-
Notifications
You must be signed in to change notification settings - Fork 509
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
d242c2e
commit 9c4918e
Showing
50 changed files
with
461 additions
and
45 deletions.
There are no files selected for viewing
12 changes: 12 additions & 0 deletions
12
pkg/policies/opa/rego/aws/aws_athena_database/AC_AWS_016.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,12 @@ | ||
{ | ||
"name": "athenaDatabaseEncrypted", | ||
"file": "athenaDatabaseEncrypted.rego", | ||
"template_args": { | ||
"prefix": "" | ||
}, | ||
"severity": "MEDIUM", | ||
"description": "Ensure Athena Database is encrypted at rest", | ||
"reference_id": "AC_AWS_016", | ||
"category": "Data Protection", | ||
"version": 2 | ||
} |
6 changes: 6 additions & 0 deletions
6
pkg/policies/opa/rego/aws/aws_athena_database/athenaDatabaseEncrypted.rego
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,6 @@ | ||
package accurics | ||
|
||
{{.prefix}}athenaDatabaseEncrypted[athena.id]{ | ||
athena = input.aws_athena_database[_] | ||
object.get(athena.config, "encryption_configuration", "undefined") = ["undefined", []][_] | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
7 changes: 2 additions & 5 deletions
7
pkg/policies/opa/rego/aws/aws_cloudtrail/cloudTrailLogNotEncrypted.rego
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,9 +1,6 @@ | ||
package accurics | ||
|
||
{{.prefix}}cloudTrailLogNotEncrypted[retVal]{ | ||
{{.prefix}}cloudTrailLogNotEncrypted[cloud_trail.id]{ | ||
cloud_trail = input.aws_cloudtrail[_] | ||
cloud_trail.config.kms_key_id == null | ||
|
||
traverse = "kms_key_id" | ||
retVal := { "Id": cloud_trail.id, "ReplaceType": "edit", "CodeType": "attribute", "Traverse": traverse, "Attribute": "kms_key_id", "AttributeDataType": "string", "Expected": "<kms_key_id>", "Actual": cloud_trail.config.kms_key_id } | ||
object.get(cloud_trail.config, "kms_key_id", "undefined") == [null, "undefined"][_] | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,12 @@ | ||
{ | ||
"name": "daxSse", | ||
"file": "daxSse.rego", | ||
"template_args": { | ||
"prefix": "" | ||
}, | ||
"severity": "MEDIUM", | ||
"description": "Ensure DAX is encrypted at rest", | ||
"reference_id": "AC_AWS_021", | ||
"category": "Data Protection", | ||
"version": 2 | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,12 @@ | ||
package accurics | ||
|
||
{{.prefix}}daxSse[dax_cluster.id] { | ||
dax_cluster := input.aws_dax_cluster[_] | ||
object.get(dax_cluster.config, "server_side_encryption", "undefined") == [[], "undefined"][_] | ||
} | ||
|
||
{{.prefix}}daxSse[dax_cluster.id] { | ||
dax_cluster := input.aws_dax_cluster[_] | ||
sse_encryption := dax_cluster.config.server_side_encryption[_] | ||
sse_encryption.enabled == false | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,12 @@ | ||
{ | ||
"name": "docDbEncrypted", | ||
"file": "docDbEncrypted.rego", | ||
"template_args": { | ||
"prefix": "" | ||
}, | ||
"severity": "MEDIUM", | ||
"description": "Ensure DocDb is encrypted at rest", | ||
"reference_id": "AC_AWS_022", | ||
"category": "Data Protection", | ||
"version": 2 | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,11 @@ | ||
package accurics | ||
|
||
{{.prefix}}docDbEncrypted[doc_cluster.id] { | ||
doc_cluster := input.aws_docdb_cluster[_] | ||
object.get(doc_cluster.config, "storage_encrypted", "undefined") == [false, "undefined"][_] | ||
} | ||
|
||
{{.prefix}}docDbEncrypted[doc_cluster.id] { | ||
doc_cluster := input.aws_docdb_cluster[_] | ||
object.get(doc_cluster.config, "kms_key_id", "undefined") == "undefined" | ||
} |
12 changes: 12 additions & 0 deletions
12
pkg/policies/opa/rego/aws/aws_dynamodb_table/AC_AWS_025.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,12 @@ | ||
{ | ||
"name": "dynamoDbEncrypted", | ||
"file": "dynamoDbEncrypted.rego", | ||
"template_args": { | ||
"prefix": "" | ||
}, | ||
"severity": "MEDIUM", | ||
"description": "Ensure DynamoDb is encrypted at rest", | ||
"reference_id": "AC_AWS_025", | ||
"category": "Data Protection", | ||
"version": 2 | ||
} |
12 changes: 12 additions & 0 deletions
12
pkg/policies/opa/rego/aws/aws_dynamodb_table/dynamoDbEncrypted.rego
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,12 @@ | ||
package accurics | ||
|
||
{{.prefix}}dynamoDbEncrypted[dydb_cluster.id] { | ||
dydb_cluster := input.aws_dynamodb_table[_] | ||
object.get(dydb_cluster.config, "server_side_encryption", "undefined") == [[], "undefined"][_] | ||
} | ||
|
||
{{.prefix}}dynamoDbEncrypted[dydb_cluster.id] { | ||
dydb_cluster := input.aws_dynamodb_table[_] | ||
sse_encryption := dydb_cluster.config.server_side_encryption[_] | ||
sse_encryption.enabled == false | ||
} |
12 changes: 12 additions & 0 deletions
12
pkg/policies/opa/rego/aws/aws_ecr_repository/AC_AWS_026.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,12 @@ | ||
{ | ||
"name": "ecrNotEncrypted", | ||
"file": "ecrNotEncrypted.rego", | ||
"template_args": { | ||
"prefix": "" | ||
}, | ||
"severity": "MEDIUM", | ||
"description": "Ensure ECR repository is encrypted at rest", | ||
"reference_id": "AC_AWS_026", | ||
"category": "Data Protection", | ||
"version": 2 | ||
} |
11 changes: 11 additions & 0 deletions
11
pkg/policies/opa/rego/aws/aws_ecr_repository/ecrNotEncrypted.rego
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,11 @@ | ||
package accurics | ||
|
||
{{.prefix}}ecrNotEncrypted[ecr.id] { | ||
ecr := input.aws_ecr_repository[_] | ||
object.get(ecr.config, "encryption_configuration", "undefined") == ["undefined", []][_] | ||
} | ||
|
||
{{.prefix}}ecrNotEncrypted[ecr.id] { | ||
ecr := input.aws_ecr_repository[_] | ||
ecr.config.encryption_configuration[_] == {} | ||
} |
12 changes: 12 additions & 0 deletions
12
pkg/policies/opa/rego/aws/aws_ecs_task_definition/AC_AWS_043.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,12 @@ | ||
{ | ||
"name": "noTransitEncryptionECS", | ||
"file": "noTransitEncryptionECS.rego", | ||
"template_args": { | ||
"prefix": "" | ||
}, | ||
"severity": "MEDIUM", | ||
"description": "Ensure EFS volume used for ECS task defination has in transit encryption enabled", | ||
"reference_id": "AC_AWS_043", | ||
"category": "Infrastructure Security", | ||
"version": 2 | ||
} |
7 changes: 7 additions & 0 deletions
7
pkg/policies/opa/rego/aws/aws_ecs_task_definition/noTransitEncryptionECS.rego
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,7 @@ | ||
package accurics | ||
|
||
{{.prefix}}noTransitEncryptionECS[ecs.id]{ | ||
ecs := input.aws_ecs_task_definition[_] | ||
efs := ecs.config.volume[_].efs_volume_configuration[_] | ||
object.get(efs, "transit_encryption", "undefined") == ["undefined", false, ""][_] | ||
} |
12 changes: 12 additions & 0 deletions
12
pkg/policies/opa/rego/aws/aws_elasticcache_replication_group/AC_AWS_027.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,12 @@ | ||
{ | ||
"name": "atRestNotEncryptedElasticCache", | ||
"file": "atRestNotEncrypted.rego", | ||
"template_args": { | ||
"prefix": "" | ||
}, | ||
"severity": "MEDIUM", | ||
"description": "Ensure Elastic Cache Replication Group is encrypted at rest", | ||
"reference_id": "AC_AWS_027", | ||
"category": "Data Protection", | ||
"version": 2 | ||
} |
12 changes: 12 additions & 0 deletions
12
pkg/policies/opa/rego/aws/aws_elasticcache_replication_group/AC_AWS_044.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,12 @@ | ||
{ | ||
"name": "inTransitNotEncryptedElasticCache", | ||
"file": "inTransitNotEncrypted.rego", | ||
"template_args": { | ||
"prefix": "" | ||
}, | ||
"severity": "MEDIUM", | ||
"description": "Ensure Elastic Cache Replication Group is encrypted in transit", | ||
"reference_id": "AC_AWS_044", | ||
"category": "Data Protection", | ||
"version": 2 | ||
} |
6 changes: 6 additions & 0 deletions
6
pkg/policies/opa/rego/aws/aws_elasticcache_replication_group/atRestNotEncrypted.rego
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,6 @@ | ||
package accurics | ||
|
||
{{.prefix}}atRestNotEncryptedElasticCache[replication_grp.id] { | ||
replication_grp := input.aws_elasticache_replication_group[_] | ||
object.get(replication_grp.config, "at_rest_encryption_enabled", "undefined") == [false, "undefined"][_] | ||
} |
6 changes: 6 additions & 0 deletions
6
pkg/policies/opa/rego/aws/aws_elasticcache_replication_group/inTransitNotEncrypted.rego
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,6 @@ | ||
package accurics | ||
|
||
{{.prefix}}inTransitNotEncryptedElasticCache[replication_grp.id] { | ||
replication_grp := input.aws_elasticache_replication_group[_] | ||
object.get(replication_grp.config, "transit_encryption_enabled", "undefined") == [false, "undefined"][_] | ||
} |
12 changes: 12 additions & 0 deletions
12
pkg/policies/opa/rego/aws/aws_elasticsearch_domain/AC_AWS_045.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,12 @@ | ||
{ | ||
"name": "noNodeToNodeEncryptionDomain", | ||
"file": "noNodeToNodeEncryptionDomain.rego", | ||
"template_args": { | ||
"prefix": "" | ||
}, | ||
"severity": "MEDIUM", | ||
"description": "Ensure Elasticsearch domains being created are set to be encrypted node-to-node", | ||
"reference_id": "AC_AWS_045", | ||
"category": "Infrastructure Security", | ||
"version": 2 | ||
} |
11 changes: 11 additions & 0 deletions
11
pkg/policies/opa/rego/aws/aws_elasticsearch_domain/noNodeToNodeEncryptionDomain.rego
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,11 @@ | ||
package accurics | ||
|
||
{{.prefix}}noNodeToNodeEncryptionDomain[domain.id] { | ||
domain := input.aws_elasticsearch_domain[_] | ||
object.get(domain.config, "node_to_node_encryption", "undefined") == "undefined" | ||
} | ||
|
||
{{.prefix}}noNodeToNodeEncryptionDomain[domain.id] { | ||
domain := input.aws_elasticsearch_domain[_] | ||
object.get(domain.config.node_to_node_encryption[_], "enabled", "undefined") == ["undefined", false][_] | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
9 changes: 6 additions & 3 deletions
9
pkg/policies/opa/rego/aws/aws_kinesis_stream/aws_kinesis_stream.rego
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,8 +1,11 @@ | ||
package accurics | ||
|
||
{{.prefix}}kinesisNotEncryptedWithKms[retVal] { | ||
{{.prefix}}kinesisNotEncryptedWithKms[stream.id] { | ||
stream = input.aws_kinesis_stream[_] | ||
stream.config.kms_key_id == null | ||
traverse = "" | ||
retVal := { "Id": stream.id, "ReplaceType": "edit", "CodeType": "attribute", "Traverse": traverse, "Attribute": "kms_key_id", "AttributeDataType": "string", "Expected": "<kms_key_id>", "Actual": null } | ||
} | ||
|
||
{{.prefix}}kinesisNotEncryptedWithKms[stream.id] { | ||
stream = input.aws_kinesis_stream[_] | ||
object.get(stream.config, "encryption_type", "undefined") == ["NONE", "undefined"][_] | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,12 @@ | ||
{ | ||
"name": "kmsKeyRotationDisabled", | ||
"file": "kmsKeyRotationDisabled.rego", | ||
"template_args": { | ||
"prefix": "" | ||
}, | ||
"severity": "MEDIUM", | ||
"description": "Ensure rotation for customer created CMKs is enabled", | ||
"reference_id": "AC_AWS_012", | ||
"category": "Security Best Practices", | ||
"version": 2 | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,12 @@ | ||
{ | ||
"name": "listenerNotHttps", | ||
"file": "listenerNotHttps.rego", | ||
"template_args": { | ||
"prefix": "" | ||
}, | ||
"severity": "MEDIUM", | ||
"description": "Ensure there is a one listener configured on HTTPs", | ||
"reference_id": "AC_AWS_046", | ||
"category": "Infrastructure Security", | ||
"version": 2 | ||
} |
13 changes: 13 additions & 0 deletions
13
pkg/policies/opa/rego/aws/aws_lb_listener/listenerNotHttps.rego
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,13 @@ | ||
package accurics | ||
|
||
{{.prefix}}listenerNotHttps[listener.id] { | ||
listener = input.aws_lb_listener[_] | ||
upper(listener.config.protocol) == "HTTP" | ||
not listener.default_action.redirect.protocol | ||
} | ||
|
||
{{.prefix}}listenerNotHttps[listener.id] { | ||
listener = input.aws_lb_listener[_] | ||
upper(listener.config.protocol) == "HTTP" | ||
upper(listener.default_action.redirect.protocol) != "HTTPS" | ||
} |
12 changes: 12 additions & 0 deletions
12
pkg/policies/opa/rego/aws/aws_lb_target_group/AC_AWS_042.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,12 @@ | ||
{ | ||
"name": "targetGroupUsingHttp", | ||
"file": "targetGroupUsingHttp.rego", | ||
"template_args": { | ||
"prefix": "" | ||
}, | ||
"severity": "MEDIUM", | ||
"description": "Ensure Target Group use HTTPs to ensure end to end encryption", | ||
"reference_id": "AC_AWS_042", | ||
"category": "Infrastructure Security", | ||
"version": 2 | ||
} |
6 changes: 6 additions & 0 deletions
6
pkg/policies/opa/rego/aws/aws_lb_target_group/targetGroupUsingHttp.rego
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,6 @@ | ||
package accurics | ||
|
||
{{.prefix}}targetGroupUsingHttp[tg_group.id] { | ||
tg_group = input.aws_lb_target_group[_] | ||
upper(tg_group.config.protocol) == "HTTP" | ||
} |
12 changes: 12 additions & 0 deletions
12
pkg/policies/opa/rego/aws/aws_neptune_cluster/AC_AWS_030.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,12 @@ | ||
{ | ||
"name": "neptuneClusterNotEncrypted", | ||
"file": "neptuneClusterNotEncrypted.rego", | ||
"template_args": { | ||
"prefix": "" | ||
}, | ||
"severity": "MEDIUM", | ||
"description": "Ensure Neptune Cluster is Encrypted", | ||
"reference_id": "AC_AWS_030", | ||
"category": "Data Protection", | ||
"version": 2 | ||
} |
6 changes: 6 additions & 0 deletions
6
pkg/policies/opa/rego/aws/aws_neptune_cluster/neptuneClusterNotEncrypted.rego
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,6 @@ | ||
package accurics | ||
|
||
{{.prefix}}neptuneClusterNotEncrypted[np.id] { | ||
np = input.aws_neptune_cluster[_] | ||
object.get(np.config, "storage_encrypted", "undefined") == [false, "undefined"][_] | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,12 @@ | ||
{ | ||
"name": "backupRetentionRDS", | ||
"file": "backupRetention.rego", | ||
"template_args": { | ||
"prefix": "" | ||
}, | ||
"severity": "MEDIUM", | ||
"description": "Ensure backup retention period is set for rds cluster", | ||
"reference_id": "AC_AWS_013", | ||
"category": "Resilience", | ||
"version": 2 | ||
} |
11 changes: 11 additions & 0 deletions
11
pkg/policies/opa/rego/aws/aws_rds_cluster/backupRetention.rego
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,11 @@ | ||
package accurics | ||
|
||
{{.prefix}}backupRetentionRDS[rds.id]{ | ||
rds = input.aws_rds_cluster[_] | ||
object.get(rds.config, "backup_retention_period", "undefined") == "undefined" | ||
} | ||
|
||
{{.prefix}}backupRetention[rds.id]{ | ||
rds = input.aws_rds_cluster[_] | ||
rds.config.backup_retention_period <= 7 | ||
} |
Oops, something went wrong.