Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Spelling #1496

Merged
merged 115 commits into from
Apr 26, 2023
Merged
Show file tree
Hide file tree
Changes from 114 commits
Commits
Show all changes
115 commits
Select commit Hold shift + click to select a range
580c7a8
spelling: abbreviation
jsoref Dec 25, 2022
c28603a
spelling: access
jsoref Dec 25, 2022
cabebd8
spelling: across
jsoref Dec 25, 2022
2a5671d
spelling: admission
jsoref Dec 25, 2022
7206ea3
spelling: allocated
jsoref Dec 25, 2022
ae08321
spelling: apache-license
jsoref Dec 25, 2022
f43e42f
spelling: are
jsoref Dec 25, 2022
5b08660
spelling: argocd
jsoref Dec 25, 2022
5958238
spelling: attribute
jsoref Dec 25, 2022
8aa4e81
spelling: authorizer
jsoref Dec 25, 2022
4477c45
spelling: availability
jsoref Dec 25, 2022
10984f9
spelling: cache
jsoref Dec 25, 2022
f77bc98
spelling: calculate
jsoref Dec 25, 2022
6f7e869
spelling: certificate
jsoref Dec 25, 2022
fc2ed48
spelling: command
jsoref Dec 25, 2022
2114c90
spelling: comparison
jsoref Dec 25, 2022
d801c04
spelling: completed
jsoref Dec 25, 2022
26a06ad
spelling: config
jsoref Dec 25, 2022
4c9971c
spelling: configs
jsoref Dec 25, 2022
46dfaa1
spelling: configurations
jsoref Dec 25, 2022
858447c
spelling: constraints
jsoref Dec 25, 2022
83e6422
spelling: container
jsoref Dec 25, 2022
9b5c9df
spelling: containing
jsoref Dec 25, 2022
c933205
spelling: custom
jsoref Dec 25, 2022
00c6ca5
spelling: defined
jsoref Dec 25, 2022
7698f9d
spelling: definition
jsoref Dec 25, 2022
42f4efc
spelling: definitions
jsoref Dec 25, 2022
e2dd31a
spelling: delimiter
jsoref Dec 25, 2022
024999c
spelling: description
jsoref Dec 25, 2022
0768c0c
spelling: documentation
jsoref Dec 25, 2022
6fc9ad5
spelling: download
jsoref Dec 25, 2022
e5f705c
spelling: elasticsearch
jsoref Dec 25, 2022
e0a4577
spelling: enabled
jsoref Dec 25, 2022
a165c32
spelling: encryption
jsoref Dec 25, 2022
9181ebd
spelling: engineer
jsoref Dec 25, 2022
6e12796
spelling: error
jsoref Dec 25, 2022
2e75c6d
spelling: errors
jsoref Dec 25, 2022
93716ed
spelling: example
jsoref Dec 25, 2022
48d5bf4
spelling: experimental
jsoref Dec 25, 2022
e25153f
spelling: failing
jsoref Dec 25, 2022
b089496
spelling: filtration
jsoref Dec 25, 2022
e497c79
spelling: float
jsoref Dec 25, 2022
5c830d7
spelling: for
jsoref Dec 25, 2022
7b28c62
spelling: github
jsoref Dec 25, 2022
480cfc6
spelling: google
jsoref Dec 25, 2022
6cff5a2
spelling: greater
jsoref Dec 25, 2022
b9f6397
spelling: guard
jsoref Dec 25, 2022
c1cd66c
spelling: handler
jsoref Dec 25, 2022
e50f27c
spelling: image
jsoref Dec 25, 2022
93b7adf
spelling: independently
jsoref Dec 25, 2022
2119f42
spelling: infinite
jsoref Dec 25, 2022
6bb22f2
spelling: initial
jsoref Dec 25, 2022
4f82483
spelling: initialises
jsoref Dec 25, 2022
7a53be1
spelling: initialize
jsoref Dec 25, 2022
21b1d67
spelling: initialized
jsoref Dec 25, 2022
db98d15
spelling: interface
jsoref Dec 25, 2022
e81643c
spelling: into
jsoref Dec 25, 2022
8985db5
spelling: invalid
jsoref Dec 25, 2022
49b5b19
spelling: kubernetes
jsoref Dec 25, 2022
3863a60
spelling: length
jsoref Dec 25, 2022
2f4e161
spelling: medium
jsoref Dec 25, 2022
0628f21
spelling: metadata
jsoref Dec 25, 2022
62d872c
spelling: misconfigured
jsoref Dec 25, 2022
393765f
spelling: modified
jsoref Dec 25, 2022
469d511
spelling: module
jsoref Dec 25, 2022
a5cbe5f
spelling: needed
jsoref Dec 25, 2022
c75b0e9
spelling: nonexistent
jsoref Dec 25, 2022
4b23cd9
spelling: notifications
jsoref Dec 25, 2022
51c74e1
spelling: notifiers
jsoref Dec 25, 2022
8f3b779
spelling: object
jsoref Dec 25, 2022
a695d07
spelling: occurred
jsoref Dec 25, 2022
49421fc
spelling: outdated
jsoref Dec 25, 2022
9c05177
spelling: parameters
jsoref Dec 25, 2022
f093ac9
spelling: period
jsoref Dec 25, 2022
d3e2bbe
spelling: playground
jsoref Dec 25, 2022
5f3dab2
spelling: policy
jsoref Dec 25, 2022
a5f2a30
spelling: possibilities
jsoref Dec 25, 2022
badcfd5
spelling: pricing
jsoref Dec 25, 2022
a801291
spelling: principal
jsoref Dec 25, 2022
0763cf8
spelling: privilege
jsoref Dec 25, 2022
1a694b2
spelling: privileged
jsoref Dec 25, 2022
b6d5e41
spelling: privileges
jsoref Dec 25, 2022
6e9c416
spelling: processed
jsoref Dec 25, 2022
d442dd0
spelling: propagate
jsoref Dec 25, 2022
2943695
spelling: propagation
jsoref Dec 25, 2022
7caee27
spelling: readable
jsoref Dec 25, 2022
1d75842
spelling: reference
jsoref Dec 25, 2022
7226ccd
spelling: registry
jsoref Dec 25, 2022
3226fce
spelling: request
jsoref Dec 25, 2022
88388af
spelling: resource
jsoref Dec 25, 2022
fa857a9
spelling: response
jsoref Dec 25, 2022
12d3feb
spelling: retention
jsoref Dec 25, 2022
2ec08f8
spelling: retrieve
jsoref Dec 25, 2022
b508d1e
spelling: returns
jsoref Dec 25, 2022
e2a4073
spelling: root
jsoref Dec 25, 2022
03bede9
spelling: scanning
jsoref Dec 25, 2022
effb881
spelling: severity
jsoref Dec 25, 2022
09914b1
spelling: should
jsoref Dec 25, 2022
9f71a3d
spelling: skipping
jsoref Dec 25, 2022
19270c2
spelling: specified
jsoref Dec 25, 2022
8a0620c
spelling: status
jsoref Dec 25, 2022
0dc32c0
spelling: struct
jsoref Dec 25, 2022
56e2b6e
spelling: suppression
jsoref Dec 25, 2022
96043c0
spelling: template
jsoref Dec 25, 2022
452c272
spelling: terraform
jsoref Dec 25, 2022
c0e4bb6
spelling: terrascan
jsoref Dec 25, 2022
13e39f3
spelling: that
jsoref Dec 25, 2022
4b07c85
spelling: transforms
jsoref Dec 25, 2022
a624514
spelling: unknown
jsoref Dec 25, 2022
82969ab
spelling: version
jsoref Dec 25, 2022
5f82001
spelling: vulnerabilities
jsoref Dec 25, 2022
07a03e9
spelling: vulnerability
jsoref Dec 25, 2022
508b6e3
Merge branch 'master' into spelling
nasir-rabbani Feb 4, 2023
5492638
Merge branch 'master' into spelling
cesar-rodriguez Apr 3, 2023
d2c9643
Merge branch 'master' into spelling
cesar-rodriguez Apr 26, 2023
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
36 changes: 18 additions & 18 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -32,7 +32,7 @@
- \[fix\] Resolve Vulnerable packages [\#1486](https://github.com/tenable/terrascan/pull/1486) ([rahulchheda](https://github.com/rahulchheda))
- added tar.gz archive for windows [\#1474](https://github.com/tenable/terrascan/pull/1474) ([nasir-rabbani](https://github.com/nasir-rabbani))
- Update opa and cobra version [\#1472](https://github.com/tenable/terrascan/pull/1472) ([nasir-rabbani](https://github.com/nasir-rabbani))
- ignored matching provider verson in tests [\#1470](https://github.com/tenable/terrascan/pull/1470) ([nasir-rabbani](https://github.com/nasir-rabbani))
- ignored matching provider version in tests [\#1470](https://github.com/tenable/terrascan/pull/1470) ([nasir-rabbani](https://github.com/nasir-rabbani))
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Some projects don't like changing changelogs. Happy to drop this or anything else.

- added terraform and provider version in resource config [\#1469](https://github.com/tenable/terrascan/pull/1469) ([nasir-rabbani](https://github.com/nasir-rabbani))
- Bump github.com/hashicorp/go-getter from 1.5.11 to 1.6.2 [\#1298](https://github.com/tenable/terrascan/pull/1298) ([dependabot[bot]](https://github.com/apps/dependabot))

Expand Down Expand Up @@ -244,7 +244,7 @@

- skip terrascan init for --config-with-error flag [\#1160](https://github.com/accurics/terrascan/pull/1160) ([nasir-rabbani](https://github.com/nasir-rabbani))
- Bugfix/s3 user policy [\#1157](https://github.com/accurics/terrascan/pull/1157) ([gaurav-gogia](https://github.com/gaurav-gogia))
- fix rds encryptionc check policy [\#1156](https://github.com/accurics/terrascan/pull/1156) ([gaurav-gogia](https://github.com/gaurav-gogia))
- fix rds encryption check policy [\#1156](https://github.com/accurics/terrascan/pull/1156) ([gaurav-gogia](https://github.com/gaurav-gogia))
- Update mkdocs-material to 8.2.1 [\#1155](https://github.com/accurics/terrascan/pull/1155) ([pyup-bot](https://github.com/pyup-bot))
- Adds: missing release tag push step [\#1151](https://github.com/accurics/terrascan/pull/1151) ([Rchanger](https://github.com/Rchanger))
- Adding CFT scanning support for the resources: [\#1149](https://github.com/accurics/terrascan/pull/1149) ([shreyas-phansalkar-189](https://github.com/shreyas-phansalkar-189))
Expand Down Expand Up @@ -445,7 +445,7 @@

- Link to docks in README [\#944](https://github.com/accurics/terrascan/issues/944)
- Ensure remote modules are downloaded only once [\#936](https://github.com/accurics/terrascan/issues/936)
- Rule supression for specific resources [\#868](https://github.com/accurics/terrascan/issues/868)
- Rule suppression for specific resources [\#868](https://github.com/accurics/terrascan/issues/868)

**Merged pull requests:**

Expand Down Expand Up @@ -570,7 +570,7 @@

**Fixed bugs:**

- Azure AKS failling to check the network policy status. [\#789](https://github.com/accurics/terrascan/issues/789)
- Azure AKS failing to check the network policy status. [\#789](https://github.com/accurics/terrascan/issues/789)
- Scan for terraform doesn't error out if a module definition refers to a directory with no tf files [\#782](https://github.com/accurics/terrascan/issues/782)
- Wrong detection of MemoryRequestsCheck,CpuRequestsCheck,noReadinessProbe and nolivenessProbe policy in k8s Job spec [\#767](https://github.com/accurics/terrascan/issues/767)
- Update Docker build for terrascan to use numeric UID [\#766](https://github.com/accurics/terrascan/issues/766)
Expand All @@ -579,7 +579,7 @@
- tfplan should use resource address for id field [\#702](https://github.com/accurics/terrascan/issues/702)
- Rule IDs with spaces cannot be skipped [\#610](https://github.com/accurics/terrascan/issues/610)
- AWS.CloudFront.Network Security.Low.0568 Doesn't allow skipping due to space in filename [\#549](https://github.com/accurics/terrascan/issues/549)
- Error parsing syntax if using complex query for dynamic ip\_restriction in azurerm\_function\_app or azurerm\_app\_service ressource [\#433](https://github.com/accurics/terrascan/issues/433)
- Error parsing syntax if using complex query for dynamic ip\_restriction in azurerm\_function\_app or azurerm\_app\_service resource [\#433](https://github.com/accurics/terrascan/issues/433)

**Closed issues:**

Expand Down Expand Up @@ -633,7 +633,7 @@
- Adding Aws new policies cloudTrail [\#810](https://github.com/accurics/terrascan/pull/810) ([Avanti19](https://github.com/Avanti19))
- Feature/az id field [\#808](https://github.com/accurics/terrascan/pull/808) ([gaurav-gogia](https://github.com/gaurav-gogia))
- added support for sarif formatted violation reports [\#806](https://github.com/accurics/terrascan/pull/806) ([dev-gaur](https://github.com/dev-gaur))
- Adds support to scan config resources with applicable policies & Refactors filteration [\#803](https://github.com/accurics/terrascan/pull/803) ([patilpankaj212](https://github.com/patilpankaj212))
- Adds support to scan config resources with applicable policies & Refactors filtration [\#803](https://github.com/accurics/terrascan/pull/803) ([patilpankaj212](https://github.com/patilpankaj212))
- Adds: in-file instrumentation for resource prioritizing [\#802](https://github.com/accurics/terrascan/pull/802) ([Rchanger](https://github.com/Rchanger))
- shifted opa engine warning message to debug log level [\#800](https://github.com/accurics/terrascan/pull/800) ([dev-gaur](https://github.com/dev-gaur))
- fix: added validation for module local source dir [\#793](https://github.com/accurics/terrascan/pull/793) ([Rchanger](https://github.com/Rchanger))
Expand Down Expand Up @@ -690,16 +690,16 @@
- fix failing test [\#740](https://github.com/accurics/terrascan/pull/740) ([patilpankaj212](https://github.com/patilpankaj212))
- AWS policy pack update [\#737](https://github.com/accurics/terrascan/pull/737) ([harkirat22](https://github.com/harkirat22))
- Adding release checklist [\#734](https://github.com/accurics/terrascan/pull/734) ([jlk](https://github.com/jlk))
- Gh action terrscan\_atlantis release [\#733](https://github.com/accurics/terrascan/pull/733) ([dev-gaur](https://github.com/dev-gaur))
- adds agrocd integration dockerfile, scripts, doc and examples [\#732](https://github.com/accurics/terrascan/pull/732) ([Rchanger](https://github.com/Rchanger))
- Gh action terrascan\_atlantis release [\#733](https://github.com/accurics/terrascan/pull/733) ([dev-gaur](https://github.com/dev-gaur))
- adds argocd integration dockerfile, scripts, doc and examples [\#732](https://github.com/accurics/terrascan/pull/732) ([Rchanger](https://github.com/Rchanger))
- Fix NSG associations [\#727](https://github.com/accurics/terrascan/pull/727) ([xortim](https://github.com/xortim))
- changes for argocd integration [\#724](https://github.com/accurics/terrascan/pull/724) ([patilpankaj212](https://github.com/patilpankaj212))
- Update admission-controller-webhooks-usage.md [\#722](https://github.com/accurics/terrascan/pull/722) ([amirbenv](https://github.com/amirbenv))
- fix - \#718 [\#720](https://github.com/accurics/terrascan/pull/720) ([patilpankaj212](https://github.com/patilpankaj212))
- doc: add homebrew badge [\#714](https://github.com/accurics/terrascan/pull/714) ([chenrui333](https://github.com/chenrui333))
- update version [\#713](https://github.com/accurics/terrascan/pull/713) ([chenrui333](https://github.com/chenrui333))
- adds skipped tests for server file scan when file is k8s yaml [\#706](https://github.com/accurics/terrascan/pull/706) ([Rchanger](https://github.com/Rchanger))
- fixes infinte loop while local variable resolution [\#700](https://github.com/accurics/terrascan/pull/700) ([patilpankaj212](https://github.com/patilpankaj212))
- fixes infinite loop while local variable resolution [\#700](https://github.com/accurics/terrascan/pull/700) ([patilpankaj212](https://github.com/patilpankaj212))
- add terrascan atlantis container files, scripts and doc. [\#684](https://github.com/accurics/terrascan/pull/684) ([dev-gaur](https://github.com/dev-gaur))
- adds support to scan directory with all iac providers in cli mode [\#674](https://github.com/accurics/terrascan/pull/674) ([patilpankaj212](https://github.com/patilpankaj212))
- adds support to scan sub folders for terraform iac provider [\#640](https://github.com/accurics/terrascan/pull/640) ([patilpankaj212](https://github.com/patilpankaj212))
Expand Down Expand Up @@ -800,7 +800,7 @@
- Adds support for junit xml output [\#527](https://github.com/accurics/terrascan/pull/527)
- Adds e2e test scenarios for help and scan command [\#564](https://github.com/accurics/terrascan/pull/564)
- Adds e2e tests for api server [\#585](https://github.com/accurics/terrascan/pull/585)
- Please checkout our new [Github Action!](https://github.com/marketplace/actions/terrascan-iac-scanner)
- Please checkout our new [GitHub Action!](https://github.com/marketplace/actions/terrascan-iac-scanner)
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Brand


**Fixed bugs:**

Expand Down Expand Up @@ -855,7 +855,7 @@
**Closed issues:**

- How to get rid of "Anonymous, public read access to a container and its blobs can be enabled in Azure Blob storage. This is only recommended if absolutely necessary." [\#405](https://github.com/accurics/terrascan/issues/405)
- False Positive for accurics.azure.NS.161 when Security Groups Association and Subnets are defined indepently from VNet [\#391](https://github.com/accurics/terrascan/issues/391)
- False Positive for accurics.azure.NS.161 when Security Groups Association and Subnets are defined independently from VNet [\#391](https://github.com/accurics/terrascan/issues/391)
- Calico is not supported as a valid Network Security for azurerm\_kubernetes\_cluster [\#376](https://github.com/accurics/terrascan/issues/376)

**Merged pull requests:**
Expand Down Expand Up @@ -893,14 +893,14 @@

**Closed issues:**

- Custom Variable Validation no longer experiemental in 0.13 [\#500](https://github.com/accurics/terrascan/issues/500)
- Custom Variable Validation no longer experimental in 0.13 [\#500](https://github.com/accurics/terrascan/issues/500)

**Merged pull requests:**

- release v1.3.1 [\#508](https://github.com/accurics/terrascan/pull/508) ([kanchwala-yusuf](https://github.com/kanchwala-yusuf))
- fix dependencies that were breaking the darwin/arm64 build [\#507](https://github.com/accurics/terrascan/pull/507) ([williepaul](https://github.com/williepaul))
- support for terraform registry remote modules [\#505](https://github.com/accurics/terrascan/pull/505) ([patilpankaj212](https://github.com/patilpankaj212))
- Readme rule supression [\#503](https://github.com/accurics/terrascan/pull/503) ([amirbenv](https://github.com/amirbenv))
- Readme rule suppression [\#503](https://github.com/accurics/terrascan/pull/503) ([amirbenv](https://github.com/amirbenv))
- Bump github.com/hashicorp/go-retryablehttp from 0.6.6 to 0.6.8 [\#496](https://github.com/accurics/terrascan/pull/496) ([dependabot[bot]](https://github.com/apps/dependabot))
- Bump github.com/hashicorp/go-getter from 1.5.1 to 1.5.2 [\#495](https://github.com/accurics/terrascan/pull/495) ([dependabot[bot]](https://github.com/apps/dependabot))

Expand Down Expand Up @@ -1025,19 +1025,19 @@

**Closed issues:**

- Deep modules location mis-proccessed. [\#365](https://github.com/accurics/terrascan/issues/365)
- Deep modules location mis-processed. [\#365](https://github.com/accurics/terrascan/issues/365)
- 20MB binary file included in repo now [\#364](https://github.com/accurics/terrascan/issues/364)
- Private GitHub repositories are not recognized with version 3.0.0+ of GitHub provider [\#326](https://github.com/accurics/terrascan/issues/326)
- Terrascan -var-file=../another dir [\#144](https://github.com/accurics/terrascan/issues/144)
- Error in test\_aws\_security\_group\_inline\_rule\_open and test\_aws\_security\_group\_rule\_open [\#138](https://github.com/accurics/terrascan/issues/138)
- Intial setup after installation [\#136](https://github.com/accurics/terrascan/issues/136)
- Initial setup after installation [\#136](https://github.com/accurics/terrascan/issues/136)
- Add support for data sources [\#3](https://github.com/accurics/terrascan/issues/3)
- Support from modules [\#2](https://github.com/accurics/terrascan/issues/2)

**Merged pull requests:**

- Bring Go to 1.15 in Github Actions [\#384](https://github.com/accurics/terrascan/pull/384) ([gliptak](https://github.com/gliptak))
- Bring Go to 1.15 in Github Actions [\#383](https://github.com/accurics/terrascan/pull/383) ([gliptak](https://github.com/gliptak))
- Bring Go to 1.15 in GitHub Actions [\#384](https://github.com/accurics/terrascan/pull/384) ([gliptak](https://github.com/gliptak))
- Bring Go to 1.15 in GitHub Actions [\#383](https://github.com/accurics/terrascan/pull/383) ([gliptak](https://github.com/gliptak))
- fix a bug when rendering subcharts [\#381](https://github.com/accurics/terrascan/pull/381) ([williepaul](https://github.com/williepaul))
- Added kustomize support [\#378](https://github.com/accurics/terrascan/pull/378) ([dev-gaur](https://github.com/dev-gaur))
- Adds support for Helm v3 [\#377](https://github.com/accurics/terrascan/pull/377) ([williepaul](https://github.com/williepaul))
Expand Down Expand Up @@ -1081,7 +1081,7 @@

**Fixed bugs:**

- Oudated Docker image [\#294](https://github.com/accurics/terrascan/issues/294)
- Outdated Docker image [\#294](https://github.com/accurics/terrascan/issues/294)
- Error with XML output [\#290](https://github.com/accurics/terrascan/issues/290)
- Fixed checkIpForward rule \(gcp\) [\#323](https://github.com/accurics/terrascan/pull/323) ([williepaul](https://github.com/williepaul))

Expand Down
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -154,7 +154,7 @@ The `--find-vuln` flag can be used when scanning IaC files as follows:
$ terrascan scan -i <IaC provider> --find-vuln
```

For more information and explanation of how to setup your environment to authenticate with the registrie's APIs see the [usage](https://runterrascan.io/docs/usage/command_line_mode/) documentation.
For more information and explanation of how to setup your environment to authenticate with the registry's APIs see the [usage](https://runterrascan.io/docs/usage/command_line_mode/) documentation.

## Customizing scans

Expand Down
2 changes: 1 addition & 1 deletion docs/README.md
Original file line number Diff line number Diff line change
@@ -1,3 +1,3 @@
# Terrascan documentation

Documenation for terrascan lives at [runterrascan.io](www.runterrascan.io). Any updates or contributions to the documentation can be made in the [tenable/runterrascan.io](https://github.com/tenable/runterrascan.io) GitHub repository.
Documentation for terrascan lives at [runterrascan.io](www.runterrascan.io). Any updates or contributions to the documentation can be made in the [tenable/runterrascan.io](https://github.com/tenable/runterrascan.io) GitHub repository.
2 changes: 1 addition & 1 deletion docs/policies.md
Original file line number Diff line number Diff line change
Expand Up @@ -63,7 +63,7 @@ $ terrascan scan -i terraform --config-only -o json
```


You can use this `.json` output as the input in the [rego playgound](https://play.openpolicyagent.org/). The following policy can be used on the above Terraform to flag if the GitHub repository has been created with `private = false`.
You can use this `.json` output as the input in the [rego playground](https://play.openpolicyagent.org/). The following policy can be used on the above Terraform to flag if the GitHub repository has been created with `private = false`.

```
package accurics
Expand Down
8 changes: 4 additions & 4 deletions docs/policies/aws.md
Original file line number Diff line number Diff line change
Expand Up @@ -72,7 +72,7 @@
| Data Protection | RDS | MEDIUM | Ensure that your RDS database has IAM Authentication enabled. | AWS.RDS.DataSecurity.High.0577 | AC_AWS_0053 |
| Infrastructure Security | RDS | HIGH | RDS Instance publicly_accessible flag is true | AWS.RDS.NS.High.0101 | AC_AWS_0054 |
| Data Protection | RDS | HIGH | RDS Instance Auto Minor Version Upgrade flag disabled | AWS.RDS.DS.High.1041 | AC_AWS_0056 |
| Data Protection | RDS | HIGH | Ensure that your RDS database instances encrypt the underlying storage. Encrypted RDS instances use the industry standard AES-256 encryption algorithm to encrypt data on the server that hosts RDS DB instances. After data is encrypted, RDS handles authentication of access and descryption of data transparently with minimal impact on performance. | AWS.RDS.DataSecurity.High.0414 | AC_AWS_0058 |
| Data Protection | RDS | HIGH | Ensure that your RDS database instances encrypt the underlying storage. Encrypted RDS instances use the industry standard AES-256 encryption algorithm to encrypt data on the server that hosts RDS DB instances. After data is encrypted, RDS handles authentication of access and description of data transparently with minimal impact on performance. | AWS.RDS.DataSecurity.High.0414 | AC_AWS_0058 |


### aws_secretsmanager_secret_policy
Expand Down Expand Up @@ -198,7 +198,7 @@
| Category | Resource | Severity | Description | Reference ID | ID |
| -------- | -------- | -------- | ----------- | ------------ | -- |
| Infrastructure Security | EcsCluster | HIGH | Like any other EC2 instance it is recommended to place ECS instance within a VPC. AWS VPCs provides the controls to facilitate a formal process for approving and testing all network connections and changes to the firewall and router configurations | AWS.EcsCluster.NetworkSecurity.High.0104 | AC_AWS_0088 |
| Infrastructure Security | AETD | MEDIUM | Ensure EFS volume used for ECS task defination has in transit encryption enabled | AWS.AETD.IS.MEDIUM.0043 | AC_AWS_0463 |
| Infrastructure Security | AETD | MEDIUM | Ensure EFS volume used for ECS task definition has in transit encryption enabled | AWS.AETD.IS.MEDIUM.0043 | AC_AWS_0463 |
| Data Protection | LaunchConfiguration | HIGH | Sensitive Information Disclosure | AWS.LaunchConfiguration.DataSecurity.High.0101 | AC_AWS_0095 |


Expand Down Expand Up @@ -480,8 +480,8 @@
### aws_lambda_function
| Category | Resource | Severity | Description | Reference ID | ID |
| -------- | -------- | -------- | ----------- | ------------ | -- |
| Logging and Monitoring | LambdaFunction | MEDIUM | Ensure AWS Lambda function has policy attached. | AWS.LambdaFunction.LM.MEIDUM.0063 | AC_AWS_0484 |
| Infrastructure Security | LambdaFunction | LOW | Lambda function does not include a VPC configuration. | AWS.LambdaFunction.Logging.0472 | AC_AWS_0486 |
| Logging and Monitoring | LambdaFunction | MEDIUM | Ensure AWS Lambda function has policy attached. | AWS.LambdaFunction.LM.MEDIUM.0063 | AC_AWS_0484 |
| Infrastructure Security | LambdaFunction | Low | Lambda function does not include a VPC configuration. | AWS.LambdaFunction.Logging.0472 | AC_AWS_0486 |
| Logging and Monitoring | LambdaFunction | LOW | Lambda tracing is not enabled. | AWS.LambdaFunction.Logging.0470 | AC_AWS_0485 |
| Data Protection | LambdaFunction | HIGH | Lambda does not use KMS CMK key to protect environment variables. | AWS.LambdaFunction.EncryptionandKeyManagement.0471 | AC_AWS_0483 |
| Logging and Monitoring | LambdaFunction | LOW | Lambda tracing is not enabled. | AWS.LambdaFunction.Logging.0470 | AC_AWS_0163 |
Expand Down
2 changes: 1 addition & 1 deletion integrations/argocd/examples/presynchook-webhook.yml
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ spec:
type: RuntimeDefault
containers:
- name: terrascan-argocd
image: <CUSTOME PRESYNC HOOK IMAGE>
image: <CUSTOM PRESYNC HOOK IMAGE>
resources:
requests:
cpu: "1"
Expand Down
2 changes: 1 addition & 1 deletion integrations/argocd/examples/presynchook.yml
Original file line number Diff line number Diff line change
Expand Up @@ -30,7 +30,7 @@ spec:
name: known-hosts-config
containers:
- name: terrascan-argocd
image: <terrscan-image>
image: <terrascan-image>
resources:
requests:
cpu: "1"
Expand Down
2 changes: 1 addition & 1 deletion pkg/cli/run.go
Original file line number Diff line number Diff line change
Expand Up @@ -144,7 +144,7 @@ func (s *ScanOptions) Scan() error {
return nil
}

// Init initalises and validates ScanOptions
// Init initialises and validates ScanOptions
func (s *ScanOptions) Init() error {
s.initColor()
if err := s.validate(); err != nil {
Expand Down
2 changes: 1 addition & 1 deletion pkg/config/config-reader_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -80,7 +80,7 @@ func TestNewTerrascanConfigReader(t *testing.T) {
want: &TerrascanConfigReader{},
},
{
name: "non existent config file",
name: "nonexistent config file",
args: args{
fileName: "test",
},
Expand Down
2 changes: 1 addition & 1 deletion pkg/config/types.go
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@

package config

// Global initalizes GlobalConfig struct
// Global initializes GlobalConfig struct
var global *TerrascanConfig

// TerrascanConfig struct defines global variables/configurations across terrascan
Expand Down
Loading