You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
As a continuation of ministryofjustice/modernisation-platform#1522 ministryofjustice/modernisation-platform#1522
There are three things we can add to monitoring for the modernisation platform the first two are new cloud watch alarms based on aws documentation and the a third would be to add vpc flow logs to the modernisation platform transit gateway and adding monitoring to the cloud watch to monitor for low traffic on the link
Trivy will check the following folders:
modules/securityhub-alarms
Running Trivy in modules/securityhub-alarms
2024-08-07T11:04:18Z INFO [db] Need to update DB
2024-08-07T11:04:18Z INFO [db] Downloading DB... repository="ghcr.io/aquasecurity/trivy-db:2"
2024-08-07T11:04:20Z INFO [vuln] Vulnerability scanning is enabled
2024-08-07T11:04:20Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-07T11:04:20Z INFO Need to update the built-in policies
2024-08-07T11:04:20Z INFO Downloading the built-in policies...
74.86 KiB / 74.86 KiB [-----------------------------------------------------------] 100.00% ? p/s 0s2024-08-07T11:04:20Z INFO [secret] Secret scanning is enabled
2024-08-07T11:04:20Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-07T11:04:20Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection
2024-08-07T11:04:21Z INFO Number of language-specific files num=0
2024-08-07T11:04:21Z INFO Detected config files num=2
trivy_exitcode=0
</details> #### `Checkov Scan` Success
<details><summary>Show Output</summary>
```hcl
*****************************
Checkov will check the following folders:
modules/securityhub-alarms
*****************************
Running Checkov in modules/securityhub-alarms
Excluding the following checks: CKV_GIT_1,CKV_AWS_126,CKV2_AWS_38,CKV2_AWS_39
terraform scan results:
Passed checks: 37, Failed checks: 0, Skipped checks: 3
checkov_exitcode=0
CTFLint Scan Success
Show Output
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.5.0)
tflint will check the following folders:
modules/securityhub-alarms
*****************************
Running tflint in modules/securityhub-alarms
Excluding the following checks: terraform_unused_declarations
tflint_exitcode=0
Trivy Scan Success
Show Output
*****************************
Trivy will check the following folders:
modules/securityhub-alarms
*****************************
Running Trivy in modules/securityhub-alarms
2024-08-07T11:04:18Z INFO [db] Need to update DB
2024-08-07T11:04:18Z INFO [db] Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-08-07T11:04:20Z INFO [vuln] Vulnerability scanning is enabled
2024-08-07T11:04:20Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-07T11:04:20Z INFO Need to update the built-in policies
2024-08-07T11:04:20Z INFO Downloading the built-in policies...74.86 KiB /74.86 KiB [-----------------------------------------------------------] 100.00%? p/s 0s2024-08-07T11:04:20Z INFO [secret] Secret scanning is enabled
2024-08-07T11:04:20Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-07T11:04:20Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection2024-08-07T11:04:21Z INFO Number of language-specific files num=02024-08-07T11:04:21Z INFO Detected config files num=2trivy_exitcode=0
Trivy will check the following folders:
modules/securityhub-alarms
Running Trivy in modules/securityhub-alarms
2024-08-07T13:09:20Z INFO [db] Need to update DB
2024-08-07T13:09:20Z INFO [db] Downloading DB... repository="ghcr.io/aquasecurity/trivy-db:2"
2024-08-07T13:09:22Z INFO [vuln] Vulnerability scanning is enabled
2024-08-07T13:09:22Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-07T13:09:22Z INFO Need to update the built-in policies
2024-08-07T13:09:22Z INFO Downloading the built-in policies...
74.86 KiB / 74.86 KiB [-----------------------------------------------------------] 100.00% ? p/s 0s2024-08-07T13:09:23Z INFO [secret] Secret scanning is enabled
2024-08-07T13:09:23Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-07T13:09:23Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection
2024-08-07T13:09:23Z INFO Number of language-specific files num=0
2024-08-07T13:09:23Z INFO Detected config files num=2
trivy_exitcode=0
</details> #### `Checkov Scan` Success
<details><summary>Show Output</summary>
```hcl
*****************************
Checkov will check the following folders:
modules/securityhub-alarms
*****************************
Running Checkov in modules/securityhub-alarms
Excluding the following checks: CKV_GIT_1,CKV_AWS_126,CKV2_AWS_38,CKV2_AWS_39
terraform scan results:
Passed checks: 37, Failed checks: 0, Skipped checks: 3
checkov_exitcode=0
CTFLint Scan Success
Show Output
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.5.0)
tflint will check the following folders:
modules/securityhub-alarms
*****************************
Running tflint in modules/securityhub-alarms
Excluding the following checks: terraform_unused_declarations
tflint_exitcode=0
Trivy Scan Success
Show Output
*****************************
Trivy will check the following folders:
modules/securityhub-alarms
*****************************
Running Trivy in modules/securityhub-alarms
2024-08-07T13:09:20Z INFO [db] Need to update DB
2024-08-07T13:09:20Z INFO [db] Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-08-07T13:09:22Z INFO [vuln] Vulnerability scanning is enabled
2024-08-07T13:09:22Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-07T13:09:22Z INFO Need to update the built-in policies
2024-08-07T13:09:22Z INFO Downloading the built-in policies...74.86 KiB /74.86 KiB [-----------------------------------------------------------] 100.00%? p/s 0s2024-08-07T13:09:23Z INFO [secret] Secret scanning is enabled
2024-08-07T13:09:23Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-07T13:09:23Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection2024-08-07T13:09:23Z INFO Number of language-specific files num=02024-08-07T13:09:23Z INFO Detected config files num=2trivy_exitcode=0
Trivy will check the following folders:
modules/securityhub-alarms
Running Trivy in modules/securityhub-alarms
2024-08-07T13:17:08Z INFO [db] Need to update DB
2024-08-07T13:17:08Z INFO [db] Downloading DB... repository="ghcr.io/aquasecurity/trivy-db:2"
2024-08-07T13:17:10Z INFO [vuln] Vulnerability scanning is enabled
2024-08-07T13:17:10Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-07T13:17:10Z INFO Need to update the built-in policies
2024-08-07T13:17:10Z INFO Downloading the built-in policies...
74.86 KiB / 74.86 KiB [-----------------------------------------------------------] 100.00% ? p/s 0s2024-08-07T13:17:11Z INFO [secret] Secret scanning is enabled
2024-08-07T13:17:11Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-07T13:17:11Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection
2024-08-07T13:17:11Z INFO Number of language-specific files num=0
2024-08-07T13:17:11Z INFO Detected config files num=2
trivy_exitcode=0
</details> #### `Checkov Scan` Success
<details><summary>Show Output</summary>
```hcl
*****************************
Checkov will check the following folders:
modules/securityhub-alarms
*****************************
Running Checkov in modules/securityhub-alarms
Excluding the following checks: CKV_GIT_1,CKV_AWS_126,CKV2_AWS_38,CKV2_AWS_39
terraform scan results:
Passed checks: 37, Failed checks: 0, Skipped checks: 3
checkov_exitcode=0
CTFLint Scan Success
Show Output
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.5.0)
tflint will check the following folders:
modules/securityhub-alarms
*****************************
Running tflint in modules/securityhub-alarms
Excluding the following checks: terraform_unused_declarations
tflint_exitcode=0
Trivy Scan Success
Show Output
*****************************
Trivy will check the following folders:
modules/securityhub-alarms
*****************************
Running Trivy in modules/securityhub-alarms
2024-08-07T13:17:08Z INFO [db] Need to update DB
2024-08-07T13:17:08Z INFO [db] Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-08-07T13:17:10Z INFO [vuln] Vulnerability scanning is enabled
2024-08-07T13:17:10Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-07T13:17:10Z INFO Need to update the built-in policies
2024-08-07T13:17:10Z INFO Downloading the built-in policies...74.86 KiB /74.86 KiB [-----------------------------------------------------------] 100.00%? p/s 0s2024-08-07T13:17:11Z INFO [secret] Secret scanning is enabled
2024-08-07T13:17:11Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-07T13:17:11Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection2024-08-07T13:17:11Z INFO Number of language-specific files num=02024-08-07T13:17:11Z INFO Detected config files num=2trivy_exitcode=0
Trivy will check the following folders:
modules/securityhub-alarms
Running Trivy in modules/securityhub-alarms
2024-08-07T13:22:13Z INFO [db] Need to update DB
2024-08-07T13:22:13Z INFO [db] Downloading DB... repository="ghcr.io/aquasecurity/trivy-db:2"
2024-08-07T13:22:15Z INFO [vuln] Vulnerability scanning is enabled
2024-08-07T13:22:15Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-07T13:22:15Z INFO Need to update the built-in policies
2024-08-07T13:22:15Z INFO Downloading the built-in policies...
74.86 KiB / 74.86 KiB [-----------------------------------------------------------] 100.00% ? p/s 0s2024-08-07T13:22:15Z INFO [secret] Secret scanning is enabled
2024-08-07T13:22:15Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-07T13:22:15Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection
2024-08-07T13:22:16Z INFO Number of language-specific files num=0
2024-08-07T13:22:16Z INFO Detected config files num=2
trivy_exitcode=0
</details> #### `Checkov Scan` Success
<details><summary>Show Output</summary>
```hcl
*****************************
Checkov will check the following folders:
modules/securityhub-alarms
*****************************
Running Checkov in modules/securityhub-alarms
Excluding the following checks: CKV_GIT_1,CKV_AWS_126,CKV2_AWS_38,CKV2_AWS_39
terraform scan results:
Passed checks: 37, Failed checks: 0, Skipped checks: 3
checkov_exitcode=0
CTFLint Scan Success
Show Output
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.5.0)
tflint will check the following folders:
modules/securityhub-alarms
*****************************
Running tflint in modules/securityhub-alarms
Excluding the following checks: terraform_unused_declarations
tflint_exitcode=0
Trivy Scan Success
Show Output
*****************************
Trivy will check the following folders:
modules/securityhub-alarms
*****************************
Running Trivy in modules/securityhub-alarms
2024-08-07T13:22:13Z INFO [db] Need to update DB
2024-08-07T13:22:13Z INFO [db] Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-08-07T13:22:15Z INFO [vuln] Vulnerability scanning is enabled
2024-08-07T13:22:15Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-07T13:22:15Z INFO Need to update the built-in policies
2024-08-07T13:22:15Z INFO Downloading the built-in policies...74.86 KiB /74.86 KiB [-----------------------------------------------------------] 100.00%? p/s 0s2024-08-07T13:22:15Z INFO [secret] Secret scanning is enabled
2024-08-07T13:22:15Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-07T13:22:15Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection2024-08-07T13:22:16Z INFO Number of language-specific files num=02024-08-07T13:22:16Z INFO Detected config files num=2trivy_exitcode=0
Trivy will check the following folders:
modules/securityhub-alarms
Running Trivy in modules/securityhub-alarms
2024-08-07T13:37:23Z INFO [db] Need to update DB
2024-08-07T13:37:23Z INFO [db] Downloading DB... repository="ghcr.io/aquasecurity/trivy-db:2"
2024-08-07T13:37:25Z INFO [vuln] Vulnerability scanning is enabled
2024-08-07T13:37:25Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-07T13:37:25Z INFO Need to update the built-in policies
2024-08-07T13:37:25Z INFO Downloading the built-in policies...
74.86 KiB / 74.86 KiB [-----------------------------------------------------------] 100.00% ? p/s 0s2024-08-07T13:37:26Z INFO [secret] Secret scanning is enabled
2024-08-07T13:37:26Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-07T13:37:26Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection
2024-08-07T13:37:26Z INFO Number of language-specific files num=0
2024-08-07T13:37:26Z INFO Detected config files num=2
trivy_exitcode=0
</details> #### `Checkov Scan` Success
<details><summary>Show Output</summary>
```hcl
*****************************
Checkov will check the following folders:
modules/securityhub-alarms
*****************************
Running Checkov in modules/securityhub-alarms
Excluding the following checks: CKV_GIT_1,CKV_AWS_126,CKV2_AWS_38,CKV2_AWS_39
terraform scan results:
Passed checks: 37, Failed checks: 0, Skipped checks: 3
checkov_exitcode=0
CTFLint Scan Success
Show Output
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.5.0)
tflint will check the following folders:
modules/securityhub-alarms
*****************************
Running tflint in modules/securityhub-alarms
Excluding the following checks: terraform_unused_declarations
tflint_exitcode=0
Trivy Scan Success
Show Output
*****************************
Trivy will check the following folders:
modules/securityhub-alarms
*****************************
Running Trivy in modules/securityhub-alarms
2024-08-07T13:37:23Z INFO [db] Need to update DB
2024-08-07T13:37:23Z INFO [db] Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-08-07T13:37:25Z INFO [vuln] Vulnerability scanning is enabled
2024-08-07T13:37:25Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-07T13:37:25Z INFO Need to update the built-in policies
2024-08-07T13:37:25Z INFO Downloading the built-in policies...74.86 KiB /74.86 KiB [-----------------------------------------------------------] 100.00%? p/s 0s2024-08-07T13:37:26Z INFO [secret] Secret scanning is enabled
2024-08-07T13:37:26Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-07T13:37:26Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection2024-08-07T13:37:26Z INFO Number of language-specific files num=02024-08-07T13:37:26Z INFO Detected config files num=2trivy_exitcode=0
Trivy will check the following folders:
modules/securityhub-alarms
Running Trivy in modules/securityhub-alarms
2024-08-08T12:40:55Z INFO [db] Need to update DB
2024-08-08T12:40:55Z INFO [db] Downloading DB... repository="ghcr.io/aquasecurity/trivy-db:2"
2024-08-08T12:40:57Z INFO [vuln] Vulnerability scanning is enabled
2024-08-08T12:40:57Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-08T12:40:57Z INFO Need to update the built-in policies
2024-08-08T12:40:57Z INFO Downloading the built-in policies...
74.86 KiB / 74.86 KiB [-----------------------------------------------------------] 100.00% ? p/s 0s2024-08-08T12:40:58Z INFO [secret] Secret scanning is enabled
2024-08-08T12:40:58Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-08T12:40:58Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection
2024-08-08T12:40:58Z INFO Number of language-specific files num=0
2024-08-08T12:40:58Z INFO Detected config files num=2
trivy_exitcode=0
</details> #### `Checkov Scan` Success
<details><summary>Show Output</summary>
```hcl
*****************************
Checkov will check the following folders:
modules/securityhub-alarms
*****************************
Running Checkov in modules/securityhub-alarms
Excluding the following checks: CKV_GIT_1,CKV_AWS_126,CKV2_AWS_38,CKV2_AWS_39
terraform scan results:
Passed checks: 37, Failed checks: 0, Skipped checks: 3
checkov_exitcode=0
CTFLint Scan Success
Show Output
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.5.0)
tflint will check the following folders:
modules/securityhub-alarms
*****************************
Running tflint in modules/securityhub-alarms
Excluding the following checks: terraform_unused_declarations
tflint_exitcode=0
Trivy Scan Success
Show Output
*****************************
Trivy will check the following folders:
modules/securityhub-alarms
*****************************
Running Trivy in modules/securityhub-alarms
2024-08-08T12:40:55Z INFO [db] Need to update DB
2024-08-08T12:40:55Z INFO [db] Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-08-08T12:40:57Z INFO [vuln] Vulnerability scanning is enabled
2024-08-08T12:40:57Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-08T12:40:57Z INFO Need to update the built-in policies
2024-08-08T12:40:57Z INFO Downloading the built-in policies...74.86 KiB /74.86 KiB [-----------------------------------------------------------] 100.00%? p/s 0s2024-08-08T12:40:58Z INFO [secret] Secret scanning is enabled
2024-08-08T12:40:58Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-08T12:40:58Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection2024-08-08T12:40:58Z INFO Number of language-specific files num=02024-08-08T12:40:58Z INFO Detected config files num=2trivy_exitcode=0
Trivy will check the following folders:
modules/securityhub-alarms
Running Trivy in modules/securityhub-alarms
2024-08-08T12:59:54Z INFO [db] Need to update DB
2024-08-08T12:59:54Z INFO [db] Downloading DB... repository="ghcr.io/aquasecurity/trivy-db:2"
2024-08-08T12:59:56Z INFO [vuln] Vulnerability scanning is enabled
2024-08-08T12:59:56Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-08T12:59:56Z INFO Need to update the built-in policies
2024-08-08T12:59:56Z INFO Downloading the built-in policies...
74.86 KiB / 74.86 KiB [-----------------------------------------------------------] 100.00% ? p/s 0s2024-08-08T12:59:57Z INFO [secret] Secret scanning is enabled
2024-08-08T12:59:57Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-08T12:59:57Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection
2024-08-08T12:59:57Z INFO Number of language-specific files num=0
2024-08-08T12:59:57Z INFO Detected config files num=2
trivy_exitcode=0
</details> #### `Checkov Scan` Success
<details><summary>Show Output</summary>
```hcl
*****************************
Checkov will check the following folders:
modules/securityhub-alarms
*****************************
Running Checkov in modules/securityhub-alarms
Excluding the following checks: CKV_GIT_1,CKV_AWS_126,CKV2_AWS_38,CKV2_AWS_39
terraform scan results:
Passed checks: 37, Failed checks: 0, Skipped checks: 3
checkov_exitcode=0
CTFLint Scan Success
Show Output
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.5.0)
tflint will check the following folders:
modules/securityhub-alarms
*****************************
Running tflint in modules/securityhub-alarms
Excluding the following checks: terraform_unused_declarations
tflint_exitcode=0
Trivy Scan Success
Show Output
*****************************
Trivy will check the following folders:
modules/securityhub-alarms
*****************************
Running Trivy in modules/securityhub-alarms
2024-08-08T12:59:54Z INFO [db] Need to update DB
2024-08-08T12:59:54Z INFO [db] Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-08-08T12:59:56Z INFO [vuln] Vulnerability scanning is enabled
2024-08-08T12:59:56Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-08T12:59:56Z INFO Need to update the built-in policies
2024-08-08T12:59:56Z INFO Downloading the built-in policies...74.86 KiB /74.86 KiB [-----------------------------------------------------------] 100.00%? p/s 0s2024-08-08T12:59:57Z INFO [secret] Secret scanning is enabled
2024-08-08T12:59:57Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-08T12:59:57Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection2024-08-08T12:59:57Z INFO Number of language-specific files num=02024-08-08T12:59:57Z INFO Detected config files num=2trivy_exitcode=0
Trivy will check the following folders:
modules/securityhub-alarms
Running Trivy in modules/securityhub-alarms
2024-08-08T13:49:55Z INFO [db] Need to update DB
2024-08-08T13:49:55Z INFO [db] Downloading DB... repository="ghcr.io/aquasecurity/trivy-db:2"
2024-08-08T13:49:57Z INFO [vuln] Vulnerability scanning is enabled
2024-08-08T13:49:57Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-08T13:49:57Z INFO Need to update the built-in policies
2024-08-08T13:49:57Z INFO Downloading the built-in policies...
74.86 KiB / 74.86 KiB [-----------------------------------------------------------] 100.00% ? p/s 0s2024-08-08T13:49:58Z INFO [secret] Secret scanning is enabled
2024-08-08T13:49:58Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-08T13:49:58Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection
2024-08-08T13:49:58Z INFO Number of language-specific files num=0
2024-08-08T13:49:58Z INFO Detected config files num=2
trivy_exitcode=0
</details> #### `Checkov Scan` Success
<details><summary>Show Output</summary>
```hcl
*****************************
Checkov will check the following folders:
modules/securityhub-alarms
*****************************
Running Checkov in modules/securityhub-alarms
Excluding the following checks: CKV_GIT_1,CKV_AWS_126,CKV2_AWS_38,CKV2_AWS_39
terraform scan results:
Passed checks: 37, Failed checks: 0, Skipped checks: 3
checkov_exitcode=0
CTFLint Scan Failed
Show Output
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.5.0)
tflint will check the following folders:
modules/securityhub-alarms
*****************************
Running tflint in modules/securityhub-alarms
Excluding the following checks: terraform_unused_declarations
1issue(s) found:
Warning: Missing version constraint for provider "null" in `required_providers` (terraform_required_providers)
on modules/securityhub-alarms/main.tf line 561:561:resource"null_resource""no_nat_gateways_found" {
Reference: https://github.com/terraform-linters/tflint-ruleset-terraform/blob/v0.5.0/docs/rules/terraform_required_providers.mdtflint_exitcode=2
Trivy Scan Success
Show Output
*****************************
Trivy will check the following folders:
modules/securityhub-alarms
*****************************
Running Trivy in modules/securityhub-alarms
2024-08-08T13:49:55Z INFO [db] Need to update DB
2024-08-08T13:49:55Z INFO [db] Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-08-08T13:49:57Z INFO [vuln] Vulnerability scanning is enabled
2024-08-08T13:49:57Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-08T13:49:57Z INFO Need to update the built-in policies
2024-08-08T13:49:57Z INFO Downloading the built-in policies...74.86 KiB /74.86 KiB [-----------------------------------------------------------] 100.00%? p/s 0s2024-08-08T13:49:58Z INFO [secret] Secret scanning is enabled
2024-08-08T13:49:58Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-08T13:49:58Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection2024-08-08T13:49:58Z INFO Number of language-specific files num=02024-08-08T13:49:58Z INFO Detected config files num=2trivy_exitcode=0
Trivy will check the following folders:
modules/securityhub-alarms
Running Trivy in modules/securityhub-alarms
2024-08-09T15:16:12Z INFO [db] Need to update DB
2024-08-09T15:16:12Z INFO [db] Downloading DB... repository="ghcr.io/aquasecurity/trivy-db:2"
2024-08-09T15:16:14Z INFO [vuln] Vulnerability scanning is enabled
2024-08-09T15:16:14Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-09T15:16:14Z INFO Need to update the built-in policies
2024-08-09T15:16:14Z INFO Downloading the built-in policies...
74.86 KiB / 74.86 KiB [-----------------------------------------------------------] 100.00% ? p/s 0s2024-08-09T15:16:15Z INFO [secret] Secret scanning is enabled
2024-08-09T15:16:15Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-09T15:16:15Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection
2024-08-09T15:16:15Z INFO Number of language-specific files num=0
2024-08-09T15:16:15Z INFO Detected config files num=2
trivy_exitcode=0
</details> #### `Checkov Scan` Success
<details><summary>Show Output</summary>
```hcl
*****************************
Checkov will check the following folders:
modules/securityhub-alarms
*****************************
Running Checkov in modules/securityhub-alarms
Excluding the following checks: CKV_GIT_1,CKV_AWS_126,CKV2_AWS_38,CKV2_AWS_39
terraform scan results:
Passed checks: 37, Failed checks: 0, Skipped checks: 3
checkov_exitcode=0
CTFLint Scan Success
Show Output
*****************************
Setting default tflint config...
Running tflint --init...
Installing "terraform" plugin...
Installed "terraform" (source: github.com/terraform-linters/tflint-ruleset-terraform, version:0.5.0)
tflint will check the following folders:
modules/securityhub-alarms
*****************************
Running tflint in modules/securityhub-alarms
Excluding the following checks: terraform_unused_declarations
tflint_exitcode=0
Trivy Scan Success
Show Output
*****************************
Trivy will check the following folders:
modules/securityhub-alarms
*****************************
Running Trivy in modules/securityhub-alarms
2024-08-09T15:16:12Z INFO [db] Need to update DB
2024-08-09T15:16:12Z INFO [db] Downloading DB...repository="ghcr.io/aquasecurity/trivy-db:2"2024-08-09T15:16:14Z INFO [vuln] Vulnerability scanning is enabled
2024-08-09T15:16:14Z INFO [misconfig] Misconfiguration scanning is enabled
2024-08-09T15:16:14Z INFO Need to update the built-in policies
2024-08-09T15:16:14Z INFO Downloading the built-in policies...74.86 KiB /74.86 KiB [-----------------------------------------------------------] 100.00%? p/s 0s2024-08-09T15:16:15Z INFO [secret] Secret scanning is enabled
2024-08-09T15:16:15Z INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-09T15:16:15Z INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection2024-08-09T15:16:15Z INFO Number of language-specific files num=02024-08-09T15:16:15Z INFO Detected config files num=2trivy_exitcode=0
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
As a continuation of ministryofjustice/modernisation-platform#1522
ministryofjustice/modernisation-platform#1522
There are three things we can add to monitoring for the modernisation platform the first two are new cloud watch alarms based on aws documentation and the a third would be to add vpc flow logs to the modernisation platform transit gateway and adding monitoring to the cloud watch to monitor for low traffic on the link
This PR Adds in the new alarms