SSH
keys TF-AZU005Passwords can be brute-forced, are prone to human error with possibitlies of weak password creation. Moreover password policies may be frustrating. Using SSH keys reduces the brute force attack vector to significant degrees.
/0
TF-GCP003Firewall source IPs must be restrictive. Specifying a non restrictive IP range allows your infrastructure to send traffic to unauthorized IP ranges. Specify a restrictive source IP range in the source_ranges attribute. Refer https://cloud.google.com/vpc/docs/using-firewalls for an overview.
#
for comments TF-L0040The Terraform language supports two different syntaxes for single-line comments: #
and //
. However, #
is the default comment style and should be used in most cases. Ref: Configuration Syntax: Comments.
Value provided in engine_type
for AWS MQ is not valid. Please check AWS Broker Engine Types for vilid values.
/0
TF-AWS006Opening up unwanted CIDR ranges to the public internet is generally to be avoided.
/0
TF-AWS007Opening up unwanted CIDR ranges to connect out to the public internet is generally to be avoided.
Warns against to prevent accidental exposure of internal assets.
/0
TF-AWS008Opening up unwanted CIDR ranges to the public internet is generally to be avoided.
/0
TF-AWS009Opening up unwanted CIDR ranges to the public internet is generally to be avoided.
It is not recommended to use outdated/insecure TLS versions for encryption.
Database resources should not publicly available.
You should not make secrets available to a user in plaintext in any scenario.
Blocks devices should be encrypted to ensure sensitive data is stored securely at rest.
Queues should be encrypted with customer managed KMS keys and not default AWS managed keys, in order to allow granular control over access to specific queues.
Queues should be encrypted with customer managed KMS keys and not default AWS managed keys, in order to allow granular control over access to specific queues.
S3 Buckets should be encrypted with customer managed KMS keys and not default AWS managed keys, in order to allow granular control over access to specific buckets.
Security groups and security group rules should include a description for auditing purposes.
/0
TF-AZU001Firewall source IPs must be restrictive. Specifying a non restrictive IP range allows your infrastructure to send traffic to unauthorized IP ranges. Specify a restrictive source IP range in the source_addresses attribute. Refer https://docs.microsoft.com/en-us/azure/firewall/overview for an overview.
Buckets should have logging enabled so that access can be audited.
AWS Classic resources run in a shared environment with infrastructure owned by other AWS customers.