
Checkov Nedir ?
Checkov, güvenlik veya uyumluluk sorunlarına yol açabilecek hatalı yapılandırmaları tespit etmek için altyapı kod (IaC) dosyalarını tarayan statik bir kod analiz aracıdır. Checkov, yaygın hatalı yapılandırma sorunlarını kontrol etmek için 750’den fazla önceden tanımlanmış politika içerir. Checkov ayrıca özel politikaların oluşturulmasını ve eklenmesini de destekler .
Checkov özellikleri
- Birden fazla sağlayıcı tarafından sağlanan IAC’nizi tarama yeteneği, yani yalnızca Terraform kodunu değil, aynı zamanda CloudFormation, Kubernetes, ARM Templates, Serverless Framework, Dockerfile, GitHub Actions, Python,Helm grafiklerini vb. de tarar.
- Kodunuzu taramak için 1000’den fazla politika.
- Tarama sonuçlarını CLI yerine JUnit ve diğer araçlar aracılığıyla görselleştirme yeteneği.
- Kurulumu kolaydır. Kurulum için sadece pip’e ihtiyacınız var.
- Belirli durumları atlamak istediğinizde sonuçları filtrelemek kolaydır.
IAC Güvenliği
IaC kuruluşumuza önemli bir değer katarken, hangi operasyonel hususları dikkate almalıyız? En önemlisi, bulut güvenliğinin kritik önemini küçümseyemeyiz.
DevOps uygulamaları geliştikçe, kaynak kodu, yazılım uygulamaları, konteyner imajları ve altyapı kaynakları dahil olmak üzere geliştirme süreçlerimizin tüm yönlerinde kapsamlı tarama olmazsa olmaz hale geldi. Yeni sürümleri üretime dağıtmadan önce bu tarama ne kadar kritik? Günümüzün güvenlik ortamı göz önüne alındığında, kesinlikle olmazsa olmazdır. Güvenlik taraması, üretim sistemlerini tehlikeye atabilecek olası güvenlik açıklarına karşı son savunma hattımızdır. Kod Olarak Altyapı (IaC) da bu gerekliliğin bir istisnası değildir; IaC şablonları ve yapılandırmaları, dağıtım süreçlerimizdeki diğer tüm kritik bileşenlerle aynı titiz güvenlik taramasından geçmelidir.
Desteklenen Frameworkler
Checkov, çeşitli yapılandırma dosyalarını taramanıza olanak tanıyan birden fazla IaC çerçevesini destekler:
- Terraform: .tfdosyalar
- CloudFormation: .jsonve .yamldosyalar
- Kubernetes: .yamldosyalar
- ARM Şablonları: .jsondosyalar
- Sunucusuz Çerçeve: serverless.yml dosyalar
Politikalar ve Uyumluluk
Checkov, ortak uyumluluk çerçeveleri ve güvenlik en iyi uygulamaları için yerleşik politikalar içerir, örneğin:
CIS Benchmarks: İnternet Güvenliği Merkezi’nin güvenlik yönergeleri. AWS Temel Güvenlik En İyi Uygulamaları: AWS’ye özgü güvenlik önerileri.
PCI-DSS, HIPAA, SOC 2: Finansal, sağlık ve genel veri korumasına yönelik uyumluluk çerçeveleri.
Özel Politikalar
Checkov’un politika motorunu kullanarak Python’da özel politikalar da yazabilirsiniz. Bu, IaC dosyalarınızda kuruluşa özgü kuralları uygulamanızı sağlar.
Lab Ortamı
Bu makalede chekov aracının kurulumunu yaptıktan sonra Terraform ile hazırlanmış AWS üzerinde EKS kurulumu yapmaza yarayan içerisinde bir çok modül barındıran bir terraform scripti üzerinde çalıştıracak ve bize verdiği raporu detaylı olarak incliyor olacağız.
Checkov kurulumu
MacOs cihazlar için brew kullanıyorsanız aşağıdaki komutu çalıştırıyoruz.Diğer sistemler için bu kılavuzu kullanınız.
| brew install checkov |
|---|
Versiyon kontrolü yapıyoruz aşağıdaki gibi bir çıktı alıyorsak checkov makinemize yüklendi demektir.
| checkov –version 3.2.450 |
|---|
Terraform versiyon kontrol
terraform --version Terraform v1.12.2 on darwin_arm64
uygulayacağım örneğimde aşağıdaki gibi bir EKS Terraform kodum bulunuyor ve bu kodu tarayarak içerisindeki yapılandırmalarda herhangi bir eksiklik yada zafiyet oluşturabilecek bir config var mı bunu kontrol edeceğim.
├── backend.tf ├── karpenter.tf ├── main.tf ├── outputs.tf ├── plan.json ├── provider.tf ├── README.md ├── remote-state.tf ├── tfplan.json ├── variables.tf └── versions.tf
# Terraform kaynağını başlat terraform init Initializing the backend... Initializing modules... Initializing provider plugins... - terraform.io/builtin/terraform is built in to Terraform - Reusing previous version of hashicorp/cloudinit from the dependency lock file - Reusing previous version of alekc/kubectl from the dependency lock file - Reusing previous version of hashicorp/null from the dependency lock file - Reusing previous version of hashicorp/tls from the dependency lock file - Reusing previous version of hashicorp/time from the dependency lock file - Reusing previous version of hashicorp/aws from the dependency lock file - Reusing previous version of hashicorp/helm from the dependency lock file - Using previously-installed hashicorp/cloudinit v2.3.7 - Using previously-installed alekc/kubectl v2.1.3 - Using previously-installed hashicorp/null v3.2.4 - Using previously-installed hashicorp/tls v4.1.0 - Using previously-installed hashicorp/time v0.13.1 - Using previously-installed hashicorp/aws v5.100.0 - Using previously-installed hashicorp/helm v3.0.2 Terraform has been successfully initialized! You may now begin working with Terraform. Try running "terraform plan" to see any changes that are required for your infrastructure. All Terraform commands should now work. If you ever set or change modules or backend configuration for Terraform, rerun this command to reinitialize your working directory. If you forget, other commands will detect it and remind you to do so if necessary.
Checkov Scan
Bu adımdan sonra aşağıdaki komutları çalıştırarak checkov kontrolü yapacağız.
#terraform planı oluştur terraform plan --out tfplan.binary #tf.plandosyayı JSON formatına dönüştürün terraform show -json tfplan.binary | jq > tfplan.json
Checkov security check
checkov -f tfplan.json checkov -f tfplan.json --skip-download -o cli
Soft fail check
| checkov -d . –soft-fail-on LOW,CKV_AWS_46 |
|---|
Hard fail check
| checkov -d . –hard-fail-on HIGH,CKV_AWS_8,CRITICAL,MEDIUM |
|---|
Komut çıktısı aşağıdaki gibi olacak.
[ kubernetes framework ]: 100%|████████████████████|[1/1], Current File Scanned=tfplan.json
[ secrets framework ]: 100%|████████████████████|[1/1], Current File Scanned=tfplan.jsonson
_ _
___| |__ ___ ___| | _______ __
/ __| '_ \ / _ \/ __| |/ / _ \ \ / /
| (__| | | | __/ (__| < (_) \ V /
\___|_| |_|\___|\___|_|\_\___/ \_/
By Prisma Cloud | version: 3.2.450
Update available 3.2.450 -> 3.2.461
Run pip3 install -U checkov to update
terraform_plan scan results:
Passed checks: 142, Failed checks: 9, Skipped checks: 0
Check: CKV_AWS_41: "Ensure no hard coded AWS access key and secret key exists in provider"
PASSED for resource: aws.default
File: /tfplan.json:19022-19039
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/secrets-policies/bc-aws-secrets-5
Check: CKV_AWS_41: "Ensure no hard coded AWS access key and secret key exists in provider"
PASSED for resource: aws.virginia
File: /tfplan.json:19039-19055
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/secrets-policies/bc-aws-secrets-5
Check: CKV_AWS_288: "Ensure IAM policies does not allow data exfiltration"
PASSED for resource: module.ebs_csi_irsa_role.aws_iam_policy.ebs_csi[0]
File: /tfplan.json:818-844
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-288
Check: CKV_AWS_287: "Ensure IAM policies does not allow credentials exposure"
PASSED for resource: module.ebs_csi_irsa_role.aws_iam_policy.ebs_csi[0]
File: /tfplan.json:818-844 
Yapılandırmada hatalı/eksik gördüğü bölümler aşağıdaki gibi.


Komut çıktısı
[ kubernetes framework ]: 100%|████████████████████|[1/1], Current File Scanned=tfplan.json
[ secrets framework ]: 100%|████████████████████|[1/1], Current File Scanned=tfplan.jsonson
_ _
___| |__ ___ ___| | _______ __
/ __| '_ \ / _ \/ __| |/ / _ \ \ / /
| (__| | | | __/ (__| < (_) \ V /
\___|_| |_|\___|\___|_|\_\___/ \_/
By Prisma Cloud | version: 3.2.450
Update available 3.2.450 -> 3.2.461
Run pip3 install -U checkov to update
terraform_plan scan results:
Passed checks: 142, Failed checks: 9, Skipped checks: 0
Check: CKV_AWS_41: "Ensure no hard coded AWS access key and secret key exists in provider"
PASSED for resource: aws.default
File: /tfplan.json:19022-19039
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/secrets-policies/bc-aws-secrets-5
Check: CKV_AWS_41: "Ensure no hard coded AWS access key and secret key exists in provider"
PASSED for resource: aws.virginia
File: /tfplan.json:19039-19055
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/secrets-policies/bc-aws-secrets-5
Check: CKV_AWS_288: "Ensure IAM policies does not allow data exfiltration"
PASSED for resource: module.ebs_csi_irsa_role.aws_iam_policy.ebs_csi[0]
File: /tfplan.json:818-844
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-288
Check: CKV_AWS_287: "Ensure IAM policies does not allow credentials exposure"
PASSED for resource: module.ebs_csi_irsa_role.aws_iam_policy.ebs_csi[0]
File: /tfplan.json:818-844
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-287
Check: CKV_AWS_63: "Ensure no IAM policies documents allow "*" as a statement's actions"
PASSED for resource: module.ebs_csi_irsa_role.aws_iam_policy.ebs_csi[0]
File: /tfplan.json:818-844
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/iam-48
Check: CKV_AWS_289: "Ensure IAM policies does not allow permissions management / resource exposure without constraints"
PASSED for resource: module.ebs_csi_irsa_role.aws_iam_policy.ebs_csi[0]
File: /tfplan.json:818-844
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-289
Check: CKV_AWS_62: "Ensure IAM policies that allow full "*-*" administrative privileges are not created"
PASSED for resource: module.ebs_csi_irsa_role.aws_iam_policy.ebs_csi[0]
File: /tfplan.json:818-844
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-iam-45
Check: CKV_AWS_286: "Ensure IAM policies does not allow privilege escalation"
PASSED for resource: module.ebs_csi_irsa_role.aws_iam_policy.ebs_csi[0]
File: /tfplan.json:818-844
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-286
Check: CKV_AWS_274: "Disallow IAM roles, users, and groups from using the AWS AdministratorAccess policy"
PASSED for resource: module.ebs_csi_irsa_role.aws_iam_role.this[0]
File: /tfplan.json:858-891
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-274
Check: CKV_AWS_61: "Ensure AWS IAM policy does not allow assume role permission across all services"
PASSED for resource: module.ebs_csi_irsa_role.aws_iam_role.this[0]
File: /tfplan.json:858-891
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-iam-45
Check: CKV_AWS_60: "Ensure IAM role allows only specific services or principals to assume it"
PASSED for resource: module.ebs_csi_irsa_role.aws_iam_role.this[0]
File: /tfplan.json:858-891
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-iam-44
Check: CKV_AWS_274: "Disallow IAM roles, users, and groups from using the AWS AdministratorAccess policy"
PASSED for resource: module.ebs_csi_irsa_role.aws_iam_role_policy_attachment.ebs_csi[0]
File: /tfplan.json:909-913
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-274
Check: CKV_AWS_100: "Ensure AWS EKS node group does not have implicit SSH access from 0.0.0.0/0"
PASSED for resource: module.eks.module.eks_managed_node_group["worker_general_t3a"].aws_eks_node_group.this[0]
File: /tfplan.json:2376-2451
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-kubernetes-policies/bc-aws-kubernetes-5
Check: CKV_AWS_274: "Disallow IAM roles, users, and groups from using the AWS AdministratorAccess policy"
PASSED for resource: module.eks.module.eks_managed_node_group["worker_general_t3a"].aws_iam_role.this[0]
File: /tfplan.json:2492-2529
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-274
Check: CKV_AWS_61: "Ensure AWS IAM policy does not allow assume role permission across all services"
PASSED for resource: module.eks.module.eks_managed_node_group["worker_general_t3a"].aws_iam_role.this[0]
File: /tfplan.json:2492-2529
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-iam-45
Check: CKV_AWS_60: "Ensure IAM role allows only specific services or principals to assume it"
PASSED for resource: module.eks.module.eks_managed_node_group["worker_general_t3a"].aws_iam_role.this[0]
File: /tfplan.json:2492-2529
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-iam-44
Check: CKV_AWS_274: "Disallow IAM roles, users, and groups from using the AWS AdministratorAccess policy"
PASSED for resource: module.eks.module.eks_managed_node_group["worker_general_t3a"].aws_iam_role_policy_attachment.additional["AWSLoadBalancerControllerIAMPolicy"]
File: /tfplan.json:2551-2555
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-274
Check: CKV_AWS_274: "Disallow IAM roles, users, and groups from using the AWS AdministratorAccess policy"
PASSED for resource: module.eks.module.eks_managed_node_group["worker_general_t3a"].aws_iam_role_policy_attachment.additional["AmazonSSMManagedInstanceCore"]
File: /tfplan.json:2566-2570
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-274
Check: CKV_AWS_274: "Disallow IAM roles, users, and groups from using the AWS AdministratorAccess policy"
PASSED for resource: module.eks.module.eks_managed_node_group["worker_general_t3a"].aws_iam_role_policy_attachment.this["AmazonEC2ContainerRegistryReadOnly"]
File: /tfplan.json:2581-2585
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-274
Check: CKV_AWS_274: "Disallow IAM roles, users, and groups from using the AWS AdministratorAccess policy"
PASSED for resource: module.eks.module.eks_managed_node_group["worker_general_t3a"].aws_iam_role_policy_attachment.this["AmazonEKSWorkerNodePolicy"]
File: /tfplan.json:2596-2600
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-274
Check: CKV_AWS_274: "Disallow IAM roles, users, and groups from using the AWS AdministratorAccess policy"
PASSED for resource: module.eks.module.eks_managed_node_group["worker_general_t3a"].aws_iam_role_policy_attachment.this["AmazonEKS_CNI_Policy"]
File: /tfplan.json:2611-2615
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-274
Check: CKV_AWS_227: "Ensure KMS key is enabled"
PASSED for resource: module.eks.module.kms.aws_kms_key.this[0]
File: /tfplan.json:2669-2692
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/ensure-aws-key-management-service-kms-key-is-enabled
Check: CKV_AWS_33: "Ensure KMS key policy does not contain wildcard (*) principal"
PASSED for resource: module.eks.module.kms.aws_kms_key.this[0]
File: /tfplan.json:2669-2692
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/ensure-kms-key-policy-does-not-contain-wildcard-principal
Check: CKV_AWS_7: "Ensure rotation for customer created CMKs is enabled"
PASSED for resource: module.eks.module.kms.aws_kms_key.this[0]
File: /tfplan.json:2669-2692
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-logging-policies/logging-8
Check: CKV_AWS_66: "Ensure that CloudWatch Log Group specifies retention days"
PASSED for resource: module.eks.aws_cloudwatch_log_group.this[0]
File: /tfplan.json:929-944
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-logging-policies/logging-13
Check: CKV_AWS_39: "Ensure Amazon EKS public endpoint disabled"
PASSED for resource: module.eks.aws_eks_cluster.this[0]
File: /tfplan.json:1266-1368
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-kubernetes-policies/bc-aws-kubernetes-2
Check: CKV_AWS_58: "Ensure EKS Cluster has Secrets Encryption Enabled"
PASSED for resource: module.eks.aws_eks_cluster.this[0]
File: /tfplan.json:1266-1368
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-kubernetes-policies/bc-aws-kubernetes-3
Check: CKV_AWS_38: "Ensure Amazon EKS public endpoint not accessible to 0.0.0.0/0"
PASSED for resource: module.eks.aws_eks_cluster.this[0]
File: /tfplan.json:1266-1368
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-kubernetes-policies/bc-aws-kubernetes-1
Check: CKV_AWS_288: "Ensure IAM policies does not allow data exfiltration"
PASSED for resource: module.eks.aws_iam_policy.cluster_encryption[0]
File: /tfplan.json:1477-1489
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-288
Check: CKV_AWS_290: "Ensure IAM policies does not allow write access without constraints"
PASSED for resource: module.eks.aws_iam_policy.cluster_encryption[0]
File: /tfplan.json:1477-1489
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-290
Check: CKV_AWS_287: "Ensure IAM policies does not allow credentials exposure"
PASSED for resource: module.eks.aws_iam_policy.cluster_encryption[0]
File: /tfplan.json:1477-1489
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-287
Check: CKV_AWS_63: "Ensure no IAM policies documents allow "*" as a statement's actions"
PASSED for resource: module.eks.aws_iam_policy.cluster_encryption[0]
File: /tfplan.json:1477-1489
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/iam-48
Check: CKV_AWS_289: "Ensure IAM policies does not allow permissions management / resource exposure without constraints"
PASSED for resource: module.eks.aws_iam_policy.cluster_encryption[0]
File: /tfplan.json:1477-1489
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-289
Check: CKV_AWS_62: "Ensure IAM policies that allow full "*-*" administrative privileges are not created"
PASSED for resource: module.eks.aws_iam_policy.cluster_encryption[0]
File: /tfplan.json:1477-1489
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-iam-45
Check: CKV_AWS_355: "Ensure no IAM policies documents allow "*" as a statement's resource for restrictable actions"
PASSED for resource: module.eks.aws_iam_policy.cluster_encryption[0]
File: /tfplan.json:1477-1489
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-355
Check: CKV_AWS_286: "Ensure IAM policies does not allow privilege escalation"
PASSED for resource: module.eks.aws_iam_policy.cluster_encryption[0]
File: /tfplan.json:1477-1489
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-286
Check: CKV_AWS_288: "Ensure IAM policies does not allow data exfiltration"
PASSED for resource: module.eks.aws_iam_policy.custom[0]
File: /tfplan.json:1503-1519
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-288
Check: CKV_AWS_290: "Ensure IAM policies does not allow write access without constraints"
PASSED for resource: module.eks.aws_iam_policy.custom[0]
File: /tfplan.json:1503-1519
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-290
Check: CKV_AWS_287: "Ensure IAM policies does not allow credentials exposure"
PASSED for resource: module.eks.aws_iam_policy.custom[0]
File: /tfplan.json:1503-1519
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-287
Check: CKV_AWS_63: "Ensure no IAM policies documents allow "*" as a statement's actions"
PASSED for resource: module.eks.aws_iam_policy.custom[0]
File: /tfplan.json:1503-1519
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/iam-48
Check: CKV_AWS_289: "Ensure IAM policies does not allow permissions management / resource exposure without constraints"
PASSED for resource: module.eks.aws_iam_policy.custom[0]
File: /tfplan.json:1503-1519
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-289
Check: CKV_AWS_62: "Ensure IAM policies that allow full "*-*" administrative privileges are not created"
PASSED for resource: module.eks.aws_iam_policy.custom[0]
File: /tfplan.json:1503-1519
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-iam-45
Check: CKV_AWS_355: "Ensure no IAM policies documents allow "*" as a statement's resource for restrictable actions"
PASSED for resource: module.eks.aws_iam_policy.custom[0]
File: /tfplan.json:1503-1519
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-355
Check: CKV_AWS_286: "Ensure IAM policies does not allow privilege escalation"
PASSED for resource: module.eks.aws_iam_policy.custom[0]
File: /tfplan.json:1503-1519
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-286
Check: CKV_AWS_274: "Disallow IAM roles, users, and groups from using the AWS AdministratorAccess policy"
PASSED for resource: module.eks.aws_iam_role.this[0]
File: /tfplan.json:1533-1561
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-274
Check: CKV_AWS_61: "Ensure AWS IAM policy does not allow assume role permission across all services"
PASSED for resource: module.eks.aws_iam_role.this[0]
File: /tfplan.json:1533-1561
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-iam-45
Check: CKV_AWS_60: "Ensure IAM role allows only specific services or principals to assume it"
PASSED for resource: module.eks.aws_iam_role.this[0]
File: /tfplan.json:1533-1561
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-iam-44
Check: CKV_AWS_274: "Disallow IAM roles, users, and groups from using the AWS AdministratorAccess policy"
PASSED for resource: module.eks.aws_iam_role_policy_attachment.additional["AWSLoadBalancerControllerIAMPolicy"]
File: /tfplan.json:1584-1588
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-274
Check: CKV_AWS_274: "Disallow IAM roles, users, and groups from using the AWS AdministratorAccess policy"
PASSED for resource: module.eks.aws_iam_role_policy_attachment.additional["AmazonSSMManagedInstanceCore"]
File: /tfplan.json:1599-1603
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-274
Check: CKV_AWS_274: "Disallow IAM roles, users, and groups from using the AWS AdministratorAccess policy"
PASSED for resource: module.eks.aws_iam_role_policy_attachment.cluster_encryption[0]
File: /tfplan.json:1614-1618
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-274
Check: CKV_AWS_274: "Disallow IAM roles, users, and groups from using the AWS AdministratorAccess policy"
PASSED for resource: module.eks.aws_iam_role_policy_attachment.custom[0]
File: /tfplan.json:1629-1633
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-274
Check: CKV_AWS_274: "Disallow IAM roles, users, and groups from using the AWS AdministratorAccess policy"
PASSED for resource: module.eks.aws_iam_role_policy_attachment.this["AmazonEKSClusterPolicy"]
File: /tfplan.json:1644-1648
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-274
Check: CKV_AWS_274: "Disallow IAM roles, users, and groups from using the AWS AdministratorAccess policy"
PASSED for resource: module.eks.aws_iam_role_policy_attachment.this["AmazonEKSVPCResourceController"]
File: /tfplan.json:1659-1663
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-274
Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80"
PASSED for resource: module.eks.aws_security_group.cluster[0]
File: /tfplan.json:1674-1719
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80
Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22"
PASSED for resource: module.eks.aws_security_group.cluster[0]
File: /tfplan.json:1674-1719
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-1-port-security
Check: CKV_AWS_23: "Ensure every security group and rule has a description"
PASSED for resource: module.eks.aws_security_group.cluster[0]
File: /tfplan.json:1674-1719
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-31
Check: CKV_AWS_277: "Ensure no security groups allow ingress from 0.0.0.0:0 to port -1"
PASSED for resource: module.eks.aws_security_group.cluster[0]
File: /tfplan.json:1674-1719
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-group-does-not-allow-all-traffic-on-all-ports
Check: CKV_AWS_25: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 3389"
PASSED for resource: module.eks.aws_security_group.cluster[0]
File: /tfplan.json:1674-1719
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-2
Check: CKV_AWS_382: "Ensure no security groups allow egress from 0.0.0.0:0 to port -1"
PASSED for resource: module.eks.aws_security_group.cluster[0]
File: /tfplan.json:1674-1719
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/bc-aws-382
Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80"
PASSED for resource: module.eks.aws_security_group.node[0]
File: /tfplan.json:1752-1912
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80
Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22"
PASSED for resource: module.eks.aws_security_group.node[0]
File: /tfplan.json:1752-1912
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-1-port-security
Check: CKV_AWS_23: "Ensure every security group and rule has a description"
PASSED for resource: module.eks.aws_security_group.node[0]
File: /tfplan.json:1752-1912
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-31
Check: CKV_AWS_277: "Ensure no security groups allow ingress from 0.0.0.0:0 to port -1"
PASSED for resource: module.eks.aws_security_group.node[0]
File: /tfplan.json:1752-1912
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-group-does-not-allow-all-traffic-on-all-ports
Check: CKV_AWS_25: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 3389"
PASSED for resource: module.eks.aws_security_group.node[0]
File: /tfplan.json:1752-1912
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-2
Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80"
PASSED for resource: module.eks.aws_security_group_rule.cluster["ingress_nodes_443"]
File: /tfplan.json:2004-2019
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80
Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22"
PASSED for resource: module.eks.aws_security_group_rule.cluster["ingress_nodes_443"]
File: /tfplan.json:2004-2019
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-1-port-security
Check: CKV_AWS_23: "Ensure every security group and rule has a description"
PASSED for resource: module.eks.aws_security_group_rule.cluster["ingress_nodes_443"]
File: /tfplan.json:2004-2019
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-31
Check: CKV_AWS_277: "Ensure no security groups allow ingress from 0.0.0.0:0 to port -1"
PASSED for resource: module.eks.aws_security_group_rule.cluster["ingress_nodes_443"]
File: /tfplan.json:2004-2019
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-group-does-not-allow-all-traffic-on-all-ports
Check: CKV_AWS_25: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 3389"
PASSED for resource: module.eks.aws_security_group_rule.cluster["ingress_nodes_443"]
File: /tfplan.json:2004-2019
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-2
Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80"
PASSED for resource: module.eks.aws_security_group_rule.cluster["ingress_source_security_group_id_vpn"]
File: /tfplan.json:2030-2047
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80
Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22"
PASSED for resource: module.eks.aws_security_group_rule.cluster["ingress_source_security_group_id_vpn"]
File: /tfplan.json:2030-2047
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-1-port-security
Check: CKV_AWS_23: "Ensure every security group and rule has a description"
PASSED for resource: module.eks.aws_security_group_rule.cluster["ingress_source_security_group_id_vpn"]
File: /tfplan.json:2030-2047
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-31
Check: CKV_AWS_277: "Ensure no security groups allow ingress from 0.0.0.0:0 to port -1"
PASSED for resource: module.eks.aws_security_group_rule.cluster["ingress_source_security_group_id_vpn"]
File: /tfplan.json:2030-2047
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-group-does-not-allow-all-traffic-on-all-ports
Check: CKV_AWS_25: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 3389"
PASSED for resource: module.eks.aws_security_group_rule.cluster["ingress_source_security_group_id_vpn"]
File: /tfplan.json:2030-2047
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-2
Check: CKV_AWS_23: "Ensure every security group and rule has a description"
PASSED for resource: module.eks.aws_security_group_rule.node["egress_all"]
File: /tfplan.json:2062-2079
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-31
Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80"
PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_443"]
File: /tfplan.json:2095-2110
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80
Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22"
PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_443"]
File: /tfplan.json:2095-2110
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-1-port-security
Check: CKV_AWS_23: "Ensure every security group and rule has a description"
PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_443"]
File: /tfplan.json:2095-2110
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-31
Check: CKV_AWS_277: "Ensure no security groups allow ingress from 0.0.0.0:0 to port -1"
PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_443"]
File: /tfplan.json:2095-2110
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-group-does-not-allow-all-traffic-on-all-ports
Check: CKV_AWS_25: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 3389"
PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_443"]
File: /tfplan.json:2095-2110
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-2
Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80"
PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_4443_webhook"]
File: /tfplan.json:2123-2138
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80
Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22"
PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_4443_webhook"]
File: /tfplan.json:2123-2138
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-1-port-security
Check: CKV_AWS_23: "Ensure every security group and rule has a description"
PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_4443_webhook"]
File: /tfplan.json:2123-2138
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-31
Check: CKV_AWS_277: "Ensure no security groups allow ingress from 0.0.0.0:0 to port -1"
PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_4443_webhook"]
File: /tfplan.json:2123-2138
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-group-does-not-allow-all-traffic-on-all-ports
Check: CKV_AWS_25: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 3389"
PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_4443_webhook"]
File: /tfplan.json:2123-2138
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-2
Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80"
PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_6443_webhook"]
File: /tfplan.json:2151-2166
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80
Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22"
PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_6443_webhook"]
File: /tfplan.json:2151-2166
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-1-port-security
Check: CKV_AWS_23: "Ensure every security group and rule has a description"
PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_6443_webhook"]
File: /tfplan.json:2151-2166
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-31
Check: CKV_AWS_277: "Ensure no security groups allow ingress from 0.0.0.0:0 to port -1"
PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_6443_webhook"]
File: /tfplan.json:2151-2166
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-group-does-not-allow-all-traffic-on-all-ports
Check: CKV_AWS_25: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 3389"
PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_6443_webhook"]
File: /tfplan.json:2151-2166
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-2
Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80"
PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_8443_webhook"]
File: /tfplan.json:2179-2194
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80
Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22"
PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_8443_webhook"]
File: /tfplan.json:2179-2194
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-1-port-security
Check: CKV_AWS_23: "Ensure every security group and rule has a description"
PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_8443_webhook"]
File: /tfplan.json:2179-2194
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-31
Check: CKV_AWS_277: "Ensure no security groups allow ingress from 0.0.0.0:0 to port -1"
PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_8443_webhook"]
File: /tfplan.json:2179-2194
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-group-does-not-allow-all-traffic-on-all-ports
Check: CKV_AWS_25: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 3389"
PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_8443_webhook"]
File: /tfplan.json:2179-2194
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-2
Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80"
PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_9443_webhook"]
File: /tfplan.json:2207-2222
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80
Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22"
PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_9443_webhook"]
File: /tfplan.json:2207-2222
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-1-port-security
Check: CKV_AWS_23: "Ensure every security group and rule has a description"
PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_9443_webhook"]
File: /tfplan.json:2207-2222
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-31
Check: CKV_AWS_277: "Ensure no security groups allow ingress from 0.0.0.0:0 to port -1"
PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_9443_webhook"]
File: /tfplan.json:2207-2222
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-group-does-not-allow-all-traffic-on-all-ports
Check: CKV_AWS_25: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 3389"
PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_9443_webhook"]
File: /tfplan.json:2207-2222
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-2
Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80"
PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_kubelet"]
File: /tfplan.json:2235-2250
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80
Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22"
PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_kubelet"]
File: /tfplan.json:2235-2250
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-1-port-security
Check: CKV_AWS_23: "Ensure every security group and rule has a description"
PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_kubelet"]
File: /tfplan.json:2235-2250
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-31
Check: CKV_AWS_277: "Ensure no security groups allow ingress from 0.0.0.0:0 to port -1"
PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_kubelet"]
File: /tfplan.json:2235-2250
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-group-does-not-allow-all-traffic-on-all-ports
Check: CKV_AWS_25: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 3389"
PASSED for resource: module.eks.aws_security_group_rule.node["ingress_cluster_kubelet"]
File: /tfplan.json:2235-2250
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-2
Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80"
PASSED for resource: module.eks.aws_security_group_rule.node["ingress_nodes_ephemeral"]
File: /tfplan.json:2263-2278
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80
Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22"
PASSED for resource: module.eks.aws_security_group_rule.node["ingress_nodes_ephemeral"]
File: /tfplan.json:2263-2278
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-1-port-security
Check: CKV_AWS_23: "Ensure every security group and rule has a description"
PASSED for resource: module.eks.aws_security_group_rule.node["ingress_nodes_ephemeral"]
File: /tfplan.json:2263-2278
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-31
Check: CKV_AWS_277: "Ensure no security groups allow ingress from 0.0.0.0:0 to port -1"
PASSED for resource: module.eks.aws_security_group_rule.node["ingress_nodes_ephemeral"]
File: /tfplan.json:2263-2278
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-group-does-not-allow-all-traffic-on-all-ports
Check: CKV_AWS_25: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 3389"
PASSED for resource: module.eks.aws_security_group_rule.node["ingress_nodes_ephemeral"]
File: /tfplan.json:2263-2278
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-2
Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80"
PASSED for resource: module.eks.aws_security_group_rule.node["ingress_self_coredns_tcp"]
File: /tfplan.json:2291-2306
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80
Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22"
PASSED for resource: module.eks.aws_security_group_rule.node["ingress_self_coredns_tcp"]
File: /tfplan.json:2291-2306
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-1-port-security
Check: CKV_AWS_23: "Ensure every security group and rule has a description"
PASSED for resource: module.eks.aws_security_group_rule.node["ingress_self_coredns_tcp"]
File: /tfplan.json:2291-2306
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-31
Check: CKV_AWS_277: "Ensure no security groups allow ingress from 0.0.0.0:0 to port -1"
PASSED for resource: module.eks.aws_security_group_rule.node["ingress_self_coredns_tcp"]
File: /tfplan.json:2291-2306
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-group-does-not-allow-all-traffic-on-all-ports
Check: CKV_AWS_25: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 3389"
PASSED for resource: module.eks.aws_security_group_rule.node["ingress_self_coredns_tcp"]
File: /tfplan.json:2291-2306
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-2
Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80"
PASSED for resource: module.eks.aws_security_group_rule.node["ingress_self_coredns_udp"]
File: /tfplan.json:2319-2334
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80
Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22"
PASSED for resource: module.eks.aws_security_group_rule.node["ingress_self_coredns_udp"]
File: /tfplan.json:2319-2334
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-1-port-security
Check: CKV_AWS_23: "Ensure every security group and rule has a description"
PASSED for resource: module.eks.aws_security_group_rule.node["ingress_self_coredns_udp"]
File: /tfplan.json:2319-2334
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-31
Check: CKV_AWS_277: "Ensure no security groups allow ingress from 0.0.0.0:0 to port -1"
PASSED for resource: module.eks.aws_security_group_rule.node["ingress_self_coredns_udp"]
File: /tfplan.json:2319-2334
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-group-does-not-allow-all-traffic-on-all-ports
Check: CKV_AWS_25: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 3389"
PASSED for resource: module.eks.aws_security_group_rule.node["ingress_self_coredns_udp"]
File: /tfplan.json:2319-2334
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-2
Check: CKV_AWS_288: "Ensure IAM policies does not allow data exfiltration"
PASSED for resource: module.karpenter.aws_iam_policy.controller[0]
File: /tfplan.json:3161-3187
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-288
Check: CKV_AWS_290: "Ensure IAM policies does not allow write access without constraints"
PASSED for resource: module.karpenter.aws_iam_policy.controller[0]
File: /tfplan.json:3161-3187
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-290
Check: CKV_AWS_287: "Ensure IAM policies does not allow credentials exposure"
PASSED for resource: module.karpenter.aws_iam_policy.controller[0]
File: /tfplan.json:3161-3187
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-287
Check: CKV_AWS_63: "Ensure no IAM policies documents allow "*" as a statement's actions"
PASSED for resource: module.karpenter.aws_iam_policy.controller[0]
File: /tfplan.json:3161-3187
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/iam-48
Check: CKV_AWS_289: "Ensure IAM policies does not allow permissions management / resource exposure without constraints"
PASSED for resource: module.karpenter.aws_iam_policy.controller[0]
File: /tfplan.json:3161-3187
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-289
Check: CKV_AWS_62: "Ensure IAM policies that allow full "*-*" administrative privileges are not created"
PASSED for resource: module.karpenter.aws_iam_policy.controller[0]
File: /tfplan.json:3161-3187
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-iam-45
Check: CKV_AWS_286: "Ensure IAM policies does not allow privilege escalation"
PASSED for resource: module.karpenter.aws_iam_policy.controller[0]
File: /tfplan.json:3161-3187
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-286
Check: CKV_AWS_274: "Disallow IAM roles, users, and groups from using the AWS AdministratorAccess policy"
PASSED for resource: module.karpenter.aws_iam_role.controller[0]
File: /tfplan.json:3201-3234
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-274
Check: CKV_AWS_61: "Ensure AWS IAM policy does not allow assume role permission across all services"
PASSED for resource: module.karpenter.aws_iam_role.controller[0]
File: /tfplan.json:3201-3234
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-iam-45
Check: CKV_AWS_60: "Ensure IAM role allows only specific services or principals to assume it"
PASSED for resource: module.karpenter.aws_iam_role.controller[0]
File: /tfplan.json:3201-3234
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-iam-44
Check: CKV_AWS_274: "Disallow IAM roles, users, and groups from using the AWS AdministratorAccess policy"
PASSED for resource: module.karpenter.aws_iam_role.node[0]
File: /tfplan.json:3252-3288
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-274
Check: CKV_AWS_61: "Ensure AWS IAM policy does not allow assume role permission across all services"
PASSED for resource: module.karpenter.aws_iam_role.node[0]
File: /tfplan.json:3252-3288
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-iam-45
Check: CKV_AWS_60: "Ensure IAM role allows only specific services or principals to assume it"
PASSED for resource: module.karpenter.aws_iam_role.node[0]
File: /tfplan.json:3252-3288
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-iam-44
Check: CKV_AWS_274: "Disallow IAM roles, users, and groups from using the AWS AdministratorAccess policy"
PASSED for resource: module.karpenter.aws_iam_role_policy_attachment.controller[0]
File: /tfplan.json:3309-3313
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-274
Check: CKV_AWS_274: "Disallow IAM roles, users, and groups from using the AWS AdministratorAccess policy"
PASSED for resource: module.karpenter.aws_iam_role_policy_attachment.node["AmazonEC2ContainerRegistryReadOnly"]
File: /tfplan.json:3324-3328
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-274
Check: CKV_AWS_274: "Disallow IAM roles, users, and groups from using the AWS AdministratorAccess policy"
PASSED for resource: module.karpenter.aws_iam_role_policy_attachment.node["AmazonEKSWorkerNodePolicy"]
File: /tfplan.json:3339-3343
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-274
Check: CKV_AWS_274: "Disallow IAM roles, users, and groups from using the AWS AdministratorAccess policy"
PASSED for resource: module.karpenter.aws_iam_role_policy_attachment.node["AmazonEKS_CNI_Policy"]
File: /tfplan.json:3354-3358
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-274
Check: CKV_AWS_274: "Disallow IAM roles, users, and groups from using the AWS AdministratorAccess policy"
PASSED for resource: module.karpenter.aws_iam_role_policy_attachment.node_additional["AmazonSSMManagedInstanceCore"]
File: /tfplan.json:3369-3373
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-274
Check: CKV_AWS_27: "Ensure all data stored in the SQS queue is encrypted"
PASSED for resource: module.karpenter.aws_sqs_queue.this[0]
File: /tfplan.json:3384-3422
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/general-16-encrypt-sqs-queue
Check: CKV_AWS_168: "Ensure SQS queue policy is not public by only allowing specific services or principals to access it"
PASSED for resource: module.karpenter.aws_sqs_queue_policy.this[0]
File: /tfplan.json:3436-3440
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/ensure-sqs-queue-policy-is-not-public-by-only-allowing-specific-services-or-principals-to-access-it
Check: CKV_AWS_72: "Ensure SQS policy does not allow ALL (*) actions."
PASSED for resource: module.karpenter.aws_sqs_queue_policy.this[0]
File: /tfplan.json:3436-3440
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-iam-46
Check: CKV_AWS_387: "Ensure SQS policy does not allow public access through wildcards"
PASSED for resource: module.karpenter.aws_sqs_queue_policy.this[0]
File: /tfplan.json:3436-3440
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/bc-aws-387
Check: CKV_AWS_290: "Ensure IAM policies does not allow write access without constraints"
FAILED for resource: module.ebs_csi_irsa_role.aws_iam_policy.ebs_csi[0]
File: /tfplan.json:818-844
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-290
819 | "values": {
820 | "arn": "arn:aws:iam::548404922889:policy/EksEBS_CSI_Policy-2025070914422222740000000e",
821 | "attachment_count": 1,
822 | "description": "Provides permissions to manage EBS volumes via the container storage interface driver",
823 | "id": "arn:aws:iam::548404922889:policy/EksEBS_CSI_Policy-2025070914422222740000000e",
824 | "name": "EksEBS_CSI_Policy-2025070914422222740000000e",
825 | "name_prefix": "EksEBS_CSI_Policy-",
826 | "path": "/",
827 | "policy": "{\"Statement\":[{\"Action\":[\"ec2:ModifyVolume\",\"ec2:EnableFastSnapshotRestores\",\"ec2:DetachVolume\",\"ec2:DescribeVolumesModifications\",\"ec2:DescribeVolumes\",\"ec2:DescribeTags\",\"ec2:DescribeSnapshots\",\"ec2:DescribeInstances\",\"ec2:DescribeAvailabilityZones\",\"ec2:CreateSnapshot\",\"ec2:AttachVolume\"],\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":\"ec2:CreateTags\",\"Condition\":{\"StringEquals\":{\"ec2:CreateAction\":[\"CreateVolume\",\"CreateSnapshot\"]}},\"Effect\":\"Allow\",\"Resource\":[\"arn:aws:ec2:*:*:volume/*\",\"arn:aws:ec2:*:*:snapshot/*\"]},{\"Action\":\"ec2:DeleteTags\",\"Effect\":\"Allow\",\"Resource\":[\"arn:aws:ec2:*:*:volume/*\",\"arn:aws:ec2:*:*:snapshot/*\"]},{\"Action\":\"ec2:CreateVolume\",\"Condition\":{\"StringLike\":{\"aws:RequestTag/ebs.csi.aws.com/cluster\":\"true\"}},\"Effect\":\"Allow\",\"Resource\":\"arn:aws:ec2:*:*:volume/*\"},{\"Action\":\"ec2:CreateVolume\",\"Condition\":{\"StringLike\":{\"aws:RequestTag/CSIVolumeName\":\"*\"}},\"Effect\":\"Allow\",\"Resource\":\"arn:aws:ec2:*:*:volume/*\"},{\"Action\":\"ec2:CreateVolume\",\"Condition\":{\"StringLike\":{\"aws:RequestTag/kubernetes.io/cluster/*\":\"owned\"}},\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":\"ec2:CreateVolume\",\"Effect\":\"Allow\",\"Resource\":\"arn:aws:ec2:*:*:snapshot/*\"},{\"Action\":\"ec2:DeleteVolume\",\"Condition\":{\"StringLike\":{\"ec2:ResourceTag/ebs.csi.aws.com/cluster\":\"true\"}},\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":\"ec2:DeleteVolume\",\"Condition\":{\"StringLike\":{\"ec2:ResourceTag/CSIVolumeName\":\"*\"}},\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":\"ec2:DeleteVolume\",\"Condition\":{\"StringLike\":{\"ec2:ResourceTag/kubernetes.io/cluster/*\":\"owned\"}},\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":\"ec2:DeleteVolume\",\"Condition\":{\"StringLike\":{\"ec2:ResourceTag/kubernetes.io/created-for/pvc/name\":\"*\"}},\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":\"ec2:DeleteSnapshot\",\"Condition\":{\"StringLike\":{\"ec2:ResourceTag/CSIVolumeSnapshotName\":\"*\"}},\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":\"ec2:DeleteSnapshot\",\"Condition\":{\"StringLike\":{\"ec2:ResourceTag/ebs.csi.aws.com/cluster\":\"true\"}},\"Effect\":\"Allow\",\"Resource\":\"*\"}],\"Version\":\"2012-10-17\"}",
828 | "policy_id": "ANPAX7L33BIE2BOKB6F6G",
829 | "tags": {
830 | "Company": "Test",
831 | "Environment": "Test-management",
832 | "GithubOrg": "https://github.com/onka-cloud/module-terraform-aws-eks.git",
833 | "GithubRepo": "module-terraform-aws-eks",
834 | "Install": "terraform",
835 | "Owner": "serdar"
836 | },
837 | "tags_all": {
838 | "Company": "Test",
839 | "Environment": "Test-management",
840 | "GithubOrg": "https://github.com/onka-cloud/module-terraform-aws-eks.git",
841 | "GithubRepo": "module-terraform-aws-eks",
842 | "Install": "terraform",
843 | "Owner": "serdar"
844 | }
Check: CKV_AWS_355: "Ensure no IAM policies documents allow "*" as a statement's resource for restrictable actions"
FAILED for resource: module.ebs_csi_irsa_role.aws_iam_policy.ebs_csi[0]
File: /tfplan.json:818-844
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-355
819 | "values": {
820 | "arn": "arn:aws:iam::548404922889:policy/EksEBS_CSI_Policy-2025070914422222740000000e",
821 | "attachment_count": 1,
822 | "description": "Provides permissions to manage EBS volumes via the container storage interface driver",
823 | "id": "arn:aws:iam::548404922889:policy/EksEBS_CSI_Policy-2025070914422222740000000e",
824 | "name": "EksEBS_CSI_Policy-2025070914422222740000000e",
825 | "name_prefix": "EksEBS_CSI_Policy-",
826 | "path": "/",
827 | "policy": "{\"Statement\":[{\"Action\":[\"ec2:ModifyVolume\",\"ec2:EnableFastSnapshotRestores\",\"ec2:DetachVolume\",\"ec2:DescribeVolumesModifications\",\"ec2:DescribeVolumes\",\"ec2:DescribeTags\",\"ec2:DescribeSnapshots\",\"ec2:DescribeInstances\",\"ec2:DescribeAvailabilityZones\",\"ec2:CreateSnapshot\",\"ec2:AttachVolume\"],\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":\"ec2:CreateTags\",\"Condition\":{\"StringEquals\":{\"ec2:CreateAction\":[\"CreateVolume\",\"CreateSnapshot\"]}},\"Effect\":\"Allow\",\"Resource\":[\"arn:aws:ec2:*:*:volume/*\",\"arn:aws:ec2:*:*:snapshot/*\"]},{\"Action\":\"ec2:DeleteTags\",\"Effect\":\"Allow\",\"Resource\":[\"arn:aws:ec2:*:*:volume/*\",\"arn:aws:ec2:*:*:snapshot/*\"]},{\"Action\":\"ec2:CreateVolume\",\"Condition\":{\"StringLike\":{\"aws:RequestTag/ebs.csi.aws.com/cluster\":\"true\"}},\"Effect\":\"Allow\",\"Resource\":\"arn:aws:ec2:*:*:volume/*\"},{\"Action\":\"ec2:CreateVolume\",\"Condition\":{\"StringLike\":{\"aws:RequestTag/CSIVolumeName\":\"*\"}},\"Effect\":\"Allow\",\"Resource\":\"arn:aws:ec2:*:*:volume/*\"},{\"Action\":\"ec2:CreateVolume\",\"Condition\":{\"StringLike\":{\"aws:RequestTag/kubernetes.io/cluster/*\":\"owned\"}},\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":\"ec2:CreateVolume\",\"Effect\":\"Allow\",\"Resource\":\"arn:aws:ec2:*:*:snapshot/*\"},{\"Action\":\"ec2:DeleteVolume\",\"Condition\":{\"StringLike\":{\"ec2:ResourceTag/ebs.csi.aws.com/cluster\":\"true\"}},\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":\"ec2:DeleteVolume\",\"Condition\":{\"StringLike\":{\"ec2:ResourceTag/CSIVolumeName\":\"*\"}},\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":\"ec2:DeleteVolume\",\"Condition\":{\"StringLike\":{\"ec2:ResourceTag/kubernetes.io/cluster/*\":\"owned\"}},\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":\"ec2:DeleteVolume\",\"Condition\":{\"StringLike\":{\"ec2:ResourceTag/kubernetes.io/created-for/pvc/name\":\"*\"}},\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":\"ec2:DeleteSnapshot\",\"Condition\":{\"StringLike\":{\"ec2:ResourceTag/CSIVolumeSnapshotName\":\"*\"}},\"Effect\":\"Allow\",\"Resource\":\"*\"},{\"Action\":\"ec2:DeleteSnapshot\",\"Condition\":{\"StringLike\":{\"ec2:ResourceTag/ebs.csi.aws.com/cluster\":\"true\"}},\"Effect\":\"Allow\",\"Resource\":\"*\"}],\"Version\":\"2012-10-17\"}",
828 | "policy_id": "ANPAX7L33BIE2BOKB6F6G",
829 | "tags": {
830 | "Company": "Test",
831 | "Environment": "Test-management",
832 | "GithubOrg": "https://github.com/onka-cloud/module-terraform-aws-eks.git",
833 | "GithubRepo": "module-terraform-aws-eks",
834 | "Install": "terraform",
835 | "Owner": "serdar"
836 | },
837 | "tags_all": {
838 | "Company": "Test",
839 | "Environment": "Test-management",
840 | "GithubOrg": "https://github.com/onka-cloud/module-terraform-aws-eks.git",
841 | "GithubRepo": "module-terraform-aws-eks",
842 | "Install": "terraform",
843 | "Owner": "serdar"
844 | }
Check: CKV_AWS_338: "Ensure CloudWatch log groups retains logs for at least 1 year"
FAILED for resource: module.eks.aws_cloudwatch_log_group.this[0]
File: /tfplan.json:929-944
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-logging-policies/bc-aws-338
930 | "values": {
931 | "arn": "arn:aws:logs:eu-central-1:548404922889:log-group:/aws/eks/Test-management-eks/cluster",
932 | "id": "/aws/eks/Test-management-eks/cluster",
933 | "kms_key_id": "",
934 | "log_group_class": "STANDARD",
935 | "name": "/aws/eks/Test-management-eks/cluster",
936 | "name_prefix": "",
937 | "retention_in_days": 90,
938 | "skip_destroy": false,
939 | "tags": {
940 | "Name": "/aws/eks/Test-management-eks/cluster"
941 | },
942 | "tags_all": {
943 | "Name": "/aws/eks/Test-management-eks/cluster"
944 | }
Check: CKV_AWS_158: "Ensure that CloudWatch Log Group is encrypted by KMS"
FAILED for resource: module.eks.aws_cloudwatch_log_group.this[0]
File: /tfplan.json:929-944
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/ensure-that-cloudwatch-log-group-is-encrypted-by-kms
930 | "values": {
931 | "arn": "arn:aws:logs:eu-central-1:548404922889:log-group:/aws/eks/Test-management-eks/cluster",
932 | "id": "/aws/eks/Test-management-eks/cluster",
933 | "kms_key_id": "",
934 | "log_group_class": "STANDARD",
935 | "name": "/aws/eks/Test-management-eks/cluster",
936 | "name_prefix": "",
937 | "retention_in_days": 90,
938 | "skip_destroy": false,
939 | "tags": {
940 | "Name": "/aws/eks/Test-management-eks/cluster"
941 | },
942 | "tags_all": {
943 | "Name": "/aws/eks/Test-management-eks/cluster"
944 | }
Check: CKV_AWS_339: "Ensure EKS clusters run on a supported Kubernetes version"
FAILED for resource: module.eks.aws_eks_cluster.this[0]
File: /tfplan.json:1266-1368
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-kubernetes-policies/bc-aws-339
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_AWS_37: "Ensure Amazon EKS control plane logging is enabled for all log types"
FAILED for resource: module.eks.aws_eks_cluster.this[0]
File: /tfplan.json:1266-1368
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-kubernetes-policies/bc-aws-kubernetes-4
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_AWS_382: "Ensure no security groups allow egress from 0.0.0.0:0 to port -1"
FAILED for resource: module.eks.aws_security_group.node[0]
File: /tfplan.json:1752-1912
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/bc-aws-382
Code lines for this resource are too many. Please use IDE of your choice to review the file.
Check: CKV_AWS_382: "Ensure no security groups allow egress from 0.0.0.0:0 to port -1"
FAILED for resource: module.eks.aws_security_group_rule.node["egress_all"]
File: /tfplan.json:2062-2079
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/bc-aws-382
2063 | "values": {
2064 | "cidr_blocks": [
2065 | "0.0.0.0/0"
2066 | ],
2067 | "description": "Allow all egress",
2068 | "from_port": 0,
2069 | "id": "sgrule-3572562169",
2070 | "ipv6_cidr_blocks": null,
2071 | "prefix_list_ids": [],
2072 | "protocol": "-1",
2073 | "security_group_id": "sg-0760ef601429274fe",
2074 | "security_group_rule_id": "sgr-0fe8e6f0f81469e6b",
2075 | "self": false,
2076 | "source_security_group_id": null,
2077 | "timeouts": null,
2078 | "to_port": 0,
2079 | "type": "egress"
Check: CKV_AWS_355: "Ensure no IAM policies documents allow "*" as a statement's resource for restrictable actions"
FAILED for resource: module.karpenter.aws_iam_policy.controller[0]
File: /tfplan.json:3161-3187
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-iam-policies/bc-aws-355
3162 | "values": {
3163 | "arn": "arn:aws:iam::548404922889:policy/KarpenterController-2025070914411110290000000c",
3164 | "attachment_count": 1,
3165 | "description": "Karpenter controller IAM policy",
3166 | "id": "arn:aws:iam::548404922889:policy/KarpenterController-2025070914411110290000000c",
3167 | "name": "KarpenterController-2025070914411110290000000c",
3168 | "name_prefix": "KarpenterController-",
3169 | "path": "/",
3170 | "policy": "{\"Statement\":[{\"Action\":[\"ec2:RunInstances\",\"ec2:CreateFleet\"],\"Effect\":\"Allow\",\"Resource\":[\"arn:aws:ec2:*::snapshot/*\",\"arn:aws:ec2:*::image/*\",\"arn:aws:ec2:*:*:subnet/*\",\"arn:aws:ec2:*:*:spot-instances-request/*\",\"arn:aws:ec2:*:*:security-group/*\",\"arn:aws:ec2:*:*:launch-template/*\"],\"Sid\":\"AllowScopedEC2InstanceActions\"},{\"Action\":[\"ec2:RunInstances\",\"ec2:CreateLaunchTemplate\",\"ec2:CreateFleet\"],\"Condition\":{\"StringEquals\":{\"aws:RequestTag/kubernetes.io/cluster/Test-management-eks\":\"owned\"},\"StringLike\":{\"aws:RequestTag/karpenter.sh/nodepool\":\"*\"}},\"Effect\":\"Allow\",\"Resource\":[\"arn:aws:ec2:*:*:volume/*\",\"arn:aws:ec2:*:*:spot-instances-request/*\",\"arn:aws:ec2:*:*:network-interface/*\",\"arn:aws:ec2:*:*:launch-template/*\",\"arn:aws:ec2:*:*:instance/*\",\"arn:aws:ec2:*:*:fleet/*\"],\"Sid\":\"AllowScopedEC2InstanceActionsWithTags\"},{\"Action\":\"ec2:CreateTags\",\"Condition\":{\"StringEquals\":{\"aws:RequestTag/kubernetes.io/cluster/Test-management-eks\":\"owned\",\"ec2:CreateAction\":[\"RunInstances\",\"CreateFleet\",\"CreateLaunchTemplate\"]},\"StringLike\":{\"aws:RequestTag/karpenter.sh/nodepool\":\"*\"}},\"Effect\":\"Allow\",\"Resource\":[\"arn:aws:ec2:*:*:volume/*\",\"arn:aws:ec2:*:*:spot-instances-request/*\",\"arn:aws:ec2:*:*:network-interface/*\",\"arn:aws:ec2:*:*:launch-template/*\",\"arn:aws:ec2:*:*:instance/*\",\"arn:aws:ec2:*:*:fleet/*\"],\"Sid\":\"AllowScopedResourceCreationTagging\"},{\"Action\":\"ec2:CreateTags\",\"Condition\":{\"ForAllValues:StringEquals\":{\"aws:TagKeys\":[\"karpenter.sh/nodeclaim\",\"Name\"]},\"StringEquals\":{\"aws:ResourceTag/kubernetes.io/cluster/Test-management-eks\":\"owned\"},\"StringLike\":{\"aws:ResourceTag/karpenter.sh/nodepool\":\"*\"}},\"Effect\":\"Allow\",\"Resource\":\"arn:aws:ec2:*:*:instance/*\",\"Sid\":\"AllowScopedResourceTagging\"},{\"Action\":[\"ec2:TerminateInstances\",\"ec2:DeleteLaunchTemplate\"],\"Condition\":{\"StringEquals\":{\"aws:ResourceTag/kubernetes.io/cluster/Test-management-eks\":\"owned\"},\"StringLike\":{\"aws:ResourceTag/karpenter.sh/nodepool\":\"*\"}},\"Effect\":\"Allow\",\"Resource\":[\"arn:aws:ec2:*:*:launch-template/*\",\"arn:aws:ec2:*:*:instance/*\"],\"Sid\":\"AllowScopedDeletion\"},{\"Action\":[\"ec2:DescribeSubnets\",\"ec2:DescribeSpotPriceHistory\",\"ec2:DescribeSecurityGroups\",\"ec2:DescribeLaunchTemplates\",\"ec2:DescribeInstances\",\"ec2:DescribeInstanceTypes\",\"ec2:DescribeInstanceTypeOfferings\",\"ec2:DescribeImages\",\"ec2:DescribeAvailabilityZones\"],\"Condition\":{\"StringEquals\":{\"aws:RequestedRegion\":\"eu-central-1\"}},\"Effect\":\"Allow\",\"Resource\":\"*\",\"Sid\":\"AllowRegionalReadActions\"},{\"Action\":\"ssm:GetParameter\",\"Effect\":\"Allow\",\"Resource\":\"arn:aws:ssm:eu-central-1::parameter/aws/service/*\",\"Sid\":\"AllowSSMReadActions\"},{\"Action\":\"pricing:GetProducts\",\"Effect\":\"Allow\",\"Resource\":\"*\",\"Sid\":\"AllowPricingReadActions\"},{\"Action\":[\"sqs:ReceiveMessage\",\"sqs:GetQueueUrl\",\"sqs:GetQueueAttributes\",\"sqs:DeleteMessage\"],\"Effect\":\"Allow\",\"Resource\":\"arn:aws:sqs:eu-central-1:548404922889:Karpenter-Test-management-eks\",\"Sid\":\"AllowInterruptionQueueActions\"},{\"Action\":\"iam:PassRole\",\"Condition\":{\"StringEquals\":{\"iam:PassedToService\":\"ec2.amazonaws.com\"}},\"Effect\":\"Allow\",\"Resource\":\"arn:aws:iam::548404922889:role/Karpenter-Test-management-eks-20250709144044563100000006\",\"Sid\":\"AllowPassingInstanceRole\"},{\"Action\":\"iam:CreateInstanceProfile\",\"Condition\":{\"StringEquals\":{\"aws:RequestTag/kubernetes.io/cluster/Test-management-eks\":\"owned\",\"aws:RequestTag/topology.kubernetes.io/region\":\"eu-central-1\"},\"StringLike\":{\"aws:RequestTag/karpenter.k8s.aws/ec2nodeclass\":\"*\"}},\"Effect\":\"Allow\",\"Resource\":\"*\",\"Sid\":\"AllowScopedInstanceProfileCreationActions\"},{\"Action\":\"iam:TagInstanceProfile\",\"Condition\":{\"StringEquals\":{\"aws:RequestTag/kubernetes.io/cluster/Test-management-eks\":\"owned\",\"aws:ResourceTag/kubernetes.io/cluster/Test-management-eks\":\"owned\",\"aws:ResourceTag/topology.kubernetes.io/region\":\"eu-central-1\"},\"StringLike\":{\"aws:RequestTag/karpenter.k8s.aws/ec2nodeclass\":\"*\",\"aws:ResourceTag/karpenter.k8s.aws/ec2nodeclass\":\"*\"}},\"Effect\":\"Allow\",\"Resource\":\"*\",\"Sid\":\"AllowScopedInstanceProfileTagActions\"},{\"Action\":[\"iam:RemoveRoleFromInstanceProfile\",\"iam:DeleteInstanceProfile\",\"iam:AddRoleToInstanceProfile\"],\"Condition\":{\"StringEquals\":{\"aws:ResourceTag/kubernetes.io/cluster/Test-management-eks\":\"owned\",\"aws:ResourceTag/topology.kubernetes.io/region\":\"eu-central-1\"},\"StringLike\":{\"aws:ResourceTag/karpenter.k8s.aws/ec2nodeclass\":\"*\"}},\"Effect\":\"Allow\",\"Resource\":\"*\",\"Sid\":\"AllowScopedInstanceProfileActions\"},{\"Action\":\"iam:GetInstanceProfile\",\"Effect\":\"Allow\",\"Resource\":\"*\",\"Sid\":\"AllowInstanceProfileReadActions\"},{\"Action\":\"eks:DescribeCluster\",\"Effect\":\"Allow\",\"Resource\":\"arn:aws:eks:eu-central-1:548404922889:cluster/Test-management-eks\",\"Sid\":\"AllowAPIServerEndpointDiscovery\"}],\"Version\":\"2012-10-17\"}",
3171 | "policy_id": "ANPAX7L33BIETLVCYQYGU",
3172 | "tags": {
3173 | "Company": "Test",
3174 | "Environment": "Test-management",
3175 | "GithubOrg": "https://github.com/onka-cloud/module-terraform-aws-eks.git",
3176 | "GithubRepo": "module-terraform-aws-eks",
3177 | "Install": "terraform",
3178 | "Owner": "serdar"
3179 | },
3180 | "tags_all": {
3181 | "Company": "Test",
3182 | "Environment": "Test-management",
3183 | "GithubOrg": "https://github.com/onka-cloud/module-terraform-aws-eks.git",
3184 | "GithubRepo": "module-terraform-aws-eks",
3185 | "Install": "terraform",
3186 | "Owner": "serdar"
3187 | }
secrets scan results:
Passed checks: 0, Failed checks: 3, Skipped checks: 0
Check: CKV_SECRET_6: "Base64 High Entropy String"
FAILED for resource: fa4f65c2c9cad7b93098cbcee14230f3332e4120
File: /tfplan.json:679-680
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/secrets-policies/secrets-policy-index/git-secrets-6
679 | "repository_password": "eyJwYX**********",
Check: CKV_SECRET_6: "Base64 High Entropy String"
FAILED for resource: 4c83f38edb48d224f862512f6fb3495fc3674117
File: /tfplan.json:3501-3502
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/secrets-policies/secrets-policy-index/git-secrets-6
3501 | "repository_password": "eyJwYX**********",
Check: CKV_SECRET_6: "Base64 High Entropy String"
FAILED for resource: d26163f63518adac7439bf8a0658a73e04a2dd8b
File: /tfplan.json:10113-10114
Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/secrets-policies/secrets-policy-index/git-secrets-6
10113 | "authorization_token": "QVdTOm**********",




