You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Governance mode vs Compliance mode. Will discuss in stand up. - We decided on Governance mode
A vault locked in Governance mode can be managed or deleted by users who have the appropriate IAM permissions. A vault lock in Compliance mode cannot be altered or deleted by any user or by AWS
Trivy will check the following folders:
modules/backup
Running Trivy in modules/backup
2024-06-24T14:28:22Z INFO Need to update DB
2024-06-24T14:28:22Z INFO Downloading DB... repository="ghcr.io/aquasecurity/trivy-db:2"
2024-06-24T14:28:25Z INFO Vulnerability scanning is enabled
2024-06-24T14:28:25Z INFO Misconfiguration scanning is enabled
2024-06-24T14:28:25Z INFO Need to update the built-in policies
2024-06-24T14:28:25Z INFO Downloading the built-in policies...
53.79 KiB / 53.79 KiB [-----------------------------------------------------------] 100.00% ? p/s 0s2024-06-24T14:28:25Z INFO Secret scanning is enabled
2024-06-24T14:28:25Z INFO If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-06-24T14:28:25Z INFO Please see also https://aquasecurity.github.io/trivy/v0.52/docs/scanner/secret/#recommendation for faster secret detection
2024-06-24T14:28:26Z INFO Number of language-specific files num=0
2024-06-24T14:28:26Z INFO Detected config files num=2
trivy_exitcode=0
</details> #### `Checkov Scan` Success
<details><summary>Show Output</summary>
```hcl
*****************************
Checkov will check the following folders:
modules/backup
*****************************
Running Checkov in modules/backup
Excluding the following checks: CKV_GIT_1,CKV_AWS_126,CKV2_AWS_38,CKV2_AWS_39
terraform scan results:
Passed checks: 1, Failed checks: 0, Skipped checks: 1
checkov_exitcode=0
CTFLint Scan Success
Show Output
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.5.0)
tflint will check the following folders:
modules/backup
*****************************
Running tflint in modules/backup
Excluding the following checks: terraform_unused_declarations
tflint_exitcode=0
Trivy Scan Success
Show Output
*****************************
Trivy will check the following folders:
modules/backup
*****************************
Running Trivy in modules/backup
2024-06-24T14:28:22Z INFO Need to update DB
2024-06-24T14:28:22Z INFO Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-06-24T14:28:25Z INFO Vulnerability scanning is enabled
2024-06-24T14:28:25Z INFO Misconfiguration scanning is enabled
2024-06-24T14:28:25Z INFO Need to update the built-in policies
2024-06-24T14:28:25Z INFO Downloading the built-in policies...53.79 KiB /53.79 KiB [-----------------------------------------------------------] 100.00%? p/s 0s2024-06-24T14:28:25Z INFO Secret scanning is enabled
2024-06-24T14:28:25Z INFO If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-06-24T14:28:25Z INFO Please see also https://aquasecurity.github.io/trivy/v0.52/docs/scanner/secret/#recommendation for faster secret detection2024-06-24T14:28:26Z INFO Number of language-specific files num=02024-06-24T14:28:26Z INFO Detected config files num=2trivy_exitcode=0
Trivy will check the following folders:
modules/backup
Running Trivy in modules/backup
2024-06-24T15:00:31Z INFO Need to update DB
2024-06-24T15:00:31Z INFO Downloading DB... repository="ghcr.io/aquasecurity/trivy-db:2"
2024-06-24T15:00:33Z INFO Vulnerability scanning is enabled
2024-06-24T15:00:33Z INFO Misconfiguration scanning is enabled
2024-06-24T15:00:33Z INFO Need to update the built-in policies
2024-06-24T15:00:33Z INFO Downloading the built-in policies...
53.79 KiB / 53.79 KiB [-----------------------------------------------------------] 100.00% ? p/s 0s2024-06-24T15:00:34Z INFO Secret scanning is enabled
2024-06-24T15:00:34Z INFO If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-06-24T15:00:34Z INFO Please see also https://aquasecurity.github.io/trivy/v0.52/docs/scanner/secret/#recommendation for faster secret detection
2024-06-24T15:00:34Z INFO Number of language-specific files num=0
2024-06-24T15:00:34Z INFO Detected config files num=2
trivy_exitcode=0
</details> #### `Checkov Scan` Success
<details><summary>Show Output</summary>
```hcl
*****************************
Checkov will check the following folders:
modules/backup
*****************************
Running Checkov in modules/backup
Excluding the following checks: CKV_GIT_1,CKV_AWS_126,CKV2_AWS_38,CKV2_AWS_39
terraform scan results:
Passed checks: 1, Failed checks: 0, Skipped checks: 1
checkov_exitcode=0
CTFLint Scan Success
Show Output
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.5.0)
tflint will check the following folders:
modules/backup
*****************************
Running tflint in modules/backup
Excluding the following checks: terraform_unused_declarations
tflint_exitcode=0
Trivy Scan Success
Show Output
*****************************
Trivy will check the following folders:
modules/backup
*****************************
Running Trivy in modules/backup
2024-06-24T15:00:31Z INFO Need to update DB
2024-06-24T15:00:31Z INFO Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-06-24T15:00:33Z INFO Vulnerability scanning is enabled
2024-06-24T15:00:33Z INFO Misconfiguration scanning is enabled
2024-06-24T15:00:33Z INFO Need to update the built-in policies
2024-06-24T15:00:33Z INFO Downloading the built-in policies...53.79 KiB /53.79 KiB [-----------------------------------------------------------] 100.00%? p/s 0s2024-06-24T15:00:34Z INFO Secret scanning is enabled
2024-06-24T15:00:34Z INFO If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-06-24T15:00:34Z INFO Please see also https://aquasecurity.github.io/trivy/v0.52/docs/scanner/secret/#recommendation for faster secret detection2024-06-24T15:00:34Z INFO Number of language-specific files num=02024-06-24T15:00:34Z INFO Detected config files num=2trivy_exitcode=0
Trivy will check the following folders:
modules/backup
Running Trivy in modules/backup
2024-06-24T15:35:19Z INFO Need to update DB
2024-06-24T15:35:19Z INFO Downloading DB... repository="ghcr.io/aquasecurity/trivy-db:2"
2024-06-24T15:35:21Z INFO Vulnerability scanning is enabled
2024-06-24T15:35:21Z INFO Misconfiguration scanning is enabled
2024-06-24T15:35:21Z INFO Need to update the built-in policies
2024-06-24T15:35:21Z INFO Downloading the built-in policies...
53.79 KiB / 53.79 KiB [-----------------------------------------------------------] 100.00% ? p/s 0s2024-06-24T15:35:21Z INFO Secret scanning is enabled
2024-06-24T15:35:21Z INFO If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-06-24T15:35:21Z INFO Please see also https://aquasecurity.github.io/trivy/v0.52/docs/scanner/secret/#recommendation for faster secret detection
2024-06-24T15:35:22Z INFO Number of language-specific files num=0
2024-06-24T15:35:22Z INFO Detected config files num=2
trivy_exitcode=0
</details> #### `Checkov Scan` Success
<details><summary>Show Output</summary>
```hcl
*****************************
Checkov will check the following folders:
modules/backup
*****************************
Running Checkov in modules/backup
Excluding the following checks: CKV_GIT_1,CKV_AWS_126,CKV2_AWS_38,CKV2_AWS_39
terraform scan results:
Passed checks: 2, Failed checks: 0, Skipped checks: 1
checkov_exitcode=0
CTFLint Scan Success
Show Output
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.5.0)
tflint will check the following folders:
modules/backup
*****************************
Running tflint in modules/backup
Excluding the following checks: terraform_unused_declarations
tflint_exitcode=0
Trivy Scan Success
Show Output
*****************************
Trivy will check the following folders:
modules/backup
*****************************
Running Trivy in modules/backup
2024-06-24T15:35:19Z INFO Need to update DB
2024-06-24T15:35:19Z INFO Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-06-24T15:35:21Z INFO Vulnerability scanning is enabled
2024-06-24T15:35:21Z INFO Misconfiguration scanning is enabled
2024-06-24T15:35:21Z INFO Need to update the built-in policies
2024-06-24T15:35:21Z INFO Downloading the built-in policies...53.79 KiB /53.79 KiB [-----------------------------------------------------------] 100.00%? p/s 0s2024-06-24T15:35:21Z INFO Secret scanning is enabled
2024-06-24T15:35:21Z INFO If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-06-24T15:35:21Z INFO Please see also https://aquasecurity.github.io/trivy/v0.52/docs/scanner/secret/#recommendation for faster secret detection2024-06-24T15:35:22Z INFO Number of language-specific files num=02024-06-24T15:35:22Z INFO Detected config files num=2trivy_exitcode=0
Trivy will check the following folders:
modules/backup
Running Trivy in modules/backup
2024-06-26T09:28:01Z INFO Need to update DB
2024-06-26T09:28:01Z INFO Downloading DB... repository="ghcr.io/aquasecurity/trivy-db:2"
2024-06-26T09:28:03Z INFO Vulnerability scanning is enabled
2024-06-26T09:28:03Z INFO Misconfiguration scanning is enabled
2024-06-26T09:28:03Z INFO Need to update the built-in policies
2024-06-26T09:28:03Z INFO Downloading the built-in policies...
74.86 KiB / 74.86 KiB [-----------------------------------------------------------] 100.00% ? p/s 0s2024-06-26T09:28:04Z INFO Secret scanning is enabled
2024-06-26T09:28:04Z INFO If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-06-26T09:28:04Z INFO Please see also https://aquasecurity.github.io/trivy/v0.52/docs/scanner/secret/#recommendation for faster secret detection
2024-06-26T09:28:04Z INFO Number of language-specific files num=0
2024-06-26T09:28:04Z INFO Detected config files num=2
trivy_exitcode=0
</details> #### `Checkov Scan` Success
<details><summary>Show Output</summary>
```hcl
*****************************
Checkov will check the following folders:
modules/backup
*****************************
Running Checkov in modules/backup
Excluding the following checks: CKV_GIT_1,CKV_AWS_126,CKV2_AWS_38,CKV2_AWS_39
terraform scan results:
Passed checks: 2, Failed checks: 0, Skipped checks: 1
checkov_exitcode=0
CTFLint Scan Success
Show Output
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.5.0)
tflint will check the following folders:
modules/backup
*****************************
Running tflint in modules/backup
Excluding the following checks: terraform_unused_declarations
tflint_exitcode=0
Trivy Scan Success
Show Output
*****************************
Trivy will check the following folders:
modules/backup
*****************************
Running Trivy in modules/backup
2024-06-26T09:28:01Z INFO Need to update DB
2024-06-26T09:28:01Z INFO Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-06-26T09:28:03Z INFO Vulnerability scanning is enabled
2024-06-26T09:28:03Z INFO Misconfiguration scanning is enabled
2024-06-26T09:28:03Z INFO Need to update the built-in policies
2024-06-26T09:28:03Z INFO Downloading the built-in policies...74.86 KiB /74.86 KiB [-----------------------------------------------------------] 100.00%? p/s 0s2024-06-26T09:28:04Z INFO Secret scanning is enabled
2024-06-26T09:28:04Z INFO If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-06-26T09:28:04Z INFO Please see also https://aquasecurity.github.io/trivy/v0.52/docs/scanner/secret/#recommendation for faster secret detection2024-06-26T09:28:04Z INFO Number of language-specific files num=02024-06-26T09:28:04Z INFO Detected config files num=2trivy_exitcode=0
Trivy will check the following folders:
modules/backup
Running Trivy in modules/backup
2024-06-26T15:25:54Z INFO Need to update DB
2024-06-26T15:25:54Z INFO Downloading DB... repository="ghcr.io/aquasecurity/trivy-db:2"
2024-06-26T15:25:56Z INFO Vulnerability scanning is enabled
2024-06-26T15:25:56Z INFO Misconfiguration scanning is enabled
2024-06-26T15:25:56Z INFO Need to update the built-in policies
2024-06-26T15:25:56Z INFO Downloading the built-in policies...
74.86 KiB / 74.86 KiB [-----------------------------------------------------------] 100.00% ? p/s 0s2024-06-26T15:25:57Z INFO Secret scanning is enabled
2024-06-26T15:25:57Z INFO If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-06-26T15:25:57Z INFO Please see also https://aquasecurity.github.io/trivy/v0.52/docs/scanner/secret/#recommendation for faster secret detection
2024-06-26T15:25:57Z INFO Number of language-specific files num=0
2024-06-26T15:25:57Z INFO Detected config files num=2
trivy_exitcode=0
</details> #### `Checkov Scan` Success
<details><summary>Show Output</summary>
```hcl
*****************************
Checkov will check the following folders:
modules/backup
*****************************
Running Checkov in modules/backup
Excluding the following checks: CKV_GIT_1,CKV_AWS_126,CKV2_AWS_38,CKV2_AWS_39
terraform scan results:
Passed checks: 2, Failed checks: 0, Skipped checks: 1
checkov_exitcode=0
CTFLint Scan Success
Show Output
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.5.0)
tflint will check the following folders:
modules/backup
*****************************
Running tflint in modules/backup
Excluding the following checks: terraform_unused_declarations
tflint_exitcode=0
Trivy Scan Success
Show Output
*****************************
Trivy will check the following folders:
modules/backup
*****************************
Running Trivy in modules/backup
2024-06-26T15:25:54Z INFO Need to update DB
2024-06-26T15:25:54Z INFO Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-06-26T15:25:56Z INFO Vulnerability scanning is enabled
2024-06-26T15:25:56Z INFO Misconfiguration scanning is enabled
2024-06-26T15:25:56Z INFO Need to update the built-in policies
2024-06-26T15:25:56Z INFO Downloading the built-in policies...74.86 KiB /74.86 KiB [-----------------------------------------------------------] 100.00%? p/s 0s2024-06-26T15:25:57Z INFO Secret scanning is enabled
2024-06-26T15:25:57Z INFO If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-06-26T15:25:57Z INFO Please see also https://aquasecurity.github.io/trivy/v0.52/docs/scanner/secret/#recommendation for faster secret detection2024-06-26T15:25:57Z INFO Number of language-specific files num=02024-06-26T15:25:57Z INFO Detected config files num=2trivy_exitcode=0
Trivy will check the following folders:
modules/backup
Running Trivy in modules/backup
2024-06-27T13:23:35Z INFO Need to update DB
2024-06-27T13:23:35Z INFO Downloading DB... repository="ghcr.io/aquasecurity/trivy-db:2"
2024-06-27T13:23:37Z INFO Vulnerability scanning is enabled
2024-06-27T13:23:37Z INFO Misconfiguration scanning is enabled
2024-06-27T13:23:37Z INFO Need to update the built-in policies
2024-06-27T13:23:37Z INFO Downloading the built-in policies...
74.86 KiB / 74.86 KiB [-----------------------------------------------------------] 100.00% ? p/s 0s2024-06-27T13:23:37Z INFO Secret scanning is enabled
2024-06-27T13:23:37Z INFO If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-06-27T13:23:37Z INFO Please see also https://aquasecurity.github.io/trivy/v0.52/docs/scanner/secret/#recommendation for faster secret detection
2024-06-27T13:23:37Z INFO Number of language-specific files num=0
2024-06-27T13:23:37Z INFO Detected config files num=2
trivy_exitcode=0
</details> #### `Checkov Scan` Success
<details><summary>Show Output</summary>
```hcl
*****************************
Checkov will check the following folders:
modules/backup
*****************************
Running Checkov in modules/backup
Excluding the following checks: CKV_GIT_1,CKV_AWS_126,CKV2_AWS_38,CKV2_AWS_39
terraform scan results:
Passed checks: 2, Failed checks: 0, Skipped checks: 1
checkov_exitcode=0
CTFLint Scan Success
Show Output
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.5.0)
tflint will check the following folders:
modules/backup
*****************************
Running tflint in modules/backup
Excluding the following checks: terraform_unused_declarations
tflint_exitcode=0
Trivy Scan Success
Show Output
*****************************
Trivy will check the following folders:
modules/backup
*****************************
Running Trivy in modules/backup
2024-06-27T13:23:35Z INFO Need to update DB
2024-06-27T13:23:35Z INFO Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-06-27T13:23:37Z INFO Vulnerability scanning is enabled
2024-06-27T13:23:37Z INFO Misconfiguration scanning is enabled
2024-06-27T13:23:37Z INFO Need to update the built-in policies
2024-06-27T13:23:37Z INFO Downloading the built-in policies...74.86 KiB /74.86 KiB [-----------------------------------------------------------] 100.00%? p/s 0s2024-06-27T13:23:37Z INFO Secret scanning is enabled
2024-06-27T13:23:37Z INFO If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-06-27T13:23:37Z INFO Please see also https://aquasecurity.github.io/trivy/v0.52/docs/scanner/secret/#recommendation for faster secret detection2024-06-27T13:23:37Z INFO Number of language-specific files num=02024-06-27T13:23:37Z INFO Detected config files num=2trivy_exitcode=0
Trivy will check the following folders:
modules/backup
Running Trivy in modules/backup
2024-06-27T13:29:31Z INFO Need to update DB
2024-06-27T13:29:31Z INFO Downloading DB... repository="ghcr.io/aquasecurity/trivy-db:2"
2024-06-27T13:29:33Z INFO Vulnerability scanning is enabled
2024-06-27T13:29:33Z INFO Misconfiguration scanning is enabled
2024-06-27T13:29:33Z INFO Need to update the built-in policies
2024-06-27T13:29:33Z INFO Downloading the built-in policies...
74.86 KiB / 74.86 KiB [-----------------------------------------------------------] 100.00% ? p/s 0s2024-06-27T13:29:33Z INFO Secret scanning is enabled
2024-06-27T13:29:33Z INFO If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-06-27T13:29:33Z INFO Please see also https://aquasecurity.github.io/trivy/v0.52/docs/scanner/secret/#recommendation for faster secret detection
2024-06-27T13:29:33Z INFO Number of language-specific files num=0
2024-06-27T13:29:33Z INFO Detected config files num=2
trivy_exitcode=0
</details> #### `Checkov Scan` Success
<details><summary>Show Output</summary>
```hcl
*****************************
Checkov will check the following folders:
modules/backup
*****************************
Running Checkov in modules/backup
Excluding the following checks: CKV_GIT_1,CKV_AWS_126,CKV2_AWS_38,CKV2_AWS_39
terraform scan results:
Passed checks: 2, Failed checks: 0, Skipped checks: 1
checkov_exitcode=0
CTFLint Scan Success
Show Output
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.5.0)
tflint will check the following folders:
modules/backup
*****************************
Running tflint in modules/backup
Excluding the following checks: terraform_unused_declarations
tflint_exitcode=0
Trivy Scan Success
Show Output
*****************************
Trivy will check the following folders:
modules/backup
*****************************
Running Trivy in modules/backup
2024-06-27T13:29:31Z INFO Need to update DB
2024-06-27T13:29:31Z INFO Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-06-27T13:29:33Z INFO Vulnerability scanning is enabled
2024-06-27T13:29:33Z INFO Misconfiguration scanning is enabled
2024-06-27T13:29:33Z INFO Need to update the built-in policies
2024-06-27T13:29:33Z INFO Downloading the built-in policies...74.86 KiB /74.86 KiB [-----------------------------------------------------------] 100.00%? p/s 0s2024-06-27T13:29:33Z INFO Secret scanning is enabled
2024-06-27T13:29:33Z INFO If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-06-27T13:29:33Z INFO Please see also https://aquasecurity.github.io/trivy/v0.52/docs/scanner/secret/#recommendation for faster secret detection2024-06-27T13:29:33Z INFO Number of language-specific files num=02024-06-27T13:29:33Z INFO Detected config files num=2trivy_exitcode=0
Trivy will check the following folders:
modules/backup
Running Trivy in modules/backup
2024-06-27T13:31:22Z INFO Need to update DB
2024-06-27T13:31:22Z INFO Downloading DB... repository="ghcr.io/aquasecurity/trivy-db:2"
2024-06-27T13:31:24Z INFO Vulnerability scanning is enabled
2024-06-27T13:31:24Z INFO Misconfiguration scanning is enabled
2024-06-27T13:31:24Z INFO Need to update the built-in policies
2024-06-27T13:31:24Z INFO Downloading the built-in policies...
74.86 KiB / 74.86 KiB [-----------------------------------------------------------] 100.00% ? p/s 0s2024-06-27T13:31:24Z INFO Secret scanning is enabled
2024-06-27T13:31:24Z INFO If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-06-27T13:31:24Z INFO Please see also https://aquasecurity.github.io/trivy/v0.52/docs/scanner/secret/#recommendation for faster secret detection
2024-06-27T13:31:25Z INFO Number of language-specific files num=0
2024-06-27T13:31:25Z INFO Detected config files num=2
trivy_exitcode=0
</details> #### `Checkov Scan` Success
<details><summary>Show Output</summary>
```hcl
*****************************
Checkov will check the following folders:
modules/backup
*****************************
Running Checkov in modules/backup
Excluding the following checks: CKV_GIT_1,CKV_AWS_126,CKV2_AWS_38,CKV2_AWS_39
terraform scan results:
Passed checks: 2, Failed checks: 0, Skipped checks: 1
checkov_exitcode=0
CTFLint Scan Success
Show Output
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.5.0)
tflint will check the following folders:
modules/backup
*****************************
Running tflint in modules/backup
Excluding the following checks: terraform_unused_declarations
tflint_exitcode=0
Trivy Scan Success
Show Output
*****************************
Trivy will check the following folders:
modules/backup
*****************************
Running Trivy in modules/backup
2024-06-27T13:31:22Z INFO Need to update DB
2024-06-27T13:31:22Z INFO Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-06-27T13:31:24Z INFO Vulnerability scanning is enabled
2024-06-27T13:31:24Z INFO Misconfiguration scanning is enabled
2024-06-27T13:31:24Z INFO Need to update the built-in policies
2024-06-27T13:31:24Z INFO Downloading the built-in policies...74.86 KiB /74.86 KiB [-----------------------------------------------------------] 100.00%? p/s 0s2024-06-27T13:31:24Z INFO Secret scanning is enabled
2024-06-27T13:31:24Z INFO If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-06-27T13:31:24Z INFO Please see also https://aquasecurity.github.io/trivy/v0.52/docs/scanner/secret/#recommendation for faster secret detection2024-06-27T13:31:25Z INFO Number of language-specific files num=02024-06-27T13:31:25Z INFO Detected config files num=2trivy_exitcode=0
Trivy will check the following folders:
modules/backup test/backup-test
Running Trivy in modules/backup
2024-07-02T08:16:07Z INFO Need to update DB
2024-07-02T08:16:07Z INFO Downloading DB... repository="ghcr.io/aquasecurity/trivy-db:2"
2024-07-02T08:16:10Z INFO Vulnerability scanning is enabled
2024-07-02T08:16:10Z INFO Misconfiguration scanning is enabled
2024-07-02T08:16:10Z INFO Need to update the built-in policies
2024-07-02T08:16:10Z INFO Downloading the built-in policies...
74.86 KiB / 74.86 KiB [-----------------------------------------------------------] 100.00% ? p/s 0s2024-07-02T08:16:10Z INFO Secret scanning is enabled
2024-07-02T08:16:10Z INFO If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-07-02T08:16:10Z INFO Please see also https://aquasecurity.github.io/trivy/v0.53/docs/scanner/secret#recommendation for faster secret detection
2024-07-02T08:16:11Z INFO Number of language-specific files num=0
2024-07-02T08:16:11Z INFO Detected config files num=2
trivy_exitcode=0
Running Trivy in test/backup-test
2024-07-02T08:16:11Z INFO Vulnerability scanning is enabled
2024-07-02T08:16:11Z INFO Misconfiguration scanning is enabled
2024-07-02T08:16:11Z INFO Secret scanning is enabled
2024-07-02T08:16:11Z INFO If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-07-02T08:16:11Z INFO Please see also https://aquasecurity.github.io/trivy/v0.53/docs/scanner/secret#recommendation for faster secret detection
2024-07-02T08:16:12Z INFO Number of language-specific files num=0
2024-07-02T08:16:12Z INFO Detected config files num=2
trivy_exitcode=0
</details> #### `Checkov Scan` Failed
<details><summary>Show Output</summary>
```hcl
*****************************
Checkov will check the following folders:
modules/backup test/backup-test
*****************************
Running Checkov in modules/backup
Excluding the following checks: CKV_GIT_1,CKV_AWS_126,CKV2_AWS_38,CKV2_AWS_39
terraform scan results:
Passed checks: 0, Failed checks: 2, Skipped checks: 1
Check: CKV_AWS_26: "Ensure all data stored in the SNS topic is encrypted"
FAILED for resource: aws_sns_topic.backup_vault_topic
File: /main.tf:17-24
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/general-15
17 | resource "aws_sns_topic" "backup_vault_topic" {
18 | count = (local.is_production && data.aws_region.current.name == "eu-west-2") ? 1 : 0
19 | kms_master_key_id = local.kms_master_key_id
20 | name = var.backup_vault_lock_sns_topic_name
21 | tags = merge(var.tags, {
22 | Description = "This backup topic is so the MP team can subscribe to backup vault lock being turned off and member accounts can create their own subscriptions"
23 | })
24 | }
Check: CKV_AWS_26: "Ensure all data stored in the SNS topic is encrypted"
FAILED for resource: aws_sns_topic.backup_failure_topic
File: /main.tf:148-154
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/general-15
148 | resource "aws_sns_topic" "backup_failure_topic" {
149 | kms_master_key_id = local.kms_master_key_id
150 | name = var.backup_aws_sns_topic_name
151 | tags = merge(var.tags, {
152 | Description = "This backup topic is so the MP team can subscribe to backup notifications from selected accounts and teams using member-unrestricted accounts can create their own subscriptions"
153 | })
154 | }
checkov_exitcode=1
*****************************
Running Checkov in test/backup-test
Excluding the following checks: CKV_GIT_1,CKV_AWS_126,CKV2_AWS_38,CKV2_AWS_39
terraform scan results:
Passed checks: 21, Failed checks: 2, Skipped checks: 1
Check: CKV_AWS_26: "Ensure all data stored in the SNS topic is encrypted"
FAILED for resource: module.backup-test.aws_sns_topic.backup_vault_topic
File: /../../modules/backup/main.tf:17-24
Calling File: /main.tf:1-13
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/general-15
17 | resource "aws_sns_topic" "backup_vault_topic" {
18 | count = (local.is_production && data.aws_region.current.name == "eu-west-2") ? 1 : 0
19 | kms_master_key_id = local.kms_master_key_id
20 | name = var.backup_vault_lock_sns_topic_name
21 | tags = merge(var.tags, {
22 | Description = "This backup topic is so the MP team can subscribe to backup vault lock being turned off and member accounts can create their own subscriptions"
23 | })
24 | }
Check: CKV_AWS_26: "Ensure all data stored in the SNS topic is encrypted"
FAILED for resource: module.backup-test.aws_sns_topic.backup_failure_topic
File: /../../modules/backup/main.tf:148-154
Calling File: /main.tf:1-13
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/general-15
148 | resource "aws_sns_topic" "backup_failure_topic" {
149 | kms_master_key_id = local.kms_master_key_id
150 | name = var.backup_aws_sns_topic_name
151 | tags = merge(var.tags, {
152 | Description = "This backup topic is so the MP team can subscribe to backup notifications from selected accounts and teams using member-unrestricted accounts can create their own subscriptions"
153 | })
154 | }
checkov_exitcode=2
CTFLint Scan Success
Show Output
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.5.0)
tflint will check the following folders:
modules/backup test/backup-test
*****************************
Running tflint in modules/backup
Excluding the following checks: terraform_unused_declarations
tflint_exitcode=0*****************************
Running tflint in test/backup-test
Excluding the following checks: terraform_unused_declarations
tflint_exitcode=0
Trivy Scan Success
Show Output
*****************************
Trivy will check the following folders:
modules/backup test/backup-test
*****************************
Running Trivy in modules/backup
2024-07-02T08:16:07Z INFO Need to update DB
2024-07-02T08:16:07Z INFO Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-07-02T08:16:10Z INFO Vulnerability scanning is enabled
2024-07-02T08:16:10Z INFO Misconfiguration scanning is enabled
2024-07-02T08:16:10Z INFO Need to update the built-in policies
2024-07-02T08:16:10Z INFO Downloading the built-in policies...74.86 KiB /74.86 KiB [-----------------------------------------------------------] 100.00%? p/s 0s2024-07-02T08:16:10Z INFO Secret scanning is enabled
2024-07-02T08:16:10Z INFO If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-07-02T08:16:10Z INFO Please see also https://aquasecurity.github.io/trivy/v0.53/docs/scanner/secret#recommendation for faster secret detection2024-07-02T08:16:11Z INFO Number of language-specific files num=02024-07-02T08:16:11Z INFO Detected config files num=2trivy_exitcode=0*****************************
Running Trivy in test/backup-test
2024-07-02T08:16:11Z INFO Vulnerability scanning is enabled
2024-07-02T08:16:11Z INFO Misconfiguration scanning is enabled
2024-07-02T08:16:11Z INFO Secret scanning is enabled
2024-07-02T08:16:11Z INFO If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-07-02T08:16:11Z INFO Please see also https://aquasecurity.github.io/trivy/v0.53/docs/scanner/secret#recommendation for faster secret detection2024-07-02T08:16:12Z INFO Number of language-specific files num=02024-07-02T08:16:12Z INFO Detected config files num=2trivy_exitcode=0
Trivy will check the following folders:
modules/backup test/backup-test
Running Trivy in modules/backup
2024-07-02T08:17:19Z INFO Need to update DB
2024-07-02T08:17:19Z INFO Downloading DB... repository="ghcr.io/aquasecurity/trivy-db:2"
2024-07-02T08:17:21Z INFO Vulnerability scanning is enabled
2024-07-02T08:17:21Z INFO Misconfiguration scanning is enabled
2024-07-02T08:17:21Z INFO Need to update the built-in policies
2024-07-02T08:17:21Z INFO Downloading the built-in policies...
74.86 KiB / 74.86 KiB [-----------------------------------------------------------] 100.00% ? p/s 0s2024-07-02T08:17:22Z INFO Secret scanning is enabled
2024-07-02T08:17:22Z INFO If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-07-02T08:17:22Z INFO Please see also https://aquasecurity.github.io/trivy/v0.53/docs/scanner/secret#recommendation for faster secret detection
2024-07-02T08:17:22Z INFO Number of language-specific files num=0
2024-07-02T08:17:22Z INFO Detected config files num=2
trivy_exitcode=0
Running Trivy in test/backup-test
2024-07-02T08:17:23Z INFO Vulnerability scanning is enabled
2024-07-02T08:17:23Z INFO Misconfiguration scanning is enabled
2024-07-02T08:17:23Z INFO Secret scanning is enabled
2024-07-02T08:17:23Z INFO If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-07-02T08:17:23Z INFO Please see also https://aquasecurity.github.io/trivy/v0.53/docs/scanner/secret#recommendation for faster secret detection
2024-07-02T08:17:24Z INFO Number of language-specific files num=0
2024-07-02T08:17:24Z INFO Detected config files num=2
trivy_exitcode=0
</details> #### `Checkov Scan` Failed
<details><summary>Show Output</summary>
```hcl
*****************************
Checkov will check the following folders:
modules/backup test/backup-test
*****************************
Running Checkov in modules/backup
Excluding the following checks: CKV_GIT_1,CKV_AWS_126,CKV2_AWS_38,CKV2_AWS_39
terraform scan results:
Passed checks: 0, Failed checks: 2, Skipped checks: 1
Check: CKV_AWS_26: "Ensure all data stored in the SNS topic is encrypted"
FAILED for resource: aws_sns_topic.backup_vault_topic
File: /main.tf:17-24
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/general-15
17 | resource "aws_sns_topic" "backup_vault_topic" {
18 | count = (local.is_production && data.aws_region.current.name == "eu-west-2") ? 1 : 0
19 | kms_master_key_id = local.kms_master_key_id
20 | name = var.backup_vault_lock_sns_topic_name
21 | tags = merge(var.tags, {
22 | Description = "This backup topic is so the MP team can subscribe to backup vault lock being turned off and member accounts can create their own subscriptions"
23 | })
24 | }
Check: CKV_AWS_26: "Ensure all data stored in the SNS topic is encrypted"
FAILED for resource: aws_sns_topic.backup_failure_topic
File: /main.tf:148-154
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/general-15
148 | resource "aws_sns_topic" "backup_failure_topic" {
149 | kms_master_key_id = local.kms_master_key_id
150 | name = var.backup_aws_sns_topic_name
151 | tags = merge(var.tags, {
152 | Description = "This backup topic is so the MP team can subscribe to backup notifications from selected accounts and teams using member-unrestricted accounts can create their own subscriptions"
153 | })
154 | }
checkov_exitcode=1
*****************************
Running Checkov in test/backup-test
Excluding the following checks: CKV_GIT_1,CKV_AWS_126,CKV2_AWS_38,CKV2_AWS_39
terraform scan results:
Passed checks: 21, Failed checks: 2, Skipped checks: 1
Check: CKV_AWS_26: "Ensure all data stored in the SNS topic is encrypted"
FAILED for resource: module.backup-test.aws_sns_topic.backup_vault_topic
File: /../../modules/backup/main.tf:17-24
Calling File: /main.tf:1-13
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/general-15
17 | resource "aws_sns_topic" "backup_vault_topic" {
18 | count = (local.is_production && data.aws_region.current.name == "eu-west-2") ? 1 : 0
19 | kms_master_key_id = local.kms_master_key_id
20 | name = var.backup_vault_lock_sns_topic_name
21 | tags = merge(var.tags, {
22 | Description = "This backup topic is so the MP team can subscribe to backup vault lock being turned off and member accounts can create their own subscriptions"
23 | })
24 | }
Check: CKV_AWS_26: "Ensure all data stored in the SNS topic is encrypted"
FAILED for resource: module.backup-test.aws_sns_topic.backup_failure_topic
File: /../../modules/backup/main.tf:148-154
Calling File: /main.tf:1-13
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/general-15
148 | resource "aws_sns_topic" "backup_failure_topic" {
149 | kms_master_key_id = local.kms_master_key_id
150 | name = var.backup_aws_sns_topic_name
151 | tags = merge(var.tags, {
152 | Description = "This backup topic is so the MP team can subscribe to backup notifications from selected accounts and teams using member-unrestricted accounts can create their own subscriptions"
153 | })
154 | }
checkov_exitcode=2
CTFLint Scan Success
Show Output
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.5.0)
tflint will check the following folders:
modules/backup test/backup-test
*****************************
Running tflint in modules/backup
Excluding the following checks: terraform_unused_declarations
tflint_exitcode=0*****************************
Running tflint in test/backup-test
Excluding the following checks: terraform_unused_declarations
tflint_exitcode=0
Trivy Scan Success
Show Output
*****************************
Trivy will check the following folders:
modules/backup test/backup-test
*****************************
Running Trivy in modules/backup
2024-07-02T08:17:19Z INFO Need to update DB
2024-07-02T08:17:19Z INFO Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-07-02T08:17:21Z INFO Vulnerability scanning is enabled
2024-07-02T08:17:21Z INFO Misconfiguration scanning is enabled
2024-07-02T08:17:21Z INFO Need to update the built-in policies
2024-07-02T08:17:21Z INFO Downloading the built-in policies...74.86 KiB /74.86 KiB [-----------------------------------------------------------] 100.00%? p/s 0s2024-07-02T08:17:22Z INFO Secret scanning is enabled
2024-07-02T08:17:22Z INFO If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-07-02T08:17:22Z INFO Please see also https://aquasecurity.github.io/trivy/v0.53/docs/scanner/secret#recommendation for faster secret detection2024-07-02T08:17:22Z INFO Number of language-specific files num=02024-07-02T08:17:22Z INFO Detected config files num=2trivy_exitcode=0*****************************
Running Trivy in test/backup-test
2024-07-02T08:17:23Z INFO Vulnerability scanning is enabled
2024-07-02T08:17:23Z INFO Misconfiguration scanning is enabled
2024-07-02T08:17:23Z INFO Secret scanning is enabled
2024-07-02T08:17:23Z INFO If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-07-02T08:17:23Z INFO Please see also https://aquasecurity.github.io/trivy/v0.53/docs/scanner/secret#recommendation for faster secret detection2024-07-02T08:17:24Z INFO Number of language-specific files num=02024-07-02T08:17:24Z INFO Detected config files num=2trivy_exitcode=0
Trivy will check the following folders:
modules/backup test/backup-test
Running Trivy in modules/backup
2024-07-02T08:18:36Z INFO Need to update DB
2024-07-02T08:18:36Z INFO Downloading DB... repository="ghcr.io/aquasecurity/trivy-db:2"
2024-07-02T08:18:39Z INFO Vulnerability scanning is enabled
2024-07-02T08:18:39Z INFO Misconfiguration scanning is enabled
2024-07-02T08:18:39Z INFO Need to update the built-in policies
2024-07-02T08:18:39Z INFO Downloading the built-in policies...
74.86 KiB / 74.86 KiB [-----------------------------------------------------------] 100.00% ? p/s 0s2024-07-02T08:18:39Z INFO Secret scanning is enabled
2024-07-02T08:18:39Z INFO If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-07-02T08:18:39Z INFO Please see also https://aquasecurity.github.io/trivy/v0.53/docs/scanner/secret#recommendation for faster secret detection
2024-07-02T08:18:39Z INFO Number of language-specific files num=0
2024-07-02T08:18:39Z INFO Detected config files num=2
trivy_exitcode=0
Running Trivy in test/backup-test
2024-07-02T08:18:40Z INFO Vulnerability scanning is enabled
2024-07-02T08:18:40Z INFO Misconfiguration scanning is enabled
2024-07-02T08:18:40Z INFO Secret scanning is enabled
2024-07-02T08:18:40Z INFO If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-07-02T08:18:40Z INFO Please see also https://aquasecurity.github.io/trivy/v0.53/docs/scanner/secret#recommendation for faster secret detection
2024-07-02T08:18:40Z INFO Number of language-specific files num=0
2024-07-02T08:18:40Z INFO Detected config files num=2
trivy_exitcode=0
</details> #### `Checkov Scan` Failed
<details><summary>Show Output</summary>
```hcl
*****************************
Checkov will check the following folders:
modules/backup test/backup-test
*****************************
Running Checkov in modules/backup
Excluding the following checks: CKV_GIT_1,CKV_AWS_126,CKV2_AWS_38,CKV2_AWS_39
terraform scan results:
Passed checks: 0, Failed checks: 2, Skipped checks: 1
Check: CKV_AWS_26: "Ensure all data stored in the SNS topic is encrypted"
FAILED for resource: aws_sns_topic.backup_vault_topic
File: /main.tf:17-24
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/general-15
17 | resource "aws_sns_topic" "backup_vault_topic" {
18 | count = (local.is_production && data.aws_region.current.name == "eu-west-2") ? 1 : 0
19 | kms_master_key_id = local.kms_master_key_id
20 | name = var.backup_vault_lock_sns_topic_name
21 | tags = merge(var.tags, {
22 | Description = "This backup topic is so the MP team can subscribe to backup vault lock being turned off and member accounts can create their own subscriptions"
23 | })
24 | }
Check: CKV_AWS_26: "Ensure all data stored in the SNS topic is encrypted"
FAILED for resource: aws_sns_topic.backup_failure_topic
File: /main.tf:148-154
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/general-15
148 | resource "aws_sns_topic" "backup_failure_topic" {
149 | kms_master_key_id = local.kms_master_key_id
150 | name = var.backup_aws_sns_topic_name
151 | tags = merge(var.tags, {
152 | Description = "This backup topic is so the MP team can subscribe to backup notifications from selected accounts and teams using member-unrestricted accounts can create their own subscriptions"
153 | })
154 | }
checkov_exitcode=1
*****************************
Running Checkov in test/backup-test
Excluding the following checks: CKV_GIT_1,CKV_AWS_126,CKV2_AWS_38,CKV2_AWS_39
terraform scan results:
Passed checks: 21, Failed checks: 2, Skipped checks: 1
Check: CKV_AWS_26: "Ensure all data stored in the SNS topic is encrypted"
FAILED for resource: module.backup-test.aws_sns_topic.backup_vault_topic
File: /../../modules/backup/main.tf:17-24
Calling File: /main.tf:1-13
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/general-15
17 | resource "aws_sns_topic" "backup_vault_topic" {
18 | count = (local.is_production && data.aws_region.current.name == "eu-west-2") ? 1 : 0
19 | kms_master_key_id = local.kms_master_key_id
20 | name = var.backup_vault_lock_sns_topic_name
21 | tags = merge(var.tags, {
22 | Description = "This backup topic is so the MP team can subscribe to backup vault lock being turned off and member accounts can create their own subscriptions"
23 | })
24 | }
Check: CKV_AWS_26: "Ensure all data stored in the SNS topic is encrypted"
FAILED for resource: module.backup-test.aws_sns_topic.backup_failure_topic
File: /../../modules/backup/main.tf:148-154
Calling File: /main.tf:1-13
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/general-15
148 | resource "aws_sns_topic" "backup_failure_topic" {
149 | kms_master_key_id = local.kms_master_key_id
150 | name = var.backup_aws_sns_topic_name
151 | tags = merge(var.tags, {
152 | Description = "This backup topic is so the MP team can subscribe to backup notifications from selected accounts and teams using member-unrestricted accounts can create their own subscriptions"
153 | })
154 | }
checkov_exitcode=2
CTFLint Scan Success
Show Output
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.5.0)
tflint will check the following folders:
modules/backup test/backup-test
*****************************
Running tflint in modules/backup
Excluding the following checks: terraform_unused_declarations
tflint_exitcode=0*****************************
Running tflint in test/backup-test
Excluding the following checks: terraform_unused_declarations
tflint_exitcode=0
Trivy Scan Success
Show Output
*****************************
Trivy will check the following folders:
modules/backup test/backup-test
*****************************
Running Trivy in modules/backup
2024-07-02T08:18:36Z INFO Need to update DB
2024-07-02T08:18:36Z INFO Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-07-02T08:18:39Z INFO Vulnerability scanning is enabled
2024-07-02T08:18:39Z INFO Misconfiguration scanning is enabled
2024-07-02T08:18:39Z INFO Need to update the built-in policies
2024-07-02T08:18:39Z INFO Downloading the built-in policies...74.86 KiB /74.86 KiB [-----------------------------------------------------------] 100.00%? p/s 0s2024-07-02T08:18:39Z INFO Secret scanning is enabled
2024-07-02T08:18:39Z INFO If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-07-02T08:18:39Z INFO Please see also https://aquasecurity.github.io/trivy/v0.53/docs/scanner/secret#recommendation for faster secret detection2024-07-02T08:18:39Z INFO Number of language-specific files num=02024-07-02T08:18:39Z INFO Detected config files num=2trivy_exitcode=0*****************************
Running Trivy in test/backup-test
2024-07-02T08:18:40Z INFO Vulnerability scanning is enabled
2024-07-02T08:18:40Z INFO Misconfiguration scanning is enabled
2024-07-02T08:18:40Z INFO Secret scanning is enabled
2024-07-02T08:18:40Z INFO If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-07-02T08:18:40Z INFO Please see also https://aquasecurity.github.io/trivy/v0.53/docs/scanner/secret#recommendation for faster secret detection2024-07-02T08:18:40Z INFO Number of language-specific files num=02024-07-02T08:18:40Z INFO Detected config files num=2trivy_exitcode=0
Trivy will check the following folders:
modules/backup test/backup-test
Running Trivy in modules/backup
2024-07-02T08:28:35Z INFO Need to update DB
2024-07-02T08:28:35Z INFO Downloading DB... repository="ghcr.io/aquasecurity/trivy-db:2"
2024-07-02T08:28:37Z INFO Vulnerability scanning is enabled
2024-07-02T08:28:37Z INFO Misconfiguration scanning is enabled
2024-07-02T08:28:37Z INFO Need to update the built-in policies
2024-07-02T08:28:37Z INFO Downloading the built-in policies...
74.86 KiB / 74.86 KiB [-----------------------------------------------------------] 100.00% ? p/s 0s2024-07-02T08:28:37Z INFO Secret scanning is enabled
2024-07-02T08:28:37Z INFO If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-07-02T08:28:37Z INFO Please see also https://aquasecurity.github.io/trivy/v0.53/docs/scanner/secret#recommendation for faster secret detection
2024-07-02T08:28:38Z INFO Number of language-specific files num=0
2024-07-02T08:28:38Z INFO Detected config files num=2
trivy_exitcode=0
Running Trivy in test/backup-test
2024-07-02T08:28:38Z INFO Vulnerability scanning is enabled
2024-07-02T08:28:38Z INFO Misconfiguration scanning is enabled
2024-07-02T08:28:38Z INFO Secret scanning is enabled
2024-07-02T08:28:38Z INFO If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-07-02T08:28:38Z INFO Please see also https://aquasecurity.github.io/trivy/v0.53/docs/scanner/secret#recommendation for faster secret detection
2024-07-02T08:28:38Z INFO Number of language-specific files num=0
2024-07-02T08:28:38Z INFO Detected config files num=2
trivy_exitcode=0
</details> #### `Checkov Scan` Success
<details><summary>Show Output</summary>
```hcl
*****************************
Checkov will check the following folders:
modules/backup test/backup-test
*****************************
Running Checkov in modules/backup
Excluding the following checks: CKV_GIT_1,CKV_AWS_126,CKV2_AWS_38,CKV2_AWS_39
terraform scan results:
Passed checks: 0, Failed checks: 0, Skipped checks: 3
checkov_exitcode=0
*****************************
Running Checkov in test/backup-test
Excluding the following checks: CKV_GIT_1,CKV_AWS_126,CKV2_AWS_38,CKV2_AWS_39
terraform scan results:
Passed checks: 21, Failed checks: 0, Skipped checks: 3
checkov_exitcode=0
CTFLint Scan Success
Show Output
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.5.0)
tflint will check the following folders:
modules/backup test/backup-test
*****************************
Running tflint in modules/backup
Excluding the following checks: terraform_unused_declarations
tflint_exitcode=0*****************************
Running tflint in test/backup-test
Excluding the following checks: terraform_unused_declarations
tflint_exitcode=0
Trivy Scan Success
Show Output
*****************************
Trivy will check the following folders:
modules/backup test/backup-test
*****************************
Running Trivy in modules/backup
2024-07-02T08:28:35Z INFO Need to update DB
2024-07-02T08:28:35Z INFO Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-07-02T08:28:37Z INFO Vulnerability scanning is enabled
2024-07-02T08:28:37Z INFO Misconfiguration scanning is enabled
2024-07-02T08:28:37Z INFO Need to update the built-in policies
2024-07-02T08:28:37Z INFO Downloading the built-in policies...74.86 KiB /74.86 KiB [-----------------------------------------------------------] 100.00%? p/s 0s2024-07-02T08:28:37Z INFO Secret scanning is enabled
2024-07-02T08:28:37Z INFO If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-07-02T08:28:37Z INFO Please see also https://aquasecurity.github.io/trivy/v0.53/docs/scanner/secret#recommendation for faster secret detection2024-07-02T08:28:38Z INFO Number of language-specific files num=02024-07-02T08:28:38Z INFO Detected config files num=2trivy_exitcode=0*****************************
Running Trivy in test/backup-test
2024-07-02T08:28:38Z INFO Vulnerability scanning is enabled
2024-07-02T08:28:38Z INFO Misconfiguration scanning is enabled
2024-07-02T08:28:38Z INFO Secret scanning is enabled
2024-07-02T08:28:38Z INFO If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-07-02T08:28:38Z INFO Please see also https://aquasecurity.github.io/trivy/v0.53/docs/scanner/secret#recommendation for faster secret detection2024-07-02T08:28:38Z INFO Number of language-specific files num=02024-07-02T08:28:38Z INFO Detected config files num=2trivy_exitcode=0
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Governance mode vs Compliance mode. Will discuss in stand up. - We decided on Governance mode
A vault locked in Governance mode can be managed or deleted by users who have the appropriate IAM permissions. A vault lock in Compliance mode cannot be altered or deleted by any user or by AWS
ministryofjustice/modernisation-platform#7265
Enables aws backup vault lock. It has been tested in cooker.
`
Ive added a filter so it will only deploy changes in production. This step needs to go in first, before step 2
ministryofjustice/modernisation-platform#7361
I have added this line so that resources are only built in production, and in eu-west-2
count = (local.is_production && data.aws_region.current.name == "eu-west-2") ? 1 : 0
I have also changed the backup notifications to use the correct KMS key, and only build in the correct region.