TerraGoat - Vulnerable Terraform Infrastructure

July 26, 2022 ยท View on GitHub

Maintained by Bridgecrew.io Infrastructure Tests CIS Azure CIS GCP CIS AWS PCI Terraform Version slack-community

TerraGoat is Bridgecrew's "Vulnerable by Design" Terraform repository. Terragoat

TerraGoat is Bridgecrew's "Vulnerable by Design" Terraform repository. TerraGoat is a learning and training project that demonstrates how common configuration errors can find their way into production cloud environments.

Table of Contents

Introduction

TerraGoat was built to enable DevSecOps design and implement a sustainable misconfiguration prevention strategy. It can be used to test a policy-as-code framework like Bridgecrew & Checkov, inline-linters, pre-commit hooks or other code scanning methods.

TerraGoat follows the tradition of existing *Goat projects that provide a baseline training ground to practice implementing secure development best practices for cloud infrastructure.

Important notes

Before you proceed please take a not of these warning:

:warning: TerraGoat creates intentionally vulnerable AWS resources into your account. DO NOT deploy TerraGoat in a production environment or alongside any sensitive AWS resources.

Requirements

  • Terraform 0.12
  • aws cli
  • azure cli

To prevent vulnerable infrastructure from arriving to production see: Bridgecrew & checkov, the open source static analysis tool for infrastructure as code.

Getting started

AWS Setup

Installation (AWS)

You can deploy multiple TerraGoat stacks in a single AWS account using the parameter TF_VAR_environment.

Create an S3 Bucket backend to keep Terraform state

export TERRAGOAT_STATE_BUCKET="mydevsecops-bucket"
export TF_VAR_company_name=acme
export TF_VAR_environment=mydevsecops
export TF_VAR_region="us-west-2"

aws s3api create-bucket --bucket $TERRAGOAT_STATE_BUCKET \
    --region $TF_VAR_region --create-bucket-configuration LocationConstraint=$TF_VAR_region

# Enable versioning
aws s3api put-bucket-versioning --bucket $TERRAGOAT_STATE_BUCKET --versioning-configuration Status=Enabled

# Enable encryption
aws s3api put-bucket-encryption --bucket $TERRAGOAT_STATE_BUCKET --server-side-encryption-configuration '{
  "Rules": [
    {
      "ApplyServerSideEncryptionByDefault": {
        "SSEAlgorithm": "aws:kms"
      }
    }
  ]
}'

Apply TerraGoat (AWS)

cd terraform/aws/
terraform init \
-backend-config="bucket=$TERRAGOAT_STATE_BUCKET" \
-backend-config="key=$TF_VAR_company_name-$TF_VAR_environment.tfstate" \
-backend-config="region=$TF_VAR_region"

terraform apply

Remove TerraGoat (AWS)

terraform destroy

Creating multiple TerraGoat AWS stacks

cd terraform/aws/
export TERRAGOAT_ENV=$TF_VAR_environment
export TERRAGOAT_STACKS_NUM=5
for i in $(seq 1 $TERRAGOAT_STACKS_NUM)
do
    export TF_VAR_environment=$TERRAGOAT_ENV$i
    terraform init \
    -backend-config="bucket=$TERRAGOAT_STATE_BUCKET" \
    -backend-config="key=$TF_VAR_company_name-$TF_VAR_environment.tfstate" \
    -backend-config="region=$TF_VAR_region"

    terraform apply -auto-approve
done

Deleting multiple TerraGoat stacks (AWS)

cd terraform/aws/
export TF_VAR_environment = $TERRAGOAT_ENV
for i in $(seq 1 $TERRAGOAT_STACKS_NUM)
do
    export TF_VAR_environment=$TERRAGOAT_ENV$i
    terraform init \
    -backend-config="bucket=$TERRAGOAT_STATE_BUCKET" \
    -backend-config="key=$TF_VAR_company_name-$TF_VAR_environment.tfstate" \
    -backend-config="region=$TF_VAR_region"

    terraform destroy -auto-approve
done

Azure Setup

Installation (Azure)

You can deploy multiple TerraGoat stacks in a single Azure subscription using the parameter TF_VAR_environment.

Create an Azure Storage Account backend to keep Terraform state

export TERRAGOAT_RESOURCE_GROUP="TerraGoatRG"
export TERRAGOAT_STATE_STORAGE_ACCOUNT="mydevsecopssa"
export TERRAGOAT_STATE_CONTAINER="mydevsecops"
export TF_VAR_environment="dev"
export TF_VAR_region="westus"

# Create resource group
az group create --location $TF_VAR_region --name $TERRAGOAT_RESOURCE_GROUP

# Create storage account
az storage account create --name $TERRAGOAT_STATE_STORAGE_ACCOUNT --resource-group $TERRAGOAT_RESOURCE_GROUP --location $TF_VAR_region --sku Standard_LRS --kind StorageV2 --https-only true --encryption-services blob

# Get storage account key
ACCOUNT_KEY=$(az storage account keys list --resource-group $TERRAGOAT_RESOURCE_GROUP --account-name $TERRAGOAT_STATE_STORAGE_ACCOUNT --query [0].value -o tsv)

# Create blob container
az storage container create --name $TERRAGOAT_STATE_CONTAINER --account-name $TERRAGOAT_STATE_STORAGE_ACCOUNT --account-key $ACCOUNT_KEY

Apply TerraGoat (Azure)

cd terraform/azure/
terraform init -reconfigure -backend-config="resource_group_name=$TERRAGOAT_RESOURCE_GROUP" \
    -backend-config "storage_account_name=$TERRAGOAT_STATE_STORAGE_ACCOUNT" \
    -backend-config="container_name=$TERRAGOAT_STATE_CONTAINER" \
    -backend-config "key=$TF_VAR_environment.terraform.tfstate"

terraform apply

Remove TerraGoat (Azure)

terraform destroy

GCP Setup

Installation (GCP)

You can deploy multiple TerraGoat stacks in a single GCP project using the parameter TF_VAR_environment.

Create a GCS backend to keep Terraform state

To use terraform, a Service Account and matching set of credentials are required. If they do not exist, they must be manually created for the relevant project. To create the Service Account:

  1. Sign into your GCP project, go to IAM > Service Accounts.
  2. Click the CREATE SERVICE ACCOUNT.
  3. Give a name to your service account (for example - terragoat) and click CREATE.
  4. Grant the Service Account the Project > Editor role and click CONTINUE.
  5. Click DONE.

To create the credentials:

  1. Sign into your GCP project, go to IAM > Service Accounts and click on the relevant Service Account.
  2. Click ADD KEY > Create new key > JSON and click CREATE. This will create a .json file and download it to your computer.

We recommend saving the key with a nicer name than the auto-generated one (i.e. terragoat_credentials.json), and storing the resulting JSON file inside terraform/gcp directory of terragoat. Once the credentials are set up, create the BE configuration as follows:

export TF_VAR_environment="dev"
export TF_TERRAGOAT_STATE_BUCKET=remote-state-bucket-terragoat
export TF_VAR_credentials_path=<PATH_TO_CREDNETIALS_FILE> # example: export TF_VAR_credentials_path=terragoat_credentials.json
export TF_VAR_project=<YOUR_PROJECT_NAME_HERE>

# Create storage bucket
gsutil mb gs://${TF_TERRAGOAT_STATE_BUCKET}

Apply TerraGoat (GCP)

cd terraform/gcp/
terraform init -reconfigure -backend-config="bucket=$TF_TERRAGOAT_STATE_BUCKET" \
    -backend-config "credentials=$TF_VAR_credentials_path" \
    -backend-config "prefix=terragoat/${TF_VAR_environment}"

terraform apply

Remove TerraGoat (GCP)

terraform destroy

Bridgecrew's IaC herd of goats

  • CfnGoat - Vulnerable by design Cloudformation template
  • TerraGoat - Vulnerable by design Terraform stack
  • CDKGoat - Vulnerable by design CDK application
  • kustomizegoat - Vulnerable by design kustomize deployment

Contributing

Contribution is welcomed!

We would love to hear about more ideas on how to find vulnerable infrastructure-as-code design patterns.

Support

Bridgecrew builds and maintains TerraGoat to encourage the adoption of policy-as-code.

If you need direct support you can contact us at info@bridgecrew.io.

Existing vulnerabilities (Auto-Generated)

terraform scan results:

check_idfileresourcecheck_nameguideline
0CKV_ALI_10/alicloud/bucket.tfalicloud_oss_bucket.bad_bucketEnsure OSS bucket has versioning enabled
1CKV_ALI_12/alicloud/bucket.tfalicloud_oss_bucket.bad_bucketEnsure the OSS bucket has access logging enabled
2CKV_ALI_11/alicloud/bucket.tfalicloud_oss_bucket.bad_bucketEnsure OSS bucket has transfer Acceleration enabled
3CKV_ALI_1/alicloud/bucket.tfalicloud_oss_bucket.bad_bucketAlibaba Cloud OSS bucket accessible to public
4CKV_ALI_6/alicloud/bucket.tfalicloud_oss_bucket.bad_bucketEnsure OSS bucket is encrypted with Customer Master Key
5CKV_ALI_36/alicloud/rds.tfalicloud_db_instance.seemeEnsure RDS instance has log_disconnections enabled
6CKV_ALI_37/alicloud/rds.tfalicloud_db_instance.seemeEnsure RDS instance has log_connections enabled
7CKV_ALI_34/alicloud/rds.tfalicloud_db_instance.seemeEnsure RDS instance is set to auto upgrade minor versions
8CKV_ALI_20/alicloud/rds.tfalicloud_db_instance.seemeEnsure RDS instance uses SSL
9CKV_ALI_30/alicloud/rds.tfalicloud_db_instance.seemeEnsure RDS instance auto upgrades for minor versions
10CKV_ALI_35/alicloud/rds.tfalicloud_db_instance.seemeEnsure RDS instance has log_duration enabled
11CKV_ALI_9/alicloud/rds.tfalicloud_db_instance.seemeEnsure database instance is not public
12CKV_ALI_25/alicloud/rds.tfalicloud_db_instance.seemeEnsure RDS Instance SQL Collector Retention Period should be greater than 180
13CKV_ALI_4/alicloud/trail.tfalicloud_actiontrail_trail.failEnsure Action Trail Logging for all regions
14CKV_ALI_5/alicloud/trail.tfalicloud_actiontrail_trail.failEnsure Action Trail Logging for all events
15CKV_ALI_10/alicloud/trail.tfalicloud_oss_bucket.trailEnsure OSS bucket has versioning enabled
16CKV_ALI_12/alicloud/trail.tfalicloud_oss_bucket.trailEnsure the OSS bucket has access logging enabled
17CKV_ALI_11/alicloud/trail.tfalicloud_oss_bucket.trailEnsure OSS bucket has transfer Acceleration enabled
18CKV_ALI_6/alicloud/trail.tfalicloud_oss_bucket.trailEnsure OSS bucket is encrypted with Customer Master Key
19CKV_AWS_157/aws/db-app.tfaws_db_instance.defaultEnsure that RDS instances have Multi-AZ enabledhttps://docs.bridgecrew.io/docs/general_73
20CKV_AWS_161/aws/db-app.tfaws_db_instance.defaultEnsure RDS database has IAM authentication enabledhttps://docs.bridgecrew.io/docs/ensure-rds-database-has-iam-authentication-enabled
21CKV_AWS_16/aws/db-app.tfaws_db_instance.defaultEnsure all data stored in the RDS is securely encrypted at resthttps://docs.bridgecrew.io/docs/general_4
22CKV_AWS_226/aws/db-app.tfaws_db_instance.defaultEnsure DB instance gets all minor upgrades automatically
23CKV_AWS_17/aws/db-app.tfaws_db_instance.defaultEnsure all data stored in RDS is not publicly accessiblehttps://docs.bridgecrew.io/docs/public_2
24CKV_AWS_118/aws/db-app.tfaws_db_instance.defaultEnsure that enhanced monitoring is enabled for Amazon RDS instanceshttps://docs.bridgecrew.io/docs/ensure-that-enhanced-monitoring-is-enabled-for-amazon-rds-instances
25CKV_AWS_129/aws/db-app.tfaws_db_instance.defaultEnsure that respective logs of Amazon Relational Database Service (Amazon RDS) are enabledhttps://docs.bridgecrew.io/docs/ensure-that-respective-logs-of-amazon-relational-database-service-amazon-rds-are-enabled
26CKV_AWS_133/aws/db-app.tfaws_db_instance.defaultEnsure that RDS instances has backup policyhttps://docs.bridgecrew.io/docs/ensure-that-rds-instances-have-backup-policy
27CKV_AWS_23/aws/db-app.tfaws_security_group.defaultEnsure every security groups rule has a descriptionhttps://docs.bridgecrew.io/docs/networking_31
28CKV_AWS_23/aws/db-app.tfaws_security_group_rule.ingressEnsure every security groups rule has a descriptionhttps://docs.bridgecrew.io/docs/networking_31
29CKV_AWS_23/aws/db-app.tfaws_security_group_rule.egressEnsure every security groups rule has a descriptionhttps://docs.bridgecrew.io/docs/networking_31
30CKV_AWS_79/aws/db-app.tfaws_instance.db_appEnsure Instance Metadata Service Version 1 is not enabledhttps://docs.bridgecrew.io/docs/bc_aws_general_31
31CKV_AWS_135/aws/db-app.tfaws_instance.db_appEnsure that EC2 is EBS optimizedhttps://docs.bridgecrew.io/docs/ensure-that-ec2-is-ebs-optimized
32CKV_AWS_8/aws/db-app.tfaws_instance.db_appEnsure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encryptedhttps://docs.bridgecrew.io/docs/general_13
33CKV_AWS_126/aws/db-app.tfaws_instance.db_appEnsure that detailed monitoring is enabled for EC2 instanceshttps://docs.bridgecrew.io/docs/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances
34CKV_AWS_79/aws/ec2.tfaws_instance.web_hostEnsure Instance Metadata Service Version 1 is not enabledhttps://docs.bridgecrew.io/docs/bc_aws_general_31
35CKV_AWS_135/aws/ec2.tfaws_instance.web_hostEnsure that EC2 is EBS optimizedhttps://docs.bridgecrew.io/docs/ensure-that-ec2-is-ebs-optimized
36CKV_AWS_8/aws/ec2.tfaws_instance.web_hostEnsure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encryptedhttps://docs.bridgecrew.io/docs/general_13
37CKV_AWS_46/aws/ec2.tfaws_instance.web_hostEnsure no hard-coded secrets exist in EC2 user datahttps://docs.bridgecrew.io/docs/bc_aws_secrets_1
38CKV_AWS_126/aws/ec2.tfaws_instance.web_hostEnsure that detailed monitoring is enabled for EC2 instanceshttps://docs.bridgecrew.io/docs/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances
39CKV_AWS_3/aws/ec2.tfaws_ebs_volume.web_host_storageEnsure all data stored in the EBS is securely encryptedhttps://docs.bridgecrew.io/docs/general_3-encrypt-eps-volume
40CKV_AWS_189/aws/ec2.tfaws_ebs_volume.web_host_storageEnsure EBS Volume is encrypted by KMS using a customer managed Key (CMK)https://docs.bridgecrew.io/docs/bc_aws_general_109
41CKV_AWS_23/aws/ec2.tfaws_security_group.web-nodeEnsure every security groups rule has a descriptionhttps://docs.bridgecrew.io/docs/networking_31
42CKV_AWS_260/aws/ec2.tfaws_security_group.web-nodeEnsure no security groups allow ingress from 0.0.0.0:0 to port 80
43CKV_AWS_24/aws/ec2.tfaws_security_group.web-nodeEnsure no security groups allow ingress from 0.0.0.0:0 to port 22https://docs.bridgecrew.io/docs/networking_1-port-security
44CKV_AWS_130/aws/ec2.tfaws_subnet.web_subnetEnsure VPC subnets do not assign public IP by defaulthttps://docs.bridgecrew.io/docs/ensure-vpc-subnets-do-not-assign-public-ip-by-default
45CKV_AWS_130/aws/ec2.tfaws_subnet.web_subnet2Ensure VPC subnets do not assign public IP by defaulthttps://docs.bridgecrew.io/docs/ensure-vpc-subnets-do-not-assign-public-ip-by-default
46CKV_AWS_136/aws/ecr.tfaws_ecr_repository.repositoryEnsure that ECR repositories are encrypted using KMShttps://docs.bridgecrew.io/docs/ensure-that-ecr-repositories-are-encrypted
47CKV_AWS_51/aws/ecr.tfaws_ecr_repository.repositoryEnsure ECR Image Tags are immutablehttps://docs.bridgecrew.io/docs/bc_aws_general_24
48CKV_AWS_163/aws/ecr.tfaws_ecr_repository.repositoryEnsure ECR image scanning on push is enabledhttps://docs.bridgecrew.io/docs/general_8
49CKV_AWS_130/aws/eks.tfaws_subnet.eks_subnet1Ensure VPC subnets do not assign public IP by defaulthttps://docs.bridgecrew.io/docs/ensure-vpc-subnets-do-not-assign-public-ip-by-default
50CKV_AWS_130/aws/eks.tfaws_subnet.eks_subnet2Ensure VPC subnets do not assign public IP by defaulthttps://docs.bridgecrew.io/docs/ensure-vpc-subnets-do-not-assign-public-ip-by-default
51CKV_AWS_39/aws/eks.tfaws_eks_cluster.eks_clusterEnsure Amazon EKS public endpoint disabledhttps://docs.bridgecrew.io/docs/bc_aws_kubernetes_2
52CKV_AWS_38/aws/eks.tfaws_eks_cluster.eks_clusterEnsure Amazon EKS public endpoint not accessible to 0.0.0.0/0https://docs.bridgecrew.io/docs/bc_aws_kubernetes_1
53CKV_AWS_37/aws/eks.tfaws_eks_cluster.eks_clusterEnsure Amazon EKS control plane logging enabled for all log typeshttps://docs.bridgecrew.io/docs/bc_aws_kubernetes_4
54CKV_AWS_58/aws/eks.tfaws_eks_cluster.eks_clusterEnsure EKS Cluster has Secrets Encryption Enabledhttps://docs.bridgecrew.io/docs/bc_aws_kubernetes_3
55CKV_AWS_127/aws/elb.tfaws_elb.weblbEnsure that Elastic Load Balancer(s) uses SSL certificates provided by AWS Certificate Managerhttps://docs.bridgecrew.io/docs/ensure-that-elastic-load-balancers-uses-ssl-certificates-provided-by-aws-certificate-manager
56CKV_AWS_92/aws/elb.tfaws_elb.weblbEnsure the ELB has access logging enabledhttps://docs.bridgecrew.io/docs/bc_aws_logging_23
57CKV_AWS_111/aws/es.tfaws_iam_policy_document.policyEnsure IAM policies does not allow write access without constraintshttps://docs.bridgecrew.io/docs/ensure-iam-policies-do-not-allow-write-access-without-constraint
58CKV_AWS_109/aws/es.tfaws_iam_policy_document.policyEnsure IAM policies does not allow permissions management / resource exposure without constraintshttps://docs.bridgecrew.io/docs/ensure-iam-policies-do-not-allow-permissions-management-resource-exposure-without-constraint
59CKV_AWS_137/aws/es.tfaws_elasticsearch_domain.monitoring-frameworkEnsure that Elasticsearch is configured inside a VPChttps://docs.bridgecrew.io/docs/ensure-that-elasticsearch-is-configured-inside-a-vpc
60CKV_AWS_247/aws/es.tfaws_elasticsearch_domain.monitoring-frameworkEnsure all data stored in the Elasticsearch is encrypted with a CMK
61CKV_AWS_248/aws/es.tfaws_elasticsearch_domain.monitoring-frameworkEnsure that Elasticsearch is not using the default Security Group
62CKV_AWS_228/aws/es.tfaws_elasticsearch_domain.monitoring-frameworkVerify Elasticsearch domain is using an up to date TLS policy
63CKV_AWS_84/aws/es.tfaws_elasticsearch_domain.monitoring-frameworkEnsure Elasticsearch Domain Logging is enabledhttps://docs.bridgecrew.io/docs/elasticsearch_7
64CKV_AWS_5/aws/es.tfaws_elasticsearch_domain.monitoring-frameworkEnsure all data stored in the Elasticsearch is securely encrypted at resthttps://docs.bridgecrew.io/docs/elasticsearch_3-enable-encryptionatrest
65CKV_AWS_7/aws/kms.tfaws_kms_key.logs_keyEnsure rotation for customer created CMKs is enabledhttps://docs.bridgecrew.io/docs/logging_8
66CKV_AWS_115/aws/lambda.tfaws_lambda_function.analysis_lambdaEnsure that AWS Lambda function is configured for function-level concurrent execution limithttps://docs.bridgecrew.io/docs/ensure-that-aws-lambda-function-is-configured-for-function-level-concurrent-execution-limit
67CKV_AWS_45/aws/lambda.tfaws_lambda_function.analysis_lambdaEnsure no hard-coded secrets exist in lambda environmenthttps://docs.bridgecrew.io/docs/bc_aws_secrets_3
68CKV_AWS_50/aws/lambda.tfaws_lambda_function.analysis_lambdaX-ray tracing is enabled for Lambdahttps://docs.bridgecrew.io/docs/bc_aws_serverless_4
69CKV_AWS_117/aws/lambda.tfaws_lambda_function.analysis_lambdaEnsure that AWS Lambda function is configured inside a VPChttps://docs.bridgecrew.io/docs/ensure-that-aws-lambda-function-is-configured-inside-a-vpc-1
70CKV_AWS_173/aws/lambda.tfaws_lambda_function.analysis_lambdaCheck encryption settings for Lambda environmental variablehttps://docs.bridgecrew.io/docs/bc_aws_serverless_5
71CKV_AWS_116/aws/lambda.tfaws_lambda_function.analysis_lambdaEnsure that AWS Lambda function is configured for a Dead Letter Queue(DLQ)https://docs.bridgecrew.io/docs/ensure-that-aws-lambda-function-is-configured-for-a-dead-letter-queue-dlq
72CKV_AWS_44/aws/neptune.tfaws_neptune_cluster.defaultEnsure Neptune storage is securely encryptedhttps://docs.bridgecrew.io/docs/general_18
73CKV_AWS_101/aws/neptune.tfaws_neptune_cluster.defaultEnsure Neptune logging is enabledhttps://docs.bridgecrew.io/docs/bc_aws_logging_24
74CKV_AWS_41/aws/providers.tfaws.plain_text_access_keys_providerEnsure no hard coded AWS access key and secret key exists in providerhttps://docs.bridgecrew.io/docs/bc_aws_secrets_5
75CKV_AWS_128/aws/rds.tfaws_rds_cluster.app1-rds-clusterEnsure that an Amazon RDS Clusters have AWS Identity and Access Management (IAM) authentication enabledhttps://docs.bridgecrew.io/docs/ensure-that-an-amazon-rds-clusters-have-iam-authentication-enabled
76CKV_AWS_139/aws/rds.tfaws_rds_cluster.app1-rds-clusterEnsure that RDS clusters have deletion protection enabledhttps://docs.bridgecrew.io/docs/ensure-that-rds-clusters-and-instances-have-deletion-protection-enabled
77CKV_AWS_96/aws/rds.tfaws_rds_cluster.app1-rds-clusterEnsure all data stored in Aurora is securely encrypted at resthttps://docs.bridgecrew.io/docs/bc_aws_general_38
78CKV_AWS_162/aws/rds.tfaws_rds_cluster.app1-rds-clusterEnsure RDS cluster has IAM authentication enabledhttps://docs.bridgecrew.io/docs/ensure-rds-cluster-has-iam-authentication-enabled
79CKV_AWS_133/aws/rds.tfaws_rds_cluster.app1-rds-clusterEnsure that RDS instances has backup policyhttps://docs.bridgecrew.io/docs/ensure-that-rds-instances-have-backup-policy
80CKV_AWS_128/aws/rds.tfaws_rds_cluster.app2-rds-clusterEnsure that an Amazon RDS Clusters have AWS Identity and Access Management (IAM) authentication enabledhttps://docs.bridgecrew.io/docs/ensure-that-an-amazon-rds-clusters-have-iam-authentication-enabled
81CKV_AWS_139/aws/rds.tfaws_rds_cluster.app2-rds-clusterEnsure that RDS clusters have deletion protection enabledhttps://docs.bridgecrew.io/docs/ensure-that-rds-clusters-and-instances-have-deletion-protection-enabled
82CKV_AWS_96/aws/rds.tfaws_rds_cluster.app2-rds-clusterEnsure all data stored in Aurora is securely encrypted at resthttps://docs.bridgecrew.io/docs/bc_aws_general_38
83CKV_AWS_162/aws/rds.tfaws_rds_cluster.app2-rds-clusterEnsure RDS cluster has IAM authentication enabledhttps://docs.bridgecrew.io/docs/ensure-rds-cluster-has-iam-authentication-enabled
84CKV_AWS_128/aws/rds.tfaws_rds_cluster.app3-rds-clusterEnsure that an Amazon RDS Clusters have AWS Identity and Access Management (IAM) authentication enabledhttps://docs.bridgecrew.io/docs/ensure-that-an-amazon-rds-clusters-have-iam-authentication-enabled
85CKV_AWS_139/aws/rds.tfaws_rds_cluster.app3-rds-clusterEnsure that RDS clusters have deletion protection enabledhttps://docs.bridgecrew.io/docs/ensure-that-rds-clusters-and-instances-have-deletion-protection-enabled
86CKV_AWS_96/aws/rds.tfaws_rds_cluster.app3-rds-clusterEnsure all data stored in Aurora is securely encrypted at resthttps://docs.bridgecrew.io/docs/bc_aws_general_38
87CKV_AWS_162/aws/rds.tfaws_rds_cluster.app3-rds-clusterEnsure RDS cluster has IAM authentication enabledhttps://docs.bridgecrew.io/docs/ensure-rds-cluster-has-iam-authentication-enabled
88CKV_AWS_128/aws/rds.tfaws_rds_cluster.app4-rds-clusterEnsure that an Amazon RDS Clusters have AWS Identity and Access Management (IAM) authentication enabledhttps://docs.bridgecrew.io/docs/ensure-that-an-amazon-rds-clusters-have-iam-authentication-enabled
89CKV_AWS_139/aws/rds.tfaws_rds_cluster.app4-rds-clusterEnsure that RDS clusters have deletion protection enabledhttps://docs.bridgecrew.io/docs/ensure-that-rds-clusters-and-instances-have-deletion-protection-enabled
90CKV_AWS_96/aws/rds.tfaws_rds_cluster.app4-rds-clusterEnsure all data stored in Aurora is securely encrypted at resthttps://docs.bridgecrew.io/docs/bc_aws_general_38
91CKV_AWS_162/aws/rds.tfaws_rds_cluster.app4-rds-clusterEnsure RDS cluster has IAM authentication enabledhttps://docs.bridgecrew.io/docs/ensure-rds-cluster-has-iam-authentication-enabled
92CKV_AWS_128/aws/rds.tfaws_rds_cluster.app5-rds-clusterEnsure that an Amazon RDS Clusters have AWS Identity and Access Management (IAM) authentication enabledhttps://docs.bridgecrew.io/docs/ensure-that-an-amazon-rds-clusters-have-iam-authentication-enabled
93CKV_AWS_139/aws/rds.tfaws_rds_cluster.app5-rds-clusterEnsure that RDS clusters have deletion protection enabledhttps://docs.bridgecrew.io/docs/ensure-that-rds-clusters-and-instances-have-deletion-protection-enabled
94CKV_AWS_96/aws/rds.tfaws_rds_cluster.app5-rds-clusterEnsure all data stored in Aurora is securely encrypted at resthttps://docs.bridgecrew.io/docs/bc_aws_general_38
95CKV_AWS_162/aws/rds.tfaws_rds_cluster.app5-rds-clusterEnsure RDS cluster has IAM authentication enabledhttps://docs.bridgecrew.io/docs/ensure-rds-cluster-has-iam-authentication-enabled
96CKV_AWS_128/aws/rds.tfaws_rds_cluster.app6-rds-clusterEnsure that an Amazon RDS Clusters have AWS Identity and Access Management (IAM) authentication enabledhttps://docs.bridgecrew.io/docs/ensure-that-an-amazon-rds-clusters-have-iam-authentication-enabled
97CKV_AWS_139/aws/rds.tfaws_rds_cluster.app6-rds-clusterEnsure that RDS clusters have deletion protection enabledhttps://docs.bridgecrew.io/docs/ensure-that-rds-clusters-and-instances-have-deletion-protection-enabled
98CKV_AWS_96/aws/rds.tfaws_rds_cluster.app6-rds-clusterEnsure all data stored in Aurora is securely encrypted at resthttps://docs.bridgecrew.io/docs/bc_aws_general_38
99CKV_AWS_162/aws/rds.tfaws_rds_cluster.app6-rds-clusterEnsure RDS cluster has IAM authentication enabledhttps://docs.bridgecrew.io/docs/ensure-rds-cluster-has-iam-authentication-enabled
100CKV_AWS_128/aws/rds.tfaws_rds_cluster.app7-rds-clusterEnsure that an Amazon RDS Clusters have AWS Identity and Access Management (IAM) authentication enabledhttps://docs.bridgecrew.io/docs/ensure-that-an-amazon-rds-clusters-have-iam-authentication-enabled
101CKV_AWS_139/aws/rds.tfaws_rds_cluster.app7-rds-clusterEnsure that RDS clusters have deletion protection enabledhttps://docs.bridgecrew.io/docs/ensure-that-rds-clusters-and-instances-have-deletion-protection-enabled
102CKV_AWS_96/aws/rds.tfaws_rds_cluster.app7-rds-clusterEnsure all data stored in Aurora is securely encrypted at resthttps://docs.bridgecrew.io/docs/bc_aws_general_38
103CKV_AWS_162/aws/rds.tfaws_rds_cluster.app7-rds-clusterEnsure RDS cluster has IAM authentication enabledhttps://docs.bridgecrew.io/docs/ensure-rds-cluster-has-iam-authentication-enabled
104CKV_AWS_128/aws/rds.tfaws_rds_cluster.app8-rds-clusterEnsure that an Amazon RDS Clusters have AWS Identity and Access Management (IAM) authentication enabledhttps://docs.bridgecrew.io/docs/ensure-that-an-amazon-rds-clusters-have-iam-authentication-enabled
105CKV_AWS_139/aws/rds.tfaws_rds_cluster.app8-rds-clusterEnsure that RDS clusters have deletion protection enabledhttps://docs.bridgecrew.io/docs/ensure-that-rds-clusters-and-instances-have-deletion-protection-enabled
106CKV_AWS_96/aws/rds.tfaws_rds_cluster.app8-rds-clusterEnsure all data stored in Aurora is securely encrypted at resthttps://docs.bridgecrew.io/docs/bc_aws_general_38
107CKV_AWS_162/aws/rds.tfaws_rds_cluster.app8-rds-clusterEnsure RDS cluster has IAM authentication enabledhttps://docs.bridgecrew.io/docs/ensure-rds-cluster-has-iam-authentication-enabled
108CKV_AWS_128/aws/rds.tfaws_rds_cluster.app9-rds-clusterEnsure that an Amazon RDS Clusters have AWS Identity and Access Management (IAM) authentication enabledhttps://docs.bridgecrew.io/docs/ensure-that-an-amazon-rds-clusters-have-iam-authentication-enabled
109CKV_AWS_139/aws/rds.tfaws_rds_cluster.app9-rds-clusterEnsure that RDS clusters have deletion protection enabledhttps://docs.bridgecrew.io/docs/ensure-that-rds-clusters-and-instances-have-deletion-protection-enabled
110CKV_AWS_96/aws/rds.tfaws_rds_cluster.app9-rds-clusterEnsure all data stored in Aurora is securely encrypted at resthttps://docs.bridgecrew.io/docs/bc_aws_general_38
111CKV_AWS_162/aws/rds.tfaws_rds_cluster.app9-rds-clusterEnsure RDS cluster has IAM authentication enabledhttps://docs.bridgecrew.io/docs/ensure-rds-cluster-has-iam-authentication-enabled
112CKV_AWS_186/aws/s3.tfaws_s3_bucket_object.data_objectEnsure S3 bucket Object is encrypted by KMS using a customer managed Key (CMK)https://docs.bridgecrew.io/docs/bc_aws_general_106
113CKV_AZURE_116/azure/aks.tfazurerm_kubernetes_cluster.k8s_clusterEnsure that AKS uses Azure Policies Add-onhttps://docs.bridgecrew.io/docs/ensure-that-aks-uses-azure-policies-add-on
114CKV_AZURE_8/azure/aks.tfazurerm_kubernetes_cluster.k8s_clusterEnsure Kubernetes Dashboard is disabledhttps://docs.bridgecrew.io/docs/bc_azr_kubernetes_5
115CKV_AZURE_4/azure/aks.tfazurerm_kubernetes_cluster.k8s_clusterEnsure AKS logging to Azure Monitoring is Configuredhttps://docs.bridgecrew.io/docs/bc_azr_kubernetes_1
116CKV_AZURE_117/azure/aks.tfazurerm_kubernetes_cluster.k8s_clusterEnsure that AKS uses disk encryption sethttps://docs.bridgecrew.io/docs/ensure-that-aks-uses-disk-encryption-set
117CKV_AZURE_115/azure/aks.tfazurerm_kubernetes_cluster.k8s_clusterEnsure that AKS enables private clustershttps://docs.bridgecrew.io/docs/ensure-that-aks-enables-private-clusters
118CKV_AZURE_141/azure/aks.tfazurerm_kubernetes_cluster.k8s_clusterEnsure AKS local admin account is disabled
119CKV_AZURE_7/azure/aks.tfazurerm_kubernetes_cluster.k8s_clusterEnsure AKS cluster has Network Policy configuredhttps://docs.bridgecrew.io/docs/bc_azr_kubernetes_4
120CKV_AZURE_6/azure/aks.tfazurerm_kubernetes_cluster.k8s_clusterEnsure AKS has an API Server Authorized IP Ranges enabledhttps://docs.bridgecrew.io/docs/bc_azr_kubernetes_3
121CKV_AZURE_5/azure/aks.tfazurerm_kubernetes_cluster.k8s_clusterEnsure RBAC is enabled on AKS clustershttps://docs.bridgecrew.io/docs/bc_azr_kubernetes_2
122CKV_AZURE_15/azure/app_service.tfazurerm_app_service.app-service1Ensure web app is using the latest version of TLS encryptionhttps://docs.bridgecrew.io/docs/bc_azr_networking_6
123CKV_AZURE_78/azure/app_service.tfazurerm_app_service.app-service1Ensure FTP deployments are disabledhttps://docs.bridgecrew.io/docs/ensure-ftp-deployments-are-disabled
124CKV_AZURE_18/azure/app_service.tfazurerm_app_service.app-service1Ensure that 'HTTP Version' is the latest if used to run the web apphttps://docs.bridgecrew.io/docs/bc_azr_networking_8
125CKV_AZURE_88/azure/app_service.tfazurerm_app_service.app-service1Ensure that app services use Azure Fileshttps://docs.bridgecrew.io/docs/ensure-that-app-services-use-azure-files
126CKV_AZURE_13/azure/app_service.tfazurerm_app_service.app-service1Ensure App Service Authentication is set on Azure App Servicehttps://docs.bridgecrew.io/docs/bc_azr_general_2
127CKV_AZURE_71/azure/app_service.tfazurerm_app_service.app-service1Ensure that Managed identity provider is enabled for app serviceshttps://docs.bridgecrew.io/docs/ensure-that-managed-identity-provider-is-enabled-for-app-services
128CKV_AZURE_80/azure/app_service.tfazurerm_app_service.app-service1Ensure that 'Net Framework' version is the latest, if used as a part of the web apphttps://docs.bridgecrew.io/docs/ensure-that-net-framework-version-is-the-latest-if-used-as-a-part-of-the-web-app
129CKV_AZURE_65/azure/app_service.tfazurerm_app_service.app-service1Ensure that App service enables detailed error messageshttps://docs.bridgecrew.io/docs/tbdensure-that-app-service-enables-detailed-error-messages
130CKV_AZURE_63/azure/app_service.tfazurerm_app_service.app-service1Ensure that App service enables HTTP logginghttps://docs.bridgecrew.io/docs/ensure-that-app-service-enables-http-logging
131CKV_AZURE_17/azure/app_service.tfazurerm_app_service.app-service1Ensure the web app has 'Client Certificates (Incoming client certificates)' sethttps://docs.bridgecrew.io/docs/bc_azr_networking_7
132CKV_AZURE_16/azure/app_service.tfazurerm_app_service.app-service1Ensure that Register with Azure Active Directory is enabled on App Servicehttps://docs.bridgecrew.io/docs/bc_azr_iam_1
133CKV_AZURE_66/azure/app_service.tfazurerm_app_service.app-service1Ensure that App service enables failed request tracinghttps://docs.bridgecrew.io/docs/ensure-that-app-service-enables-failed-request-tracing
134CKV_AZURE_14/azure/app_service.tfazurerm_app_service.app-service1Ensure web app redirects all HTTP traffic to HTTPS in Azure App Servicehttps://docs.bridgecrew.io/docs/bc_azr_networking_5
135CKV_AZURE_78/azure/app_service.tfazurerm_app_service.app-service2Ensure FTP deployments are disabledhttps://docs.bridgecrew.io/docs/ensure-ftp-deployments-are-disabled
136CKV_AZURE_18/azure/app_service.tfazurerm_app_service.app-service2Ensure that 'HTTP Version' is the latest if used to run the web apphttps://docs.bridgecrew.io/docs/bc_azr_networking_8
137CKV_AZURE_88/azure/app_service.tfazurerm_app_service.app-service2Ensure that app services use Azure Fileshttps://docs.bridgecrew.io/docs/ensure-that-app-services-use-azure-files
138CKV_AZURE_13/azure/app_service.tfazurerm_app_service.app-service2Ensure App Service Authentication is set on Azure App Servicehttps://docs.bridgecrew.io/docs/bc_azr_general_2
139CKV_AZURE_71/azure/app_service.tfazurerm_app_service.app-service2Ensure that Managed identity provider is enabled for app serviceshttps://docs.bridgecrew.io/docs/ensure-that-managed-identity-provider-is-enabled-for-app-services
140CKV_AZURE_80/azure/app_service.tfazurerm_app_service.app-service2Ensure that 'Net Framework' version is the latest, if used as a part of the web apphttps://docs.bridgecrew.io/docs/ensure-that-net-framework-version-is-the-latest-if-used-as-a-part-of-the-web-app
141CKV_AZURE_65/azure/app_service.tfazurerm_app_service.app-service2Ensure that App service enables detailed error messageshttps://docs.bridgecrew.io/docs/tbdensure-that-app-service-enables-detailed-error-messages
142CKV_AZURE_63/azure/app_service.tfazurerm_app_service.app-service2Ensure that App service enables HTTP logginghttps://docs.bridgecrew.io/docs/ensure-that-app-service-enables-http-logging
143CKV_AZURE_17/azure/app_service.tfazurerm_app_service.app-service2Ensure the web app has 'Client Certificates (Incoming client certificates)' sethttps://docs.bridgecrew.io/docs/bc_azr_networking_7
144CKV_AZURE_16/azure/app_service.tfazurerm_app_service.app-service2Ensure that Register with Azure Active Directory is enabled on App Servicehttps://docs.bridgecrew.io/docs/bc_azr_iam_1
145CKV_AZURE_66/azure/app_service.tfazurerm_app_service.app-service2Ensure that App service enables failed request tracinghttps://docs.bridgecrew.io/docs/ensure-that-app-service-enables-failed-request-tracing
146CKV_AZURE_1/azure/instance.tfazurerm_linux_virtual_machine.linux_machineEnsure Azure Instance does not use basic authentication(Use SSH Key Instead)https://docs.bridgecrew.io/docs/bc_azr_networking_1
147CKV_AZURE_50/azure/instance.tfazurerm_linux_virtual_machine.linux_machineEnsure Virtual Machine Extensions are not Installedhttps://docs.bridgecrew.io/docs/bc_azr_general_14
148CKV_AZURE_149/azure/instance.tfazurerm_linux_virtual_machine.linux_machineEnsure that Virtual machine does not enable password authentication
149CKV_AZURE_151/azure/instance.tfazurerm_windows_virtual_machine.windows_machineEnsure Windows VM enables encryption
150CKV_AZURE_50/azure/instance.tfazurerm_windows_virtual_machine.windows_machineEnsure Virtual Machine Extensions are not Installedhttps://docs.bridgecrew.io/docs/bc_azr_general_14
151CKV_AZURE_109/azure/key_vault.tfazurerm_key_vault.exampleEnsure that key vault allows firewall rules settingshttps://docs.bridgecrew.io/docs/ensure-that-key-vault-allows-firewall-rules-settings
152CKV_AZURE_42/azure/key_vault.tfazurerm_key_vault.exampleEnsure the key vault is recoverablehttps://docs.bridgecrew.io/docs/ensure-the-key-vault-is-recoverable
153CKV_AZURE_110/azure/key_vault.tfazurerm_key_vault.exampleEnsure that key vault enables purge protectionhttps://docs.bridgecrew.io/docs/ensure-that-key-vault-enables-purge-protection
154CKV_AZURE_112/azure/key_vault.tfazurerm_key_vault_key.generatedEnsure that key vault key is backed by HSMhttps://docs.bridgecrew.io/docs/ensure-that-key-vault-key-is-backed-by-hsm
155CKV_AZURE_40/azure/key_vault.tfazurerm_key_vault_key.generatedEnsure that the expiration date is set on all keyshttps://docs.bridgecrew.io/docs/set-an-expiration-date-on-all-keys
156CKV_AZURE_114/azure/key_vault.tfazurerm_key_vault_secret.secretEnsure that key vault secrets have "content_type" sethttps://docs.bridgecrew.io/docs/ensure-that-key-vault-secrets-have-content_type-set
157CKV_AZURE_41/azure/key_vault.tfazurerm_key_vault_secret.secretEnsure that the expiration date is set on all secretshttps://docs.bridgecrew.io/docs/set-an-expiration-date-on-all-secrets
158CKV_AZURE_38/azure/logging.tfazurerm_monitor_log_profile.logging_profileEnsure audit profile captures all the activitieshttps://docs.bridgecrew.io/docs/ensure-audit-profile-captures-all-activities
159CKV_AZURE_37/azure/logging.tfazurerm_monitor_log_profile.logging_profileEnsure that Activity Log Retention is set 365 days or greaterhttps://docs.bridgecrew.io/docs/set-activity-log-retention-to-365-days-or-greater
160CKV_AZURE_35/azure/mssql.tfazurerm_storage_account.security_storage_accountEnsure default network access rule for Storage Accounts is set to denyhttps://docs.bridgecrew.io/docs/set-default-network-access-rule-for-storage-accounts-to-deny
161CKV_AZURE_33/azure/mssql.tfazurerm_storage_account.security_storage_accountEnsure Storage logging is enabled for Queue service for read, write and delete requestshttps://docs.bridgecrew.io/docs/enable-requests-on-storage-logging-for-queue-service
162CKV_AZURE_44/azure/mssql.tfazurerm_storage_account.security_storage_accountEnsure Storage Account is using the latest version of TLS encryptionhttps://docs.bridgecrew.io/docs/bc_azr_storage_2
163CKV_AZURE_52/azure/mssql.tfazurerm_mssql_server.mssql1Ensure MSSQL is using the latest version of TLS encryptionhttps://docs.bridgecrew.io/docs/ensure-mssql-is-using-the-latest-version-of-tls-encryption
164CKV_AZURE_113/azure/mssql.tfazurerm_mssql_server.mssql1Ensure that SQL server disables public network accesshttps://docs.bridgecrew.io/docs/ensure-that-sql-server-disables-public-network-access
165CKV_AZURE_52/azure/mssql.tfazurerm_mssql_server.mssql2Ensure MSSQL is using the latest version of TLS encryptionhttps://docs.bridgecrew.io/docs/ensure-mssql-is-using-the-latest-version-of-tls-encryption
166CKV_AZURE_113/azure/mssql.tfazurerm_mssql_server.mssql2Ensure that SQL server disables public network accesshttps://docs.bridgecrew.io/docs/ensure-that-sql-server-disables-public-network-access
167CKV_AZURE_52/azure/mssql.tfazurerm_mssql_server.mssql3Ensure MSSQL is using the latest version of TLS encryptionhttps://docs.bridgecrew.io/docs/ensure-mssql-is-using-the-latest-version-of-tls-encryption
168CKV_AZURE_113/azure/mssql.tfazurerm_mssql_server.mssql3Ensure that SQL server disables public network accesshttps://docs.bridgecrew.io/docs/ensure-that-sql-server-disables-public-network-access
169CKV_AZURE_52/azure/mssql.tfazurerm_mssql_server.mssql4Ensure MSSQL is using the latest version of TLS encryptionhttps://docs.bridgecrew.io/docs/ensure-mssql-is-using-the-latest-version-of-tls-encryption
170CKV_AZURE_113/azure/mssql.tfazurerm_mssql_server.mssql4Ensure that SQL server disables public network accesshttps://docs.bridgecrew.io/docs/ensure-that-sql-server-disables-public-network-access
171CKV_AZURE_52/azure/mssql.tfazurerm_mssql_server.mssql5Ensure MSSQL is using the latest version of TLS encryptionhttps://docs.bridgecrew.io/docs/ensure-mssql-is-using-the-latest-version-of-tls-encryption
172CKV_AZURE_113/azure/mssql.tfazurerm_mssql_server.mssql5Ensure that SQL server disables public network accesshttps://docs.bridgecrew.io/docs/ensure-that-sql-server-disables-public-network-access
173CKV_AZURE_52/azure/mssql.tfazurerm_mssql_server.mssql6Ensure MSSQL is using the latest version of TLS encryptionhttps://docs.bridgecrew.io/docs/ensure-mssql-is-using-the-latest-version-of-tls-encryption
174CKV_AZURE_113/azure/mssql.tfazurerm_mssql_server.mssql6Ensure that SQL server disables public network accesshttps://docs.bridgecrew.io/docs/ensure-that-sql-server-disables-public-network-access
175CKV_AZURE_52/azure/mssql.tfazurerm_mssql_server.mssql7Ensure MSSQL is using the latest version of TLS encryptionhttps://docs.bridgecrew.io/docs/ensure-mssql-is-using-the-latest-version-of-tls-encryption
176CKV_AZURE_113/azure/mssql.tfazurerm_mssql_server.mssql7Ensure that SQL server disables public network accesshttps://docs.bridgecrew.io/docs/ensure-that-sql-server-disables-public-network-access
177CKV_AZURE_25/azure/mssql.tfazurerm_mssql_server_security_alert_policy.alertpolicy1Ensure that 'Threat Detection types' is set to 'All'https://docs.bridgecrew.io/docs/bc_azr_general_6
178CKV_AZURE_27/azure/mssql.tfazurerm_mssql_server_security_alert_policy.alertpolicy1Ensure that 'Email service and co-administrators' is 'Enabled' for MSSQL servershttps://docs.bridgecrew.io/docs/bc_azr_general_8
179CKV_AZURE_25/azure/mssql.tfazurerm_mssql_server_security_alert_policy.alertpolicy2Ensure that 'Threat Detection types' is set to 'All'https://docs.bridgecrew.io/docs/bc_azr_general_6
180CKV_AZURE_27/azure/mssql.tfazurerm_mssql_server_security_alert_policy.alertpolicy2Ensure that 'Email service and co-administrators' is 'Enabled' for MSSQL servershttps://docs.bridgecrew.io/docs/bc_azr_general_8
181CKV_AZURE_25/azure/mssql.tfazurerm_mssql_server_security_alert_policy.alertpolicy3Ensure that 'Threat Detection types' is set to 'All'https://docs.bridgecrew.io/docs/bc_azr_general_6
182CKV_AZURE_27/azure/mssql.tfazurerm_mssql_server_security_alert_policy.alertpolicy3Ensure that 'Email service and co-administrators' is 'Enabled' for MSSQL servershttps://docs.bridgecrew.io/docs/bc_azr_general_8
183CKV_AZURE_25/azure/mssql.tfazurerm_mssql_server_security_alert_policy.alertpolicy4Ensure that 'Threat Detection types' is set to 'All'https://docs.bridgecrew.io/docs/bc_azr_general_6
184CKV_AZURE_27/azure/mssql.tfazurerm_mssql_server_security_alert_policy.alertpolicy4Ensure that 'Email service and co-administrators' is 'Enabled' for MSSQL servershttps://docs.bridgecrew.io/docs/bc_azr_general_8
185CKV_AZURE_25/azure/mssql.tfazurerm_mssql_server_security_alert_policy.alertpolicy5Ensure that 'Threat Detection types' is set to 'All'https://docs.bridgecrew.io/docs/bc_azr_general_6
186CKV_AZURE_26/azure/mssql.tfazurerm_mssql_server_security_alert_policy.alertpolicy5Ensure that 'Send Alerts To' is enabled for MSSQL servershttps://docs.bridgecrew.io/docs/bc_azr_general_7
187CKV_AZURE_27/azure/mssql.tfazurerm_mssql_server_security_alert_policy.alertpolicy5Ensure that 'Email service and co-administrators' is 'Enabled' for MSSQL servershttps://docs.bridgecrew.io/docs/bc_azr_general_8
188CKV_AZURE_25/azure/mssql.tfazurerm_mssql_server_security_alert_policy.alertpolicy6Ensure that 'Threat Detection types' is set to 'All'https://docs.bridgecrew.io/docs/bc_azr_general_6
189CKV_AZURE_27/azure/mssql.tfazurerm_mssql_server_security_alert_policy.alertpolicy6Ensure that 'Email service and co-administrators' is 'Enabled' for MSSQL servershttps://docs.bridgecrew.io/docs/bc_azr_general_8
190CKV_AZURE_25/azure/mssql.tfazurerm_mssql_server_security_alert_policy.alertpolicy7Ensure that 'Threat Detection types' is set to 'All'https://docs.bridgecrew.io/docs/bc_azr_general_6
191CKV_AZURE_27/azure/mssql.tfazurerm_mssql_server_security_alert_policy.alertpolicy7Ensure that 'Email service and co-administrators' is 'Enabled' for MSSQL servershttps://docs.bridgecrew.io/docs/bc_azr_general_8
192CKV_AZURE_10/azure/networking.tfazurerm_network_security_group.bad_sgEnsure that SSH access is restricted from the internethttps://docs.bridgecrew.io/docs/bc_azr_networking_3
193CKV_AZURE_9/azure/networking.tfazurerm_network_security_group.bad_sgEnsure that RDP access is restricted from the internethttps://docs.bridgecrew.io/docs/bc_azr_networking_2
194CKV_AZURE_12/azure/networking.tfazurerm_network_watcher_flow_log.flow_logEnsure that Network Security Group Flow Log retention period is 'greater than 90 days'https://docs.bridgecrew.io/docs/bc_azr_logging_1
195CKV_AZURE_39/azure/roles.tfazurerm_role_definition.exampleEnsure that no custom subscription owner roles are createdhttps://docs.bridgecrew.io/docs/do-not-create-custom-subscription-owner-roles
196CKV_AZURE_19/azure/security_center.tfazurerm_security_center_subscription_pricing.pricingEnsure that standard pricing tier is selectedhttps://docs.bridgecrew.io/docs/ensure-standard-pricing-tier-is-selected
197CKV_AZURE_20/azure/security_center.tfazurerm_security_center_contact.contactEnsure that security contact 'Phone number' is sethttps://docs.bridgecrew.io/docs/bc_azr_general_3
198CKV_AZURE_22/azure/security_center.tfazurerm_security_center_contact.contactEnsure that 'Send email notification for high severity alerts' is set to 'On'https://docs.bridgecrew.io/docs/bc_azr_general_5
199CKV_AZURE_21/azure/security_center.tfazurerm_security_center_contact.contactEnsure that 'Send email notification for high severity alerts' is set to 'On'https://docs.bridgecrew.io/docs/bc_azr_general_4
200CKV_AZURE_25/azure/sql.tfazurerm_mssql_server_security_alert_policy.exampleEnsure that 'Threat Detection types' is set to 'All'https://docs.bridgecrew.io/docs/bc_azr_general_6
201CKV_AZURE_26/azure/sql.tfazurerm_mssql_server_security_alert_policy.exampleEnsure that 'Send Alerts To' is enabled for MSSQL servershttps://docs.bridgecrew.io/docs/bc_azr_general_7
202CKV_AZURE_27/azure/sql.tfazurerm_mssql_server_security_alert_policy.exampleEnsure that 'Email service and co-administrators' is 'Enabled' for MSSQL servershttps://docs.bridgecrew.io/docs/bc_azr_general_8
203CKV_AZURE_127/azure/sql.tfazurerm_mysql_server.exampleEnsure that My SQL server enables Threat detection policyhttps://docs.bridgecrew.io/docs/ensure-that-my-sql-server-enables-threat-detection-policy
204CKV_AZURE_94/azure/sql.tfazurerm_mysql_server.exampleEnsure that My SQL server enables geo-redundant backupshttps://docs.bridgecrew.io/docs/ensure-that-my-sql-server-enables-geo-redundant-backups
205CKV_AZURE_53/azure/sql.tfazurerm_mysql_server.exampleEnsure 'public network access enabled' is set to 'False' for mySQL servershttps://docs.bridgecrew.io/docs/ensure-public-network-access-enabled-is-set-to-false-for-mysql-servers
206CKV_AZURE_54/azure/sql.tfazurerm_mysql_server.exampleEnsure MySQL is using the latest version of TLS encryptionhttps://docs.bridgecrew.io/docs/ensure-mysql-is-using-the-latest-version-of-tls-encryption
207CKV_AZURE_28/azure/sql.tfazurerm_mysql_server.exampleEnsure 'Enforce SSL connection' is set to 'ENABLED' for MySQL Database Serverhttps://docs.bridgecrew.io/docs/bc_azr_networking_9
208CKV_AZURE_147/azure/sql.tfazurerm_postgresql_server.exampleEnsure PostgreSQL is using the latest version of TLS encryption
209CKV_AZURE_130/azure/sql.tfazurerm_postgresql_server.exampleEnsure that PostgreSQL server enables infrastructure encryptionhttps://docs.bridgecrew.io/docs/ensure-that-postgresql-server-enables-infrastructure-encryption
210CKV_AZURE_29/azure/sql.tfazurerm_postgresql_server.exampleEnsure 'Enforce SSL connection' is set to 'ENABLED' for PostgreSQL Database Serverhttps://docs.bridgecrew.io/docs/bc_azr_networking_10
211CKV_AZURE_128/azure/sql.tfazurerm_postgresql_server.exampleEnsure that PostgreSQL server enables Threat detection policyhttps://docs.bridgecrew.io/docs/ensure-that-postgresql-server-enables-threat-detection-policy
212CKV_AZURE_102/azure/sql.tfazurerm_postgresql_server.exampleEnsure that PostgreSQL server enables geo-redundant backupshttps://docs.bridgecrew.io/docs/ensure-that-postgresql-server-enables-geo-redundant-backups
213CKV_AZURE_68/azure/sql.tfazurerm_postgresql_server.exampleEnsure that PostgreSQL server disables public network accesshttps://docs.bridgecrew.io/docs/ensure-that-postgresql-server-disables-public-network-access
214CKV_AZURE_32/azure/sql.tfazurerm_postgresql_configuration.thrtottling_configEnsure server parameter 'connection_throttling' is set to 'ON' for PostgreSQL Database Serverhttps://docs.bridgecrew.io/docs/bc_azr_networking_13
215CKV_AZURE_30/azure/sql.tfazurerm_postgresql_configuration.exampleEnsure server parameter 'log_checkpoints' is set to 'ON' for PostgreSQL Database Serverhttps://docs.bridgecrew.io/docs/bc_azr_networking_11
216CKV_AZURE_2/azure/storage.tfazurerm_managed_disk.exampleEnsure Azure managed disk has encryption enabledhttps://docs.bridgecrew.io/docs/bc_azr_general_1
217CKV_AZURE_93/azure/storage.tfazurerm_managed_disk.exampleEnsure that managed disks use a specific set of disk encryption sets for the customer-managed key encryptionhttps://docs.bridgecrew.io/docs/ensure-that-managed-disks-use-a-specific-set-of-disk-encryption-sets-for-the-customer-managed-key-encryption
218CKV_AZURE_35/azure/storage.tfazurerm_storage_account.exampleEnsure default network access rule for Storage Accounts is set to denyhttps://docs.bridgecrew.io/docs/set-default-network-access-rule-for-storage-accounts-to-deny
219CKV_AZURE_3/azure/storage.tfazurerm_storage_account.exampleEnsure that 'Secure transfer required' is set to 'Enabled'
220CKV_AZURE_33/azure/storage.tfazurerm_storage_account.exampleEnsure Storage logging is enabled for Queue service for read, write and delete requestshttps://docs.bridgecrew.io/docs/enable-requests-on-storage-logging-for-queue-service
221CKV_AZURE_44/azure/storage.tfazurerm_storage_account.exampleEnsure Storage Account is using the latest version of TLS encryptionhttps://docs.bridgecrew.io/docs/bc_azr_storage_2
222CKV_AZURE_36/azure/storage.tfazurerm_storage_account_network_rules.testEnsure 'Trusted Microsoft Services' is enabled for Storage Account accesshttps://docs.bridgecrew.io/docs/enable-trusted-microsoft-services-for-storage-account-access
223CKV_GCP_6/gcp/big_data.tfgoogle_sql_database_instance.master_instanceEnsure all Cloud SQL database instance requires all incoming connections to use SSLhttps://docs.bridgecrew.io/docs/bc_gcp_general_1
224CKV_GCP_11/gcp/big_data.tfgoogle_sql_database_instance.master_instanceEnsure that Cloud SQL database Instances are not open to the worldhttps://docs.bridgecrew.io/docs/bc_gcp_networking_4
225CKV_GCP_79/gcp/big_data.tfgoogle_sql_database_instance.master_instanceEnsure SQL database is using latest Major version
226CKV_GCP_60/gcp/big_data.tfgoogle_sql_database_instance.master_instanceEnsure Cloud SQL database does not have public IPhttps://docs.bridgecrew.io/docs/bc_gcp_sql_11
227CKV_GCP_14/gcp/big_data.tfgoogle_sql_database_instance.master_instanceEnsure all Cloud SQL database instance have backup configuration enabledhttps://docs.bridgecrew.io/docs/bc_gcp_general_2
228CKV_GCP_15/gcp/big_data.tfgoogle_bigquery_dataset.datasetEnsure that BigQuery datasets are not anonymously or publicly accessiblehttps://docs.bridgecrew.io/docs/bc_gcp_general_3
229CKV_GCP_81/gcp/big_data.tfgoogle_bigquery_dataset.datasetEnsure Big Query Tables are encrypted with Customer Supplied Encryption Keys (CSEK)
230CKV_GCP_62/gcp/gcs.tfgoogle_storage_bucket.terragoat_websiteBucket should log accesshttps://docs.bridgecrew.io/docs/bc_gcp_logging_2
231CKV_GCP_78/gcp/gcs.tfgoogle_storage_bucket.terragoat_websiteEnsure Cloud storage has versioning enabled
232CKV_GCP_29/gcp/gcs.tfgoogle_storage_bucket.terragoat_websiteEnsure that Cloud Storage buckets have uniform bucket-level access enabledhttps://docs.bridgecrew.io/docs/bc_gcp_gcs_2
233CKV_GCP_28/gcp/gcs.tfgoogle_storage_bucket_iam_binding.allow_public_readEnsure that Cloud Storage bucket is not anonymously or publicly accessiblehttps://docs.bridgecrew.io/docs/bc_gcp_public_1
234CKV_GCP_70/gcp/gke.tfgoogle_container_cluster.workload_clusterEnsure the GKE Release Channel is sethttps://docs.bridgecrew.io/docs/ensure-the-gke-release-channel-is-set
235CKV_GCP_69/gcp/gke.tfgoogle_container_cluster.workload_clusterEnsure the GKE Metadata Server is Enabledhttps://docs.bridgecrew.io/docs/ensure-the-gke-metadata-server-is-enabled
236CKV_GCP_67/gcp/gke.tfgoogle_container_cluster.workload_clusterEnsure legacy Compute Engine instance metadata APIs are Disabledhttps://docs.bridgecrew.io/docs/ensure-legacy-compute-engine-instance-metadata-apis-are-disabled
237CKV_GCP_19/gcp/gke.tfgoogle_container_cluster.workload_clusterEnsure GKE basic auth is disabledhttps://docs.bridgecrew.io/docs/bc_gcp_kubernetes_11
238CKV_GCP_21/gcp/gke.tfgoogle_container_cluster.workload_clusterEnsure Kubernetes Clusters are configured with Labelshttps://docs.bridgecrew.io/docs/bc_gcp_kubernetes_13
239CKV_GCP_66/gcp/gke.tfgoogle_container_cluster.workload_clusterEnsure use of Binary Authorizationhttps://docs.bridgecrew.io/docs/ensure-use-of-binary-authorization
240CKV_GCP_61/gcp/gke.tfgoogle_container_cluster.workload_clusterEnable VPC Flow Logs and Intranode Visibilityhttps://docs.bridgecrew.io/docs/enable-vpc-flow-logs-and-intranode-visibility
241CKV_GCP_25/gcp/gke.tfgoogle_container_cluster.workload_clusterEnsure Kubernetes Cluster is created with Private cluster enabledhttps://docs.bridgecrew.io/docs/bc_gcp_kubernetes_6
242CKV_GCP_1/gcp/gke.tfgoogle_container_cluster.workload_clusterEnsure Stackdriver Logging is set to Enabled on Kubernetes Engine Clustershttps://docs.bridgecrew.io/docs/bc_gcp_kubernetes_1
243CKV_GCP_18/gcp/gke.tfgoogle_container_cluster.workload_clusterEnsure GKE Control Plane is not publichttps://docs.bridgecrew.io/docs/bc_gcp_kubernetes_10
244CKV_GCP_64/gcp/gke.tfgoogle_container_cluster.workload_clusterEnsure clusters are created with Private Nodeshttps://docs.bridgecrew.io/docs/ensure-clusters-are-created-with-private-nodes
245CKV_GCP_13/gcp/gke.tfgoogle_container_cluster.workload_clusterEnsure client certificate authentication to Kubernetes Engine Clusters is disabledhttps://docs.bridgecrew.io/docs/bc_gcp_kubernetes_8
246CKV_GCP_12/gcp/gke.tfgoogle_container_cluster.workload_clusterEnsure Network Policy is enabled on Kubernetes Engine Clustershttps://docs.bridgecrew.io/docs/bc_gcp_kubernetes_7
247CKV_GCP_65/gcp/gke.tfgoogle_container_cluster.workload_clusterManage Kubernetes RBAC users with Google Groups for GKEhttps://docs.bridgecrew.io/docs/manage-kubernetes-rbac-users-with-google-groups-for-gke
248CKV_GCP_24/gcp/gke.tfgoogle_container_cluster.workload_clusterEnsure PodSecurityPolicy controller is enabled on the Kubernetes Engine Clustershttps://docs.bridgecrew.io/docs/bc_gcp_kubernetes_9
249CKV_GCP_7/gcp/gke.tfgoogle_container_cluster.workload_clusterEnsure Legacy Authorization is set to Disabled on Kubernetes Engine Clustershttps://docs.bridgecrew.io/docs/bc_gcp_kubernetes_2
250CKV_GCP_23/gcp/gke.tfgoogle_container_cluster.workload_clusterEnsure Kubernetes Cluster is created with Alias IP ranges enabledhttps://docs.bridgecrew.io/docs/bc_gcp_kubernetes_15
251CKV_GCP_8/gcp/gke.tfgoogle_container_cluster.workload_clusterEnsure Stackdriver Monitoring is set to Enabled on Kubernetes Engine Clustershttps://docs.bridgecrew.io/docs/bc_gcp_kubernetes_3
252CKV_GCP_68/gcp/gke.tfgoogle_container_node_pool.custom_node_poolEnsure Secure Boot for Shielded GKE Nodes is Enabledhttps://docs.bridgecrew.io/docs/ensure-secure-boot-for-shielded-gke-nodes-is-enabled
253CKV_GCP_22/gcp/gke.tfgoogle_container_node_pool.custom_node_poolEnsure Container-Optimized OS (cos) is used for Kubernetes Engine Clusters Node imagehttps://docs.bridgecrew.io/docs/bc_gcp_kubernetes_14
254CKV_GCP_69/gcp/gke.tfgoogle_container_node_pool.custom_node_poolEnsure the GKE Metadata Server is Enabledhttps://docs.bridgecrew.io/docs/ensure-the-gke-metadata-server-is-enabled
255CKV_GCP_9/gcp/gke.tfgoogle_container_node_pool.custom_node_poolEnsure 'Automatic node repair' is enabled for Kubernetes Clustershttps://docs.bridgecrew.io/docs/bc_gcp_kubernetes_4
256CKV_GCP_10/gcp/gke.tfgoogle_container_node_pool.custom_node_poolEnsure 'Automatic node upgrade' is enabled for Kubernetes Clustershttps://docs.bridgecrew.io/docs/bc_gcp_kubernetes_5
257CKV_GCP_38/gcp/instances.tfgoogle_compute_instance.serverEnsure VM disks for critical VMs are encrypted with Customer Supplied Encryption Keys (CSEK)https://docs.bridgecrew.io/docs/encrypt-boot-disks-for-instances-with-cseks
258CKV_GCP_35/gcp/instances.tfgoogle_compute_instance.serverEnsure 'Enable connecting to serial ports' is not enabled for VM Instancehttps://docs.bridgecrew.io/docs/bc_gcp_networking_11
259CKV_GCP_40/gcp/instances.tfgoogle_compute_instance.serverEnsure that Compute instances do not have public IP addresseshttps://docs.bridgecrew.io/docs/bc_gcp_public_2
260CKV_GCP_34/gcp/instances.tfgoogle_compute_instance.serverEnsure that no instance in the project overrides the project setting for enabling OSLogin(OSLogin needs to be enabled in project metadata for all instances)https://docs.bridgecrew.io/docs/bc_gcp_networking_10
261CKV_GCP_30/gcp/instances.tfgoogle_compute_instance.serverEnsure that instances are not configured to use the default service accounthttps://docs.bridgecrew.io/docs/bc_gcp_iam_1
262CKV_GCP_36/gcp/instances.tfgoogle_compute_instance.serverEnsure that IP forwarding is not enabled on Instanceshttps://docs.bridgecrew.io/docs/bc_gcp_networking_12
263CKV_GCP_32/gcp/instances.tfgoogle_compute_instance.serverEnsure 'Block Project-wide SSH keys' is enabled for VM instanceshttps://docs.bridgecrew.io/docs/bc_gcp_networking_8
264CKV_GCP_39/gcp/instances.tfgoogle_compute_instance.serverEnsure Compute instances are launched with Shielded VM enabledhttps://docs.bridgecrew.io/docs/bc_gcp_general_y
265CKV_GCP_37/gcp/instances.tfgoogle_compute_disk.unencrypted_diskEnsure VM disks for critical VMs are encrypted with Customer Supplied Encryption Keys (CSEK)https://docs.bridgecrew.io/docs/bc_gcp_general_x
266CKV_GCP_74/gcp/networks.tfgoogle_compute_subnetwork.public-subnetworkEnsure that private_ip_google_access is enabled for Subnet
267CKV_GCP_26/gcp/networks.tfgoogle_compute_subnetwork.public-subnetworkEnsure that VPC Flow Logs is enabled for every subnet in a VPC Networkhttps://docs.bridgecrew.io/docs/bc_gcp_logging_1
268CKV_GCP_76/gcp/networks.tfgoogle_compute_subnetwork.public-subnetworkEnsure that Private google access is enabled for IPV6
269CKV_GCP_88/gcp/networks.tfgoogle_compute_firewall.allow_allEnsure Google compute firewall ingress does not allow unrestricted mysql access
270CKV_GCP_106/gcp/networks.tfgoogle_compute_firewall.allow_allEnsure Google compute firewall ingress does not allow unrestricted http port 80 access
271CKV_GCP_77/gcp/networks.tfgoogle_compute_firewall.allow_allEnsure Google compute firewall ingress does not allow on ftp port
272CKV_GCP_3/gcp/networks.tfgoogle_compute_firewall.allow_allEnsure Google compute firewall ingress does not allow unrestricted rdp accesshttps://docs.bridgecrew.io/docs/bc_gcp_networking_2
273CKV_GCP_75/gcp/networks.tfgoogle_compute_firewall.allow_allEnsure Google compute firewall ingress does not allow unrestricted FTP access
274CKV_GCP_2/gcp/networks.tfgoogle_compute_firewall.allow_allEnsure Google compute firewall ingress does not allow unrestricted ssh accesshttps://docs.bridgecrew.io/docs/bc_gcp_networking_1
275CKV_OCI_9/oracle/bucket.tfoci_objectstorage_bucket.secretsquirrelEnsure OCI Object Storage is encrypted with Customer Managed Keyhttps://docs.bridgecrew.io/docs/ensure-oci-object-storage-is-encrypted-with-customer-managed-key
276CKV_OCI_8/oracle/bucket.tfoci_objectstorage_bucket.secretsquirrelEnsure OCI Object Storage has versioning enabledhttps://docs.bridgecrew.io/docs/ensure-oci-object-storage-has-versioning-enabled
277CKV_OCI_7/oracle/bucket.tfoci_objectstorage_bucket.secretsquirrelEnsure OCI Object Storage bucket can emit object eventshttps://docs.bridgecrew.io/docs/ensure-oci-object-storage-bucket-can-emit-object-events
278CKV_OCI_10/oracle/bucket.tfoci_objectstorage_bucket.secretsquirrelEnsure OCI Object Storage is not Publichttps://docs.bridgecrew.io/docs/ensure-oci-object-storage-is-not-public
279CKV2_AWS_12/aws/eks.tfaws_vpc.eks_vpcEnsure the default security group of every VPC restricts all traffichttps://docs.bridgecrew.io/docs/networking_4
280CKV2_AWS_12/aws/ec2.tfaws_vpc.web_vpcEnsure the default security group of every VPC restricts all traffichttps://docs.bridgecrew.io/docs/networking_4
281CKV2_AWS_8/aws/rds.tfaws_rds_cluster.app8-rds-clusterEnsure that RDS clusters has backup plan of AWS Backuphttps://docs.bridgecrew.io/docs/ensure-that-rds-clusters-has-backup-plan-of-aws-backup
282CKV2_AWS_8/aws/rds.tfaws_rds_cluster.app4-rds-clusterEnsure that RDS clusters has backup plan of AWS Backuphttps://docs.bridgecrew.io/docs/ensure-that-rds-clusters-has-backup-plan-of-aws-backup
283CKV2_AWS_8/aws/rds.tfaws_rds_cluster.app7-rds-clusterEnsure that RDS clusters has backup plan of AWS Backuphttps://docs.bridgecrew.io/docs/ensure-that-rds-clusters-has-backup-plan-of-aws-backup
284CKV2_AWS_8/aws/rds.tfaws_rds_cluster.app1-rds-clusterEnsure that RDS clusters has backup plan of AWS Backuphttps://docs.bridgecrew.io/docs/ensure-that-rds-clusters-has-backup-plan-of-aws-backup
285CKV2_AWS_8/aws/rds.tfaws_rds_cluster.app3-rds-clusterEnsure that RDS clusters has backup plan of AWS Backuphttps://docs.bridgecrew.io/docs/ensure-that-rds-clusters-has-backup-plan-of-aws-backup
286CKV2_AWS_8/aws/rds.tfaws_rds_cluster.app9-rds-clusterEnsure that RDS clusters has backup plan of AWS Backuphttps://docs.bridgecrew.io/docs/ensure-that-rds-clusters-has-backup-plan-of-aws-backup
287CKV2_AWS_8/aws/rds.tfaws_rds_cluster.app5-rds-clusterEnsure that RDS clusters has backup plan of AWS Backuphttps://docs.bridgecrew.io/docs/ensure-that-rds-clusters-has-backup-plan-of-aws-backup
288CKV2_AWS_8/aws/rds.tfaws_rds_cluster.app6-rds-clusterEnsure that RDS clusters has backup plan of AWS Backuphttps://docs.bridgecrew.io/docs/ensure-that-rds-clusters-has-backup-plan-of-aws-backup
289CKV2_AWS_8/aws/rds.tfaws_rds_cluster.app2-rds-clusterEnsure that RDS clusters has backup plan of AWS Backuphttps://docs.bridgecrew.io/docs/ensure-that-rds-clusters-has-backup-plan-of-aws-backup
290CKV_AWS_145/aws/s3.tfaws_s3_bucket.financialsEnsure that S3 buckets are encrypted with KMS by defaulthttps://docs.bridgecrew.io/docs/ensure-that-s3-buckets-are-encrypted-with-kms-by-default
291CKV_AWS_145/aws/s3.tfaws_s3_bucket.data_scienceEnsure that S3 buckets are encrypted with KMS by defaulthttps://docs.bridgecrew.io/docs/ensure-that-s3-buckets-are-encrypted-with-kms-by-default
292CKV_AWS_145/aws/s3.tfaws_s3_bucket.dataEnsure that S3 buckets are encrypted with KMS by defaulthttps://docs.bridgecrew.io/docs/ensure-that-s3-buckets-are-encrypted-with-kms-by-default
293CKV_AWS_145/aws/ec2.tfaws_s3_bucket.flowbucketEnsure that S3 buckets are encrypted with KMS by defaulthttps://docs.bridgecrew.io/docs/ensure-that-s3-buckets-are-encrypted-with-kms-by-default
294CKV_AWS_145/aws/s3.tfaws_s3_bucket.operationsEnsure that S3 buckets are encrypted with KMS by defaulthttps://docs.bridgecrew.io/docs/ensure-that-s3-buckets-are-encrypted-with-kms-by-default
295CKV_AWS_18/aws/s3.tfaws_s3_bucket.financialsEnsure the S3 bucket has access logging enabledhttps://docs.bridgecrew.io/docs/s3_13-enable-logging
296CKV_AWS_18/aws/s3.tfaws_s3_bucket.dataEnsure the S3 bucket has access logging enabledhttps://docs.bridgecrew.io/docs/s3_13-enable-logging
297CKV_AWS_18/aws/ec2.tfaws_s3_bucket.flowbucketEnsure the S3 bucket has access logging enabledhttps://docs.bridgecrew.io/docs/s3_13-enable-logging
298CKV_AWS_18/aws/s3.tfaws_s3_bucket.operationsEnsure the S3 bucket has access logging enabledhttps://docs.bridgecrew.io/docs/s3_13-enable-logging
299CKV_AWS_18/aws/s3.tfaws_s3_bucket.logsEnsure the S3 bucket has access logging enabledhttps://docs.bridgecrew.io/docs/s3_13-enable-logging
300CKV2_AWS_11/aws/eks.tfaws_vpc.eks_vpcEnsure VPC flow logging is enabled in all VPCshttps://docs.bridgecrew.io/docs/logging_9-enable-vpc-flow-logging
301CKV2_AWS_2/aws/ec2.tfaws_ebs_volume.web_host_storageEnsure that only encrypted EBS volumes are attached to EC2 instanceshttps://docs.bridgecrew.io/docs/ensure-that-only-encrypted-ebs-volumes-are-attached-to-ec2-instances
302CKV2_AWS_6/aws/s3.tfaws_s3_bucket.financialsEnsure that S3 bucket has a Public Access blockhttps://docs.bridgecrew.io/docs/s3-bucket-should-have-public-access-blocks-defaults-to-false-if-the-public-access-block-is-not-attached
303CKV2_AWS_6/aws/s3.tfaws_s3_bucket.data_scienceEnsure that S3 bucket has a Public Access blockhttps://docs.bridgecrew.io/docs/s3-bucket-should-have-public-access-blocks-defaults-to-false-if-the-public-access-block-is-not-attached
304CKV2_AWS_6/aws/s3.tfaws_s3_bucket.dataEnsure that S3 bucket has a Public Access blockhttps://docs.bridgecrew.io/docs/s3-bucket-should-have-public-access-blocks-defaults-to-false-if-the-public-access-block-is-not-attached
305CKV2_AWS_6/aws/ec2.tfaws_s3_bucket.flowbucketEnsure that S3 bucket has a Public Access blockhttps://docs.bridgecrew.io/docs/s3-bucket-should-have-public-access-blocks-defaults-to-false-if-the-public-access-block-is-not-attached
306CKV2_AWS_6/aws/s3.tfaws_s3_bucket.operationsEnsure that S3 bucket has a Public Access blockhttps://docs.bridgecrew.io/docs/s3-bucket-should-have-public-access-blocks-defaults-to-false-if-the-public-access-block-is-not-attached
307CKV2_AWS_6/aws/s3.tfaws_s3_bucket.logsEnsure that S3 bucket has a Public Access blockhttps://docs.bridgecrew.io/docs/s3-bucket-should-have-public-access-blocks-defaults-to-false-if-the-public-access-block-is-not-attached
308CKV_AWS_21/aws/s3.tfaws_s3_bucket.financialsEnsure all data stored in the S3 bucket have versioning enabledhttps://docs.bridgecrew.io/docs/s3_16-enable-versioning
309CKV_AWS_21/aws/s3.tfaws_s3_bucket.dataEnsure all data stored in the S3 bucket have versioning enabledhttps://docs.bridgecrew.io/docs/s3_16-enable-versioning
310CKV_AWS_21/aws/ec2.tfaws_s3_bucket.flowbucketEnsure all data stored in the S3 bucket have versioning enabledhttps://docs.bridgecrew.io/docs/s3_16-enable-versioning
311CKV2_AZURE_7/azure/sql.tfazurerm_sql_server.exampleEnsure that Azure Active Directory Admin is configuredhttps://docs.bridgecrew.io/docs/ensure-that-azure-active-directory-admin-is-configured
312CKV2_AZURE_1/azure/storage.tfazurerm_storage_account.exampleEnsure storage for critical data are encrypted with Customer Managed Keyhttps://docs.bridgecrew.io/docs/ensure-storage-for-critical-data-are-encrypted-with-customer-managed-key
313CKV2_AZURE_1/azure/mssql.tfazurerm_storage_account.security_storage_accountEnsure storage for critical data are encrypted with Customer Managed Keyhttps://docs.bridgecrew.io/docs/ensure-storage-for-critical-data-are-encrypted-with-customer-managed-key
314CKV2_AZURE_16/azure/sql.tfazurerm_mysql_server.exampleEnsure that MySQL server enables customer-managed key for encryptionhttps://docs.bridgecrew.io/docs/ensure-that-mysql-server-enables-customer-managed-key-for-encryption
315CKV_AZURE_120/azure/application_gateway.tfazurerm_application_gateway.networkEnsure that Application Gateway enables WAFhttps://docs.bridgecrew.io/docs/ensure-that-application-gateway-enables-waf
316CKV_AWS_144/aws/s3.tfaws_s3_bucket.financialsEnsure that S3 bucket has cross-region replication enabledhttps://docs.bridgecrew.io/docs/ensure-that-s3-bucket-has-cross-region-replication-enabled
317CKV_AWS_144/aws/s3.tfaws_s3_bucket.data_scienceEnsure that S3 bucket has cross-region replication enabledhttps://docs.bridgecrew.io/docs/ensure-that-s3-bucket-has-cross-region-replication-enabled
318CKV_AWS_144/aws/s3.tfaws_s3_bucket.dataEnsure that S3 bucket has cross-region replication enabledhttps://docs.bridgecrew.io/docs/ensure-that-s3-bucket-has-cross-region-replication-enabled
319CKV_AWS_144/aws/ec2.tfaws_s3_bucket.flowbucketEnsure that S3 bucket has cross-region replication enabledhttps://docs.bridgecrew.io/docs/ensure-that-s3-bucket-has-cross-region-replication-enabled
320CKV_AWS_144/aws/s3.tfaws_s3_bucket.operationsEnsure that S3 bucket has cross-region replication enabledhttps://docs.bridgecrew.io/docs/ensure-that-s3-bucket-has-cross-region-replication-enabled
321CKV_AWS_144/aws/s3.tfaws_s3_bucket.logsEnsure that S3 bucket has cross-region replication enabledhttps://docs.bridgecrew.io/docs/ensure-that-s3-bucket-has-cross-region-replication-enabled
322CKV2_AZURE_18/azure/storage.tfazurerm_storage_account.exampleEnsure that Storage Accounts use customer-managed key for encryptionhttps://docs.bridgecrew.io/docs/ensure-that-storage-accounts-use-customer-managed-key-for-encryption
323CKV2_AZURE_18/azure/mssql.tfazurerm_storage_account.security_storage_accountEnsure that Storage Accounts use customer-managed key for encryptionhttps://docs.bridgecrew.io/docs/ensure-that-storage-accounts-use-customer-managed-key-for-encryption
324CKV_AWS_19/aws/s3.tfaws_s3_bucket.financialsEnsure all data stored in the S3 bucket is securely encrypted at resthttps://docs.bridgecrew.io/docs/s3_14-data-encrypted-at-rest
325CKV_AWS_19/aws/s3.tfaws_s3_bucket.data_scienceEnsure all data stored in the S3 bucket is securely encrypted at resthttps://docs.bridgecrew.io/docs/s3_14-data-encrypted-at-rest
326CKV_AWS_19/aws/s3.tfaws_s3_bucket.dataEnsure all data stored in the S3 bucket is securely encrypted at resthttps://docs.bridgecrew.io/docs/s3_14-data-encrypted-at-rest
327CKV_AWS_19/aws/ec2.tfaws_s3_bucket.flowbucketEnsure all data stored in the S3 bucket is securely encrypted at resthttps://docs.bridgecrew.io/docs/s3_14-data-encrypted-at-rest
328CKV_AWS_19/aws/s3.tfaws_s3_bucket.operationsEnsure all data stored in the S3 bucket is securely encrypted at resthttps://docs.bridgecrew.io/docs/s3_14-data-encrypted-at-rest
329CKV_AZURE_24/azure/sql.tfazurerm_sql_server.exampleEnsure that 'Auditing' Retention is 'greater than 90 days' for SQL servershttps://docs.bridgecrew.io/docs/bc_azr_logging_3
330CKV_AZURE_24/azure/mssql.tfazurerm_mssql_server.mssql5Ensure that 'Auditing' Retention is 'greater than 90 days' for SQL servershttps://docs.bridgecrew.io/docs/bc_azr_logging_3
331CKV_AZURE_24/azure/mssql.tfazurerm_mssql_server.mssql1Ensure that 'Auditing' Retention is 'greater than 90 days' for SQL servershttps://docs.bridgecrew.io/docs/bc_azr_logging_3
332CKV_AZURE_24/azure/mssql.tfazurerm_mssql_server.mssql6Ensure that 'Auditing' Retention is 'greater than 90 days' for SQL servershttps://docs.bridgecrew.io/docs/bc_azr_logging_3
333CKV_AZURE_24/azure/mssql.tfazurerm_mssql_server.mssql2Ensure that 'Auditing' Retention is 'greater than 90 days' for SQL servershttps://docs.bridgecrew.io/docs/bc_azr_logging_3
334CKV_AZURE_24/azure/mssql.tfazurerm_mssql_server.mssql4Ensure that 'Auditing' Retention is 'greater than 90 days' for SQL servershttps://docs.bridgecrew.io/docs/bc_azr_logging_3
335CKV_AZURE_24/azure/mssql.tfazurerm_mssql_server.mssql7Ensure that 'Auditing' Retention is 'greater than 90 days' for SQL servershttps://docs.bridgecrew.io/docs/bc_azr_logging_3
336CKV_AZURE_24/azure/mssql.tfazurerm_mssql_server.mssql3Ensure that 'Auditing' Retention is 'greater than 90 days' for SQL servershttps://docs.bridgecrew.io/docs/bc_azr_logging_3
337CKV_AZURE_23/azure/sql.tfazurerm_sql_server.exampleEnsure that 'Auditing' is set to 'On' for SQL servershttps://docs.bridgecrew.io/docs/bc_azr_logging_2
338CKV_AZURE_23/azure/mssql.tfazurerm_mssql_server.mssql5Ensure that 'Auditing' is set to 'On' for SQL servershttps://docs.bridgecrew.io/docs/bc_azr_logging_2
339CKV_AZURE_23/azure/mssql.tfazurerm_mssql_server.mssql1Ensure that 'Auditing' is set to 'On' for SQL servershttps://docs.bridgecrew.io/docs/bc_azr_logging_2
340CKV_AZURE_23/azure/mssql.tfazurerm_mssql_server.mssql6Ensure that 'Auditing' is set to 'On' for SQL servershttps://docs.bridgecrew.io/docs/bc_azr_logging_2
341CKV_AZURE_23/azure/mssql.tfazurerm_mssql_server.mssql2Ensure that 'Auditing' is set to 'On' for SQL servershttps://docs.bridgecrew.io/docs/bc_azr_logging_2
342CKV_AZURE_23/azure/mssql.tfazurerm_mssql_server.mssql4Ensure that 'Auditing' is set to 'On' for SQL servershttps://docs.bridgecrew.io/docs/bc_azr_logging_2
343CKV_AZURE_23/azure/mssql.tfazurerm_mssql_server.mssql7Ensure that 'Auditing' is set to 'On' for SQL servershttps://docs.bridgecrew.io/docs/bc_azr_logging_2
344CKV_AZURE_23/azure/mssql.tfazurerm_mssql_server.mssql3Ensure that 'Auditing' is set to 'On' for SQL servershttps://docs.bridgecrew.io/docs/bc_azr_logging_2

dockerfile scan results:

check_idfileresourcecheck_nameguideline
0CKV_DOCKER_3/aws/resources/Dockerfile/aws/resources/Dockerfile.Ensure that a user for the container has been createdhttps://docs.bridgecrew.io/docs/ensure-that-a-user-for-the-container-has-been-created
1CKV_DOCKER_2/aws/resources/Dockerfile/aws/resources/Dockerfile.Ensure that HEALTHCHECK instructions have been added to container imageshttps://docs.bridgecrew.io/docs/ensure-that-healthcheck-instructions-have-been-added-to-container-images

secrets scan results:

check_idfileresourcecheck_nameguideline
0CKV_SECRET_2/aws/lambda.tf25910f981e85ca04baf359199dd0bd4a3ae738b6AWS Access Keyhttps://docs.bridgecrew.io/docs/git_secrets_2
1CKV_SECRET_6/aws/lambda.tfd70eab08607a4d05faa2d0d6647206599e9abc65Base64 High Entropy Stringhttps://docs.bridgecrew.io/docs/git_secrets_6
2CKV_SECRET_2/aws/providers.tf25910f981e85ca04baf359199dd0bd4a3ae738b6AWS Access Keyhttps://docs.bridgecrew.io/docs/git_secrets_2
3CKV_SECRET_6/aws/providers.tfd70eab08607a4d05faa2d0d6647206599e9abc65Base64 High Entropy Stringhttps://docs.bridgecrew.io/docs/git_secrets_6
4CKV_SECRET_6/azure/sql.tfa57ae0fe47084bc8a05f69f3f8083896f8b437b0Base64 High Entropy Stringhttps://docs.bridgecrew.io/docs/git_secrets_6