DevOpsSecurity

Checkov IaC Security Scan

Checkov ile Terraform Kodlarınızda Güvenlik Açıkları Tespit Etme

Checkov Nedir ?

Checkov, güvenlik veya uyumluluk sorunlarına yol açabilecek hatalı yapılandırmaları tespit etmek için altyapı kod (IaC) dosyalarını tarayan statik bir kod analiz aracıdır. Checkov, yaygın hatalı yapılandırma sorunlarını kontrol etmek için 750’den fazla önceden tanımlanmış politika içerir. Checkov ayrıca özel politikaların oluşturulmasını ve eklenmesini de destekler .

Checkov özellikleri

  • Birden fazla sağlayıcı tarafından sağlanan IAC’nizi tarama yeteneği, yani yalnızca Terraform kodunu değil, aynı zamanda CloudFormation, Kubernetes, ARM Templates, Serverless Framework, Dockerfile, GitHub Actions, Python,Helm grafiklerini vb. de tarar.
  • Kodunuzu taramak için 1000’den fazla politika.
  • Tarama sonuçlarını CLI yerine JUnit ve diğer araçlar aracılığıyla görselleştirme yeteneği.
  • Kurulumu kolaydır. Kurulum için sadece pip’e ihtiyacınız var.
  • Belirli durumları atlamak istediğinizde sonuçları filtrelemek kolaydır.

IAC Güvenliği

IaC kuruluşumuza önemli bir değer katarken, hangi operasyonel hususları dikkate almalıyız? En önemlisi, bulut güvenliğinin kritik önemini küçümseyemeyiz.

DevOps uygulamaları geliştikçe, kaynak kodu, yazılım uygulamaları, konteyner imajları ve altyapı kaynakları dahil olmak üzere geliştirme süreçlerimizin tüm yönlerinde kapsamlı tarama olmazsa olmaz hale geldi. Yeni sürümleri üretime dağıtmadan önce bu tarama ne kadar kritik? Günümüzün güvenlik ortamı göz önüne alındığında, kesinlikle olmazsa olmazdır. Güvenlik taraması, üretim sistemlerini tehlikeye atabilecek olası güvenlik açıklarına karşı son savunma hattımızdır. Kod Olarak Altyapı (IaC) da bu gerekliliğin bir istisnası değildir; IaC şablonları ve yapılandırmaları, dağıtım süreçlerimizdeki diğer tüm kritik bileşenlerle aynı titiz güvenlik taramasından geçmelidir.

Desteklenen Frameworkler

Checkov, çeşitli yapılandırma dosyalarını taramanıza olanak tanıyan birden fazla IaC çerçevesini destekler:

  • Terraform: .tfdosyalar
  • CloudFormation: .jsonve .yamldosyalar
  • Kubernetes: .yamldosyalar
  • ARM Şablonları: .jsondosyalar
  • Sunucusuz Çerçeve: serverless.yml dosyalar

Politikalar ve Uyumluluk

Checkov, ortak uyumluluk çerçeveleri ve güvenlik en iyi uygulamaları için yerleşik politikalar içerir, örneğin:

CIS Benchmarks: İnternet Güvenliği Merkezi’nin güvenlik yönergeleri. AWS Temel Güvenlik En İyi Uygulamaları: AWS’ye özgü güvenlik önerileri.

PCI-DSS, HIPAA, SOC 2: Finansal, sağlık ve genel veri korumasına yönelik uyumluluk çerçeveleri.

Özel Politikalar

Checkov’un politika motorunu kullanarak Python’da özel politikalar da yazabilirsiniz. Bu, IaC dosyalarınızda kuruluşa özgü kuralları uygulamanızı sağlar.

Lab Ortamı

Bu makalede chekov aracının kurulumunu yaptıktan sonra Terraform ile hazırlanmış AWS üzerinde EKS kurulumu yapmaza yarayan içerisinde bir çok modül barındıran bir terraform scripti üzerinde çalıştıracak ve bize verdiği raporu detaylı olarak incliyor olacağız.

Checkov kurulumu

MacOs cihazlar için brew kullanıyorsanız aşağıdaki komutu çalıştırıyoruz.Diğer sistemler için bu kılavuzu kullanınız.

brew install checkov

Versiyon kontrolü yapıyoruz aşağıdaki gibi bir çıktı alıyorsak checkov makinemize yüklendi demektir.

checkov –version
3.2.450

Terraform versiyon kontrol

terraform --version
Terraform v1.12.2
on darwin_arm64

uygulayacağım örneğimde aşağıdaki gibi bir EKS Terraform kodum bulunuyor ve bu kodu tarayarak içerisindeki yapılandırmalarda herhangi bir eksiklik yada zafiyet oluşturabilecek bir config var mı bunu kontrol edeceğim.

├── backend.tf
├── karpenter.tf
├── main.tf
├── outputs.tf
├── plan.json
├── provider.tf
├── README.md
├── remote-state.tf
├── tfplan.json
├── variables.tf
└── versions.tf
# Terraform kaynağını başlat
terraform init

Initializing the backend...
Initializing modules...
Initializing provider plugins...
- terraform.io/builtin/terraform is built in to Terraform
- Reusing previous version of hashicorp/cloudinit from the dependency lock file
- Reusing previous version of alekc/kubectl from the dependency lock file
- Reusing previous version of hashicorp/null from the dependency lock file
- Reusing previous version of hashicorp/tls from the dependency lock file
- Reusing previous version of hashicorp/time from the dependency lock file
- Reusing previous version of hashicorp/aws from the dependency lock file
- Reusing previous version of hashicorp/helm from the dependency lock file
- Using previously-installed hashicorp/cloudinit v2.3.7
- Using previously-installed alekc/kubectl v2.1.3
- Using previously-installed hashicorp/null v3.2.4
- Using previously-installed hashicorp/tls v4.1.0
- Using previously-installed hashicorp/time v0.13.1
- Using previously-installed hashicorp/aws v5.100.0
- Using previously-installed hashicorp/helm v3.0.2

Terraform has been successfully initialized!

You may now begin working with Terraform. Try running "terraform plan" to see
any changes that are required for your infrastructure. All Terraform commands
should now work.

If you ever set or change modules or backend configuration for Terraform,
rerun this command to reinitialize your working directory. If you forget, other
commands will detect it and remind you to do so if necessary. 

Checkov Scan

Bu adımdan sonra aşağıdaki komutları çalıştırarak checkov kontrolü yapacağız.

#terraform planı oluştur
terraform plan --out tfplan.binary

#tf.plandosyayı JSON formatına dönüştürün
terraform show -json tfplan.binary | jq > tfplan.json

Checkov security check

checkov -f tfplan.json 
checkov -f tfplan.json --skip-download -o cli

Soft fail check

checkov -d . –soft-fail-on LOW,CKV_AWS_46

Hard fail check

checkov -d . –hard-fail-on HIGH,CKV_AWS_8,CRITICAL,MEDIUM

Komut çıktısı aşağıdaki gibi olacak.

[ kubernetes framework ]: 100%|████████████████████|[1/1], Current File Scanned=tfplan.json
[ secrets framework ]: 100%|████████████████████|[1/1], Current File Scanned=tfplan.jsonson


       _               _
   ___| |__   ___  ___| | _______   __
  / __| '_ \ / _ \/ __| |/ / _ \ \ / /
 | (__| | | |  __/ (__|   < (_) \ V /
  \___|_| |_|\___|\___|_|\_\___/ \_/

By Prisma Cloud | version: 3.2.450 
Update available 3.2.450 -> 3.2.461
Run pip3 install -U checkov to update 


terraform_plan scan results:

Passed checks: 142, Failed checks: 9, Skipped checks: 0

Check: CKV_AWS_41: "Ensure no hard coded AWS access key and secret key exists in provider"
        PASSED for resource: aws.default
        File: /tfplan.json:19022-19039
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/secrets-policies/bc-aws-secrets-5
Check: CKV_AWS_41: "Ensure no hard coded AWS access key and secret key exists in provider"
        PASSED for resource: aws.virginia
        File: /tfplan.json:19039-19055
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/secrets-policies/bc-aws-secrets-5
Check: CKV_AWS_288: "Ensure IAM policies does not allow data exfiltration"
        PASSED for resource: module.ebs_csi_irsa_role.aws_iam_policy.ebs_csi[0]
        File: /tfplan.json:818-844
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-288
Check: CKV_AWS_287: "Ensure IAM policies does not allow credentials exposure"
        PASSED for resource: module.ebs_csi_irsa_role.aws_iam_policy.ebs_csi[0]
        File: /tfplan.json:818-844

Checkov IaC Security Scan 2

Yapılandırmada hatalı/eksik gördüğü bölümler aşağıdaki gibi.

Checkov IaC Security Scan 3
Screenshot

 

Checkov IaC Security Scan 4

Komut çıktısı

[ kubernetes framework ]: 100%|████████████████████|[1/1], Current File Scanned=tfplan.json
[ secrets framework ]: 100%|████████████████████|[1/1], Current File Scanned=tfplan.jsonson


       _               _
   ___| |__   ___  ___| | _______   __
  / __| '_ \ / _ \/ __| |/ / _ \ \ / /
 | (__| | | |  __/ (__|   < (_) \ V /
  \___|_| |_|\___|\___|_|\_\___/ \_/

By Prisma Cloud | version: 3.2.450 
Update available 3.2.450 -> 3.2.461
Run pip3 install -U checkov to update 


terraform_plan scan results:

Passed checks: 142, Failed checks: 9, Skipped checks: 0

Check: CKV_AWS_41: "Ensure no hard coded AWS access key and secret key exists in provider"
        PASSED for resource: aws.default
        File: /tfplan.json:19022-19039
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/secrets-policies/bc-aws-secrets-5
Check: CKV_AWS_41: "Ensure no hard coded AWS access key and secret key exists in provider"
        PASSED for resource: aws.virginia
        File: /tfplan.json:19039-19055
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/secrets-policies/bc-aws-secrets-5
Check: CKV_AWS_288: "Ensure IAM policies does not allow data exfiltration"
        PASSED for resource: module.ebs_csi_irsa_role.aws_iam_policy.ebs_csi[0]
        File: /tfplan.json:818-844
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-288
Check: CKV_AWS_287: "Ensure IAM policies does not allow credentials exposure"
        PASSED for resource: module.ebs_csi_irsa_role.aws_iam_policy.ebs_csi[0]
        File: /tfplan.json:818-844
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-287
Check: CKV_AWS_63: "Ensure no IAM policies documents allow "*" as a statement's actions"
        PASSED for resource: module.ebs_csi_irsa_role.aws_iam_policy.ebs_csi[0]
        File: /tfplan.json:818-844
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/iam-48
Check: CKV_AWS_289: "Ensure IAM policies does not allow permissions management / resource exposure without constraints"
        PASSED for resource: module.ebs_csi_irsa_role.aws_iam_policy.ebs_csi[0]
        File: /tfplan.json:818-844
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-289
Check: CKV_AWS_62: "Ensure IAM policies that allow full "*-*" administrative privileges are not created"
        PASSED for resource: module.ebs_csi_irsa_role.aws_iam_policy.ebs_csi[0]
        File: /tfplan.json:818-844
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-iam-45
Check: CKV_AWS_286: "Ensure IAM policies does not allow privilege escalation"
        PASSED for resource: module.ebs_csi_irsa_role.aws_iam_policy.ebs_csi[0]
        File: /tfplan.json:818-844
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-286
Check: CKV_AWS_274: "Disallow IAM roles, users, and groups from using the AWS AdministratorAccess policy"
        PASSED for resource: module.ebs_csi_irsa_role.aws_iam_role.this[0]
        File: /tfplan.json:858-891
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-274
Check: CKV_AWS_61: "Ensure AWS IAM policy does not allow assume role permission across all services"
        PASSED for resource: module.ebs_csi_irsa_role.aws_iam_role.this[0]
        File: /tfplan.json:858-891
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-iam-45
Check: CKV_AWS_60: "Ensure IAM role allows only specific services or principals to assume it"
        PASSED for resource: module.ebs_csi_irsa_role.aws_iam_role.this[0]
        File: /tfplan.json:858-891
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-iam-44
Check: CKV_AWS_274: "Disallow IAM roles, users, and groups from using the AWS AdministratorAccess policy"
        PASSED for resource: module.ebs_csi_irsa_role.aws_iam_role_policy_attachment.ebs_csi[0]
        File: /tfplan.json:909-913
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-274
Check: CKV_AWS_100: "Ensure AWS EKS node group does not have implicit SSH access from 0.0.0.0/0"
        PASSED for resource: module.eks.module.eks_managed_node_group["worker_general_t3a"].aws_eks_node_group.this[0]
        File: /tfplan.json:2376-2451
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-kubernetes-policies/bc-aws-kubernetes-5
Check: CKV_AWS_274: "Disallow IAM roles, users, and groups from using the AWS AdministratorAccess policy"
        PASSED for resource: module.eks.module.eks_managed_node_group["worker_general_t3a"].aws_iam_role.this[0]
        File: /tfplan.json:2492-2529
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-274
Check: CKV_AWS_61: "Ensure AWS IAM policy does not allow assume role permission across all services"
        PASSED for resource: module.eks.module.eks_managed_node_group["worker_general_t3a"].aws_iam_role.this[0]
        File: /tfplan.json:2492-2529
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-iam-45
Check: CKV_AWS_60: "Ensure IAM role allows only specific services or principals to assume it"
        PASSED for resource: module.eks.module.eks_managed_node_group["worker_general_t3a"].aws_iam_role.this[0]
        File: /tfplan.json:2492-2529
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-iam-44
Check: CKV_AWS_274: "Disallow IAM roles, users, and groups from using the AWS AdministratorAccess policy"
        PASSED for resource: module.eks.module.eks_managed_node_group["worker_general_t3a"].aws_iam_role_policy_attachment.additional["AWSLoadBalancerControllerIAMPolicy"]
        File: /tfplan.json:2551-2555
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-274
Check: CKV_AWS_274: "Disallow IAM roles, users, and groups from using the AWS AdministratorAccess policy"
        PASSED for resource: module.eks.module.eks_managed_node_group["worker_general_t3a"].aws_iam_role_policy_attachment.additional["AmazonSSMManagedInstanceCore"]
        File: /tfplan.json:2566-2570
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-274
Check: CKV_AWS_274: "Disallow IAM roles, users, and groups from using the AWS AdministratorAccess policy"
        PASSED for resource: module.eks.module.eks_managed_node_group["worker_general_t3a"].aws_iam_role_policy_attachment.this["AmazonEC2ContainerRegistryReadOnly"]
        File: /tfplan.json:2581-2585
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-274
Check: CKV_AWS_274: "Disallow IAM roles, users, and groups from using the AWS AdministratorAccess policy"
        PASSED for resource: module.eks.module.eks_managed_node_group["worker_general_t3a"].aws_iam_role_policy_attachment.this["AmazonEKSWorkerNodePolicy"]
        File: /tfplan.json:2596-2600
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-274
Check: CKV_AWS_274: "Disallow IAM roles, users, and groups from using the AWS AdministratorAccess policy"
        PASSED for resource: module.eks.module.eks_managed_node_group["worker_general_t3a"].aws_iam_role_policy_attachment.this["AmazonEKS_CNI_Policy"]
        File: /tfplan.json:2611-2615
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-274
Check: CKV_AWS_227: "Ensure KMS key is enabled"
        PASSED for resource: module.eks.module.kms.aws_kms_key.this[0]
        File: /tfplan.json:2669-2692
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/ensure-aws-key-management-service-kms-key-is-enabled
Check: CKV_AWS_33: "Ensure KMS key policy does not contain wildcard (*) principal"
        PASSED for resource: module.eks.module.kms.aws_kms_key.this[0]
        File: /tfplan.json:2669-2692
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/ensure-kms-key-policy-does-not-contain-wildcard-principal
Check: CKV_AWS_7: "Ensure rotation for customer created CMKs is enabled"
        PASSED for resource: module.eks.module.kms.aws_kms_key.this[0]
        File: /tfplan.json:2669-2692
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-logging-policies/logging-8
Check: CKV_AWS_66: "Ensure that CloudWatch Log Group specifies retention days"
        PASSED for resource: module.eks.aws_cloudwatch_log_group.this[0]
        File: /tfplan.json:929-944
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-logging-policies/logging-13
Check: CKV_AWS_39: "Ensure Amazon EKS public endpoint disabled"
        PASSED for resource: module.eks.aws_eks_cluster.this[0]
        File: /tfplan.json:1266-1368
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-kubernetes-policies/bc-aws-kubernetes-2
Check: CKV_AWS_58: "Ensure EKS Cluster has Secrets Encryption Enabled"
        PASSED for resource: module.eks.aws_eks_cluster.this[0]
        File: /tfplan.json:1266-1368
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-kubernetes-policies/bc-aws-kubernetes-3
Check: CKV_AWS_38: "Ensure Amazon EKS public endpoint not accessible to 0.0.0.0/0"
        PASSED for resource: module.eks.aws_eks_cluster.this[0]
        File: /tfplan.json:1266-1368
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-kubernetes-policies/bc-aws-kubernetes-1
Check: CKV_AWS_288: "Ensure IAM policies does not allow data exfiltration"
        PASSED for resource: module.eks.aws_iam_policy.cluster_encryption[0]
        File: /tfplan.json:1477-1489
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-288
Check: CKV_AWS_290: "Ensure IAM policies does not allow write access without constraints"
        PASSED for resource: module.eks.aws_iam_policy.cluster_encryption[0]
        File: /tfplan.json:1477-1489
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-290
Check: CKV_AWS_287: "Ensure IAM policies does not allow credentials exposure"
        PASSED for resource: module.eks.aws_iam_policy.cluster_encryption[0]
        File: /tfplan.json:1477-1489
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-287
Check: CKV_AWS_63: "Ensure no IAM policies documents allow "*" as a statement's actions"
        PASSED for resource: module.eks.aws_iam_policy.cluster_encryption[0]
        File: /tfplan.json:1477-1489
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/iam-48
Check: CKV_AWS_289: "Ensure IAM policies does not allow permissions management / resource exposure without constraints"
        PASSED for resource: module.eks.aws_iam_policy.cluster_encryption[0]
        File: /tfplan.json:1477-1489
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-289
Check: CKV_AWS_62: "Ensure IAM policies that allow full "*-*" administrative privileges are not created"
        PASSED for resource: module.eks.aws_iam_policy.cluster_encryption[0]
        File: /tfplan.json:1477-1489
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-iam-45
Check: CKV_AWS_355: "Ensure no IAM policies documents allow "*" as a statement's resource for restrictable actions"
        PASSED for resource: module.eks.aws_iam_policy.cluster_encryption[0]
        File: /tfplan.json:1477-1489
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-355
Check: CKV_AWS_286: "Ensure IAM policies does not allow privilege escalation"
        PASSED for resource: module.eks.aws_iam_policy.cluster_encryption[0]
        File: /tfplan.json:1477-1489
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-286
Check: CKV_AWS_288: "Ensure IAM policies does not allow data exfiltration"
        PASSED for resource: module.eks.aws_iam_policy.custom[0]
        File: /tfplan.json:1503-1519
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-288
Check: CKV_AWS_290: "Ensure IAM policies does not allow write access without constraints"
        PASSED for resource: module.eks.aws_iam_policy.custom[0]
        File: /tfplan.json:1503-1519
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-290
Check: CKV_AWS_287: "Ensure IAM policies does not allow credentials exposure"
        PASSED for resource: module.eks.aws_iam_policy.custom[0]
        File: /tfplan.json:1503-1519
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-287
Check: CKV_AWS_63: "Ensure no IAM policies documents allow "*" as a statement's actions"
        PASSED for resource: module.eks.aws_iam_policy.custom[0]
        File: /tfplan.json:1503-1519
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/iam-48
Check: CKV_AWS_289: "Ensure IAM policies does not allow permissions management / resource exposure without constraints"
        PASSED for resource: module.eks.aws_iam_policy.custom[0]
        File: /tfplan.json:1503-1519
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-289
Check: CKV_AWS_62: "Ensure IAM policies that allow full "*-*" administrative privileges are not created"
        PASSED for resource: module.eks.aws_iam_policy.custom[0]
        File: /tfplan.json:1503-1519
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-iam-45
Check: CKV_AWS_355: "Ensure no IAM policies documents allow "*" as a statement's resource for restrictable actions"
        PASSED for resource: module.eks.aws_iam_policy.custom[0]
        File: /tfplan.json:1503-1519
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-355
Check: CKV_AWS_286: "Ensure IAM policies does not allow privilege escalation"
        PASSED for resource: module.eks.aws_iam_policy.custom[0]
        File: /tfplan.json:1503-1519
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-286
Check: CKV_AWS_274: "Disallow IAM roles, users, and groups from using the AWS AdministratorAccess policy"
        PASSED for resource: module.eks.aws_iam_role.this[0]
        File: /tfplan.json:1533-1561
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-274
Check: CKV_AWS_61: "Ensure AWS IAM policy does not allow assume role permission across all services"
        PASSED for resource: module.eks.aws_iam_role.this[0]
        File: /tfplan.json:1533-1561
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-iam-45
Check: CKV_AWS_60: "Ensure IAM role allows only specific services or principals to assume it"
        PASSED for resource: module.eks.aws_iam_role.this[0]
        File: /tfplan.json:1533-1561
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-iam-44
Check: CKV_AWS_274: "Disallow IAM roles, users, and groups from using the AWS AdministratorAccess policy"
        PASSED for resource: module.eks.aws_iam_role_policy_attachment.additional["AWSLoadBalancerControllerIAMPolicy"]
        File: /tfplan.json:1584-1588
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-274
Check: CKV_AWS_274: "Disallow IAM roles, users, and groups from using the AWS AdministratorAccess policy"
        PASSED for resource: module.eks.aws_iam_role_policy_attachment.additional["AmazonSSMManagedInstanceCore"]
        File: /tfplan.json:1599-1603
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-274
Check: CKV_AWS_274: "Disallow IAM roles, users, and groups from using the AWS AdministratorAccess policy"
        PASSED for resource: module.eks.aws_iam_role_policy_attachment.cluster_encryption[0]
        File: /tfplan.json:1614-1618
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-274
Check: CKV_AWS_274: "Disallow IAM roles, users, and groups from using the AWS AdministratorAccess policy"
        PASSED for resource: module.eks.aws_iam_role_policy_attachment.custom[0]
        File: /tfplan.json:1629-1633
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-274
Check: CKV_AWS_274: "Disallow IAM roles, users, and groups from using the AWS AdministratorAccess policy"
        PASSED for resource: module.eks.aws_iam_role_policy_attachment.this["AmazonEKSClusterPolicy"]
        File: /tfplan.json:1644-1648
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-274
Check: CKV_AWS_274: "Disallow IAM roles, users, and groups from using the AWS AdministratorAccess policy"
        PASSED for resource: module.eks.aws_iam_role_policy_attachment.this["AmazonEKSVPCResourceController"]
        File: /tfplan.json:1659-1663
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-274
Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80"
        PASSED for resource: module.eks.aws_security_group.cluster[0]
        File: /tfplan.json:1674-1719
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80
Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22"
        PASSED for resource: module.eks.aws_security_group.cluster[0]
        File: /tfplan.json:1674-1719
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-1-port-security
Check: CKV_AWS_23: "Ensure every security group and rule has a description"
        PASSED for resource: module.eks.aws_security_group.cluster[0]
        File: /tfplan.json:1674-1719
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-31
Check: CKV_AWS_277: "Ensure no security groups allow ingress from 0.0.0.0:0 to port -1"
        PASSED for resource: module.eks.aws_security_group.cluster[0]
        File: /tfplan.json:1674-1719
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-group-does-not-allow-all-traffic-on-all-ports
Check: CKV_AWS_25: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 3389"
        PASSED for resource: module.eks.aws_security_group.cluster[0]
        File: /tfplan.json:1674-1719
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-2
Check: CKV_AWS_382: "Ensure no security groups allow egress from 0.0.0.0:0 to port -1"
        PASSED for resource: module.eks.aws_security_group.cluster[0]
        File: /tfplan.json:1674-1719
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/bc-aws-382
Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80"
        PASSED for resource: module.eks.aws_security_group.node[0]
        File: /tfplan.json:1752-1912
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80
Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22"
        PASSED for resource: module.eks.aws_security_group.node[0]
        File: /tfplan.json:1752-1912
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-1-port-security
Check: CKV_AWS_23: "Ensure every security group and rule has a description"
        PASSED for resource: module.eks.aws_security_group.node[0]
        File: /tfplan.json:1752-1912
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-31
Check: CKV_AWS_277: "Ensure no security groups allow ingress from 0.0.0.0:0 to port -1"
        PASSED for resource: module.eks.aws_security_group.node[0]
        File: /tfplan.json:1752-1912
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-group-does-not-allow-all-traffic-on-all-ports
Check: CKV_AWS_25: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 3389"
        PASSED for resource: module.eks.aws_security_group.node[0]
        File: /tfplan.json:1752-1912
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-2
Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80"
        PASSED for resource: module.eks.aws_security_group_rule.cluster["ingress_nodes_443"]
        File: /tfplan.json:2004-2019
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80
Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22"
        PASSED for resource: module.eks.aws_security_group_rule.cluster["ingress_nodes_443"]
        File: /tfplan.json:2004-2019
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-1-port-security
Check: CKV_AWS_23: "Ensure every security group and rule has a description"
        PASSED for resource: module.eks.aws_security_group_rule.cluster["ingress_nodes_443"]
        File: /tfplan.json:2004-2019
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-31
Check: CKV_AWS_277: "Ensure no security groups allow ingress from 0.0.0.0:0 to port -1"
        PASSED for resource: module.eks.aws_security_group_rule.cluster["ingress_nodes_443"]
        File: /tfplan.json:2004-2019
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-group-does-not-allow-all-traffic-on-all-ports
Check: CKV_AWS_25: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 3389"
        PASSED for resource: module.eks.aws_security_group_rule.cluster["ingress_nodes_443"]
        File: /tfplan.json:2004-2019
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-2
Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80"
        PASSED for resource: module.eks.aws_security_group_rule.cluster["ingress_source_security_group_id_vpn"]
        File: /tfplan.json:2030-2047
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80
Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22"
        PASSED for resource: module.eks.aws_security_group_rule.cluster["ingress_source_security_group_id_vpn"]
        File: /tfplan.json:2030-2047
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-1-port-security
Check: CKV_AWS_23: "Ensure every security group and rule has a description"
        PASSED for resource: module.eks.aws_security_group_rule.cluster["ingress_source_security_group_id_vpn"]
        File: /tfplan.json:2030-2047
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-31
Check: CKV_AWS_277: "Ensure no security groups allow ingress from 0.0.0.0:0 to port -1"
        PASSED for resource: module.eks.aws_security_group_rule.cluster["ingress_source_security_group_id_vpn"]
        File: /tfplan.json:2030-2047
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-group-does-not-allow-all-traffic-on-all-ports
Check: CKV_AWS_25: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 3389"
        PASSED for resource: module.eks.aws_security_group_rule.cluster["ingress_source_security_group_id_vpn"]
        File: /tfplan.json:2030-2047
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-2
Check: CKV_AWS_23: "Ensure every security group and rule has a description"
        PASSED for resource: module.eks.aws_security_group_rule.node["egress_all"]
        File: /tfplan.json:2062-2079
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-31
Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80"
        PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_443"]
        File: /tfplan.json:2095-2110
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80
Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22"
        PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_443"]
        File: /tfplan.json:2095-2110
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-1-port-security
Check: CKV_AWS_23: "Ensure every security group and rule has a description"
        PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_443"]
        File: /tfplan.json:2095-2110
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-31
Check: CKV_AWS_277: "Ensure no security groups allow ingress from 0.0.0.0:0 to port -1"
        PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_443"]
        File: /tfplan.json:2095-2110
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-group-does-not-allow-all-traffic-on-all-ports
Check: CKV_AWS_25: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 3389"
        PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_443"]
        File: /tfplan.json:2095-2110
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-2
Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80"
        PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_4443_webhook"]
        File: /tfplan.json:2123-2138
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80
Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22"
        PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_4443_webhook"]
        File: /tfplan.json:2123-2138
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-1-port-security
Check: CKV_AWS_23: "Ensure every security group and rule has a description"
        PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_4443_webhook"]
        File: /tfplan.json:2123-2138
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-31
Check: CKV_AWS_277: "Ensure no security groups allow ingress from 0.0.0.0:0 to port -1"
        PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_4443_webhook"]
        File: /tfplan.json:2123-2138
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-group-does-not-allow-all-traffic-on-all-ports
Check: CKV_AWS_25: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 3389"
        PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_4443_webhook"]
        File: /tfplan.json:2123-2138
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-2
Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80"
        PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_6443_webhook"]
        File: /tfplan.json:2151-2166
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80
Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22"
        PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_6443_webhook"]
        File: /tfplan.json:2151-2166
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-1-port-security
Check: CKV_AWS_23: "Ensure every security group and rule has a description"
        PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_6443_webhook"]
        File: /tfplan.json:2151-2166
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-31
Check: CKV_AWS_277: "Ensure no security groups allow ingress from 0.0.0.0:0 to port -1"
        PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_6443_webhook"]
        File: /tfplan.json:2151-2166
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-group-does-not-allow-all-traffic-on-all-ports
Check: CKV_AWS_25: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 3389"
        PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_6443_webhook"]
        File: /tfplan.json:2151-2166
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-2
Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80"
        PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_8443_webhook"]
        File: /tfplan.json:2179-2194
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80
Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22"
        PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_8443_webhook"]
        File: /tfplan.json:2179-2194
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-1-port-security
Check: CKV_AWS_23: "Ensure every security group and rule has a description"
        PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_8443_webhook"]
        File: /tfplan.json:2179-2194
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-31
Check: CKV_AWS_277: "Ensure no security groups allow ingress from 0.0.0.0:0 to port -1"
        PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_8443_webhook"]
        File: /tfplan.json:2179-2194
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-group-does-not-allow-all-traffic-on-all-ports
Check: CKV_AWS_25: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 3389"
        PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_8443_webhook"]
        File: /tfplan.json:2179-2194
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-2
Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80"
        PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_9443_webhook"]
        File: /tfplan.json:2207-2222
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80
Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22"
        PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_9443_webhook"]
        File: /tfplan.json:2207-2222
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-1-port-security
Check: CKV_AWS_23: "Ensure every security group and rule has a description"
        PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_9443_webhook"]
        File: /tfplan.json:2207-2222
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-31
Check: CKV_AWS_277: "Ensure no security groups allow ingress from 0.0.0.0:0 to port -1"
        PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_9443_webhook"]
        File: /tfplan.json:2207-2222
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-group-does-not-allow-all-traffic-on-all-ports
Check: CKV_AWS_25: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 3389"
        PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_9443_webhook"]
        File: /tfplan.json:2207-2222
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-2
Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80"
        PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_kubelet"]
        File: /tfplan.json:2235-2250
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80
Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22"
        PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_kubelet"]
        File: /tfplan.json:2235-2250
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-1-port-security
Check: CKV_AWS_23: "Ensure every security group and rule has a description"
        PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_kubelet"]
        File: /tfplan.json:2235-2250
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-31
Check: CKV_AWS_277: "Ensure no security groups allow ingress from 0.0.0.0:0 to port -1"
        PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_kubelet"]
        File: /tfplan.json:2235-2250
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-group-does-not-allow-all-traffic-on-all-ports
Check: CKV_AWS_25: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 3389"
        PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_kubelet"]
        File: /tfplan.json:2235-2250
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-2
Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80"
        PASSED for resource: module.eks.aws_security_group_rule.node["ingress_nodes_ephemeral"]
        File: /tfplan.json:2263-2278
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80
Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22"
        PASSED for resource: module.eks.aws_security_group_rule.node["ingress_nodes_ephemeral"]
        File: /tfplan.json:2263-2278
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-1-port-security
Check: CKV_AWS_23: "Ensure every security group and rule has a description"
        PASSED for resource: module.eks.aws_security_group_rule.node["ingress_nodes_ephemeral"]
        File: /tfplan.json:2263-2278
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-31
Check: CKV_AWS_277: "Ensure no security groups allow ingress from 0.0.0.0:0 to port -1"
        PASSED for resource: module.eks.aws_security_group_rule.node["ingress_nodes_ephemeral"]
        File: /tfplan.json:2263-2278
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-group-does-not-allow-all-traffic-on-all-ports
Check: CKV_AWS_25: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 3389"
        PASSED for resource: module.eks.aws_security_group_rule.node["ingress_nodes_ephemeral"]
        File: /tfplan.json:2263-2278
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-2
Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80"
        PASSED for resource: module.eks.aws_security_group_rule.node["ingress_self_coredns_tcp"]
        File: /tfplan.json:2291-2306
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80
Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22"
        PASSED for resource: module.eks.aws_security_group_rule.node["ingress_self_coredns_tcp"]
        File: /tfplan.json:2291-2306
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-1-port-security
Check: CKV_AWS_23: "Ensure every security group and rule has a description"
        PASSED for resource: module.eks.aws_security_group_rule.node["ingress_self_coredns_tcp"]
        File: /tfplan.json:2291-2306
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-31
Check: CKV_AWS_277: "Ensure no security groups allow ingress from 0.0.0.0:0 to port -1"
        PASSED for resource: module.eks.aws_security_group_rule.node["ingress_self_coredns_tcp"]
        File: /tfplan.json:2291-2306
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-group-does-not-allow-all-traffic-on-all-ports
Check: CKV_AWS_25: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 3389"
        PASSED for resource: module.eks.aws_security_group_rule.node["ingress_self_coredns_tcp"]
        File: /tfplan.json:2291-2306
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-2
Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80"
        PASSED for resource: module.eks.aws_security_group_rule.node["ingress_self_coredns_udp"]
        File: /tfplan.json:2319-2334
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80
Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22"
        PASSED for resource: module.eks.aws_security_group_rule.node["ingress_self_coredns_udp"]
        File: /tfplan.json:2319-2334
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-1-port-security
Check: CKV_AWS_23: "Ensure every security group and rule has a description"
        PASSED for resource: module.eks.aws_security_group_rule.node["ingress_self_coredns_udp"]
        File: /tfplan.json:2319-2334
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-31
Check: CKV_AWS_277: "Ensure no security groups allow ingress from 0.0.0.0:0 to port -1"
        PASSED for resource: module.eks.aws_security_group_rule.node["ingress_self_coredns_udp"]
        File: /tfplan.json:2319-2334
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-group-does-not-allow-all-traffic-on-all-ports
Check: CKV_AWS_25: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 3389"
        PASSED for resource: module.eks.aws_security_group_rule.node["ingress_self_coredns_udp"]
        File: /tfplan.json:2319-2334
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-2
Check: CKV_AWS_288: "Ensure IAM policies does not allow data exfiltration"
        PASSED for resource: module.karpenter.aws_iam_policy.controller[0]
        File: /tfplan.json:3161-3187
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-288
Check: CKV_AWS_290: "Ensure IAM policies does not allow write access without constraints"
        PASSED for resource: module.karpenter.aws_iam_policy.controller[0]
        File: /tfplan.json:3161-3187
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-290
Check: CKV_AWS_287: "Ensure IAM policies does not allow credentials exposure"
        PASSED for resource: module.karpenter.aws_iam_policy.controller[0]
        File: /tfplan.json:3161-3187
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-287
Check: CKV_AWS_63: "Ensure no IAM policies documents allow "*" as a statement's actions"
        PASSED for resource: module.karpenter.aws_iam_policy.controller[0]
        File: /tfplan.json:3161-3187
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/iam-48
Check: CKV_AWS_289: "Ensure IAM policies does not allow permissions management / resource exposure without constraints"
        PASSED for resource: module.karpenter.aws_iam_policy.controller[0]
        File: /tfplan.json:3161-3187
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-289
Check: CKV_AWS_62: "Ensure IAM policies that allow full "*-*" administrative privileges are not created"
        PASSED for resource: module.karpenter.aws_iam_policy.controller[0]
        File: /tfplan.json:3161-3187
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-iam-45
Check: CKV_AWS_286: "Ensure IAM policies does not allow privilege escalation"
        PASSED for resource: module.karpenter.aws_iam_policy.controller[0]
        File: /tfplan.json:3161-3187
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-286
Check: CKV_AWS_274: "Disallow IAM roles, users, and groups from using the AWS AdministratorAccess policy"
        PASSED for resource: module.karpenter.aws_iam_role.controller[0]
        File: /tfplan.json:3201-3234
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-274
Check: CKV_AWS_61: "Ensure AWS IAM policy does not allow assume role permission across all services"
        PASSED for resource: module.karpenter.aws_iam_role.controller[0]
        File: /tfplan.json:3201-3234
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-iam-45
Check: CKV_AWS_60: "Ensure IAM role allows only specific services or principals to assume it"
        PASSED for resource: module.karpenter.aws_iam_role.controller[0]
        File: /tfplan.json:3201-3234
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-iam-44
Check: CKV_AWS_274: "Disallow IAM roles, users, and groups from using the AWS AdministratorAccess policy"
        PASSED for resource: module.karpenter.aws_iam_role.node[0]
        File: /tfplan.json:3252-3288
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-274
Check: CKV_AWS_61: "Ensure AWS IAM policy does not allow assume role permission across all services"
        PASSED for resource: module.karpenter.aws_iam_role.node[0]
        File: /tfplan.json:3252-3288
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-iam-45
Check: CKV_AWS_60: "Ensure IAM role allows only specific services or principals to assume it"
        PASSED for resource: module.karpenter.aws_iam_role.node[0]
        File: /tfplan.json:3252-3288
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-iam-44
Check: CKV_AWS_274: "Disallow IAM roles, users, and groups from using the AWS AdministratorAccess policy"
        PASSED for resource: module.karpenter.aws_iam_role_policy_attachment.controller[0]
        File: /tfplan.json:3309-3313
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-274
Check: CKV_AWS_274: "Disallow IAM roles, users, and groups from using the AWS AdministratorAccess policy"
        PASSED for resource: module.karpenter.aws_iam_role_policy_attachment.node["AmazonEC2ContainerRegistryReadOnly"]
        File: /tfplan.json:3324-3328
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-274
Check: CKV_AWS_274: "Disallow IAM roles, users, and groups from using the AWS AdministratorAccess policy"
        PASSED for resource: module.karpenter.aws_iam_role_policy_attachment.node["AmazonEKSWorkerNodePolicy"]
        File: /tfplan.json:3339-3343
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-274
Check: CKV_AWS_274: "Disallow IAM roles, users, and groups from using the AWS AdministratorAccess policy"
        PASSED for resource: module.karpenter.aws_iam_role_policy_attachment.node["AmazonEKS_CNI_Policy"]
        File: /tfplan.json:3354-3358
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-274
Check: CKV_AWS_274: "Disallow IAM roles, users, and groups from using the AWS AdministratorAccess policy"
        PASSED for resource: module.karpenter.aws_iam_role_policy_attachment.node_additional["AmazonSSMManagedInstanceCore"]
        File: /tfplan.json:3369-3373
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-274
Check: CKV_AWS_27: "Ensure all data stored in the SQS queue is encrypted"
        PASSED for resource: module.karpenter.aws_sqs_queue.this[0]
        File: /tfplan.json:3384-3422
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/general-16-encrypt-sqs-queue
Check: CKV_AWS_168: "Ensure SQS queue policy is not public by only allowing specific services or principals to access it"
        PASSED for resource: module.karpenter.aws_sqs_queue_policy.this[0]
        File: /tfplan.json:3436-3440
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/ensure-sqs-queue-policy-is-not-public-by-only-allowing-specific-services-or-principals-to-access-it
Check: CKV_AWS_72: "Ensure SQS policy does not allow ALL (*) actions."
        PASSED for resource: module.karpenter.aws_sqs_queue_policy.this[0]
        File: /tfplan.json:3436-3440
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-iam-46
Check: CKV_AWS_387: "Ensure SQS policy does not allow public access through wildcards"
        PASSED for resource: module.karpenter.aws_sqs_queue_policy.this[0]
        File: /tfplan.json:3436-3440
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/bc-aws-387
Check: CKV_AWS_290: "Ensure IAM policies does not allow write access without constraints"
        FAILED for resource: module.ebs_csi_irsa_role.aws_iam_policy.ebs_csi[0]
        File: /tfplan.json:818-844
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-290

                819 |               "values": {
                820 |                 "arn": "arn:aws:iam::548404922889:policy/EksEBS_CSI_Policy-2025070914422222740000000e",
                821 |                 "attachment_count": 1,
                822 |                 "description": "Provides permissions to manage EBS volumes via the container storage interface driver",
                823 |                 "id": "arn:aws:iam::548404922889:policy/EksEBS_CSI_Policy-2025070914422222740000000e",
                824 |                 "name": "EksEBS_CSI_Policy-2025070914422222740000000e",
                825 |                 "name_prefix": "EksEBS_CSI_Policy-",
                826 |                 "path": "/",
                827 |                 "policy": "{\"Statement\":[{\"Action\":[\"ec2:ModifyVolume\",\"ec2:EnableFastSnapshotRestores\",\"ec2:DetachVolume\",\"ec2:DescribeVolumesModifications\",\"ec2:DescribeVolumes\",\"ec2:DescribeTags\",\"ec2:DescribeSnapshots\",\"ec2:DescribeInstances\",\"ec2:DescribeAvailabilityZones\",\"ec2:CreateSnapshot\",\"ec2:AttachVolume\"],\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":\"ec2:CreateTags\",\"Condition\":{\"StringEquals\":{\"ec2:CreateAction\":[\"CreateVolume\",\"CreateSnapshot\"]}},\"Effect\":\"Allow\",\"Resource\":[\"arn:aws:ec2:*:*:volume/*\",\"arn:aws:ec2:*:*:snapshot/*\"]},{\"Action\":\"ec2:DeleteTags\",\"Effect\":\"Allow\",\"Resource\":[\"arn:aws:ec2:*:*:volume/*\",\"arn:aws:ec2:*:*:snapshot/*\"]},{\"Action\":\"ec2:CreateVolume\",\"Condition\":{\"StringLike\":{\"aws:RequestTag/ebs.csi.aws.com/cluster\":\"true\"}},\"Effect\":\"Allow\",\"Resource\":\"arn:aws:ec2:*:*:volume/*\"},{\"Action\":\"ec2:CreateVolume\",\"Condition\":{\"StringLike\":{\"aws:RequestTag/CSIVolumeName\":\"*\"}},\"Effect\":\"Allow\",\"Resource\":\"arn:aws:ec2:*:*:volume/*\"},{\"Action\":\"ec2:CreateVolume\",\"Condition\":{\"StringLike\":{\"aws:RequestTag/kubernetes.io/cluster/*\":\"owned\"}},\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":\"ec2:CreateVolume\",\"Effect\":\"Allow\",\"Resource\":\"arn:aws:ec2:*:*:snapshot/*\"},{\"Action\":\"ec2:DeleteVolume\",\"Condition\":{\"StringLike\":{\"ec2:ResourceTag/ebs.csi.aws.com/cluster\":\"true\"}},\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":\"ec2:DeleteVolume\",\"Condition\":{\"StringLike\":{\"ec2:ResourceTag/CSIVolumeName\":\"*\"}},\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":\"ec2:DeleteVolume\",\"Condition\":{\"StringLike\":{\"ec2:ResourceTag/kubernetes.io/cluster/*\":\"owned\"}},\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":\"ec2:DeleteVolume\",\"Condition\":{\"StringLike\":{\"ec2:ResourceTag/kubernetes.io/created-for/pvc/name\":\"*\"}},\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":\"ec2:DeleteSnapshot\",\"Condition\":{\"StringLike\":{\"ec2:ResourceTag/CSIVolumeSnapshotName\":\"*\"}},\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":\"ec2:DeleteSnapshot\",\"Condition\":{\"StringLike\":{\"ec2:ResourceTag/ebs.csi.aws.com/cluster\":\"true\"}},\"Effect\":\"Allow\",\"Resource\":\"*\"}],\"Version\":\"2012-10-17\"}",
                828 |                 "policy_id": "ANPAX7L33BIE2BOKB6F6G",
                829 |                 "tags": {
                830 |                   "Company": "Test",
                831 |                   "Environment": "Test-management",
                832 |                   "GithubOrg": "https://github.com/onka-cloud/module-terraform-aws-eks.git",
                833 |                   "GithubRepo": "module-terraform-aws-eks",
                834 |                   "Install": "terraform",
                835 |                   "Owner": "serdar"
                836 |                 },
                837 |                 "tags_all": {
                838 |                   "Company": "Test",
                839 |                   "Environment": "Test-management",
                840 |                   "GithubOrg": "https://github.com/onka-cloud/module-terraform-aws-eks.git",
                841 |                   "GithubRepo": "module-terraform-aws-eks",
                842 |                   "Install": "terraform",
                843 |                   "Owner": "serdar"
                844 |                 }

Check: CKV_AWS_355: "Ensure no IAM policies documents allow "*" as a statement's resource for restrictable actions"
        FAILED for resource: module.ebs_csi_irsa_role.aws_iam_policy.ebs_csi[0]
        File: /tfplan.json:818-844
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-355

                819 |               "values": {
                820 |                 "arn": "arn:aws:iam::548404922889:policy/EksEBS_CSI_Policy-2025070914422222740000000e",
                821 |                 "attachment_count": 1,
                822 |                 "description": "Provides permissions to manage EBS volumes via the container storage interface driver",
                823 |                 "id": "arn:aws:iam::548404922889:policy/EksEBS_CSI_Policy-2025070914422222740000000e",
                824 |                 "name": "EksEBS_CSI_Policy-2025070914422222740000000e",
                825 |                 "name_prefix": "EksEBS_CSI_Policy-",
                826 |                 "path": "/",
                827 |                 "policy": "{\"Statement\":[{\"Action\":[\"ec2:ModifyVolume\",\"ec2:EnableFastSnapshotRestores\",\"ec2:DetachVolume\",\"ec2:DescribeVolumesModifications\",\"ec2:DescribeVolumes\",\"ec2:DescribeTags\",\"ec2:DescribeSnapshots\",\"ec2:DescribeInstances\",\"ec2:DescribeAvailabilityZones\",\"ec2:CreateSnapshot\",\"ec2:AttachVolume\"],\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":\"ec2:CreateTags\",\"Condition\":{\"StringEquals\":{\"ec2:CreateAction\":[\"CreateVolume\",\"CreateSnapshot\"]}},\"Effect\":\"Allow\",\"Resource\":[\"arn:aws:ec2:*:*:volume/*\",\"arn:aws:ec2:*:*:snapshot/*\"]},{\"Action\":\"ec2:DeleteTags\",\"Effect\":\"Allow\",\"Resource\":[\"arn:aws:ec2:*:*:volume/*\",\"arn:aws:ec2:*:*:snapshot/*\"]},{\"Action\":\"ec2:CreateVolume\",\"Condition\":{\"StringLike\":{\"aws:RequestTag/ebs.csi.aws.com/cluster\":\"true\"}},\"Effect\":\"Allow\",\"Resource\":\"arn:aws:ec2:*:*:volume/*\"},{\"Action\":\"ec2:CreateVolume\",\"Condition\":{\"StringLike\":{\"aws:RequestTag/CSIVolumeName\":\"*\"}},\"Effect\":\"Allow\",\"Resource\":\"arn:aws:ec2:*:*:volume/*\"},{\"Action\":\"ec2:CreateVolume\",\"Condition\":{\"StringLike\":{\"aws:RequestTag/kubernetes.io/cluster/*\":\"owned\"}},\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":\"ec2:CreateVolume\",\"Effect\":\"Allow\",\"Resource\":\"arn:aws:ec2:*:*:snapshot/*\"},{\"Action\":\"ec2:DeleteVolume\",\"Condition\":{\"StringLike\":{\"ec2:ResourceTag/ebs.csi.aws.com/cluster\":\"true\"}},\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":\"ec2:DeleteVolume\",\"Condition\":{\"StringLike\":{\"ec2:ResourceTag/CSIVolumeName\":\"*\"}},\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":\"ec2:DeleteVolume\",\"Condition\":{\"StringLike\":{\"ec2:ResourceTag/kubernetes.io/cluster/*\":\"owned\"}},\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":\"ec2:DeleteVolume\",\"Condition\":{\"StringLike\":{\"ec2:ResourceTag/kubernetes.io/created-for/pvc/name\":\"*\"}},\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":\"ec2:DeleteSnapshot\",\"Condition\":{\"StringLike\":{\"ec2:ResourceTag/CSIVolumeSnapshotName\":\"*\"}},\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":\"ec2:DeleteSnapshot\",\"Condition\":{\"StringLike\":{\"ec2:ResourceTag/ebs.csi.aws.com/cluster\":\"true\"}},\"Effect\":\"Allow\",\"Resource\":\"*\"}],\"Version\":\"2012-10-17\"}",
                828 |                 "policy_id": "ANPAX7L33BIE2BOKB6F6G",
                829 |                 "tags": {
                830 |                   "Company": "Test",
                831 |                   "Environment": "Test-management",
                832 |                   "GithubOrg": "https://github.com/onka-cloud/module-terraform-aws-eks.git",
                833 |                   "GithubRepo": "module-terraform-aws-eks",
                834 |                   "Install": "terraform",
                835 |                   "Owner": "serdar"
                836 |                 },
                837 |                 "tags_all": {
                838 |                   "Company": "Test",
                839 |                   "Environment": "Test-management",
                840 |                   "GithubOrg": "https://github.com/onka-cloud/module-terraform-aws-eks.git",
                841 |                   "GithubRepo": "module-terraform-aws-eks",
                842 |                   "Install": "terraform",
                843 |                   "Owner": "serdar"
                844 |                 }

Check: CKV_AWS_338: "Ensure CloudWatch log groups retains logs for at least 1 year"
        FAILED for resource: module.eks.aws_cloudwatch_log_group.this[0]
        File: /tfplan.json:929-944
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-logging-policies/bc-aws-338

                930 |               "values": {
                931 |                 "arn": "arn:aws:logs:eu-central-1:548404922889:log-group:/aws/eks/Test-management-eks/cluster",
                932 |                 "id": "/aws/eks/Test-management-eks/cluster",
                933 |                 "kms_key_id": "",
                934 |                 "log_group_class": "STANDARD",
                935 |                 "name": "/aws/eks/Test-management-eks/cluster",
                936 |                 "name_prefix": "",
                937 |                 "retention_in_days": 90,
                938 |                 "skip_destroy": false,
                939 |                 "tags": {
                940 |                   "Name": "/aws/eks/Test-management-eks/cluster"
                941 |                 },
                942 |                 "tags_all": {
                943 |                   "Name": "/aws/eks/Test-management-eks/cluster"
                944 |                 }

Check: CKV_AWS_158: "Ensure that CloudWatch Log Group is encrypted by KMS"
        FAILED for resource: module.eks.aws_cloudwatch_log_group.this[0]
        File: /tfplan.json:929-944
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/ensure-that-cloudwatch-log-group-is-encrypted-by-kms

                930 |               "values": {
                931 |                 "arn": "arn:aws:logs:eu-central-1:548404922889:log-group:/aws/eks/Test-management-eks/cluster",
                932 |                 "id": "/aws/eks/Test-management-eks/cluster",
                933 |                 "kms_key_id": "",
                934 |                 "log_group_class": "STANDARD",
                935 |                 "name": "/aws/eks/Test-management-eks/cluster",
                936 |                 "name_prefix": "",
                937 |                 "retention_in_days": 90,
                938 |                 "skip_destroy": false,
                939 |                 "tags": {
                940 |                   "Name": "/aws/eks/Test-management-eks/cluster"
                941 |                 },
                942 |                 "tags_all": {
                943 |                   "Name": "/aws/eks/Test-management-eks/cluster"
                944 |                 }

Check: CKV_AWS_339: "Ensure EKS clusters run on a supported Kubernetes version"
        FAILED for resource: module.eks.aws_eks_cluster.this[0]
        File: /tfplan.json:1266-1368
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-kubernetes-policies/bc-aws-339

                Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_AWS_37: "Ensure Amazon EKS control plane logging is enabled for all log types"
        FAILED for resource: module.eks.aws_eks_cluster.this[0]
        File: /tfplan.json:1266-1368
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-kubernetes-policies/bc-aws-kubernetes-4

                Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_AWS_382: "Ensure no security groups allow egress from 0.0.0.0:0 to port -1"
        FAILED for resource: module.eks.aws_security_group.node[0]
        File: /tfplan.json:1752-1912
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/bc-aws-382

                Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_AWS_382: "Ensure no security groups allow egress from 0.0.0.0:0 to port -1"
        FAILED for resource: module.eks.aws_security_group_rule.node["egress_all"]
        File: /tfplan.json:2062-2079
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/bc-aws-382

                2063 |               "values": {
                2064 |                 "cidr_blocks": [
                2065 |                   "0.0.0.0/0"
                2066 |                 ],
                2067 |                 "description": "Allow all egress",
                2068 |                 "from_port": 0,
                2069 |                 "id": "sgrule-3572562169",
                2070 |                 "ipv6_cidr_blocks": null,
                2071 |                 "prefix_list_ids": [],
                2072 |                 "protocol": "-1",
                2073 |                 "security_group_id": "sg-0760ef601429274fe",
                2074 |                 "security_group_rule_id": "sgr-0fe8e6f0f81469e6b",
                2075 |                 "self": false,
                2076 |                 "source_security_group_id": null,
                2077 |                 "timeouts": null,
                2078 |                 "to_port": 0,
                2079 |                 "type": "egress"

Check: CKV_AWS_355: "Ensure no IAM policies documents allow "*" as a statement's resource for restrictable actions"
        FAILED for resource: module.karpenter.aws_iam_policy.controller[0]
        File: /tfplan.json:3161-3187
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-355

                3162 |               "values": {
                3163 |                 "arn": "arn:aws:iam::548404922889:policy/KarpenterController-2025070914411110290000000c",
                3164 |                 "attachment_count": 1,
                3165 |                 "description": "Karpenter controller IAM policy",
                3166 |                 "id": "arn:aws:iam::548404922889:policy/KarpenterController-2025070914411110290000000c",
                3167 |                 "name": "KarpenterController-2025070914411110290000000c",
                3168 |                 "name_prefix": "KarpenterController-",
                3169 |                 "path": "/",
                3170 |                 "policy": "{\"Statement\":[{\"Action\":[\"ec2:RunInstances\",\"ec2:CreateFleet\"],\"Effect\":\"Allow\",\"Resource\":[\"arn:aws:ec2:*::snapshot/*\",\"arn:aws:ec2:*::image/*\",\"arn:aws:ec2:*:*:subnet/*\",\"arn:aws:ec2:*:*:spot-instances-request/*\",\"arn:aws:ec2:*:*:security-group/*\",\"arn:aws:ec2:*:*:launch-template/*\"],\"Sid\":\"AllowScopedEC2InstanceActions\"},{\"Action\":[\"ec2:RunInstances\",\"ec2:CreateLaunchTemplate\",\"ec2:CreateFleet\"],\"Condition\":{\"StringEquals\":{\"aws:RequestTag/kubernetes.io/cluster/Test-management-eks\":\"owned\"},\"StringLike\":{\"aws:RequestTag/karpenter.sh/nodepool\":\"*\"}},\"Effect\":\"Allow\",\"Resource\":[\"arn:aws:ec2:*:*:volume/*\",\"arn:aws:ec2:*:*:spot-instances-request/*\",\"arn:aws:ec2:*:*:network-interface/*\",\"arn:aws:ec2:*:*:launch-template/*\",\"arn:aws:ec2:*:*:instance/*\",\"arn:aws:ec2:*:*:fleet/*\"],\"Sid\":\"AllowScopedEC2InstanceActionsWithTags\"},{\"Action\":\"ec2:CreateTags\",\"Condition\":{\"StringEquals\":{\"aws:RequestTag/kubernetes.io/cluster/Test-management-eks\":\"owned\",\"ec2:CreateAction\":[\"RunInstances\",\"CreateFleet\",\"CreateLaunchTemplate\"]},\"StringLike\":{\"aws:RequestTag/karpenter.sh/nodepool\":\"*\"}},\"Effect\":\"Allow\",\"Resource\":[\"arn:aws:ec2:*:*:volume/*\",\"arn:aws:ec2:*:*:spot-instances-request/*\",\"arn:aws:ec2:*:*:network-interface/*\",\"arn:aws:ec2:*:*:launch-template/*\",\"arn:aws:ec2:*:*:instance/*\",\"arn:aws:ec2:*:*:fleet/*\"],\"Sid\":\"AllowScopedResourceCreationTagging\"},{\"Action\":\"ec2:CreateTags\",\"Condition\":{\"ForAllValues:StringEquals\":{\"aws:TagKeys\":[\"karpenter.sh/nodeclaim\",\"Name\"]},\"StringEquals\":{\"aws:ResourceTag/kubernetes.io/cluster/Test-management-eks\":\"owned\"},\"StringLike\":{\"aws:ResourceTag/karpenter.sh/nodepool\":\"*\"}},\"Effect\":\"Allow\",\"Resource\":\"arn:aws:ec2:*:*:instance/*\",\"Sid\":\"AllowScopedResourceTagging\"},{\"Action\":[\"ec2:TerminateInstances\",\"ec2:DeleteLaunchTemplate\"],\"Condition\":{\"StringEquals\":{\"aws:ResourceTag/kubernetes.io/cluster/Test-management-eks\":\"owned\"},\"StringLike\":{\"aws:ResourceTag/karpenter.sh/nodepool\":\"*\"}},\"Effect\":\"Allow\",\"Resource\":[\"arn:aws:ec2:*:*:launch-template/*\",\"arn:aws:ec2:*:*:instance/*\"],\"Sid\":\"AllowScopedDeletion\"},{\"Action\":[\"ec2:DescribeSubnets\",\"ec2:DescribeSpotPriceHistory\",\"ec2:DescribeSecurityGroups\",\"ec2:DescribeLaunchTemplates\",\"ec2:DescribeInstances\",\"ec2:DescribeInstanceTypes\",\"ec2:DescribeInstanceTypeOfferings\",\"ec2:DescribeImages\",\"ec2:DescribeAvailabilityZones\"],\"Condition\":{\"StringEquals\":{\"aws:RequestedRegion\":\"eu-central-1\"}},\"Effect\":\"Allow\",\"Resource\":\"*\",\"Sid\":\"AllowRegionalReadActions\"},{\"Action\":\"ssm:GetParameter\",\"Effect\":\"Allow\",\"Resource\":\"arn:aws:ssm:eu-central-1::parameter/aws/service/*\",\"Sid\":\"AllowSSMReadActions\"},{\"Action\":\"pricing:GetProducts\",\"Effect\":\"Allow\",\"Resource\":\"*\",\"Sid\":\"AllowPricingReadActions\"},{\"Action\":[\"sqs:ReceiveMessage\",\"sqs:GetQueueUrl\",\"sqs:GetQueueAttributes\",\"sqs:DeleteMessage\"],\"Effect\":\"Allow\",\"Resource\":\"arn:aws:sqs:eu-central-1:548404922889:Karpenter-Test-management-eks\",\"Sid\":\"AllowInterruptionQueueActions\"},{\"Action\":\"iam:PassRole\",\"Condition\":{\"StringEquals\":{\"iam:PassedToService\":\"ec2.amazonaws.com\"}},\"Effect\":\"Allow\",\"Resource\":\"arn:aws:iam::548404922889:role/Karpenter-Test-management-eks-20250709144044563100000006\",\"Sid\":\"AllowPassingInstanceRole\"},{\"Action\":\"iam:CreateInstanceProfile\",\"Condition\":{\"StringEquals\":{\"aws:RequestTag/kubernetes.io/cluster/Test-management-eks\":\"owned\",\"aws:RequestTag/topology.kubernetes.io/region\":\"eu-central-1\"},\"StringLike\":{\"aws:RequestTag/karpenter.k8s.aws/ec2nodeclass\":\"*\"}},\"Effect\":\"Allow\",\"Resource\":\"*\",\"Sid\":\"AllowScopedInstanceProfileCreationActions\"},{\"Action\":\"iam:TagInstanceProfile\",\"Condition\":{\"StringEquals\":{\"aws:RequestTag/kubernetes.io/cluster/Test-management-eks\":\"owned\",\"aws:ResourceTag/kubernetes.io/cluster/Test-management-eks\":\"owned\",\"aws:ResourceTag/topology.kubernetes.io/region\":\"eu-central-1\"},\"StringLike\":{\"aws:RequestTag/karpenter.k8s.aws/ec2nodeclass\":\"*\",\"aws:ResourceTag/karpenter.k8s.aws/ec2nodeclass\":\"*\"}},\"Effect\":\"Allow\",\"Resource\":\"*\",\"Sid\":\"AllowScopedInstanceProfileTagActions\"},{\"Action\":[\"iam:RemoveRoleFromInstanceProfile\",\"iam:DeleteInstanceProfile\",\"iam:AddRoleToInstanceProfile\"],\"Condition\":{\"StringEquals\":{\"aws:ResourceTag/kubernetes.io/cluster/Test-management-eks\":\"owned\",\"aws:ResourceTag/topology.kubernetes.io/region\":\"eu-central-1\"},\"StringLike\":{\"aws:ResourceTag/karpenter.k8s.aws/ec2nodeclass\":\"*\"}},\"Effect\":\"Allow\",\"Resource\":\"*\",\"Sid\":\"AllowScopedInstanceProfileActions\"},{\"Action\":\"iam:GetInstanceProfile\",\"Effect\":\"Allow\",\"Resource\":\"*\",\"Sid\":\"AllowInstanceProfileReadActions\"},{\"Action\":\"eks:DescribeCluster\",\"Effect\":\"Allow\",\"Resource\":\"arn:aws:eks:eu-central-1:548404922889:cluster/Test-management-eks\",\"Sid\":\"AllowAPIServerEndpointDiscovery\"}],\"Version\":\"2012-10-17\"}",
                3171 |                 "policy_id": "ANPAX7L33BIETLVCYQYGU",
                3172 |                 "tags": {
                3173 |                   "Company": "Test",
                3174 |                   "Environment": "Test-management",
                3175 |                   "GithubOrg": "https://github.com/onka-cloud/module-terraform-aws-eks.git",
                3176 |                   "GithubRepo": "module-terraform-aws-eks",
                3177 |                   "Install": "terraform",
                3178 |                   "Owner": "serdar"
                3179 |                 },
                3180 |                 "tags_all": {
                3181 |                   "Company": "Test",
                3182 |                   "Environment": "Test-management",
                3183 |                   "GithubOrg": "https://github.com/onka-cloud/module-terraform-aws-eks.git",
                3184 |                   "GithubRepo": "module-terraform-aws-eks",
                3185 |                   "Install": "terraform",
                3186 |                   "Owner": "serdar"
                3187 |                 }

secrets scan results:

Passed checks: 0, Failed checks: 3, Skipped checks: 0

Check: CKV_SECRET_6: "Base64 High Entropy String"
        FAILED for resource: fa4f65c2c9cad7b93098cbcee14230f3332e4120
        File: /tfplan.json:679-680
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/secrets-policies/secrets-policy-index/git-secrets-6

                679 |             "repository_password": "eyJwYX**********",

Check: CKV_SECRET_6: "Base64 High Entropy String"
        FAILED for resource: 4c83f38edb48d224f862512f6fb3495fc3674117
        File: /tfplan.json:3501-3502
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/secrets-policies/secrets-policy-index/git-secrets-6

                3501 |           "repository_password": "eyJwYX**********",

Check: CKV_SECRET_6: "Base64 High Entropy String"
        FAILED for resource: d26163f63518adac7439bf8a0658a73e04a2dd8b
        File: /tfplan.json:10113-10114
        Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/secrets-policies/secrets-policy-index/git-secrets-6

                10113 |               "authorization_token": "QVdTOm**********",

 

Serdar Bayram

Bu yazı blog üzerinde Serdar Bayram tarafından hazırlanıp paylaşılmıştır. 2009 yılında açılan blogum kısa zaman içerisinde paylasımları ile dikkat cekip büyük bir izleyici kitlesine sahip olmuştur.

İlgili Makaleler

Bir yanıt yazın

E-posta adresiniz yayınlanmayacak. Gerekli alanlar * ile işaretlenmişlerdir

Başa dön tuşu