FAILED |
/cloudtrail.tf | CKV_AWS_252 | Ensure CloudTrail defines an SNS Topic | aws_cloudtrail.all_cloudtrail | FAILED |
Please review the above report. ⚠️
File | Check ID | Description | Resource | Checkov Result |
---|---|---|---|---|
/cloudtrail.tf | CKV_AWS_338 | Ensure CloudWatch log groups retains logs for at least 1 year | aws_cloudwatch_log_group.cloudtrail_log_group | FAILED |
/cloudtrail.tf | CKV_AWS_252 | Ensure CloudTrail defines an SNS Topic | aws_cloudtrail.all_cloudtrail | FAILED |
Please review the above report. ⚠️
Removed legacy code which used sqs and sns for log injestion. @kourosh-forti-hands , this should be AOK to review
Revert PR because it goes against AWS best practices and is doing redundant AWS Cloudwatch logging to an S3 bucket and a cloudwatch log group. Its creating SNS Keys? We don't use SNS for logging, so no clue the logic behind that.
create_cloudtrail
true and false