You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I added AWS Administrative Policy(which is required by me) to terrascan run and I found that is not included in scanning severities.
Describe what you were trying to get done.
Tell us what happened, what went wrong, and what you expected to happen.
I added one of the AWS Managed Administrative policy to my code(although this is required one) and run that code with terrascan, it didn't show up the administrative privileges
What I Did
Added this policy: arn:aws:iam::aws:policy/AdministratorAccess to the role an run terrascan on role template for terraform
Paste the command(s) you ran and the output.
If there was a crash, please include the traceback here.
terrascan init
terrascan scan
Violation Details -
Description : Ensure that detailed monitoring is enabled for EC2 instances.
File : xxxxx
Module Name : xxxxx
Plan Root : .\
Line : 3
Severity : HIGH
-----------------------------------------------------------------------
Description : Ensure Security Groups Unrestricted Specific Ports Knowninternalwebpor
File : main.tf
Module Name : root
Plan Root : .\
Line : 33
Severity : LOW
-----------------------------------------------------------------------
Description : Ensure Security Groups Unrestricted Specific Ports Knowninternalwebpor
File : main.tf
Module Name : root
Plan Root : .\
Line : 33
Severity : LOW
-----------------------------------------------------------------------
Description : Ensure Security Groups Unrestricted Specific Ports Knowninternalwebpor
File : main.tf
Module Name : root
Plan Root : .\
Line : 33
Severity : LOW
-----------------------------------------------------------------------
The text was updated successfully, but these errors were encountered:
terrascan version
version: v1.18.3
Windows
Description
I added AWS Administrative Policy(which is required by me) to terrascan run and I found that is not included in scanning severities.
Describe what you were trying to get done.
Tell us what happened, what went wrong, and what you expected to happen.
I added one of the AWS Managed Administrative policy to my code(although this is required one) and run that code with terrascan, it didn't show up the administrative privileges
What I Did
Added this policy: arn:aws:iam::aws:policy/AdministratorAccess to the role an run terrascan on role template for terraform
Violation Details -
The text was updated successfully, but these errors were encountered: