@@ -85,6 +85,8 @@ func TestScanner_ScanConfig(t *testing.T) {
85
85
},
86
86
IacMetadata : types.IacMetadata {
87
87
Resource : "S3Bucket" ,
88
+ Provider : "AWS" ,
89
+ Service : "s3" ,
88
90
StartLine : 12 ,
89
91
EndLine : 24 ,
90
92
},
@@ -101,6 +103,8 @@ func TestScanner_ScanConfig(t *testing.T) {
101
103
References : []string {"https://cfsec.dev/docs/s3/no-public-access-with-acl/#s3" , "https://docs.aws.amazon.com/AmazonS3/latest/dev/ServerLogs.html" },
102
104
}, IacMetadata : types.IacMetadata {
103
105
Resource : "S3Bucket" ,
106
+ Provider : "AWS" ,
107
+ Service : "s3" ,
104
108
StartLine : 12 ,
105
109
EndLine : 24 ,
106
110
},
@@ -118,6 +122,8 @@ func TestScanner_ScanConfig(t *testing.T) {
118
122
},
119
123
IacMetadata : types.IacMetadata {
120
124
Resource : "S3Bucket" ,
125
+ Provider : "AWS" ,
126
+ Service : "s3" ,
121
127
StartLine : 12 ,
122
128
EndLine : 24 ,
123
129
},
@@ -137,8 +143,10 @@ func TestScanner_ScanConfig(t *testing.T) {
137
143
},
138
144
IacMetadata : types.IacMetadata {
139
145
Resource : "S3Bucket" ,
140
- StartLine : 12 ,
141
- EndLine : 24 ,
146
+ Provider : "AWS" ,
147
+ Service : "s3" ,
148
+ StartLine : 18 ,
149
+ EndLine : 18 ,
142
150
},
143
151
},
144
152
{
@@ -154,8 +162,10 @@ func TestScanner_ScanConfig(t *testing.T) {
154
162
},
155
163
IacMetadata : types.IacMetadata {
156
164
Resource : "S3Bucket" ,
157
- StartLine : 12 ,
158
- EndLine : 24 ,
165
+ Provider : "AWS" ,
166
+ Service : "s3" ,
167
+ StartLine : 19 ,
168
+ EndLine : 19 ,
159
169
},
160
170
},
161
171
{
@@ -171,7 +181,9 @@ func TestScanner_ScanConfig(t *testing.T) {
171
181
},
172
182
IacMetadata : types.IacMetadata {
173
183
Resource : "S3Bucket" ,
174
- StartLine : 12 ,
184
+ Provider : "AWS" ,
185
+ Service : "s3" ,
186
+ StartLine : 24 ,
175
187
EndLine : 24 ,
176
188
},
177
189
},
@@ -188,6 +200,8 @@ func TestScanner_ScanConfig(t *testing.T) {
188
200
},
189
201
IacMetadata : types.IacMetadata {
190
202
Resource : "S3Bucket" ,
203
+ Provider : "AWS" ,
204
+ Service : "s3" ,
191
205
StartLine : 12 ,
192
206
EndLine : 24 ,
193
207
},
@@ -205,6 +219,8 @@ func TestScanner_ScanConfig(t *testing.T) {
205
219
},
206
220
IacMetadata : types.IacMetadata {
207
221
Resource : "S3Bucket" ,
222
+ Provider : "AWS" ,
223
+ Service : "s3" ,
208
224
StartLine : 12 ,
209
225
EndLine : 24 ,
210
226
},
@@ -222,8 +238,10 @@ func TestScanner_ScanConfig(t *testing.T) {
222
238
},
223
239
IacMetadata : types.IacMetadata {
224
240
Resource : "S3Bucket" ,
225
- StartLine : 12 ,
226
- EndLine : 24 ,
241
+ Provider : "AWS" ,
242
+ Service : "s3" ,
243
+ StartLine : 21 ,
244
+ EndLine : 21 ,
227
245
},
228
246
},
229
247
},
@@ -253,6 +271,8 @@ func TestScanner_ScanConfig(t *testing.T) {
253
271
},
254
272
IacMetadata : types.IacMetadata {
255
273
Resource : "aws_security_group_rule.my-rule" ,
274
+ Provider : "AWS" ,
275
+ Service : "vpc" ,
256
276
StartLine : 1 ,
257
277
EndLine : 4 ,
258
278
},
@@ -268,6 +288,8 @@ func TestScanner_ScanConfig(t *testing.T) {
268
288
},
269
289
IacMetadata : types.IacMetadata {
270
290
Resource : "aws_security_group_rule.my-rule" ,
291
+ Provider : "AWS" ,
292
+ Service : "vpc" ,
271
293
StartLine : 1 ,
272
294
EndLine : 4 ,
273
295
},
@@ -283,6 +305,8 @@ func TestScanner_ScanConfig(t *testing.T) {
283
305
},
284
306
IacMetadata : types.IacMetadata {
285
307
Resource : "aws_security_group_rule.my-rule" ,
308
+ Provider : "General" ,
309
+ Service : "secrets" ,
286
310
StartLine : 1 ,
287
311
EndLine : 4 ,
288
312
},
@@ -298,6 +322,8 @@ func TestScanner_ScanConfig(t *testing.T) {
298
322
},
299
323
IacMetadata : types.IacMetadata {
300
324
Resource : "azurerm_managed_disk.source" ,
325
+ Provider : "General" ,
326
+ Service : "secrets" ,
301
327
StartLine : 10 ,
302
328
EndLine : 14 ,
303
329
},
@@ -313,6 +339,8 @@ func TestScanner_ScanConfig(t *testing.T) {
313
339
},
314
340
IacMetadata : types.IacMetadata {
315
341
Resource : "aws_security_group_rule.my-rule" ,
342
+ Provider : "General" ,
343
+ Service : "secrets" ,
316
344
StartLine : 1 ,
317
345
EndLine : 4 ,
318
346
},
@@ -328,6 +356,8 @@ func TestScanner_ScanConfig(t *testing.T) {
328
356
},
329
357
IacMetadata : types.IacMetadata {
330
358
Resource : "azurerm_managed_disk.source" ,
359
+ Provider : "General" ,
360
+ Service : "secrets" ,
331
361
StartLine : 10 ,
332
362
EndLine : 14 ,
333
363
},
@@ -344,6 +374,8 @@ func TestScanner_ScanConfig(t *testing.T) {
344
374
},
345
375
IacMetadata : types.IacMetadata {
346
376
Resource : "variable.enableEncryption" ,
377
+ Provider : "General" ,
378
+ Service : "secrets" ,
347
379
StartLine : 6 ,
348
380
EndLine : 8 ,
349
381
},
@@ -359,6 +391,8 @@ func TestScanner_ScanConfig(t *testing.T) {
359
391
},
360
392
IacMetadata : types.IacMetadata {
361
393
Resource : "variable.enableEncryption" ,
394
+ Provider : "General" ,
395
+ Service : "secrets" ,
362
396
StartLine : 6 ,
363
397
EndLine : 8 ,
364
398
},
@@ -375,14 +409,16 @@ func TestScanner_ScanConfig(t *testing.T) {
375
409
RecommendedActions : "Add descriptions for all security groups and rules" ,
376
410
Severity : "LOW" ,
377
411
References : []string {
378
- "https://tfsec.dev/docs/ aws/vpc/add-description-to-security-group#aws/vpc " ,
412
+ "https://aquasecurity.github.io/tfsec/latest/checks/ aws/vpc/add-description-to-security-group" ,
379
413
"https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group" ,
380
414
"https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule" ,
381
415
"https://www.cloudconformity.com/knowledge-base/aws/EC2/security-group-rules-description.html" ,
382
416
},
383
417
},
384
418
IacMetadata : types.IacMetadata {
385
419
Resource : "aws_security_group_rule.my-rule" ,
420
+ Provider : "AWS" ,
421
+ Service : "vpc" ,
386
422
StartLine : 1 ,
387
423
EndLine : 4 ,
388
424
},
@@ -397,13 +433,15 @@ func TestScanner_ScanConfig(t *testing.T) {
397
433
RecommendedActions : "Set a more restrictive cidr range" ,
398
434
Severity : "CRITICAL" ,
399
435
References : []string {
400
- "https://tfsec.dev/docs/ aws/vpc/no-public-ingress-sgr#aws/vpc " ,
436
+ "https://aquasecurity.github.io/tfsec/latest/checks/ aws/vpc/no-public-ingress-sgr" ,
401
437
"https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group_rule#cidr_blocks" ,
402
438
"https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/security-group-rules-reference.html" ,
403
439
},
404
440
},
405
441
IacMetadata : types.IacMetadata {
406
442
Resource : "aws_security_group_rule.my-rule" ,
443
+ Provider : "AWS" ,
444
+ Service : "vpc" ,
407
445
StartLine : 3 ,
408
446
EndLine : 3 ,
409
447
},
@@ -418,13 +456,15 @@ func TestScanner_ScanConfig(t *testing.T) {
418
456
RecommendedActions : "Enable encryption on managed disks" ,
419
457
Severity : "HIGH" ,
420
458
References : []string {
421
- "https://tfsec.dev/docs/ azure/compute/enable-disk-encryption#azure/compute " ,
459
+ "https://aquasecurity.github.io/tfsec/latest/checks/ azure/compute/enable-disk-encryption" ,
422
460
"https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/managed_disk" ,
423
461
"https://docs.microsoft.com/en-us/azure/virtual-machines/linux/disk-encryption" ,
424
462
},
425
463
},
426
464
IacMetadata : types.IacMetadata {
427
465
Resource : "azurerm_managed_disk.source" ,
466
+ Provider : "Azure" ,
467
+ Service : "compute" ,
428
468
StartLine : 12 ,
429
469
EndLine : 12 ,
430
470
},
0 commit comments