Skip to content

Secure Code Analysis #630

Secure Code Analysis

Secure Code Analysis #630

Triggered via schedule November 12, 2024 02:02
Status Failure
Total duration 6m 26s
Artifacts

code-scanning.yml

on: schedule
Matrix: tflint
Fit to window
Zoom out
Zoom in

Annotations

11 errors
trivy
Code Scanning could not process the submitted SARIF file: locationFromSarifResult: expected artifact location, locationFromSarifResult: expected artifact location, locationFromSarifResult: expected artifact location
checkov: terraform/environments/analytical-platform-compute/iam-policies.tf#L284
CKV_AWS_111: "Ensure IAM policies does not allow write access without constraints"
checkov: terraform/environments/analytical-platform-compute/iam-policies.tf#L284
CKV_AWS_356: "Ensure no IAM policies documents allow "*" as a statement's resource for restrictable actions"
checkov: terraform/environments/analytical-platform-ingestion/route53-resolver-associations.tf#L1
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
checkov: terraform/environments/analytical-platform-ingestion/route53-resolver-endpoints.tf#L1
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
checkov: terraform/environments/apex/backups.tf#L6
CKV_AWS_166: "Ensure Backup Vault is encrypted at rest using KMS CMK"
checkov: terraform/environments/apex/backups.tf#L64
CKV_AWS_166: "Ensure Backup Vault is encrypted at rest using KMS CMK"
checkov: terraform/environments/apex/cloudfront.tf#L157
CKV_AWS_300: "Ensure S3 lifecycle configuration sets period for aborting failed uploads"
checkov: terraform/environments/apex/cloudfront.tf#L177
CKV_AWS_310: "Ensure CloudFront distributions should have origin failover configured"
checkov: terraform/environments/apex/cloudfront.tf#L177
CKV_AWS_374: "Ensure AWS CloudFront web distribution has geo restriction enabled"
checkov: terraform/environments/apex/cloudfront.tf#L177
CKV_AWS_305: "Ensure CloudFront distribution has a default root object configured"