Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bridgecrew fix config: /packages/sub/pom.xml and 179 more #5

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

bridgecrew-dev[bot]
Copy link

Bridgecrew has created this PR to fix supply chain risks found in the files of this project.

Changes included in this PR:

  • /packages/sub/pom.xml
  • /packages/pom.xml
  • /packages/requirements.txt
  • /packages/sub/.hidden/requirements.txt
  • /terraform/gcp/gke.tf:google_container_node_pool.custom_node_pool
  • /terraform/gcp/gke.tf:google_container_node_pool.custom_node_pool
  • /terraform/gcp/gke.tf:google_container_node_pool.custom_node_pool
  • /terraform/aws/s3.tf:aws_s3_bucket.financials
  • /terraform/aws/s3.tf:aws_s3_bucket.financials
  • /terraform/gcp/networks.tf:google_compute_subnetwork.public-subnetwork
  • /terraform/gcp/networks.tf:google_compute_subnetwork.public-subnetwork
  • /terraform/azure/sql.tf:azurerm_mssql_server_security_alert_policy.example
  • /terraform/azure/mssql.tf:azurerm_mssql_server_security_alert_policy.alertpolicy1
  • /terraform/azure/mssql.tf:azurerm_mssql_server_security_alert_policy.alertpolicy2
  • /terraform/azure/mssql.tf:azurerm_mssql_server_security_alert_policy.alertpolicy3
  • /terraform/azure/mssql.tf:azurerm_mssql_server_security_alert_policy.alertpolicy4
  • /terraform/azure/mssql.tf:azurerm_mssql_server_security_alert_policy.alertpolicy5
  • /terraform/azure/mssql.tf:azurerm_mssql_server_security_alert_policy.alertpolicy6
  • /terraform/azure/mssql.tf:azurerm_mssql_server_security_alert_policy.alertpolicy7
  • /terraform/aws/ec2.tf:aws_subnet.web_subnet
  • /terraform/aws/ec2.tf:aws_subnet.web_subnet2
  • /terraform/aws/eks.tf:aws_subnet.eks_subnet1
  • /terraform/aws/eks.tf:aws_subnet.eks_subnet2
  • /terraform/azure/key_vault.tf:azurerm_key_vault_key.generated
  • /terraform/azure/mssql.tf:azurerm_mssql_server.mssql1
  • /terraform/azure/mssql.tf:azurerm_mssql_server.mssql1
  • /terraform/azure/sql.tf:azurerm_postgresql_server.example
  • /terraform/azure/sql.tf:azurerm_postgresql_server.example
  • /terraform/azure/sql.tf:azurerm_postgresql_server.example
  • /terraform/azure/sql.tf:azurerm_postgresql_server.example
  • /terraform/azure/sql.tf:azurerm_postgresql_server.example
  • /terraform/azure/sql.tf:azurerm_postgresql_server.example
  • /terraform/oracle/bucket.tf:oci_objectstorage_bucket.secretsquirrel
  • /terraform/oracle/bucket.tf:oci_objectstorage_bucket.secretsquirrel
  • /terraform/oracle/bucket.tf:oci_objectstorage_bucket.secretsquirrel
  • /terraform/azure/aks.tf:azurerm_kubernetes_cluster.k8s_cluster
  • /terraform/azure/aks.tf:azurerm_kubernetes_cluster.k8s_cluster
  • /terraform/azure/aks.tf:azurerm_kubernetes_cluster.k8s_cluster
  • /terraform/azure/app_service.tf:azurerm_app_service.app-service1
  • /terraform/azure/app_service.tf:azurerm_app_service.app-service1
  • /terraform/azure/app_service.tf:azurerm_app_service.app-service1
  • /terraform/azure/app_service.tf:azurerm_app_service.app-service1
  • /terraform/azure/app_service.tf:azurerm_app_service.app-service1
  • /terraform/azure/app_service.tf:azurerm_app_service.app-service1
  • /terraform/azure/app_service.tf:azurerm_app_service.app-service1
  • /terraform/azure/app_service.tf:azurerm_app_service.app-service1
  • /terraform/azure/app_service.tf:azurerm_app_service.app-service1
  • /terraform/azure/app_service.tf:azurerm_app_service.app-service1
  • /terraform/azure/app_service.tf:azurerm_app_service.app-service1
  • /terraform/azure/app_service.tf:azurerm_app_service.app-service2
  • /terraform/azure/app_service.tf:azurerm_app_service.app-service2
  • /terraform/azure/app_service.tf:azurerm_app_service.app-service2
  • /terraform/azure/app_service.tf:azurerm_app_service.app-service2
  • /terraform/azure/app_service.tf:azurerm_app_service.app-service2
  • /terraform/azure/app_service.tf:azurerm_app_service.app-service2
  • /terraform/azure/app_service.tf:azurerm_app_service.app-service2
  • /terraform/azure/app_service.tf:azurerm_app_service.app-service2
  • /terraform/azure/app_service.tf:azurerm_app_service.app-service2
  • /terraform/azure/security_center.tf:azurerm_security_center_contact.contact
  • /terraform/azure/security_center.tf:azurerm_security_center_contact.contact
  • /terraform/azure/sql.tf:azurerm_mysql_server.example
  • /terraform/azure/sql.tf:azurerm_mysql_server.example
  • /terraform/azure/sql.tf:azurerm_mysql_server.example
  • /terraform/azure/sql.tf:azurerm_mysql_server.example
  • /terraform/azure/sql.tf:azurerm_mysql_server.example
  • /terraform/aws/db-app.tf:aws_instance.db_app
  • /terraform/aws/db-app.tf:aws_instance.db_app
  • /terraform/gcp/big_data.tf:google_sql_database_instance.master_instance
  • /terraform/gcp/big_data.tf:google_sql_database_instance.master_instance
  • /terraform/gcp/big_data.tf:google_sql_database_instance.master_instance
  • /terraform/alicloud/trail.tf:alicloud_actiontrail_trail.fail
  • /terraform/alicloud/trail.tf:alicloud_actiontrail_trail.fail
  • /terraform/alicloud/bucket.tf:alicloud_oss_bucket.bad_bucket
  • /terraform/alicloud/bucket.tf:alicloud_oss_bucket.bad_bucket
  • /terraform/alicloud/bucket.tf:alicloud_oss_bucket.bad_bucket
  • /terraform/alicloud/trail.tf:alicloud_oss_bucket.trail
  • /terraform/alicloud/trail.tf:alicloud_oss_bucket.trail
  • /terraform/aws/ec2.tf:aws_s3_bucket.flowbucket
  • /terraform/aws/ec2.tf:aws_s3_bucket.flowbucket
  • /terraform/aws/ec2.tf:aws_s3_bucket.flowbucket
  • /terraform/aws/ec2.tf:aws_s3_bucket.flowbucket
  • /terraform/aws/s3.tf:aws_s3_bucket.data
  • /terraform/aws/s3.tf:aws_s3_bucket.data
  • /terraform/aws/s3.tf:aws_s3_bucket.data
  • /terraform/aws/s3.tf:aws_s3_bucket.data
  • /terraform/aws/s3.tf:aws_s3_bucket.operations
  • /terraform/aws/s3.tf:aws_s3_bucket.operations
  • /terraform/aws/s3.tf:aws_s3_bucket.logs
  • /terraform/aws/rds.tf:aws_rds_cluster.app4-rds-cluster
  • /terraform/aws/rds.tf:aws_rds_cluster.app4-rds-cluster
  • /terraform/aws/rds.tf:aws_rds_cluster.app4-rds-cluster
  • /terraform/aws/rds.tf:aws_rds_cluster.app4-rds-cluster
  • /terraform/aws/rds.tf:aws_rds_cluster.app3-rds-cluster
  • /terraform/aws/rds.tf:aws_rds_cluster.app3-rds-cluster
  • /terraform/aws/rds.tf:aws_rds_cluster.app3-rds-cluster
  • /terraform/aws/rds.tf:aws_rds_cluster.app3-rds-cluster
  • /terraform/azure/instance.tf:azurerm_linux_virtual_machine.linux_machine
  • /terraform/azure/instance.tf:azurerm_linux_virtual_machine.linux_machine
  • /terraform/gcp/gcs.tf:google_storage_bucket.terragoat_website
  • /terraform/gcp/gcs.tf:google_storage_bucket.terragoat_website
  • /terraform/gcp/instances.tf:google_compute_instance.server
  • /terraform/gcp/instances.tf:google_compute_instance.server
  • /terraform/gcp/instances.tf:google_compute_instance.server
  • /terraform/gcp/instances.tf:google_compute_instance.server
  • /terraform/gcp/instances.tf:google_compute_instance.server
  • /terraform/aws/rds.tf:aws_rds_cluster.app7-rds-cluster
  • /terraform/aws/rds.tf:aws_rds_cluster.app7-rds-cluster
  • /terraform/aws/rds.tf:aws_rds_cluster.app7-rds-cluster
  • /terraform/aws/rds.tf:aws_rds_cluster.app7-rds-cluster
  • /terraform/aws/rds.tf:aws_rds_cluster.app8-rds-cluster
  • /terraform/aws/rds.tf:aws_rds_cluster.app8-rds-cluster
  • /terraform/aws/rds.tf:aws_rds_cluster.app8-rds-cluster
  • /terraform/aws/rds.tf:aws_rds_cluster.app8-rds-cluster
  • /terraform/azure/instance.tf:azurerm_windows_virtual_machine.windows_machine
  • /terraform/azure/instance.tf:azurerm_windows_virtual_machine.windows_machine
  • /terraform/aws/rds.tf:aws_rds_cluster.app1-rds-cluster
  • /terraform/aws/rds.tf:aws_rds_cluster.app1-rds-cluster
  • /terraform/aws/rds.tf:aws_rds_cluster.app1-rds-cluster
  • /terraform/aws/rds.tf:aws_rds_cluster.app1-rds-cluster
  • /terraform/azure/key_vault.tf:azurerm_key_vault.example
  • /terraform/azure/key_vault.tf:azurerm_key_vault.example
  • /terraform/gcp/gke.tf:google_container_cluster.workload_cluster
  • /terraform/gcp/gke.tf:google_container_cluster.workload_cluster
  • /terraform/gcp/gke.tf:google_container_cluster.workload_cluster
  • /terraform/gcp/gke.tf:google_container_cluster.workload_cluster
  • /terraform/gcp/gke.tf:google_container_cluster.workload_cluster
  • /terraform/gcp/gke.tf:google_container_cluster.workload_cluster
  • /terraform/aws/rds.tf:aws_rds_cluster.app5-rds-cluster
  • /terraform/aws/rds.tf:aws_rds_cluster.app5-rds-cluster
  • /terraform/aws/rds.tf:aws_rds_cluster.app5-rds-cluster
  • /terraform/aws/rds.tf:aws_rds_cluster.app5-rds-cluster
  • /terraform/aws/rds.tf:aws_rds_cluster.app9-rds-cluster
  • /terraform/aws/rds.tf:aws_rds_cluster.app9-rds-cluster
  • /terraform/aws/rds.tf:aws_rds_cluster.app9-rds-cluster
  • /terraform/aws/rds.tf:aws_rds_cluster.app9-rds-cluster
  • /terraform/aws/es.tf:aws_elasticsearch_domain.monitoring-framework
  • /terraform/aws/es.tf:aws_elasticsearch_domain.monitoring-framework
  • /terraform/aws/es.tf:aws_elasticsearch_domain.monitoring-framework
  • /terraform/alicloud/rds.tf:alicloud_db_instance.seeme
  • /terraform/alicloud/rds.tf:alicloud_db_instance.seeme
  • /terraform/aws/db-app.tf:aws_db_instance.default
  • /terraform/aws/db-app.tf:aws_db_instance.default
  • /terraform/aws/db-app.tf:aws_db_instance.default
  • /terraform/aws/db-app.tf:aws_db_instance.default
  • /terraform/aws/db-app.tf:aws_db_instance.default
  • /terraform/aws/db-app.tf:aws_db_instance.default
  • /terraform/aws/kms.tf:aws_kms_key.logs_key
  • /terraform/aws/lambda.tf:aws_lambda_function.analysis_lambda
  • /terraform/azure/mssql.tf:azurerm_mssql_server.mssql2
  • /terraform/azure/mssql.tf:azurerm_mssql_server.mssql2
  • /terraform/azure/mssql.tf:azurerm_mssql_server.mssql3
  • /terraform/azure/mssql.tf:azurerm_mssql_server.mssql3
  • /terraform/azure/mssql.tf:azurerm_mssql_server.mssql4
  • /terraform/azure/mssql.tf:azurerm_mssql_server.mssql4
  • /terraform/azure/mssql.tf:azurerm_mssql_server.mssql5
  • /terraform/azure/mssql.tf:azurerm_mssql_server.mssql5
  • /terraform/azure/mssql.tf:azurerm_mssql_server.mssql6
  • /terraform/azure/mssql.tf:azurerm_mssql_server.mssql6
  • /terraform/azure/mssql.tf:azurerm_mssql_server.mssql7
  • /terraform/azure/mssql.tf:azurerm_mssql_server.mssql7
  • /terraform/aws/rds.tf:aws_rds_cluster.app6-rds-cluster
  • /terraform/aws/rds.tf:aws_rds_cluster.app6-rds-cluster
  • /terraform/aws/rds.tf:aws_rds_cluster.app6-rds-cluster
  • /terraform/aws/rds.tf:aws_rds_cluster.app6-rds-cluster
  • /terraform/aws/rds.tf:aws_rds_cluster.app2-rds-cluster
  • /terraform/aws/rds.tf:aws_rds_cluster.app2-rds-cluster
  • /terraform/aws/rds.tf:aws_rds_cluster.app2-rds-cluster
  • /terraform/aws/rds.tf:aws_rds_cluster.app2-rds-cluster
  • /terraform/aws/eks.tf:aws_eks_cluster.eks_cluster
  • /terraform/aws/eks.tf:aws_eks_cluster.eks_cluster
  • /terraform/aws/ecr.tf:aws_ecr_repository.repository
  • /terraform/aws/ecr.tf:aws_ecr_repository.repository
  • /terraform/aws/ecr.tf:aws_ecr_repository.repository
  • /terraform/aws/neptune.tf:aws_neptune_cluster.default
  • /terraform/aws/ec2.tf:aws_ebs_volume.web_host_storage
  • /terraform/aws/ec2.tf:aws_instance.web_host
  • /terraform/aws/ec2.tf:aws_instance.web_host
  • /terraform/aws/s3.tf:aws_s3_bucket.data_science
  • /terraform/aws/s3.tf:aws_s3_bucket.data_science
  • /terraform/azure/security_center.tf:azurerm_security_center_subscription_pricing.pricing

Below are the Policies fixed in this PR:

🌈 Policy ✨ Details
Ensure that Private google access is enabled for IPV6 View
Ensure that 'Email service and co-administrators' is 'Enabled' for MSSQL servers View
Packages scan found vulnerabilities View
Ensure 'Automatic node repair' is enabled for Kubernetes Clusters View
Ensure 'Automatic node upgrade' is enabled for Kubernetes Clusters View
Ensure that S3 buckets are encrypted with KMS by default View
Ensure VPC subnets do not assign public IP by default View
Ensure that PostgreSQL server enables infrastructure encryption View
Ensure that private_ip_google_access is enabled for Subnet View
Ensure that SQL server disables public network access View
Ensure PostgreSQL is using the latest version of TLS encryption View
Ensure that PostgreSQL server disables public network access View
Ensure 'Enforce SSL connection' is set to 'ENABLED' for PostgreSQL Database Server View
Ensure that PostgreSQL server enables geo-redundant backups View
Ensure 'public network access enabled' is set to 'False' for mySQL servers View
Ensure that app services use Azure Files View
Ensure App Service Authentication is set on Azure App Service View
Ensure AKS local admin account is disabled View
Ensure AKS logging to Azure Monitoring is Configured View
Ensure web app is using the latest version of TLS encryption View
Ensure 'Enforce SSL connection' is set to 'ENABLED' for MySQL Database Server View
Ensure that 'HTTP Version' is the latest if used to run the web app View
Ensure Action Trail Logging for all regions View
Ensure MySQL is using the latest version of TLS encryption View
Ensure that key vault key is backed by HSM View
Ensure Action Trail Logging for all events View
Ensure that 'Send email notification for high severity alerts' is set to 'On' View
Ensure Cloud storage has versioning enabled View
Ensure 'Enable connecting to serial ports' is not enabled for VM Instance View
Ensure that EC2 is EBS optimized View
Ensure that key vault allows firewall rules settings View
Ensure that key vault enables purge protection View
Ensure Network Policy is enabled on Kubernetes Engine Clusters View
Ensure RDS instance auto upgrades for minor versions View
Ensure all data stored in the Elasticsearch is securely encrypted at rest View
Ensure DB instance gets all minor upgrades automatically View
Ensure RDS instance uses SSL View
Verify Elasticsearch domain is using an up to date TLS policy View
Ensure that enhanced monitoring is enabled for Amazon RDS instances View
Ensure all data stored in the RDS is securely encrypted at rest View
Ensure Secure Boot for Shielded GKE Nodes is Enabled View
Ensure that RDS instances have Multi-AZ enabled View
Ensure all data stored in the RDS bucket is not public accessible View
Ensure MSSQL is using the latest version of TLS encryption View
Ensure RDS database has IAM authentication enabled View
Ensure all data stored in the S3 bucket is securely encrypted at rest View
Ensure rotation for customer created CMKs is enabled View
Ensure Amazon EKS public endpoint disabled View
Ensure X-ray tracing is enabled for Lambda View
Ensure EKS Cluster has Secrets Encryption Enabled View
Ensure ECR image scanning on push is enabled View
Ensure that ECR repositories are encrypted using KMS View
Ensure ECR Image Tags are immutable View
Ensure Neptune storage is securely encrypted View
Ensure that standard pricing tier is selected View
Ensure all data stored in the EBS is securely encrypted View
Ensure that 'Net Framework' version is the latest, if used as a part of the web app View
Ensure web app redirects all HTTP traffic to HTTPS in Azure App Service View
Ensure FTP deployments are disabled View
Ensure OSS bucket has transfer Acceleration enabled View
Ensure that App service enables failed request tracing View
Ensure SQL database is using latest Major version View
Ensure that My SQL server enables Threat detection policy View
Alibaba Cloud OSS bucket accessible to public View
Ensure that AKS enables private clusters View
Ensure OSS bucket has versioning enabled View
Ensure that 'Send email notification for high severity alerts' is set to 'On' View
Ensure OCI Object Storage has versioning enabled View
Ensure that My SQL server enables geo-redundant backups View
Ensure all data stored in the S3 bucket have versioning enabled View
Ensure the S3 bucket has access logging enabled View
Ensure Virtual Machine Extensions are not Installed View
Ensure the web app has 'Client Certificates (Incoming client certificates)' set View
Ensure that PostgreSQL server enables Threat detection policy View
Ensure OCI Object Storage is not Public View
Ensure legacy Compute Engine instance metadata APIs are Disabled View
Ensure all Cloud SQL database instance requires all incoming connections to use SSL View
Ensure all Cloud SQL database instance have backup configuration enabled View
Ensure that App service enables detailed error messages View
Ensure that Compute instances do not have public IP addresses View
Ensure Legacy Authorization is set to Disabled on Kubernetes Engine Clusters View
Ensure that an Amazon RDS Clusters have AWS Identity and Access Management (IAM) authentication enabled View
Ensure that RDS clusters have deletion protection enabled View
Ensure that detailed monitoring is enabled for EC2 instances View
Ensure that Virtual machine does not enable password authentication View
Ensure PodSecurityPolicy controller is enabled on the Kubernetes Engine Clusters View
Ensure that no instance in the project overrides the project setting for enabling OSLogin(OSLogin needs to be enabled in prject metadata for all instances) View
Ensure that Cloud Storage buckets have uniform bucket-level access enabled View
Ensure OCI Object Storage bucket can emit object events View
Ensure all data stored in Aurora is securely encrypted at rest View
Ensure 'Block Project-wide SSH keys' is enabled for VM instances View
Ensure Windows VM enables encryption View
Ensure a client certificate is used by clients to authenticate to Kubernetes Engine Clusters View
Ensure RDS cluster has IAM authentication enabled View
Ensure Elasticsearch Domain Logging is enabled View
Enable VPC Flow Logs and Intranode Visibility View
Ensure that Register with Azure Active Directory is enabled on App Service View
Ensure that IP forwarding is not enabled on Instances View
Please check the changes in this PR to ensure they do not introduce conflicts to your project.

For more information:
View this repository's Supply Chain Graph👀

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants