Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

reference ids with & and <space> fixed #845

Merged
merged 1 commit into from
Jun 8, 2021
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
"template_args": null,
"severity": "MEDIUM",
"description": "Enable AWS AMI Encryption",
"reference_id": "AWS.EC2.Encryption\u0026KeyManagement.Medium.0688",
"reference_id": "AWS.EC2.EncryptionandKeyManagement.Medium.0688",
"category": "Infrastructure Security",
"version": 1,
"id": "AC_AWS_0005"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
"template_args": null,
"severity": "MEDIUM",
"description": "Enable Detailed CloudWatch Metrics for APIs",
"reference_id": "AWS.API Gateway.Logging.Medium.0569",
"reference_id": "AWS.APIGateway.Logging.Medium.0569",
"category": "Logging and Monitoring",
"version": 2,
"id": "AC_AWS_0007"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
"template_args": null,
"severity": "MEDIUM",
"description": "API Gateway Private Endpoints",
"reference_id": "AWS.APIGateway.Network Security.Medium.0570",
"reference_id": "AWS.APIGateway.NetworkSecurity.Medium.0570",
"category": "Infrastructure Security",
"version": 1,
"id": "AC_AWS_0011"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
"template_args": null,
"severity": "MEDIUM",
"description": "Enable AWS CloudWatch Logs for APIs",
"reference_id": "AWS.API Gateway.Logging.Medium.0567",
"reference_id": "AWS.APIGateway.Logging.Medium.0567",
"category": "Logging and Monitoring",
"version": 1,
"id": "AC_AWS_0014"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
"template_args": null,
"severity": "LOW",
"description": "Ensure AWS API Gateway has active xray tracing enabled",
"reference_id": "AWS.API Gateway.Logging.Medium.0571",
"reference_id": "AWS.APIGateway.Logging.Medium.0571",
"category": "Logging and Monitoring",
"version": 2,
"id": "AC_AWS_0015"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure that AWS CloudWatch logs are enabled for all your APIs created with Amazon API Gateway service in order to track and analyze execution behavior at the API stage level.",
"reference_id": "AWS.API Gateway.Logging.Medium.0572",
"reference_id": "AWS.APIGateway.Logging.Medium.0572",
"category": "Logging and Monitoring",
"version": 2,
"id": "AC_AWS_0012"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
"template_args": null,
"severity": "MEDIUM",
"description": "Enable SSL Client Certificate",
"reference_id": "AWS.API Gateway.Network Security.Medium.0565",
"reference_id": "AWS.APIGateway.NetworkSecurity.Medium.0565",
"category": "Infrastructure Security",
"version": 1,
"id": "AC_AWS_0013"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
"template_args": null,
"severity": "MEDIUM",
"description": "Ensure AWS Config Rule is enabled for Encrypted Volumes",
"reference_id": "AWS.Config.Encryption\u0026KeyManagement.Medium.0660",
"reference_id": "AWS.Config.EncryptionandKeyManagement.Medium.0660",
"category": "Data Protection",
"version": 1,
"id": "AC_AWS_0048"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure that Amazon GuardDuty service is currently enabled in all regions in order to protect your AWS environment and infrastructure (AWS accounts and resources, IAM credentials, guest operating systems, applications, etc) against security threats. AWS GuardDuty is a managed threat detection service that continuously monitors your VPC flow logs, AWS CloudTrail event logs and DNS logs for malicious or unauthorized behavior. The service monitors for activity such as unusual API calls, potentially compromised EC2 instances or potentially unauthorized deployments that indicate a possible AWS account compromise. AWS GuardDuty operates entirely on Amazon Web Services infrastructure and does not affect the performance or reliability of your applications. The service does not require any software agents, sensors or network appliances.",
"reference_id": "AWS.GuardDuty Enabled.Security.Medium.0575",
"reference_id": "AWS.GuardDutyEnabled.Security.Medium.0575",
"category": "Logging and Monitoring",
"version": 2,
"id": "AC_AWS_0131"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure CloudWatch logging is enabled for Route53 hosted zones.",
"reference_id": "AWS.Route53 query logs.Logging.Medium.0574",
"reference_id": "AWS.Route53querylogs.Logging.Medium.0574",
"category": "Logging and Monitoring",
"version": 1,
"id": "AC_AWS_0204"
Expand Down