turbot / steampipe-mod-terraform-aws-compliance

Run compliance and security controls to detect Terraform AWS resources deviating from security best practices prior to deployment using Powerpipe and Steampipe.
https://hub.powerpipe.io/mods/turbot/terraform_aws_compliance
Apache License 2.0
25 stars 3 forks source link

eks_cluster_endpoint_restrict_public_access result false +ve #78

Closed rajlearner17 closed 1 year ago

rajlearner17 commented 1 year ago

Describe the bug A clear and concise description of what the bug is.

The query > uses endpoint_public_access, which is moved to vpc_config under terraform Resource: aws_eks_cluster

Additionally,

 vpc_config {
    subnet_ids             = [aws_subnet.named_test_resource1.id, aws_subnet.named_test_resource2.id]
    endpoint_public_access = true ### (Optional) Whether the Amazon EKS public API server endpoint is enabled. Default is true
    public_access_cidrs = ["0.0.0.0/0"] ### Accessible from internet
  }

Steampipe version (steampipe -v) Example: v0.3.0

Plugin version (steampipe plugin list) Example: v0.5.0

To reproduce Steps to reproduce the behavior (please include relevant code and/or commands).

Expected behavior A clear and concise description of what you expected to happen.

Additional context Add any other context about the problem here.

misraved commented 1 year ago

Addressed in https://github.com/turbot/steampipe-mod-terraform-aws-compliance/pull/80