diff --git a/resotocore/resotocore/static/report/checks/aws/aws_lambda.json b/resotocore/resotocore/static/report/checks/aws/aws_lambda.json index 833e100b77..9832cc1a19 100644 --- a/resotocore/resotocore/static/report/checks/aws/aws_lambda.json +++ b/resotocore/resotocore/static/report/checks/aws/aws_lambda.json @@ -83,7 +83,7 @@ "severity": "high", "url": "https://docs.aws.amazon.com/secretsmanager/latest/userguide/lambda-functions.html", "detect": { - "resoto": "is(aws_lambda_function) and function_url_config.auth_type != AWS_IAM" + "resoto": "is(aws_lambda_function) and function_url_config != null and function_url_config.auth_type != AWS_IAM" }, "remediation": { "action": { diff --git a/resotocore/resotocore/static/report/checks/aws/aws_sqs.json b/resotocore/resotocore/static/report/checks/aws/aws_sqs.json index da7b0fa4d6..80ce16d210 100644 --- a/resotocore/resotocore/static/report/checks/aws/aws_sqs.json +++ b/resotocore/resotocore/static/report/checks/aws/aws_sqs.json @@ -10,7 +10,7 @@ "risk": "If server-side encryption is not enabled for SQS queues, sensitive information in transit could be compromised. This leads to risks of data leakage, breach of compliance regulations, and potential damage to the organization's reputation.", "severity": "medium", "detect": { - "resoto": "is(aws_sqs_queue) and sqs_kms_master_key_id==null" + "resoto": "is(aws_sqs_queue) and sqs_managed_sse_enabled==false" }, "remediation": { "text": "To mitigate this risk, ensure server-side encryption is turned on for all Amazon SQS queues. If possible, leverage a Customer Master Key (CMK) for enhanced management and privacy benefits.",