Scanning Aws Code - 0wr09y
Scanning Aws Code - 0wr09y
On
se
lU
Terrascan Scan Report
Report generated by Nessus™ Wed, 31 Jul 2024 11:59:27 SE Asia Standard Time
ria
rT
Fo
TABLE OF CONTENTS
Violations
• Identity and Access Management - allUsersReadAccess (1)................................................................................4
ly
Infrastructure Security - unrestrictedIngressAccess (1)........................................................................................7
On
se
lU
ria
rT
Fo
Fo
rT
ria
Violations
lU
se
On
ly
Identity and Access Management - allUsersReadAccess (1)
Description
Misconfigured S3 buckets can leak private information to the entire internet or allow unauthorized data
tampering / deletion
Resource Type
ly
aws_s3_bucket
Policy Type
On
aws
Version
Policy File
s3AclGrants.rego
se
lU
Template Args
{"prefix":"","name":"allUsersReadAccess","access":"public-read"}
ria
Reference Id
AWS.S3Bucket.IAM.High.0377
Violation Details
rT
file.tf
Line : 40
Resource Name : insecure_bucket
Plan Root : .\
Fo
Description
Enabling S3 versioning will enable easy recovery from both unintended user actions, like deletes and
overwrites
Resource Type
ly
aws_s3_bucket
Policy Type
On
aws
Version
Policy File
s3Versioning.rego
se
lU
Template Args
{"prefix":""}
ria
Reference Id
AWS.S3Bucket.IAM.High.0370
Violation Details
rT
file.tf
Line : 40
Resource Name : insecure_bucket
Plan Root : .\
Fo
Description
Resource Type
aws_instance
ly
Policy Type
On
aws
Version
Policy File se
detailedMonitoringEnabledInstance.rego
lU
Template Args
{"prefix":""}
Reference Id
ria
AWS.AI.LM.HIGH.0070
Violation Details
file.tf
rT
Line : 5
Resource Name : insecure_instance
Plan Root : .\
Module Name : root
Fo
Description
Ensure no security groups allow ingress from 0.0.0.0/0 to ALL ports and protocols
Resource Type
aws_security_group
ly
Policy Type
On
aws
Version
Policy File
unrestrictedIngressAccess.rego
se
lU
Template Args
{"suffix":"","prefix":"","name":"unrestrictedIngressAccess","defaultValue":"<cidr>"}
Reference Id
ria
AC_AWS_0231
Violation Details
file.tf
rT
Line : 17
Resource Name : insecure_sg
Plan Root : .\
Module Name : root
Fo
Description
EC2 instances should disable IMDS or require IMDSv2 as this can be related to the weaponization phase of
kill chain
Resource Type
ly
aws_instance
Policy Type
On
aws
Version
Policy File
ec2UsingIMDSv1.rego
se
lU
Template Args
null
ria
Reference Id
AC-AWS-NS-IN-M-1172
Violation Details
rT
file.tf
Line : 5
Resource Name : insecure_instance
Plan Root : .\
Fo