Experience Builder


Terraform

< Back

Repository
SebastianUA / terraform
Description

The place to storing Terraform modules of many providers

Stars

 173

Failed Checks
  •  Security Scanning
     Linting

  • Scan Date

    2023-10-30 17:57:40

    Security Scanning

    This repository failed the Experience Builder Terraform Module's Security Scanning validation. This means that a security scanning tool was not found to be implemented in any of the CICD tool configuration files in the repository.

    There is an opportunity to:

    Checkov Output
                    
                      2023-10-05 14:52:38,684 [MainThread  ] [WARNI]  Failed to download module [email protected]:SebastianUA/terraform.git//azure/modules/base?ref=dev:None (for external modules, the --download-external-modules flag is required)
    2023-10-05 14:52:38,684 [MainThread  ] [WARNI]  Failed to download module 8.8.4.4/32:None (for external modules, the --download-external-modules flag is required)
    2023-10-05 14:52:38,684 [MainThread  ] [WARNI]  Failed to download module [email protected]:SebastianUA/terraform.git//aws/modules/iam_policy?ref=master:None (for external modules, the --download-external-modules flag is required)
    2023-10-05 14:52:38,685 [MainThread  ] [WARNI]  Failed to download module [email protected]:SebastianUA/terraform.git//aws/modules/iam_role?ref=master:None (for external modules, the --download-external-modules flag is required)
    2023-10-05 14:52:38,685 [MainThread  ] [WARNI]  Failed to download module [email protected]:SebastianUA/terraform.git//aws/modules/s3?ref=master:None (for external modules, the --download-external-modules flag is required)
    2023-10-05 14:52:38,689 [MainThread  ] [WARNI]  Failed to download module [email protected]:SebastianUA/terraform.git//random/modules/random?ref=master:None (for external modules, the --download-external-modules flag is required)
    2023-10-05 14:52:38,689 [MainThread  ] [WARNI]  Failed to download module [email protected]:SebastianUA/terraform.git//aws/modules/dms2?ref=dev:None (for external modules, the --download-external-modules flag is required)
    2023-10-05 14:52:38,689 [MainThread  ] [WARNI]  Failed to download module [email protected]:SebastianUA/terraform.git//aws/modules/sns?ref=dev:None (for external modules, the --download-external-modules flag is required)
    2023-10-05 14:52:38,689 [MainThread  ] [WARNI]  Failed to download module [email protected]:SebastianUA/terraform.git//aws/modules/sg?ref=dev:None (for external modules, the --download-external-modules flag is required)
    2023-10-05 14:52:38,690 [MainThread  ] [WARNI]  Failed to download module [email protected]:SebastianUA/terraform.git//aws/modules/iam_role?ref=dev:None (for external modules, the --download-external-modules flag is required)
    2023-10-05 14:52:38,690 [MainThread  ] [WARNI]  Failed to download module [email protected]:SebastianUA/terraform.git//time/modules/time?ref=dev:None (for external modules, the --download-external-modules flag is required)
    2023-10-05 14:52:38,691 [MainThread  ] [WARNI]  Failed to download module [email protected]:SebastianUA/terraform.git//aws/modules/vpc?ref=dev:None (for external modules, the --download-external-modules flag is required)
    2023-10-05 14:52:38,703 [MainThread  ] [WARNI]  Failed to download module [email protected]:SebastianUA/terraform.git//aws/modules/vpc_peering?ref=master:None (for external modules, the --download-external-modules flag is required)
    2023-10-05 14:52:38,703 [MainThread  ] [WARNI]  Failed to download module [email protected]:SebastianUA/terraform.git//aws/modules/ssm?ref=v15.15.15:None (for external modules, the --download-external-modules flag is required)
    2023-10-05 14:52:38,703 [MainThread  ] [WARNI]  Failed to download module [email protected]:SebastianUA/terraform.git//random/modules/random?ref=dev:None (for external modules, the --download-external-modules flag is required)
    2023-10-05 14:52:38,704 [MainThread  ] [WARNI]  Failed to download module [email protected]:SebastianUA/terraform.git//aws/modules/route53?ref=dev:None (for external modules, the --download-external-modules flag is required)
    2023-10-05 14:52:38,704 [MainThread  ] [WARNI]  Failed to download module [email protected]:SebastianUA/terraform.git//aws/modules/rds?ref=dev:None (for external modules, the --download-external-modules flag is required)
    2023-10-05 14:52:38,704 [MainThread  ] [WARNI]  Failed to download module [email protected]:SebastianUA/terraform.git//aws/modules/kms?ref=v15.15.15:None (for external modules, the --download-external-modules flag is required)
    2023-10-05 14:52:38,704 [MainThread  ] [WARNI]  Failed to download module [email protected]:sebastianua/terraform.git//aws/modules/apigatewayv2?ref=dev:None (for external modules, the --download-external-modules flag is required)
    2023-10-05 14:52:38,704 [MainThread  ] [WARNI]  Failed to download module [email protected]:sebastianua/terraform.git//aws/modules/lambda?ref=dev:None (for external modules, the --download-external-modules flag is required)
    2023-10-05 14:52:38,704 [MainThread  ] [WARNI]  Failed to download module [email protected]:sebastianua/terraform.git//aws/modules/route53?ref=dev:None (for external modules, the --download-external-modules flag is required)
    2023-10-05 14:52:38,704 [MainThread  ] [WARNI]  Failed to download module 10.0.0.0/16:None (for external modules, the --download-external-modules flag is required)
    2023-10-05 14:52:38,705 [MainThread  ] [WARNI]  Failed to download module [email protected]:SebastianUA/terraform.git//aws/modules/dms?ref=dev:None (for external modules, the --download-external-modules flag is required)
    2023-10-05 14:52:43,869 [MainThread  ] [WARNI]  Module /home/brett/smallbets/ladoj/gh_scraper/tfcheck/terraform/azure/modules/sdn:latest failed to load via 
    2023-10-05 14:52:43,869 [MainThread  ] [WARNI]  Unable to load module - source: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/terraform/azure/modules/sdn, version: latest, error: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/terraform/azure/modules/sdn
    2023-10-05 14:52:44,008 [MainThread  ] [WARNI]  Module /home/brett/smallbets/ladoj/gh_scraper/tfcheck/terraform/azure/modules/disk_pool:latest failed to load via 
    2023-10-05 14:52:44,008 [MainThread  ] [WARNI]  Unable to load module - source: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/terraform/azure/modules/disk_pool, version: latest, error: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/terraform/azure/modules/disk_pool
    2023-10-05 14:52:44,027 [MainThread  ] [WARNI]  Module /home/brett/smallbets/ladoj/gh_scraper/tfcheck/terraform/azure/modules/management_group:latest failed to load via 
    2023-10-05 14:52:44,027 [MainThread  ] [WARNI]  Unable to load module - source: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/terraform/azure/modules/management_group, version: latest, error: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/terraform/azure/modules/management_group
    2023-10-05 14:52:44,028 [MainThread  ] [WARNI]  Module /home/brett/smallbets/ladoj/gh_scraper/tfcheck/terraform/azure/modules/management_group:latest failed to load via 
    2023-10-05 14:52:44,028 [MainThread  ] [WARNI]  Unable to load module - source: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/terraform/azure/modules/management_group, version: latest, error: /home/brett/smallbets/ladoj/gh_scraper/tfcheck/terraform/azure/modules/management_group
    2023-10-05 14:53:38,025 [MainThread  ] [ERROR]  Failed to run check CKV_GCP_73 on /google_cloud_platform/modules/compute_security/compute_security.tf:google_compute_security_policy.compute_security_policy_custom[0]
    Traceback (most recent call last):
      File "/home/brett/.pyenv/versions/3.9.2/lib/python3.9/site-packages/checkov/common/checks/base_check.py", line 75, in run
        check_result["result"] = self.scan_entity_conf(entity_configuration, entity_type)
      File "/home/brett/.pyenv/versions/3.9.2/lib/python3.9/site-packages/checkov/terraform/checks/resource/base_resource_check.py", line 43, in scan_entity_conf
        return self.scan_resource_conf(conf)
      File "/home/brett/.pyenv/versions/3.9.2/lib/python3.9/site-packages/checkov/terraform/checks/resource/gcp/CloudArmorWAFACLCVE202144228.py", line 25, in scan_resource_conf
        match = rule.get("match")
    AttributeError: 'list' object has no attribute 'get'
    terraform scan results:
    
    Passed checks: 841, Failed checks: 353, Skipped checks: 0
    
    Check: CKV_AWS_283: "Ensure no IAM policies documents allow ALL or any AWS principal permissions to the resource"
    	FAILED for resource: aws_iam_policy_document.iam_policy_document
    	File: /aws/examples/ses/main.tf:44-58
    
    		44 | data "aws_iam_policy_document" "iam_policy_document" {
    		45 |   statement {
    		46 |     actions   = ["SES:SendEmail", "SES:SendRawEmail"]
    		47 |     resources = [module.ses_domain_identity.ses_domain_identity_arn]
    		48 | 
    		49 |     principals {
    		50 |       identifiers = ["*"]
    		51 |       type        = "AWS"
    		52 |     }
    		53 |   }
    		54 | 
    		55 |   depends_on = [
    		56 |     module.ses_domain_identity
    		57 |   ]
    		58 | }
    
    Check: CKV_AWS_150: "Ensure that Load Balancer has deletion protection enabled"
    	FAILED for resource: module.alb.aws_lb.alb[0]
    	File: /aws/modules/alb/lb.tf:4-70
    	Calling File: /aws/examples/alb/main.tf:16-98
    	Guide: https://docs.bridgecrew.io/docs/bc_aws_networking_62
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AWS_2: "Ensure ALB protocol is HTTPS"
    	FAILED for resource: module.alb.aws_lb_listener.alb_listener[0]
    	File: /aws/modules/alb/lb_listener.tf:4-121
    	Calling File: /aws/examples/alb/main.tf:16-98
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-29.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted"
    	FAILED for resource: module.asg.aws_launch_configuration.lc[0]
    	File: /aws/modules/asg/launch_configuration.tf:10-74
    	Calling File: /aws/examples/asg/main.tf:30-153
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled"
    	FAILED for resource: module.asg.aws_launch_configuration.lc[0]
    	File: /aws/modules/asg/launch_configuration.tf:10-74
    	Calling File: /aws/examples/asg/main.tf:30-153
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AWS_310: "Ensure CloudFront distributions should have origin failover configured"
    	FAILED for resource: module.cloudfront.aws_cloudfront_distribution.cloudfront_distribution[0]
    	File: /aws/modules/cloudfront/cloudfront_distribution.tf:4-281
    	Calling File: /aws/examples/cloudfront/main.tf:52-181
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AWS_67: "Ensure CloudTrail is enabled in all Regions"
    	FAILED for resource: module.cloudtrail.aws_cloudtrail.cloudtrail[0]
    	File: /aws/modules/cloudtrail/cloudtrail.tf:4-56
    	Calling File: /aws/examples/cloudtrail/main.tf:32-49
    	Guide: https://docs.bridgecrew.io/docs/logging_1
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AWS_35: "Ensure CloudTrail logs are encrypted at rest using KMS CMKs"
    	FAILED for resource: module.cloudtrail.aws_cloudtrail.cloudtrail[0]
    	File: /aws/modules/cloudtrail/cloudtrail.tf:4-56
    	Calling File: /aws/examples/cloudtrail/main.tf:32-49
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/logging-7.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AWS_36: "Ensure CloudTrail log file validation is enabled"
    	FAILED for resource: module.cloudtrail.aws_cloudtrail.cloudtrail[0]
    	File: /aws/modules/cloudtrail/cloudtrail.tf:4-56
    	Calling File: /aws/examples/cloudtrail/main.tf:32-49
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/logging-2.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AWS_252: "Ensure CloudTrail defines an SNS Topic"
    	FAILED for resource: module.cloudtrail.aws_cloudtrail.cloudtrail[0]
    	File: /aws/modules/cloudtrail/cloudtrail.tf:4-56
    	Calling File: /aws/examples/cloudtrail/main.tf:32-49
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-aws-cloudtrail-defines-an-sns-topic.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AWS_67: "Ensure CloudTrail is enabled in all Regions"
    	FAILED for resource: module.cloudtrail_event_selector_lambda.aws_cloudtrail.cloudtrail[0]
    	File: /aws/modules/cloudtrail/cloudtrail.tf:4-56
    	Calling File: /aws/examples/cloudtrail/main.tf:52-79
    	Guide: https://docs.bridgecrew.io/docs/logging_1
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AWS_35: "Ensure CloudTrail logs are encrypted at rest using KMS CMKs"
    	FAILED for resource: module.cloudtrail_event_selector_lambda.aws_cloudtrail.cloudtrail[0]
    	File: /aws/modules/cloudtrail/cloudtrail.tf:4-56
    	Calling File: /aws/examples/cloudtrail/main.tf:52-79
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/logging-7.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AWS_36: "Ensure CloudTrail log file validation is enabled"
    	FAILED for resource: module.cloudtrail_event_selector_lambda.aws_cloudtrail.cloudtrail[0]
    	File: /aws/modules/cloudtrail/cloudtrail.tf:4-56
    	Calling File: /aws/examples/cloudtrail/main.tf:52-79
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/logging-2.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AWS_252: "Ensure CloudTrail defines an SNS Topic"
    	FAILED for resource: module.cloudtrail_event_selector_lambda.aws_cloudtrail.cloudtrail[0]
    	File: /aws/modules/cloudtrail/cloudtrail.tf:4-56
    	Calling File: /aws/examples/cloudtrail/main.tf:52-79
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-aws-cloudtrail-defines-an-sns-topic.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AWS_67: "Ensure CloudTrail is enabled in all Regions"
    	FAILED for resource: module.cloudtrail_event_selector_s3.aws_cloudtrail.cloudtrail[0]
    	File: /aws/modules/cloudtrail/cloudtrail.tf:4-56
    	Calling File: /aws/examples/cloudtrail/main.tf:82-110
    	Guide: https://docs.bridgecrew.io/docs/logging_1
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AWS_35: "Ensure CloudTrail logs are encrypted at rest using KMS CMKs"
    	FAILED for resource: module.cloudtrail_event_selector_s3.aws_cloudtrail.cloudtrail[0]
    	File: /aws/modules/cloudtrail/cloudtrail.tf:4-56
    	Calling File: /aws/examples/cloudtrail/main.tf:82-110
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/logging-7.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AWS_36: "Ensure CloudTrail log file validation is enabled"
    	FAILED for resource: module.cloudtrail_event_selector_s3.aws_cloudtrail.cloudtrail[0]
    	File: /aws/modules/cloudtrail/cloudtrail.tf:4-56
    	Calling File: /aws/examples/cloudtrail/main.tf:82-110
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/logging-2.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AWS_252: "Ensure CloudTrail defines an SNS Topic"
    	FAILED for resource: module.cloudtrail_event_selector_s3.aws_cloudtrail.cloudtrail[0]
    	File: /aws/modules/cloudtrail/cloudtrail.tf:4-56
    	Calling File: /aws/examples/cloudtrail/main.tf:82-110
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-aws-cloudtrail-defines-an-sns-topic.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AWS_338: "Ensure CloudWatch log groups retains logs for at least 1 year"
    	FAILED for resource: module.cloudwatch_logs.aws_cloudwatch_log_group.cw_log_group[0]
    	File: /aws/modules/cloudwatch_logs/cloudwatch_log_group.tf:4-24
    	Calling File: /aws/examples/cloudwatch_logs/main.tf:13-41
    
    		4  | resource "aws_cloudwatch_log_group" "cw_log_group" {
    		5  |   count = var.enable_cw_log_group ? 1 : 0
    		6  | 
    		7  |   name              = var.cw_log_group_name != "" ? var.cw_log_group_name : "${lower(var.name)}-group-${lower(var.environment)}"
    		8  |   retention_in_days = var.cw_log_group_retention_in_days
    		9  |   kms_key_id        = var.cw_log_group_kms_key_id
    		10 | 
    		11 |   tags = merge(
    		12 |     {
    		13 |       Name = var.cw_log_group_name != "" ? var.cw_log_group_name : "${lower(var.name)}-group-${lower(var.environment)}"
    		14 |     },
    		15 |     var.tags
    		16 |   )
    		17 | 
    		18 |   lifecycle {
    		19 |     create_before_destroy = true
    		20 |     ignore_changes        = []
    		21 |   }
    		22 | 
    		23 |   depends_on = []
    		24 | }
    
    Check: CKV_AWS_158: "Ensure that CloudWatch Log Group is encrypted by KMS"
    	FAILED for resource: module.cloudwatch_logs.aws_cloudwatch_log_group.cw_log_group[0]
    	File: /aws/modules/cloudwatch_logs/cloudwatch_log_group.tf:4-24
    	Calling File: /aws/examples/cloudwatch_logs/main.tf:13-41
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-cloudwatch-log-group-is-encrypted-by-kms.html
    
    		4  | resource "aws_cloudwatch_log_group" "cw_log_group" {
    		5  |   count = var.enable_cw_log_group ? 1 : 0
    		6  | 
    		7  |   name              = var.cw_log_group_name != "" ? var.cw_log_group_name : "${lower(var.name)}-group-${lower(var.environment)}"
    		8  |   retention_in_days = var.cw_log_group_retention_in_days
    		9  |   kms_key_id        = var.cw_log_group_kms_key_id
    		10 | 
    		11 |   tags = merge(
    		12 |     {
    		13 |       Name = var.cw_log_group_name != "" ? var.cw_log_group_name : "${lower(var.name)}-group-${lower(var.environment)}"
    		14 |     },
    		15 |     var.tags
    		16 |   )
    		17 | 
    		18 |   lifecycle {
    		19 |     create_before_destroy = true
    		20 |     ignore_changes        = []
    		21 |   }
    		22 | 
    		23 |   depends_on = []
    		24 | }
    
    Check: CKV_AWS_239: "Ensure DAX cluster endpoint is using TLS"
    	FAILED for resource: module.dax.aws_dax_cluster.dax_cluster[0]
    	File: /aws/modules/dax/dax_cluster.tf:4-56
    	Calling File: /aws/examples/dax/main.tf:13-49
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-aws-dax-cluster-endpoint-uses-transport-layer-security-tls.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AWS_89: "DMS replication instance should not be publicly accessible"
    	FAILED for resource: module.source_dms_endpoint.aws_dms_replication_instance.dms_replication_instance[0]
    	File: /aws/modules/dms/dms_replication_instance.tf:4-49
    	Calling File: /aws/examples/dms/main.tf:13-62
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/public-policies/public-13.html
    
    		4  | resource "aws_dms_replication_instance" "dms_replication_instance" {
    		5  |   count = var.enable_dms_replication_instance ? 1 : 0
    		6  | 
    		7  |   replication_instance_class  = var.dms_replication_instance_replication_instance_class
    		8  |   replication_instance_id     = var.dms_replication_instance_replication_instance_id != "" ? var.dms_replication_instance_replication_instance_id : "${lower(var.name)}-dms-replication-instance-${lower(var.environment)}"
    		9  |   replication_subnet_group_id = var.dms_replication_instance_replication_subnet_group_id != "" ? var.dms_replication_instance_replication_subnet_group_id : (var.enable_dms_replication_subnet_group ? aws_dms_replication_subnet_group.dms_replication_subnet_group[count.index].id : null)
    		10 | 
    		11 |   allocated_storage            = var.dms_replication_instance_allocated_storage
    		12 |   apply_immediately            = var.dms_replication_instance_apply_immediately
    		13 |   auto_minor_version_upgrade   = var.dms_replication_instance_auto_minor_version_upgrade
    		14 |   allow_major_version_upgrade  = var.dms_replication_instance_allow_major_version_upgrade
    		15 |   availability_zone            = var.dms_replication_instance_availability_zone
    		16 |   multi_az                     = var.dms_replication_instance_multi_az
    		17 |   engine_version               = var.dms_replication_instance_engine_version
    		18 |   kms_key_arn                  = var.dms_replication_instance_kms_key_arn
    		19 |   preferred_maintenance_window = var.dms_replication_instance_preferred_maintenance_window
    		20 |   publicly_accessible          = var.dms_replication_instance_publicly_accessible
    		21 |   vpc_security_group_ids       = var.dms_replication_instance_vpc_security_group_ids
    		22 | 
    		23 |   dynamic "timeouts" {
    		24 |     iterator = timeouts
    		25 |     for_each = length(keys(var.dms_replication_instance_timeouts)) > 0 ? [var.dms_replication_instance_timeouts] : []
    		26 | 
    		27 |     content {
    		28 |       create = lookup(timeouts.value, "create", null)
    		29 |       update = lookup(timeouts.value, "update", null)
    		30 |       delete = lookup(timeouts.value, "delete", null)
    		31 |     }
    		32 |   }
    		33 | 
    		34 |   tags = merge(
    		35 |     {
    		36 |       Name = var.dms_replication_instance_replication_instance_id != "" ? var.dms_replication_instance_replication_instance_id : "${lower(var.name)}-dms-replication-instance-${lower(var.environment)}"
    		37 |     },
    		38 |     var.tags
    		39 |   )
    		40 | 
    		41 |   lifecycle {
    		42 |     create_before_destroy = true
    		43 |     ignore_changes        = []
    		44 |   }
    		45 | 
    		46 |   depends_on = [
    		47 |     aws_dms_replication_subnet_group.dms_replication_subnet_group
    		48 |   ]
    		49 | }
    Check: CKV_AWS_119: "Ensure DynamoDB Tables are encrypted using a KMS Customer Managed CMK"
    	FAILED for resource: module.dynamodb.aws_dynamodb_table.dynamodb_table[0]
    	File: /aws/modules/dynamodb/dynamodb_table.tf:4-110
    	Calling File: /aws/examples/dynamodb/main.tf:13-82
    	Guide: https://docs.bridgecrew.io/docs/ensure-that-dynamodb-tables-are-encrypted
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AWS_189: "Ensure EBS Volume is encrypted by KMS using a customer managed Key (CMK)"
    	FAILED for resource: module.ebs.aws_ebs_volume.ebs_volume[0]
    	File: /aws/modules/ebs/ebs_volume.tf:4-29
    	Calling File: /aws/examples/ebs/main.tf:1-32
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-109.html
    
    		4  | resource "aws_ebs_volume" "ebs_volume" {
    		5  |   count = var.enable_ebs_volume ? 1 : 0
    		6  | 
    		7  |   availability_zone = length(var.ebs_volume_availability_zone) > 0 ? var.ebs_volume_availability_zone : element(split(",", (lookup(var.availability_zones, var.region))), 0)
    		8  |   type              = var.ebs_volume_type
    		9  |   size              = var.ebs_volume_size
    		10 | 
    		11 |   encrypted   = var.ebs_volume_encrypted
    		12 |   iops        = var.ebs_volume_iops
    		13 |   snapshot_id = var.ebs_volume_snapshot_id
    		14 |   kms_key_id  = var.ebs_volume_kms_key_id
    		15 | 
    		16 |   tags = merge(
    		17 |     {
    		18 |       Name = var.ebs_volume_name != "" ? lower(var.ebs_volume_name) : "${lower(var.name)}-ebs-${lower(var.environment)}"
    		19 |     },
    		20 |     var.tags
    		21 |   )
    		22 | 
    		23 |   lifecycle {
    		24 |     create_before_destroy = true
    		25 |     ignore_changes        = []
    		26 |   }
    		27 | 
    		28 |   depends_on = []
    		29 | }
    
    Check: CKV_AWS_3: "Ensure all data stored in the EBS is securely encrypted"
    	FAILED for resource: module.ebs.aws_ebs_volume.ebs_volume[0]
    	File: /aws/modules/ebs/ebs_volume.tf:4-29
    	Calling File: /aws/examples/ebs/main.tf:1-32
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-3-encrypt-ebs-volume.html
    
    		4  | resource "aws_ebs_volume" "ebs_volume" {
    		5  |   count = var.enable_ebs_volume ? 1 : 0
    		6  | 
    		7  |   availability_zone = length(var.ebs_volume_availability_zone) > 0 ? var.ebs_volume_availability_zone : element(split(",", (lookup(var.availability_zones, var.region))), 0)
    		8  |   type              = var.ebs_volume_type
    		9  |   size              = var.ebs_volume_size
    		10 | 
    		11 |   encrypted   = var.ebs_volume_encrypted
    		12 |   iops        = var.ebs_volume_iops
    		13 |   snapshot_id = var.ebs_volume_snapshot_id
    		14 |   kms_key_id  = var.ebs_volume_kms_key_id
    		15 | 
    		16 |   tags = merge(
    		17 |     {
    		18 |       Name = var.ebs_volume_name != "" ? lower(var.ebs_volume_name) : "${lower(var.name)}-ebs-${lower(var.environment)}"
    		19 |     },
    		20 |     var.tags
    		21 |   )
    		22 | 
    		23 |   lifecycle {
    		24 |     create_before_destroy = true
    		25 |     ignore_changes        = []
    		26 |   }
    		27 | 
    		28 |   depends_on = []
    		29 | }
    
    Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted"
    	FAILED for resource: module.ec2.aws_instance.instance[0]
    	File: /aws/modules/ec2/instance.tf:4-195
    	Calling File: /aws/examples/ec2/main.tf:13-37
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AWS_88: "EC2 instance should not have public IP."
    	FAILED for resource: module.ec2.aws_instance.instance[0]
    	File: /aws/modules/ec2/instance.tf:4-195
    	Calling File: /aws/examples/ec2/main.tf:13-37
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/public-policies/public-12.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AWS_163: "Ensure ECR image scanning on push is enabled"
    	FAILED for resource: module.ecr.aws_ecr_repository.ecr_repository[0]
    	File: /aws/modules/ecr/ecr_repository.tf:4-21
    	Calling File: /aws/examples/ecr/main.tf:8-28
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-8.html
    
    		4  | resource "aws_ecr_repository" "ecr_repository" {
    		5  |   count = var.enable_ecr_repository ? 1 : 0
    		6  | 
    		7  |   name = var.ecr_repository_name != "" ? var.ecr_repository_name : "${lower(var.name)}-ecr-${lower(var.environment)}"
    		8  | 
    		9  |   tags = merge(
    		10 |     {
    		11 |       Name = var.ecr_repository_name != "" ? var.ecr_repository_name : "${lower(var.name)}-ecr-${lower(var.environment)}"
    		12 |     },
    		13 |     var.tags
    		14 |   )
    		15 | 
    		16 |   timeouts {
    		17 |     delete = var.timeouts_delete
    		18 |   }
    		19 | 
    		20 |   depends_on = []
    		21 | }
    
    Check: CKV_AWS_51: "Ensure ECR Image Tags are immutable"
    	FAILED for resource: module.ecr.aws_ecr_repository.ecr_repository[0]
    	File: /aws/modules/ecr/ecr_repository.tf:4-21
    	Calling File: /aws/examples/ecr/main.tf:8-28
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-24.html
    
    		4  | resource "aws_ecr_repository" "ecr_repository" {
    		5  |   count = var.enable_ecr_repository ? 1 : 0
    		6  | 
    		7  |   name = var.ecr_repository_name != "" ? var.ecr_repository_name : "${lower(var.name)}-ecr-${lower(var.environment)}"
    		8  | 
    		9  |   tags = merge(
    		10 |     {
    		11 |       Name = var.ecr_repository_name != "" ? var.ecr_repository_name : "${lower(var.name)}-ecr-${lower(var.environment)}"
    		12 |     },
    		13 |     var.tags
    		14 |   )
    		15 | 
    		16 |   timeouts {
    		17 |     delete = var.timeouts_delete
    		18 |   }
    		19 | 
    		20 |   depends_on = []
    		21 | }
    
    Check: CKV_AWS_136: "Ensure that ECR repositories are encrypted using KMS"
    	FAILED for resource: module.ecr.aws_ecr_repository.ecr_repository[0]
    	File: /aws/modules/ecr/ecr_repository.tf:4-21
    	Calling File: /aws/examples/ecr/main.tf:8-28
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ecr-repositories-are-encrypted.html
    
    		4  | resource "aws_ecr_repository" "ecr_repository" {
    		5  |   count = var.enable_ecr_repository ? 1 : 0
    		6  | 
    		7  |   name = var.ecr_repository_name != "" ? var.ecr_repository_name : "${lower(var.name)}-ecr-${lower(var.environment)}"
    		8  | 
    		9  |   tags = merge(
    		10 |     {
    		11 |       Name = var.ecr_repository_name != "" ? var.ecr_repository_name : "${lower(var.name)}-ecr-${lower(var.environment)}"
    		12 |     },
    		13 |     var.tags
    		14 |   )
    		15 | 
    		16 |   timeouts {
    		17 |     delete = var.timeouts_delete
    		18 |   }
    		19 | 
    		20 |   depends_on = []
    		21 | }
    
    Check: CKV_AWS_184: "Ensure resource is encrypted by KMS using a customer managed Key (CMK)"
    	FAILED for resource: module.efs.aws_efs_file_system.efs_file_system[0]
    	File: /aws/modules/efs/efs_file_system.tf:4-37
    	Calling File: /aws/examples/efs/main.tf:14-54
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-104.html
    
    		4  | resource "aws_efs_file_system" "efs_file_system" {
    		5  |   count = var.enable_efs_file_system ? 1 : 0
    		6  | 
    		7  |   creation_token   = var.efs_file_system_creation_token
    		8  |   encrypted        = var.efs_file_system_encrypted
    		9  |   kms_key_id       = var.efs_file_system_kms_key_id
    		10 |   performance_mode = var.efs_file_system_performance_mode
    		11 | 
    		12 |   provisioned_throughput_in_mibps = var.efs_file_system_provisioned_throughput_in_mibps
    		13 |   throughput_mode                 = var.efs_file_system_throughput_mode
    		14 | 
    		15 |   dynamic "lifecycle_policy" {
    		16 |     iterator = lifecycle_policy
    		17 |     for_each = var.efs_file_system_lifecycle_policy
    		18 | 
    		19 |     content {
    		20 |       transition_to_ia = lookup(lifecycle_policy.value, "transition_to_ia", null)
    		21 |     }
    		22 |   }
    		23 | 
    		24 |   tags = merge(
    		25 |     {
    		26 |       Name = var.efs_file_system_name != "" ? var.efs_file_system_name : "${lower(var.name)}-efs-${lower(var.environment)}"
    		27 |     },
    		28 |     var.tags
    		29 |   )
    		30 | 
    		31 |   lifecycle {
    		32 |     create_before_destroy = true
    		33 |     ignore_changes        = []
    		34 |   }
    		35 | 
    		36 |   depends_on = []
    		37 | }
    
    Check: CKV_AWS_42: "Ensure EFS is securely encrypted"
    	FAILED for resource: module.efs.aws_efs_file_system.efs_file_system[0]
    	File: /aws/modules/efs/efs_file_system.tf:4-37
    	Calling File: /aws/examples/efs/main.tf:14-54
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-17.html
    
    		4  | resource "aws_efs_file_system" "efs_file_system" {
    		5  |   count = var.enable_efs_file_system ? 1 : 0
    		6  | 
    		7  |   creation_token   = var.efs_file_system_creation_token
    		8  |   encrypted        = var.efs_file_system_encrypted
    		9  |   kms_key_id       = var.efs_file_system_kms_key_id
    		10 |   performance_mode = var.efs_file_system_performance_mode
    		11 | 
    		12 |   provisioned_throughput_in_mibps = var.efs_file_system_provisioned_throughput_in_mibps
    		13 |   throughput_mode                 = var.efs_file_system_throughput_mode
    		14 | 
    		15 |   dynamic "lifecycle_policy" {
    		16 |     iterator = lifecycle_policy
    		17 |     for_each = var.efs_file_system_lifecycle_policy
    		18 | 
    		19 |     content {
    		20 |       transition_to_ia = lookup(lifecycle_policy.value, "transition_to_ia", null)
    		21 |     }
    		22 |   }
    		23 | 
    		24 |   tags = merge(
    		25 |     {
    		26 |       Name = var.efs_file_system_name != "" ? var.efs_file_system_name : "${lower(var.name)}-efs-${lower(var.environment)}"
    		27 |     },
    		28 |     var.tags
    		29 |   )
    		30 | 
    		31 |   lifecycle {
    		32 |     create_before_destroy = true
    		33 |     ignore_changes        = []
    		34 |   }
    		35 | 
    		36 |   depends_on = []
    		37 | }
    
    Check: CKV_AWS_39: "Ensure Amazon EKS public endpoint disabled"
    	FAILED for resource: module.eks.aws_eks_cluster.eks_cluster[0]
    	File: /aws/modules/eks/eks_cluster.tf:4-78
    	Calling File: /aws/examples/eks/main.tf:89-148
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-kubernetes-policies/bc-aws-kubernetes-2.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AWS_37: "Ensure Amazon EKS control plane logging enabled for all log types"
    	FAILED for resource: module.eks.aws_eks_cluster.eks_cluster[0]
    	File: /aws/modules/eks/eks_cluster.tf:4-78
    	Calling File: /aws/examples/eks/main.tf:89-148
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-kubernetes-policies/bc-aws-kubernetes-4.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AWS_196: "Ensure no aws_elasticache_security_group resources exist"
    	FAILED for resource: module.elasticache_single_redis.aws_elasticache_security_group.elasticache_security_group[0]
    	File: /aws/modules/elasticache/elasticache_security_group.tf:4-20
    	Calling File: /aws/examples/elasticache/main.tf:20-59
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-aws-elasticache-security-groups-are-defined.html
    
    		4  | resource "aws_elasticache_security_group" "elasticache_security_group" {
    		5  |   count = var.enable_elasticache_security_group ? 1 : 0
    		6  | 
    		7  |   name        = var.elasticache_security_group_name != "" ? var.elasticache_security_group_name : "${lower(var.name)}-elasticache-sg-${lower(var.environment)}"
    		8  |   description = var.elasticache_security_group_description != "" ? var.elasticache_security_group_description : "Elasticache security group (SG) which managed by me"
    		9  | 
    		10 |   # NOTE: ElastiCache Subnet Groups are only for use when working with an ElastiCache cluster inside of a VPC. If you are on EC2 Classic, see the ElastiCache Security Group resource.
    		11 |   # NOTE: ElastiCache Security Groups are for use only when working with an ElastiCache cluster outside of a VPC. If you are using a VPC, see the ElastiCache Subnet Group resource.
    		12 |   security_group_names = var.elasticache_security_group_security_group_names
    		13 | 
    		14 |   lifecycle {
    		15 |     create_before_destroy = true
    		16 |     ignore_changes        = []
    		17 |   }
    		18 | 
    		19 |   depends_on = []
    		20 | }
    
    Check: CKV_AWS_340: "Ensure Elastic Beanstalk managed platform updates are enabled"
    	FAILED for resource: module.elasticbeanstalk.aws_elastic_beanstalk_environment.elastic_beanstalk_environment[0]
    	File: /aws/modules/elasticbeanstalk/elastic_beanstalk_environment.tf:4-48
    	Calling File: /aws/examples/elasticbeanstalk/main.tf:14-73
    
    		4  | resource "aws_elastic_beanstalk_environment" "elastic_beanstalk_environment" {
    		5  |   count = var.enable_elastic_beanstalk_environment ? 1 : 0
    		6  | 
    		7  |   name        = var.elastic_beanstalk_environment_name != "" ? var.elastic_beanstalk_environment_name : "${lower(var.name)}-eb-env-${lower(var.environment)}"
    		8  |   description = var.elastic_beanstalk_environment_description != "" ? var.elastic_beanstalk_environment_description : null
    		9  |   application = var.elastic_beanstalk_environment_application != "" ? var.elastic_beanstalk_application_name : (var.enable_elastic_beanstalk_application ? aws_elastic_beanstalk_application.elastic_beanstalk_application.0.name : null)
    		10 | 
    		11 |   solution_stack_name = var.elastic_beanstalk_environment_solution_stack_name != "" && var.elastic_beanstalk_environment_template_name == "" ? var.elastic_beanstalk_environment_solution_stack_name : null
    		12 |   template_name       = var.elastic_beanstalk_environment_template_name != "" && var.elastic_beanstalk_environment_solution_stack_name == "" ? var.elastic_beanstalk_environment_template_name : null
    		13 |   cname_prefix        = var.elastic_beanstalk_environment_cname_prefix != "" ? var.elastic_beanstalk_environment_cname_prefix : null
    		14 |   tier                = var.elastic_beanstalk_environment_tier
    		15 | 
    		16 |   dynamic "setting" {
    		17 |     iterator = setting
    		18 |     for_each = var.elastic_beanstalk_environment_setting
    		19 | 
    		20 |     content {
    		21 |       name      = lookup(setting.value, "name", null)
    		22 |       value     = lookup(setting.value, "value", null)
    		23 |       namespace = lookup(setting.value, "namespace", null)
    		24 |       resource  = lookup(setting.value, "resource", null)
    		25 |     }
    		26 |   }
    		27 | 
    		28 |   platform_arn           = var.elastic_beanstalk_environment_platform_arn
    		29 |   wait_for_ready_timeout = var.elastic_beanstalk_environment_wait_for_ready_timeout
    		30 |   poll_interval          = var.elastic_beanstalk_environment_poll_interval
    		31 |   version_label          = var.elastic_beanstalk_environment_version_label
    		32 | 
    		33 |   tags = merge(
    		34 |     {
    		35 |       Name = var.elastic_beanstalk_environment_name != "" ? lower(var.elastic_beanstalk_environment_name) : "${lower(var.name)}-eb-env-${lower(var.environment)}"
    		36 |     },
    		37 |     var.tags
    		38 |   )
    		39 | 
    		40 |   lifecycle {
    		41 |     create_before_destroy = true
    		42 |     ignore_changes        = [tags]
    		43 |   }
    		44 | 
    		45 |   depends_on = [
    		46 |     aws_elastic_beanstalk_application.elastic_beanstalk_application
    		47 |   ]
    		48 | }
    
    Check: CKV_AWS_312: "Ensure Elastic Beanstalk environments have enhanced health reporting enabled"
    	FAILED for resource: module.elasticbeanstalk.aws_elastic_beanstalk_environment.elastic_beanstalk_environment[0]
    	File: /aws/modules/elasticbeanstalk/elastic_beanstalk_environment.tf:4-48
    	Calling File: /aws/examples/elasticbeanstalk/main.tf:14-73
    
    		4  | resource "aws_elastic_beanstalk_environment" "elastic_beanstalk_environment" {
    		5  |   count = var.enable_elastic_beanstalk_environment ? 1 : 0
    		6  | 
    		7  |   name        = var.elastic_beanstalk_environment_name != "" ? var.elastic_beanstalk_environment_name : "${lower(var.name)}-eb-env-${lower(var.environment)}"
    		8  |   description = var.elastic_beanstalk_environment_description != "" ? var.elastic_beanstalk_environment_description : null
    		9  |   application = var.elastic_beanstalk_environment_application != "" ? var.elastic_beanstalk_application_name : (var.enable_elastic_beanstalk_application ? aws_elastic_beanstalk_application.elastic_beanstalk_application.0.name : null)
    		10 | 
    		11 |   solution_stack_name = var.elastic_beanstalk_environment_solution_stack_name != "" && var.elastic_beanstalk_environment_template_name == "" ? var.elastic_beanstalk_environment_solution_stack_name : null
    		12 |   template_name       = var.elastic_beanstalk_environment_template_name != "" && var.elastic_beanstalk_environment_solution_stack_name == "" ? var.elastic_beanstalk_environment_template_name : null
    		13 |   cname_prefix        = var.elastic_beanstalk_environment_cname_prefix != "" ? var.elastic_beanstalk_environment_cname_prefix : null
    		14 |   tier                = var.elastic_beanstalk_environment_tier
    		15 | 
    		16 |   dynamic "setting" {
    		17 |     iterator = setting
    		18 |     for_each = var.elastic_beanstalk_environment_setting
    		19 | 
    		20 |     content {
    		21 |       name      = lookup(setting.value, "name", null)
    		22 |       value     = lookup(setting.value, "value", null)
    		23 |       namespace = lookup(setting.value, "namespace", null)
    		24 |       resource  = lookup(setting.value, "resource", null)
    		25 |     }
    		26 |   }
    		27 | 
    		28 |   platform_arn           = var.elastic_beanstalk_environment_platform_arn
    		29 |   wait_for_ready_timeout = var.elastic_beanstalk_environment_wait_for_ready_timeout
    		30 |   poll_interval          = var.elastic_beanstalk_environment_poll_interval
    		31 |   version_label          = var.elastic_beanstalk_environment_version_label
    		32 | 
    		33 |   tags = merge(
    		34 |     {
    		35 |       Name = var.elastic_beanstalk_environment_name != "" ? lower(var.elastic_beanstalk_environment_name) : "${lower(var.name)}-eb-env-${lower(var.environment)}"
    		36 |     },
    		37 |     var.tags
    		38 |   )
    		39 | 
    		40 |   lifecycle {
    		41 |     create_before_destroy = true
    		42 |     ignore_changes        = [tags]
    		43 |   }
    		44 | 
    		45 |   depends_on = [
    		46 |     aws_elastic_beanstalk_application.elastic_beanstalk_application
    		47 |   ]
    		48 | }
    
    Check: CKV_AWS_318: "Ensure Elasticsearch domains are configured with at least three dedicated master nodes for HA"
    	FAILED for resource: module.elasticsearch_domain.aws_elasticsearch_domain.elasticsearch_domain[0]
    	File: /aws/modules/elasticsearch/elasticsearch_domain.tf:4-170
    	Calling File: /aws/examples/elasticsearch/main.tf:14-49
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AWS_248: "Ensure that Elasticsearch is not using the default Security Group"
    	FAILED for resource: module.elasticsearch_domain.aws_elasticsearch_domain.elasticsearch_domain[0]
    	File: /aws/modules/elasticsearch/elasticsearch_domain.tf:4-170
    	Calling File: /aws/examples/elasticsearch/main.tf:14-49
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-aws-elasticsearch-does-not-use-the-default-security-group.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AWS_317: "Ensure Elasticsearch Domain Audit Logging is enabled"
    	FAILED for resource: module.elasticsearch_domain.aws_elasticsearch_domain.elasticsearch_domain[0]
    	File: /aws/modules/elasticsearch/elasticsearch_domain.tf:4-170
    	Calling File: /aws/examples/elasticsearch/main.tf:14-49
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AWS_92: "Ensure the ELB has access logging enabled"
    	FAILED for resource: module.elb.aws_elb.elb[0]
    	File: /aws/modules/elb/elb.tf:4-69
    	Calling File: /aws/examples/elb/main.tf:12-109
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/bc-aws-logging-23.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AWS_190: "Ensure lustre file systems is encrypted by KMS using a customer managed Key (CMK)"
    	FAILED for resource: module.fsx.aws_fsx_lustre_file_system.fsx_lustre_file_system[0]
    	File: /aws/modules/fsx/fsx_lustre_file_system.tf:4-39
    	Calling File: /aws/examples/fsx/main.tf:13-30
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-110.html
    
    		4  | resource "aws_fsx_lustre_file_system" "fsx_lustre_file_system" {
    		5  |   count = var.enable_fsx_lustre_file_system ? 1 : 0
    		6  | 
    		7  |   storage_capacity = var.fsx_lustre_file_system_storage_capacity
    		8  |   subnet_ids       = var.fsx_lustre_file_system_subnet_ids
    		9  | 
    		10 |   export_path                   = var.fsx_lustre_file_system_export_path
    		11 |   import_path                   = var.fsx_lustre_file_system_import_path
    		12 |   imported_file_chunk_size      = var.fsx_lustre_file_system_imported_file_chunk_size
    		13 |   security_group_ids            = var.fsx_lustre_file_system_security_group_ids
    		14 |   weekly_maintenance_start_time = var.fsx_lustre_file_system_weekly_maintenance_start_time
    		15 | 
    		16 |   dynamic "timeouts" {
    		17 |     iterator = timeouts
    		18 |     for_each = length(keys(var.fsx_lustre_file_system_timeouts)) > 0 ? [var.fsx_lustre_file_system_timeouts] : []
    		19 | 
    		20 |     content {
    		21 |       create = lookup(timeouts.value, "create", null)
    		22 |       delete = lookup(timeouts.value, "delete", null)
    		23 |     }
    		24 |   }
    		25 | 
    		26 |   tags = merge(
    		27 |     {
    		28 |       Name = var.fsx_lustre_file_system_name != "" ? lower(var.fsx_lustre_file_system_name) : "${lower(var.name)}-fsx-lustre-file-system-${lower(var.environment)}"
    		29 |     },
    		30 |     var.tags
    		31 |   )
    		32 | 
    		33 |   lifecycle {
    		34 |     create_before_destroy = true
    		35 |     ignore_changes        = []
    		36 |   }
    		37 | 
    		38 |   depends_on = []
    		39 | }
    
    Check: CKV_AWS_10: "Ensure IAM password policy requires minimum length of 14 or greater"
    	FAILED for resource: module.iam_account.aws_iam_account_password_policy.iam_account_password_policy[0]
    	File: /aws/modules/iam_account/iam_account_password_policy.tf:4-24
    	Calling File: /aws/examples/iam_account/main.tf:32-64
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/iam-9-1.html
    
    		4  | resource "aws_iam_account_password_policy" "iam_account_password_policy" {
    		5  |   count = var.enable_iam_account_password_policy ? 1 : 0
    		6  | 
    		7  |   minimum_password_length        = var.iam_account_password_policy_minimum_password_length
    		8  |   require_lowercase_characters   = var.iam_account_password_policy_require_lowercase_characters
    		9  |   require_uppercase_characters   = var.iam_account_password_policy_require_uppercase_characters
    		10 |   require_numbers                = var.iam_account_password_policy_require_numbers
    		11 |   require_symbols                = var.iam_account_password_policy_require_symbols
    		12 |   allow_users_to_change_password = var.iam_account_password_policy_allow_users_to_change_password
    		13 | 
    		14 |   hard_expiry               = var.iam_account_password_policy_hard_expiry
    		15 |   max_password_age          = var.iam_account_password_policy_max_password_age
    		16 |   password_reuse_prevention = var.iam_account_password_policy_password_reuse_prevention
    		17 | 
    		18 |   lifecycle {
    		19 |     create_before_destroy = true
    		20 |     ignore_changes        = []
    		21 |   }
    		22 | 
    		23 |   depends_on = []
    		24 | }
    
    Check: CKV_AWS_273: "Ensure access is controlled through SSO and not AWS IAM defined users"
    	FAILED for resource: module.iam_user.aws_iam_user.iam_user[0]
    	File: /aws/modules/iam_user/iam_user.tf:4-26
    	Calling File: /aws/examples/iam_user/main.tf:32-74
    
    		4  | resource "aws_iam_user" "iam_user" {
    		5  |   count = var.enable_iam_user ? 1 : 0
    		6  | 
    		7  |   name = var.iam_user_name != "" ? var.iam_user_name : "${lower(var.name)}-user-${lower(var.environment)}"
    		8  |   path = var.iam_user_path
    		9  | 
    		10 |   permissions_boundary = var.iam_user_permissions_boundary
    		11 |   force_destroy        = var.iam_user_force_destroy
    		12 | 
    		13 |   tags = merge(
    		14 |     {
    		15 |       Name = var.iam_user_name != "" ? var.iam_user_name : "${lower(var.name)}-user-${lower(var.environment)}"
    		16 |     },
    		17 |     var.tags
    		18 |   )
    		19 | 
    		20 |   lifecycle {
    		21 |     create_before_destroy = true
    		22 |     ignore_changes        = []
    		23 |   }
    		24 | 
    		25 |   depends_on = []
    		26 | }
    
    Check: CKV_AWS_40: "Ensure IAM policies are attached only to groups or roles (Reducing access management complexity may in-turn reduce opportunity for a principal to inadvertently receive or retain excessive privileges.)"
    	FAILED for resource: module.iam_user.aws_iam_user_policy.iam_user_policy[0]
    	File: /aws/modules/iam_user/iam_user_policy.tf:4-21
    	Calling File: /aws/examples/iam_user/main.tf:32-74
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/iam-16-iam-policy-privileges-1.html
    
    		4  | resource "aws_iam_user_policy" "iam_user_policy" {
    		5  |   count = var.enable_iam_user_policy ? 1 : 0
    		6  | 
    		7  |   name        = var.iam_user_policy_name != "" && var.iam_user_policy_name_prefix == "" ? var.iam_user_policy_name : null
    		8  |   name_prefix = var.iam_user_policy_name_prefix != "" && var.iam_user_policy_name == "" ? var.iam_user_policy_name_prefix : null
    		9  | 
    		10 |   user   = var.iam_user_policy_user != "" && !var.enable_iam_user ? var.iam_user_policy_user : element(concat(aws_iam_user.iam_user.*.id, [""]), 0)
    		11 |   policy = var.iam_user_policy_policy
    		12 | 
    		13 |   lifecycle {
    		14 |     create_before_destroy = true
    		15 |     ignore_changes        = []
    		16 |   }
    		17 | 
    		18 |   depends_on = [
    		19 |     aws_iam_user.iam_user
    		20 |   ]
    		21 | }
    
    Check: CKV_AWS_272: "Ensure AWS Lambda function is configured to validate code-signing"
    	FAILED for resource: module.lambda.aws_lambda_function.lambda_function[0]
    	File: /aws/modules/lambda/lambda_function.tf:4-83
    	Calling File: /aws/examples/lambda/main.tf:15-74
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AWS_207: "Ensure MQ Broker minor version updates are enabled"
    	FAILED for resource: module.mq.aws_mq_broker.mq_broker[0]
    	File: /aws/modules/mq/mq_broker.tf:4-97
    	Calling File: /aws/examples/mq/main.tf:14-66
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-aws-mqbrokers-minor-version-updates-are-enabled.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AWS_80: "Ensure MSK Cluster logging is enabled"
    	FAILED for resource: module.msk.aws_msk_cluster.msk_cluster[0]
    	File: /aws/modules/msk/msk_cluster.tf:4-171
    	Calling File: /aws/examples/msk/main.tf:15-107
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/logging-18.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AWS_150: "Ensure that Load Balancer has deletion protection enabled"
    	FAILED for resource: module.nlb.aws_lb.nlb[0]
    	File: /aws/modules/nlb/nlb.tf:4-64
    	Calling File: /aws/examples/nlb/main.tf:14-59
    	Guide: https://docs.bridgecrew.io/docs/bc_aws_networking_62
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AWS_152: "Ensure that Load Balancer (Network/Gateway) has cross-zone load balancing enabled"
    	FAILED for resource: module.nlb.aws_lb.nlb[0]
    	File: /aws/modules/nlb/nlb.tf:4-64
    	Calling File: /aws/examples/nlb/main.tf:14-59
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-that-load-balancer-networkgateway-has-cross-zone-load-balancing-enabled.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AWS_2: "Ensure ALB protocol is HTTPS"
    	FAILED for resource: module.nlb.aws_lb_listener.nlb_listener[0]
    	File: /aws/modules/nlb/nlb_listener.tf:4-121
    	Calling File: /aws/examples/nlb/main.tf:14-59
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-29.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AWS_293: "Ensure that AWS database instances have deletion protection enabled"
    	FAILED for resource: module.db_instance-rds-oracle.aws_db_instance.db_instance[0]
    	File: /aws/modules/rds/db_instance.tf:4-106
    	Calling File: /aws/examples/rds/main.tf:62-127
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AWS_118: "Ensure that enhanced monitoring is enabled for Amazon RDS instances"
    	FAILED for resource: module.db_instance-rds-oracle.aws_db_instance.db_instance[0]
    	File: /aws/modules/rds/db_instance.tf:4-106
    	Calling File: /aws/examples/rds/main.tf:62-127
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-enhanced-monitoring-is-enabled-for-amazon-rds-instances.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AWS_16: "Ensure all data stored in the RDS is securely encrypted at rest"
    	FAILED for resource: module.db_instance-rds-oracle.aws_db_instance.db_instance[0]
    	File: /aws/modules/rds/db_instance.tf:4-106
    	Calling File: /aws/examples/rds/main.tf:62-127
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-4.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AWS_157: "Ensure that RDS instances have Multi-AZ enabled"
    	FAILED for resource: module.db_instance-rds-oracle.aws_db_instance.db_instance[0]
    	File: /aws/modules/rds/db_instance.tf:4-106
    	Calling File: /aws/examples/rds/main.tf:62-127
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-73.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AWS_324: "Ensure that RDS Cluster log capture is enabled"
    	FAILED for resource: module.rds_cluster.aws_rds_cluster.rds_cluster[0]
    	File: /aws/modules/rds/rds_cluster.tf:4-106
    	Calling File: /aws/examples/rds/main.tf:14-59
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AWS_96: "Ensure all data stored in Aurora is securely encrypted at rest"
    	FAILED for resource: module.rds_cluster.aws_rds_cluster.rds_cluster[0]
    	File: /aws/modules/rds/rds_cluster.tf:4-106
    	Calling File: /aws/examples/rds/main.tf:14-59
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-38.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AWS_313: "Ensure RDS cluster configured to copy tags to snapshots"
    	FAILED for resource: module.rds_cluster.aws_rds_cluster.rds_cluster[0]
    	File: /aws/modules/rds/rds_cluster.tf:4-106
    	Calling File: /aws/examples/rds/main.tf:14-59
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AWS_133: "Ensure that RDS instances has backup policy"
    	FAILED for resource: module.rds_cluster.aws_rds_cluster.rds_cluster[0]
    	File: /aws/modules/rds/rds_cluster.tf:4-106
    	Calling File: /aws/examples/rds/main.tf:14-59
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-rds-instances-have-backup-policy.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AWS_139: "Ensure that RDS clusters have deletion protection enabled"
    	FAILED for resource: module.rds_cluster.aws_rds_cluster.rds_cluster[0]
    	File: /aws/modules/rds/rds_cluster.tf:4-106
    	Calling File: /aws/examples/rds/main.tf:14-59
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-rds-clusters-and-instances-have-deletion-protection-enabled.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AWS_226: "Ensure DB instance gets all minor upgrades automatically"
    	FAILED for resource: module.rds_cluster.aws_rds_cluster_instance.rds_cluster_instance[0]
    	File: /aws/modules/rds/rds_cluster_instance.tf:4-64
    	Calling File: /aws/examples/rds/main.tf:14-59
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-aws-db-instance-gets-all-minor-upgrades-automatically.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AWS_118: "Ensure that enhanced monitoring is enabled for Amazon RDS instances"
    	FAILED for resource: module.rds_cluster.aws_rds_cluster_instance.rds_cluster_instance[0]
    	File: /aws/modules/rds/rds_cluster_instance.tf:4-64
    	Calling File: /aws/examples/rds/main.tf:14-59
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-enhanced-monitoring-is-enabled-for-amazon-rds-instances.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AWS_307: "Ensure SageMaker Users should not have root access to SageMaker notebook instances"
    	FAILED for resource: module.sagemaker.aws_sagemaker_notebook_instance.sagemaker_notebook_instance[0]
    	File: /aws/modules/sagemaker/sagemaker_notebook_instance.tf:4-34
    	Calling File: /aws/examples/sagemaker/main.tf:17-67
    
    		4  | resource "aws_sagemaker_notebook_instance" "sagemaker_notebook_instance" {
    		5  |   count = var.enable_sagemaker_notebook_instance ? 1 : 0
    		6  | 
    		7  |   name          = var.sagemaker_notebook_instance_name != "" ? lower(var.sagemaker_notebook_instance_name) : "${lower(var.name)}-notebook-instance-${lower(var.environment)}"
    		8  |   role_arn      = var.sagemaker_notebook_instance_role_arn
    		9  |   instance_type = var.sagemaker_notebook_instance_instance_type
    		10 | 
    		11 |   platform_identifier    = var.sagemaker_notebook_instance_platform_identifier
    		12 |   volume_size            = var.sagemaker_notebook_instance_volume_size
    		13 |   subnet_id              = var.sagemaker_notebook_instance_subnet_id
    		14 |   security_groups        = var.sagemaker_notebook_instance_security_groups
    		15 |   kms_key_id             = var.sagemaker_notebook_instance_kms_key_id
    		16 |   lifecycle_config_name  = var.sagemaker_notebook_instance_lifecycle_config_name != "" && !var.enable_sagemaker_notebook_instance_lifecycle_configuration ? var.sagemaker_notebook_instance_lifecycle_config_name : element(concat(aws_sagemaker_notebook_instance_lifecycle_configuration.sagemaker_notebook_instance_lifecycle_configuration.*.id, [""]), 0)
    		17 |   direct_internet_access = var.sagemaker_notebook_instance_direct_internet_access
    		18 | 
    		19 |   tags = merge(
    		20 |     {
    		21 |       Name = var.sagemaker_notebook_instance_name != "" ? lower(var.sagemaker_notebook_instance_name) : "${lower(var.name)}-notebook-instance-${lower(var.environment)}"
    		22 |     },
    		23 |     var.tags
    		24 |   )
    		25 | 
    		26 |   lifecycle {
    		27 |     create_before_destroy = true
    		28 |     ignore_changes        = []
    		29 |   }
    		30 | 
    		31 |   depends_on = [
    		32 |     aws_sagemaker_notebook_instance_lifecycle_configuration.sagemaker_notebook_instance_lifecycle_configuration
    		33 |   ]
    		34 | }
    
    Check: CKV_AWS_285: "Ensure State Machine has execution history logging enabled"
    	FAILED for resource: module.sfn.aws_sfn_state_machine.sfn_state_machine[0]
    	File: /aws/modules/sfn/sfn_state_machine.tf:4-24
    	Calling File: /aws/examples/sfn/main.tf:13-44
    
    		4  | resource "aws_sfn_state_machine" "sfn_state_machine" {
    		5  |   count = var.enable_sfn_state_machine ? 1 : 0
    		6  | 
    		7  |   name       = var.sfn_state_machine_name != "" ? var.sfn_state_machine_name : "${lower(var.name)}-sfn-activity-${lower(var.environment)}"
    		8  |   definition = var.sfn_state_machine_definition
    		9  |   role_arn   = var.sfn_state_machine_role_arn
    		10 | 
    		11 |   tags = merge(
    		12 |     {
    		13 |       Name = var.sfn_state_machine_name != "" ? var.sfn_state_machine_name : "${lower(var.name)}-sfn-activity-${lower(var.environment)}"
    		14 |     },
    		15 |     var.tags
    		16 |   )
    		17 | 
    		18 |   lifecycle {
    		19 |     create_before_destroy = true
    		20 |     ignore_changes        = []
    		21 |   }
    		22 | 
    		23 |   depends_on = []
    		24 | }
    Check: CKV_AWS_284: "Ensure State Machine has X-Ray tracing enabled"
    	FAILED for resource: module.sfn.aws_sfn_state_machine.sfn_state_machine[0]
    	File: /aws/modules/sfn/sfn_state_machine.tf:4-24
    	Calling File: /aws/examples/sfn/main.tf:13-44
    
    		4  | resource "aws_sfn_state_machine" "sfn_state_machine" {
    		5  |   count = var.enable_sfn_state_machine ? 1 : 0
    		6  | 
    		7  |   name       = var.sfn_state_machine_name != "" ? var.sfn_state_machine_name : "${lower(var.name)}-sfn-activity-${lower(var.environment)}"
    		8  |   definition = var.sfn_state_machine_definition
    		9  |   role_arn   = var.sfn_state_machine_role_arn
    		10 | 
    		11 |   tags = merge(
    		12 |     {
    		13 |       Name = var.sfn_state_machine_name != "" ? var.sfn_state_machine_name : "${lower(var.name)}-sfn-activity-${lower(var.environment)}"
    		14 |     },
    		15 |     var.tags
    		16 |   )
    		17 | 
    		18 |   lifecycle {
    		19 |     create_before_destroy = true
    		20 |     ignore_changes        = []
    		21 |   }
    		22 | 
    		23 |   depends_on = []
    		24 | }
    Check: CKV_AWS_164: "Ensure Transfer Server is not exposed publicly."
    	FAILED for resource: module.transfer.aws_transfer_server.transfer_server[0]
    	File: /aws/modules/transfer/transfer_server.tf:4-37
    	Calling File: /aws/examples/transfer/main.tf:13-32
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-transfer-server-is-not-exposed-publicly.html
    
    		4  | resource "aws_transfer_server" "transfer_server" {
    		5  |   count = var.enable_transfer_server ? 1 : 0
    		6  | 
    		7  |   endpoint_type          = upper(var.transfer_server_endpoint_type)
    		8  |   invocation_role        = var.transfer_server_invocation_role
    		9  |   host_key               = var.transfer_server_host_key
    		10 |   url                    = var.transfer_server_url
    		11 |   identity_provider_type = var.transfer_server_identity_provider_type
    		12 |   logging_role           = var.transfer_server_logging_role
    		13 |   force_destroy          = var.transfer_server_force_destroy
    		14 | 
    		15 |   dynamic "endpoint_details" {
    		16 |     iterator = endpoint_details
    		17 |     for_each = var.transfer_server_endpoint_details
    		18 | 
    		19 |     content {
    		20 |       vpc_endpoint_id = lookup(endpoint_details.value, "vpc_endpoint_id", null)
    		21 |     }
    		22 |   }
    		23 | 
    		24 |   tags = merge(
    		25 |     {
    		26 |       Name = var.transfer_server_name != "" ? lower(var.transfer_server_name) : "${lower(var.name)}-transfer-server-${lower(var.environment)}"
    		27 |     },
    		28 |     var.tags
    		29 |   )
    		30 | 
    		31 |   lifecycle {
    		32 |     create_before_destroy = true
    		33 |     ignore_changes        = []
    		34 |   }
    		35 | 
    		36 |   depends_on = []
    		37 | }
    
    Check: CKV_AWS_232: "Ensure no NACL allow ingress from 0.0.0.0:0 to port 22"
    	FAILED for resource: module.vpc_2.aws_network_acl.network_acl[0]
    	File: /aws/modules/vpc/network_acl.tf:4-59
    	Calling File: /aws/examples/vpc/main.tf:253-371
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-aws-nacl-does-not-allow-ingress-from-00000-to-port-22.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AWS_230: "Ensure no NACL allow ingress from 0.0.0.0:0 to port 20"
    	FAILED for resource: module.vpc_2.aws_network_acl.network_acl[0]
    	File: /aws/modules/vpc/network_acl.tf:4-59
    	Calling File: /aws/examples/vpc/main.tf:253-371
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-aws-nacl-does-not-allow-ingress-from-00000-to-port-20.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AWS_229: "Ensure no NACL allow ingress from 0.0.0.0:0 to port 21"
    	FAILED for resource: module.vpc_2.aws_network_acl.network_acl[0]
    	File: /aws/modules/vpc/network_acl.tf:4-59
    	Calling File: /aws/examples/vpc/main.tf:253-371
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-aws-nacl-does-not-allow-ingress-from-00000-to-port-21.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AWS_231: "Ensure no NACL allow ingress from 0.0.0.0:0 to port 3389"
    	FAILED for resource: module.vpc_2.aws_network_acl.network_acl[0]
    	File: /aws/modules/vpc/network_acl.tf:4-59
    	Calling File: /aws/examples/vpc/main.tf:253-371
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-aws-nacl-does-not-allow-ingress-from-00000-to-port-3389.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AWS_130: "Ensure VPC subnets do not assign public IP by default"
    	FAILED for resource: module.vpc.aws_subnet.public_subnets[0]
    	File: /aws/modules/vpc/subnet.tf:88-125
    	Calling File: /aws/examples/vpc_old/main.tf:24-86
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-vpc-subnets-do-not-assign-public-ip-by-default.html
    
    		88  | resource "aws_subnet" "public_subnets" {
    		89  |   count = length(var.public_subnet_cidrs)
    		90  | 
    		91  |   cidr_block              = var.public_subnet_cidrs[count.index]
    		92  |   vpc_id                  = var.vpc_id != "" && !var.enable_vpc ? var.vpc_id : element(concat(aws_vpc.vpc.*.id, [""]), 0)
    		93  |   map_public_ip_on_launch = var.map_public_ip_on_launch
    		94  |   availability_zone       = length(var.azs) > 0 ? var.azs[count.index] : element(lookup(var.availability_zones, var.region), count.index)
    		95  | 
    		96  |   availability_zone_id            = var.availability_zone_id
    		97  |   ipv6_cidr_block                 = var.public_subnet_ipv6_cidrs != null ? var.public_subnet_ipv6_cidrs[count.index] : null
    		98  |   assign_ipv6_address_on_creation = var.assign_ipv6_address_on_creation
    		99  | 
    		100 |   dynamic "timeouts" {
    		101 |     iterator = timeouts
    		102 |     for_each = length(keys(var.subnet_timeouts)) > 0 ? [var.subnet_timeouts] : []
    		103 | 
    		104 |     content {
    		105 |       create = lookup(subnet_timeouts.value, "create", null)
    		106 |       delete = lookup(subnet_timeouts.value, "delete", null)
    		107 |     }
    		108 |   }
    		109 | 
    		110 |   tags = merge(
    		111 |     {
    		112 |       Name = var.public_subnets_name != "" ? "${lower(var.public_subnets_name)}-${count.index + 1}" : "${lower(var.name)}-${lower(var.environment)}-public_subnet-${count.index + 1}"
    		113 |     },
    		114 |     var.tags
    		115 |   )
    		116 | 
    		117 |   lifecycle {
    		118 |     create_before_destroy = true
    		119 |     ignore_changes        = []
    		120 |   }
    		121 | 
    		122 |   depends_on = [
    		123 |     aws_vpc.vpc
    		124 |   ]
    		125 | }
    
    Check: CKV_AWS_130: "Ensure VPC subnets do not assign public IP by default"
    	FAILED for resource: module.vpc.aws_subnet.public_subnets[1]
    	File: /aws/modules/vpc/subnet.tf:88-125
    	Calling File: /aws/examples/vpc_old/main.tf:24-86
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-vpc-subnets-do-not-assign-public-ip-by-default.html
    
    		88  | resource "aws_subnet" "public_subnets" {
    		89  |   count = length(var.public_subnet_cidrs)
    		90  | 
    		91  |   cidr_block              = var.public_subnet_cidrs[count.index]
    		92  |   vpc_id                  = var.vpc_id != "" && !var.enable_vpc ? var.vpc_id : element(concat(aws_vpc.vpc.*.id, [""]), 0)
    		93  |   map_public_ip_on_launch = var.map_public_ip_on_launch
    		94  |   availability_zone       = length(var.azs) > 0 ? var.azs[count.index] : element(lookup(var.availability_zones, var.region), count.index)
    		95  | 
    		96  |   availability_zone_id            = var.availability_zone_id
    		97  |   ipv6_cidr_block                 = var.public_subnet_ipv6_cidrs != null ? var.public_subnet_ipv6_cidrs[count.index] : null
    		98  |   assign_ipv6_address_on_creation = var.assign_ipv6_address_on_creation
    		99  | 
    		100 |   dynamic "timeouts" {
    		101 |     iterator = timeouts
    		102 |     for_each = length(keys(var.subnet_timeouts)) > 0 ? [var.subnet_timeouts] : []
    		103 | 
    		104 |     content {
    		105 |       create = lookup(subnet_timeouts.value, "create", null)
    		106 |       delete = lookup(subnet_timeouts.value, "delete", null)
    		107 |     }
    		108 |   }
    		109 | 
    		110 |   tags = merge(
    		111 |     {
    		112 |       Name = var.public_subnets_name != "" ? "${lower(var.public_subnets_name)}-${count.index + 1}" : "${lower(var.name)}-${lower(var.environment)}-public_subnet-${count.index + 1}"
    		113 |     },
    		114 |     var.tags
    		115 |   )
    		116 | 
    		117 |   lifecycle {
    		118 |     create_before_destroy = true
    		119 |     ignore_changes        = []
    		120 |   }
    		121 | 
    		122 |   depends_on = [
    		123 |     aws_vpc.vpc
    		124 |   ]
    		125 | }
    
    Check: CKV_AWS_130: "Ensure VPC subnets do not assign public IP by default"
    	FAILED for resource: module.vpc_1.aws_subnet.public_subnets[0]
    	File: /aws/modules/vpc/subnet.tf:88-125
    	Calling File: /aws/examples/vpc/main.tf:198-248
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-vpc-subnets-do-not-assign-public-ip-by-default.html
    
    		88  | resource "aws_subnet" "public_subnets" {
    		89  |   count = length(var.public_subnet_cidrs)
    		90  | 
    		91  |   cidr_block              = var.public_subnet_cidrs[count.index]
    		92  |   vpc_id                  = var.vpc_id != "" && !var.enable_vpc ? var.vpc_id : element(concat(aws_vpc.vpc.*.id, [""]), 0)
    		93  |   map_public_ip_on_launch = var.map_public_ip_on_launch
    		94  |   availability_zone       = length(var.azs) > 0 ? var.azs[count.index] : element(lookup(var.availability_zones, var.region), count.index)
    		95  | 
    		96  |   availability_zone_id            = var.availability_zone_id
    		97  |   ipv6_cidr_block                 = var.public_subnet_ipv6_cidrs != null ? var.public_subnet_ipv6_cidrs[count.index] : null
    		98  |   assign_ipv6_address_on_creation = var.assign_ipv6_address_on_creation
    		99  | 
    		100 |   dynamic "timeouts" {
    		101 |     iterator = timeouts
    		102 |     for_each = length(keys(var.subnet_timeouts)) > 0 ? [var.subnet_timeouts] : []
    		103 | 
    		104 |     content {
    		105 |       create = lookup(subnet_timeouts.value, "create", null)
    		106 |       delete = lookup(subnet_timeouts.value, "delete", null)
    		107 |     }
    		108 |   }
    		109 | 
    		110 |   tags = merge(
    		111 |     {
    		112 |       Name = var.public_subnets_name != "" ? "${lower(var.public_subnets_name)}-${count.index + 1}" : "${lower(var.name)}-${lower(var.environment)}-public_subnet-${count.index + 1}"
    		113 |     },
    		114 |     var.tags
    		115 |   )
    		116 | 
    		117 |   lifecycle {
    		118 |     create_before_destroy = true
    		119 |     ignore_changes        = []
    		120 |   }
    		121 | 
    		122 |   depends_on = [
    		123 |     aws_vpc.vpc
    		124 |   ]
    		125 | }
    
    Check: CKV_AWS_130: "Ensure VPC subnets do not assign public IP by default"
    	FAILED for resource: module.vpc_1.aws_subnet.public_subnets[1]
    	File: /aws/modules/vpc/subnet.tf:88-125
    	Calling File: /aws/examples/vpc/main.tf:198-248
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-vpc-subnets-do-not-assign-public-ip-by-default.html
    
    		88  | resource "aws_subnet" "public_subnets" {
    		89  |   count = length(var.public_subnet_cidrs)
    		90  | 
    		91  |   cidr_block              = var.public_subnet_cidrs[count.index]
    		92  |   vpc_id                  = var.vpc_id != "" && !var.enable_vpc ? var.vpc_id : element(concat(aws_vpc.vpc.*.id, [""]), 0)
    		93  |   map_public_ip_on_launch = var.map_public_ip_on_launch
    		94  |   availability_zone       = length(var.azs) > 0 ? var.azs[count.index] : element(lookup(var.availability_zones, var.region), count.index)
    		95  | 
    		96  |   availability_zone_id            = var.availability_zone_id
    		97  |   ipv6_cidr_block                 = var.public_subnet_ipv6_cidrs != null ? var.public_subnet_ipv6_cidrs[count.index] : null
    		98  |   assign_ipv6_address_on_creation = var.assign_ipv6_address_on_creation
    		99  | 
    		100 |   dynamic "timeouts" {
    		101 |     iterator = timeouts
    		102 |     for_each = length(keys(var.subnet_timeouts)) > 0 ? [var.subnet_timeouts] : []
    		103 | 
    		104 |     content {
    		105 |       create = lookup(subnet_timeouts.value, "create", null)
    		106 |       delete = lookup(subnet_timeouts.value, "delete", null)
    		107 |     }
    		108 |   }
    		109 | 
    		110 |   tags = merge(
    		111 |     {
    		112 |       Name = var.public_subnets_name != "" ? "${lower(var.public_subnets_name)}-${count.index + 1}" : "${lower(var.name)}-${lower(var.environment)}-public_subnet-${count.index + 1}"
    		113 |     },
    		114 |     var.tags
    		115 |   )
    		116 | 
    		117 |   lifecycle {
    		118 |     create_before_destroy = true
    		119 |     ignore_changes        = []
    		120 |   }
    		121 | 
    		122 |   depends_on = [
    		123 |     aws_vpc.vpc
    		124 |   ]
    		125 | }
    
    Check: CKV_AWS_130: "Ensure VPC subnets do not assign public IP by default"
    	FAILED for resource: module.vpc_2.aws_subnet.public_subnets[0]
    	File: /aws/modules/vpc/subnet.tf:88-125
    	Calling File: /aws/examples/vpc/main.tf:253-371
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-vpc-subnets-do-not-assign-public-ip-by-default.html
    
    		88  | resource "aws_subnet" "public_subnets" {
    		89  |   count = length(var.public_subnet_cidrs)
    		90  | 
    		91  |   cidr_block              = var.public_subnet_cidrs[count.index]
    		92  |   vpc_id                  = var.vpc_id != "" && !var.enable_vpc ? var.vpc_id : element(concat(aws_vpc.vpc.*.id, [""]), 0)
    		93  |   map_public_ip_on_launch = var.map_public_ip_on_launch
    		94  |   availability_zone       = length(var.azs) > 0 ? var.azs[count.index] : element(lookup(var.availability_zones, var.region), count.index)
    		95  | 
    		96  |   availability_zone_id            = var.availability_zone_id
    		97  |   ipv6_cidr_block                 = var.public_subnet_ipv6_cidrs != null ? var.public_subnet_ipv6_cidrs[count.index] : null
    		98  |   assign_ipv6_address_on_creation = var.assign_ipv6_address_on_creation
    		99  | 
    		100 |   dynamic "timeouts" {
    		101 |     iterator = timeouts
    		102 |     for_each = length(keys(var.subnet_timeouts)) > 0 ? [var.subnet_timeouts] : []
    		103 | 
    		104 |     content {
    		105 |       create = lookup(subnet_timeouts.value, "create", null)
    		106 |       delete = lookup(subnet_timeouts.value, "delete", null)
    		107 |     }
    		108 |   }
    		109 | 
    		110 |   tags = merge(
    		111 |     {
    		112 |       Name = var.public_subnets_name != "" ? "${lower(var.public_subnets_name)}-${count.index + 1}" : "${lower(var.name)}-${lower(var.environment)}-public_subnet-${count.index + 1}"
    		113 |     },
    		114 |     var.tags
    		115 |   )
    		116 | 
    		117 |   lifecycle {
    		118 |     create_before_destroy = true
    		119 |     ignore_changes        = []
    		120 |   }
    		121 | 
    		122 |   depends_on = [
    		123 |     aws_vpc.vpc
    		124 |   ]
    		125 | }
    
    Check: CKV_AWS_130: "Ensure VPC subnets do not assign public IP by default"
    	FAILED for resource: module.vpc_2.aws_subnet.public_subnets[1]
    	File: /aws/modules/vpc/subnet.tf:88-125
    	Calling File: /aws/examples/vpc/main.tf:253-371
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-vpc-subnets-do-not-assign-public-ip-by-default.html
    
    		88  | resource "aws_subnet" "public_subnets" {
    		89  |   count = length(var.public_subnet_cidrs)
    		90  | 
    		91  |   cidr_block              = var.public_subnet_cidrs[count.index]
    		92  |   vpc_id                  = var.vpc_id != "" && !var.enable_vpc ? var.vpc_id : element(concat(aws_vpc.vpc.*.id, [""]), 0)
    		93  |   map_public_ip_on_launch = var.map_public_ip_on_launch
    		94  |   availability_zone       = length(var.azs) > 0 ? var.azs[count.index] : element(lookup(var.availability_zones, var.region), count.index)
    		95  | 
    		96  |   availability_zone_id            = var.availability_zone_id
    		97  |   ipv6_cidr_block                 = var.public_subnet_ipv6_cidrs != null ? var.public_subnet_ipv6_cidrs[count.index] : null
    		98  |   assign_ipv6_address_on_creation = var.assign_ipv6_address_on_creation
    		99  | 
    		100 |   dynamic "timeouts" {
    		101 |     iterator = timeouts
    		102 |     for_each = length(keys(var.subnet_timeouts)) > 0 ? [var.subnet_timeouts] : []
    		103 | 
    		104 |     content {
    		105 |       create = lookup(subnet_timeouts.value, "create", null)
    		106 |       delete = lookup(subnet_timeouts.value, "delete", null)
    		107 |     }
    		108 |   }
    		109 | 
    		110 |   tags = merge(
    		111 |     {
    		112 |       Name = var.public_subnets_name != "" ? "${lower(var.public_subnets_name)}-${count.index + 1}" : "${lower(var.name)}-${lower(var.environment)}-public_subnet-${count.index + 1}"
    		113 |     },
    		114 |     var.tags
    		115 |   )
    		116 | 
    		117 |   lifecycle {
    		118 |     create_before_destroy = true
    		119 |     ignore_changes        = []
    		120 |   }
    		121 | 
    		122 |   depends_on = [
    		123 |     aws_vpc.vpc
    		124 |   ]
    		125 | }
    
    Check: CKV_AWS_130: "Ensure VPC subnets do not assign public IP by default"
    	FAILED for resource: module.vpc_custom_routings.aws_subnet.public_subnets[0]
    	File: /aws/modules/vpc/subnet.tf:88-125
    	Calling File: /aws/examples/vpc_old/vpc_custom_routings.tf:4-44
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-vpc-subnets-do-not-assign-public-ip-by-default.html
    
    		88  | resource "aws_subnet" "public_subnets" {
    		89  |   count = length(var.public_subnet_cidrs)
    		90  | 
    		91  |   cidr_block              = var.public_subnet_cidrs[count.index]
    		92  |   vpc_id                  = var.vpc_id != "" && !var.enable_vpc ? var.vpc_id : element(concat(aws_vpc.vpc.*.id, [""]), 0)
    		93  |   map_public_ip_on_launch = var.map_public_ip_on_launch
    		94  |   availability_zone       = length(var.azs) > 0 ? var.azs[count.index] : element(lookup(var.availability_zones, var.region), count.index)
    		95  | 
    		96  |   availability_zone_id            = var.availability_zone_id
    		97  |   ipv6_cidr_block                 = var.public_subnet_ipv6_cidrs != null ? var.public_subnet_ipv6_cidrs[count.index] : null
    		98  |   assign_ipv6_address_on_creation = var.assign_ipv6_address_on_creation
    		99  | 
    		100 |   dynamic "timeouts" {
    		101 |     iterator = timeouts
    		102 |     for_each = length(keys(var.subnet_timeouts)) > 0 ? [var.subnet_timeouts] : []
    		103 | 
    		104 |     content {
    		105 |       create = lookup(subnet_timeouts.value, "create", null)
    		106 |       delete = lookup(subnet_timeouts.value, "delete", null)
    		107 |     }
    		108 |   }
    		109 | 
    		110 |   tags = merge(
    		111 |     {
    		112 |       Name = var.public_subnets_name != "" ? "${lower(var.public_subnets_name)}-${count.index + 1}" : "${lower(var.name)}-${lower(var.environment)}-public_subnet-${count.index + 1}"
    		113 |     },
    		114 |     var.tags
    		115 |   )
    		116 | 
    		117 |   lifecycle {
    		118 |     create_before_destroy = true
    		119 |     ignore_changes        = []
    		120 |   }
    		121 | 
    		122 |   depends_on = [
    		123 |     aws_vpc.vpc
    		124 |   ]
    		125 | }
    
    Check: CKV_AWS_130: "Ensure VPC subnets do not assign public IP by default"
    	FAILED for resource: module.vpc_custom_routings.aws_subnet.public_subnets[1]
    	File: /aws/modules/vpc/subnet.tf:88-125
    	Calling File: /aws/examples/vpc_old/vpc_custom_routings.tf:4-44
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-vpc-subnets-do-not-assign-public-ip-by-default.html
    
    		88  | resource "aws_subnet" "public_subnets" {
    		89  |   count = length(var.public_subnet_cidrs)
    		90  | 
    		91  |   cidr_block              = var.public_subnet_cidrs[count.index]
    		92  |   vpc_id                  = var.vpc_id != "" && !var.enable_vpc ? var.vpc_id : element(concat(aws_vpc.vpc.*.id, [""]), 0)
    		93  |   map_public_ip_on_launch = var.map_public_ip_on_launch
    		94  |   availability_zone       = length(var.azs) > 0 ? var.azs[count.index] : element(lookup(var.availability_zones, var.region), count.index)
    		95  | 
    		96  |   availability_zone_id            = var.availability_zone_id
    		97  |   ipv6_cidr_block                 = var.public_subnet_ipv6_cidrs != null ? var.public_subnet_ipv6_cidrs[count.index] : null
    		98  |   assign_ipv6_address_on_creation = var.assign_ipv6_address_on_creation
    		99  | 
    		100 |   dynamic "timeouts" {
    		101 |     iterator = timeouts
    		102 |     for_each = length(keys(var.subnet_timeouts)) > 0 ? [var.subnet_timeouts] : []
    		103 | 
    		104 |     content {
    		105 |       create = lookup(subnet_timeouts.value, "create", null)
    		106 |       delete = lookup(subnet_timeouts.value, "delete", null)
    		107 |     }
    		108 |   }
    		109 | 
    		110 |   tags = merge(
    		111 |     {
    		112 |       Name = var.public_subnets_name != "" ? "${lower(var.public_subnets_name)}-${count.index + 1}" : "${lower(var.name)}-${lower(var.environment)}-public_subnet-${count.index + 1}"
    		113 |     },
    		114 |     var.tags
    		115 |   )
    		116 | 
    		117 |   lifecycle {
    		118 |     create_before_destroy = true
    		119 |     ignore_changes        = []
    		120 |   }
    		121 | 
    		122 |   depends_on = [
    		123 |     aws_vpc.vpc
    		124 |   ]
    		125 | }
    
    Check: CKV_AWS_130: "Ensure VPC subnets do not assign public IP by default"
    	FAILED for resource: module.vpc_endpoint.aws_subnet.public_subnets[0]
    	File: /aws/modules/vpc/subnet.tf:88-125
    	Calling File: /aws/examples/vpc/main.tf:382-488
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-vpc-subnets-do-not-assign-public-ip-by-default.html
    
    		88  | resource "aws_subnet" "public_subnets" {
    		89  |   count = length(var.public_subnet_cidrs)
    		90  | 
    		91  |   cidr_block              = var.public_subnet_cidrs[count.index]
    		92  |   vpc_id                  = var.vpc_id != "" && !var.enable_vpc ? var.vpc_id : element(concat(aws_vpc.vpc.*.id, [""]), 0)
    		93  |   map_public_ip_on_launch = var.map_public_ip_on_launch
    		94  |   availability_zone       = length(var.azs) > 0 ? var.azs[count.index] : element(lookup(var.availability_zones, var.region), count.index)
    		95  | 
    		96  |   availability_zone_id            = var.availability_zone_id
    		97  |   ipv6_cidr_block                 = var.public_subnet_ipv6_cidrs != null ? var.public_subnet_ipv6_cidrs[count.index] : null
    		98  |   assign_ipv6_address_on_creation = var.assign_ipv6_address_on_creation
    		99  | 
    		100 |   dynamic "timeouts" {
    		101 |     iterator = timeouts
    		102 |     for_each = length(keys(var.subnet_timeouts)) > 0 ? [var.subnet_timeouts] : []
    		103 | 
    		104 |     content {
    		105 |       create = lookup(subnet_timeouts.value, "create", null)
    		106 |       delete = lookup(subnet_timeouts.value, "delete", null)
    		107 |     }
    		108 |   }
    		109 | 
    		110 |   tags = merge(
    		111 |     {
    		112 |       Name = var.public_subnets_name != "" ? "${lower(var.public_subnets_name)}-${count.index + 1}" : "${lower(var.name)}-${lower(var.environment)}-public_subnet-${count.index + 1}"
    		113 |     },
    		114 |     var.tags
    		115 |   )
    		116 | 
    		117 |   lifecycle {
    		118 |     create_before_destroy = true
    		119 |     ignore_changes        = []
    		120 |   }
    		121 | 
    		122 |   depends_on = [
    		123 |     aws_vpc.vpc
    		124 |   ]
    		125 | }
    
    Check: CKV_AWS_130: "Ensure VPC subnets do not assign public IP by default"
    	FAILED for resource: module.vpc_endpoint.aws_subnet.public_subnets[1]
    	File: /aws/modules/vpc/subnet.tf:88-125
    	Calling File: /aws/examples/vpc/main.tf:382-488
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-vpc-subnets-do-not-assign-public-ip-by-default.html
    
    		88  | resource "aws_subnet" "public_subnets" {
    		89  |   count = length(var.public_subnet_cidrs)
    		90  | 
    		91  |   cidr_block              = var.public_subnet_cidrs[count.index]
    		92  |   vpc_id                  = var.vpc_id != "" && !var.enable_vpc ? var.vpc_id : element(concat(aws_vpc.vpc.*.id, [""]), 0)
    		93  |   map_public_ip_on_launch = var.map_public_ip_on_launch
    		94  |   availability_zone       = length(var.azs) > 0 ? var.azs[count.index] : element(lookup(var.availability_zones, var.region), count.index)
    		95  | 
    		96  |   availability_zone_id            = var.availability_zone_id
    		97  |   ipv6_cidr_block                 = var.public_subnet_ipv6_cidrs != null ? var.public_subnet_ipv6_cidrs[count.index] : null
    		98  |   assign_ipv6_address_on_creation = var.assign_ipv6_address_on_creation
    		99  | 
    		100 |   dynamic "timeouts" {
    		101 |     iterator = timeouts
    		102 |     for_each = length(keys(var.subnet_timeouts)) > 0 ? [var.subnet_timeouts] : []
    		103 | 
    		104 |     content {
    		105 |       create = lookup(subnet_timeouts.value, "create", null)
    		106 |       delete = lookup(subnet_timeouts.value, "delete", null)
    		107 |     }
    		108 |   }
    		109 | 
    		110 |   tags = merge(
    		111 |     {
    		112 |       Name = var.public_subnets_name != "" ? "${lower(var.public_subnets_name)}-${count.index + 1}" : "${lower(var.name)}-${lower(var.environment)}-public_subnet-${count.index + 1}"
    		113 |     },
    		114 |     var.tags
    		115 |   )
    		116 | 
    		117 |   lifecycle {
    		118 |     create_before_destroy = true
    		119 |     ignore_changes        = []
    		120 |   }
    		121 | 
    		122 |   depends_on = [
    		123 |     aws_vpc.vpc
    		124 |   ]
    		125 | }
    
    Check: CKV_AWS_130: "Ensure VPC subnets do not assign public IP by default"
    	FAILED for resource: module.vpc_vpn.aws_subnet.public_subnets[0]
    	File: /aws/modules/vpc/subnet.tf:88-125
    	Calling File: /aws/examples/vpc_old/vpc_vpn.tf:4-60
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-vpc-subnets-do-not-assign-public-ip-by-default.html
    
    		88  | resource "aws_subnet" "public_subnets" {
    		89  |   count = length(var.public_subnet_cidrs)
    		90  | 
    		91  |   cidr_block              = var.public_subnet_cidrs[count.index]
    		92  |   vpc_id                  = var.vpc_id != "" && !var.enable_vpc ? var.vpc_id : element(concat(aws_vpc.vpc.*.id, [""]), 0)
    		93  |   map_public_ip_on_launch = var.map_public_ip_on_launch
    		94  |   availability_zone       = length(var.azs) > 0 ? var.azs[count.index] : element(lookup(var.availability_zones, var.region), count.index)
    		95  | 
    		96  |   availability_zone_id            = var.availability_zone_id
    		97  |   ipv6_cidr_block                 = var.public_subnet_ipv6_cidrs != null ? var.public_subnet_ipv6_cidrs[count.index] : null
    		98  |   assign_ipv6_address_on_creation = var.assign_ipv6_address_on_creation
    		99  | 
    		100 |   dynamic "timeouts" {
    		101 |     iterator = timeouts
    		102 |     for_each = length(keys(var.subnet_timeouts)) > 0 ? [var.subnet_timeouts] : []
    		103 | 
    		104 |     content {
    		105 |       create = lookup(subnet_timeouts.value, "create", null)
    		106 |       delete = lookup(subnet_timeouts.value, "delete", null)
    		107 |     }
    		108 |   }
    		109 | 
    		110 |   tags = merge(
    		111 |     {
    		112 |       Name = var.public_subnets_name != "" ? "${lower(var.public_subnets_name)}-${count.index + 1}" : "${lower(var.name)}-${lower(var.environment)}-public_subnet-${count.index + 1}"
    		113 |     },
    		114 |     var.tags
    		115 |   )
    		116 | 
    		117 |   lifecycle {
    		118 |     create_before_destroy = true
    		119 |     ignore_changes        = []
    		120 |   }
    		121 | 
    		122 |   depends_on = [
    		123 |     aws_vpc.vpc
    		124 |   ]
    		125 | }
    
    Check: CKV_AWS_130: "Ensure VPC subnets do not assign public IP by default"
    	FAILED for resource: module.vpc_vpn.aws_subnet.public_subnets[1]
    	File: /aws/modules/vpc/subnet.tf:88-125
    	Calling File: /aws/examples/vpc_old/vpc_vpn.tf:4-60
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-vpc-subnets-do-not-assign-public-ip-by-default.html
    
    		88  | resource "aws_subnet" "public_subnets" {
    		89  |   count = length(var.public_subnet_cidrs)
    		90  | 
    		91  |   cidr_block              = var.public_subnet_cidrs[count.index]
    		92  |   vpc_id                  = var.vpc_id != "" && !var.enable_vpc ? var.vpc_id : element(concat(aws_vpc.vpc.*.id, [""]), 0)
    		93  |   map_public_ip_on_launch = var.map_public_ip_on_launch
    		94  |   availability_zone       = length(var.azs) > 0 ? var.azs[count.index] : element(lookup(var.availability_zones, var.region), count.index)
    		95  | 
    		96  |   availability_zone_id            = var.availability_zone_id
    		97  |   ipv6_cidr_block                 = var.public_subnet_ipv6_cidrs != null ? var.public_subnet_ipv6_cidrs[count.index] : null
    		98  |   assign_ipv6_address_on_creation = var.assign_ipv6_address_on_creation
    		99  | 
    		100 |   dynamic "timeouts" {
    		101 |     iterator = timeouts
    		102 |     for_each = length(keys(var.subnet_timeouts)) > 0 ? [var.subnet_timeouts] : []
    		103 | 
    		104 |     content {
    		105 |       create = lookup(subnet_timeouts.value, "create", null)
    		106 |       delete = lookup(subnet_timeouts.value, "delete", null)
    		107 |     }
    		108 |   }
    		109 | 
    		110 |   tags = merge(
    		111 |     {
    		112 |       Name = var.public_subnets_name != "" ? "${lower(var.public_subnets_name)}-${count.index + 1}" : "${lower(var.name)}-${lower(var.environment)}-public_subnet-${count.index + 1}"
    		113 |     },
    		114 |     var.tags
    		115 |   )
    		116 | 
    		117 |   lifecycle {
    		118 |     create_before_destroy = true
    		119 |     ignore_changes        = []
    		120 |   }
    		121 | 
    		122 |   depends_on = [
    		123 |     aws_vpc.vpc
    		124 |   ]
    		125 | }
    
    Check: CKV_AWS_130: "Ensure VPC subnets do not assign public IP by default"
    	FAILED for resource: module.vpc_endpoint.aws_subnet.public_subnets
    	File: /aws/modules/vpc/subnet.tf:88-125
    	Calling File: /aws/examples/vpc_old/vpc_endpoint.tf:4-81
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-vpc-subnets-do-not-assign-public-ip-by-default.html
    
    		88  | resource "aws_subnet" "public_subnets" {
    		89  |   count = length(var.public_subnet_cidrs)
    		90  | 
    		91  |   cidr_block              = var.public_subnet_cidrs[count.index]
    		92  |   vpc_id                  = var.vpc_id != "" && !var.enable_vpc ? var.vpc_id : element(concat(aws_vpc.vpc.*.id, [""]), 0)
    		93  |   map_public_ip_on_launch = var.map_public_ip_on_launch
    		94  |   availability_zone       = length(var.azs) > 0 ? var.azs[count.index] : element(lookup(var.availability_zones, var.region), count.index)
    		95  | 
    		96  |   availability_zone_id            = var.availability_zone_id
    		97  |   ipv6_cidr_block                 = var.public_subnet_ipv6_cidrs != null ? var.public_subnet_ipv6_cidrs[count.index] : null
    		98  |   assign_ipv6_address_on_creation = var.assign_ipv6_address_on_creation
    		99  | 
    		100 |   dynamic "timeouts" {
    		101 |     iterator = timeouts
    		102 |     for_each = length(keys(var.subnet_timeouts)) > 0 ? [var.subnet_timeouts] : []
    		103 | 
    		104 |     content {
    		105 |       create = lookup(subnet_timeouts.value, "create", null)
    		106 |       delete = lookup(subnet_timeouts.value, "delete", null)
    		107 |     }
    		108 |   }
    		109 | 
    		110 |   tags = merge(
    		111 |     {
    		112 |       Name = var.public_subnets_name != "" ? "${lower(var.public_subnets_name)}-${count.index + 1}" : "${lower(var.name)}-${lower(var.environment)}-public_subnet-${count.index + 1}"
    		113 |     },
    		114 |     var.tags
    		115 |   )
    		116 | 
    		117 |   lifecycle {
    		118 |     create_before_destroy = true
    		119 |     ignore_changes        = []
    		120 |   }
    		121 | 
    		122 |   depends_on = [
    		123 |     aws_vpc.vpc
    		124 |   ]
    		125 | }
    
    Check: CKV_AWS_130: "Ensure VPC subnets do not assign public IP by default"
    	FAILED for resource: module.vpc_1.aws_subnet.public_subnets
    	File: /aws/modules/vpc/subnet.tf:88-125
    	Calling File: /aws/examples/vpc_old/vpc_peering.tf:4-54
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-vpc-subnets-do-not-assign-public-ip-by-default.html
    
    		88  | resource "aws_subnet" "public_subnets" {
    		89  |   count = length(var.public_subnet_cidrs)
    		90  | 
    		91  |   cidr_block              = var.public_subnet_cidrs[count.index]
    		92  |   vpc_id                  = var.vpc_id != "" && !var.enable_vpc ? var.vpc_id : element(concat(aws_vpc.vpc.*.id, [""]), 0)
    		93  |   map_public_ip_on_launch = var.map_public_ip_on_launch
    		94  |   availability_zone       = length(var.azs) > 0 ? var.azs[count.index] : element(lookup(var.availability_zones, var.region), count.index)
    		95  | 
    		96  |   availability_zone_id            = var.availability_zone_id
    		97  |   ipv6_cidr_block                 = var.public_subnet_ipv6_cidrs != null ? var.public_subnet_ipv6_cidrs[count.index] : null
    		98  |   assign_ipv6_address_on_creation = var.assign_ipv6_address_on_creation
    		99  | 
    		100 |   dynamic "timeouts" {
    		101 |     iterator = timeouts
    		102 |     for_each = length(keys(var.subnet_timeouts)) > 0 ? [var.subnet_timeouts] : []
    		103 | 
    		104 |     content {
    		105 |       create = lookup(subnet_timeouts.value, "create", null)
    		106 |       delete = lookup(subnet_timeouts.value, "delete", null)
    		107 |     }
    		108 |   }
    		109 | 
    		110 |   tags = merge(
    		111 |     {
    		112 |       Name = var.public_subnets_name != "" ? "${lower(var.public_subnets_name)}-${count.index + 1}" : "${lower(var.name)}-${lower(var.environment)}-public_subnet-${count.index + 1}"
    		113 |     },
    		114 |     var.tags
    		115 |   )
    		116 | 
    		117 |   lifecycle {
    		118 |     create_before_destroy = true
    		119 |     ignore_changes        = []
    		120 |   }
    		121 | 
    		122 |   depends_on = [
    		123 |     aws_vpc.vpc
    		124 |   ]
    		125 | }
    
    Check: CKV_AWS_130: "Ensure VPC subnets do not assign public IP by default"
    	FAILED for resource: module.vpc_2.aws_subnet.public_subnets
    	File: /aws/modules/vpc/subnet.tf:88-125
    	Calling File: /aws/examples/vpc_old/vpc_peering.tf:59-177
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-vpc-subnets-do-not-assign-public-ip-by-default.html
    
    		88  | resource "aws_subnet" "public_subnets" {
    		89  |   count = length(var.public_subnet_cidrs)
    		90  | 
    		91  |   cidr_block              = var.public_subnet_cidrs[count.index]
    		92  |   vpc_id                  = var.vpc_id != "" && !var.enable_vpc ? var.vpc_id : element(concat(aws_vpc.vpc.*.id, [""]), 0)
    		93  |   map_public_ip_on_launch = var.map_public_ip_on_launch
    		94  |   availability_zone       = length(var.azs) > 0 ? var.azs[count.index] : element(lookup(var.availability_zones, var.region), count.index)
    		95  | 
    		96  |   availability_zone_id            = var.availability_zone_id
    		97  |   ipv6_cidr_block                 = var.public_subnet_ipv6_cidrs != null ? var.public_subnet_ipv6_cidrs[count.index] : null
    		98  |   assign_ipv6_address_on_creation = var.assign_ipv6_address_on_creation
    		99  | 
    		100 |   dynamic "timeouts" {
    		101 |     iterator = timeouts
    		102 |     for_each = length(keys(var.subnet_timeouts)) > 0 ? [var.subnet_timeouts] : []
    		103 | 
    		104 |     content {
    		105 |       create = lookup(subnet_timeouts.value, "create", null)
    		106 |       delete = lookup(subnet_timeouts.value, "delete", null)
    		107 |     }
    		108 |   }
    		109 | 
    		110 |   tags = merge(
    		111 |     {
    		112 |       Name = var.public_subnets_name != "" ? "${lower(var.public_subnets_name)}-${count.index + 1}" : "${lower(var.name)}-${lower(var.environment)}-public_subnet-${count.index + 1}"
    		113 |     },
    		114 |     var.tags
    		115 |   )
    		116 | 
    		117 |   lifecycle {
    		118 |     create_before_destroy = true
    		119 |     ignore_changes        = []
    		120 |   }
    		121 | 
    		122 |   depends_on = [
    		123 |     aws_vpc.vpc
    		124 |   ]
    		125 | }
    
    Check: CKV_AWS_148: "Ensure no default VPC is planned to be provisioned"
    	FAILED for resource: module.vpc_default.aws_default_vpc.default_vpc[0]
    	File: /aws/modules/vpc_default/default_vpc.tf:4-24
    	Calling File: /aws/examples/vpc_default/main.tf:13-33
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-no-default-vpc-is-planned-to-be-provisioned.html
    
    		4  | resource "aws_default_vpc" "default_vpc" {
    		5  |   count = var.enable_default_vpc ? 1 : 0
    		6  | 
    		7  |   enable_dns_support   = var.default_vpc_enable_dns_support
    		8  |   enable_dns_hostnames = var.default_vpc_enable_dns_hostnames
    		9  |   enable_classiclink   = var.default_vpc_enable_classiclink
    		10 | 
    		11 |   tags = merge(
    		12 |     {
    		13 |       Name = var.default_vpc_name != "" ? var.default_vpc_name : "Default VPC"
    		14 |     },
    		15 |     var.tags
    		16 |   )
    		17 | 
    		18 |   lifecycle {
    		19 |     create_before_destroy = true
    		20 |     ignore_changes        = []
    		21 |   }
    		22 | 
    		23 |   depends_on = []
    		24 | }
    
    Check: CKV_AZURE_172: "Ensure autorotation of Secrets Store CSI Driver secrets for AKS clusters"
    	FAILED for resource: module.aks.azurerm_kubernetes_cluster.kubernetes_cluster[0]
    	File: /azure/modules/aks/kubernetes_cluster.tf:4-311
    	Calling File: /azure/examples/aks/main.tf:37-67
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AZURE_226: "Ensure ephemeral disks are used for OS disks"
    	FAILED for resource: module.aks.azurerm_kubernetes_cluster.kubernetes_cluster[0]
    	File: /azure/modules/aks/kubernetes_cluster.tf:4-311
    	Calling File: /azure/examples/aks/main.tf:37-67
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AZURE_227: "Ensure that the AKS cluster encrypt temp disks, caches, and data flows between Compute and Storage resources"
    	FAILED for resource: module.aks.azurerm_kubernetes_cluster.kubernetes_cluster[0]
    	File: /azure/modules/aks/kubernetes_cluster.tf:4-311
    	Calling File: /azure/examples/aks/main.tf:37-67
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AZURE_168: "Ensure Azure Kubernetes Cluster (AKS) nodes should use a minimum number of 50 pods."
    	FAILED for resource: module.aks.azurerm_kubernetes_cluster.kubernetes_cluster[0]
    	File: /azure/modules/aks/kubernetes_cluster.tf:4-311
    	Calling File: /azure/examples/aks/main.tf:37-67
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AZURE_39: "Ensure that no custom subscription owner roles are created"
    	FAILED for resource: module.authorization.azurerm_role_definition.role_definition[0]
    	File: /azure/modules/authorization/role_definition.tf:4-44
    	Calling File: /azure/examples/authorization/main.tf:49-91
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/azure-policies/azure-iam-policies/do-not-create-custom-subscription-owner-roles.html
    
    		4  | resource "azurerm_role_definition" "role_definition" {
    		5  |   count = var.enable_role_definition ? 1 : 0
    		6  | 
    		7  |   name  = var.role_definition_name != "" ? var.role_definition_name : "${lower(var.name)}-role-definition-${lower(var.environment)}"
    		8  |   scope = var.role_definition_scope
    		9  | 
    		10 |   description        = var.role_definition_description
    		11 |   role_definition_id = var.role_definition_role_definition_id
    		12 |   assignable_scopes  = var.role_definition_assignable_scopes
    		13 | 
    		14 |   dynamic "permissions" {
    		15 |     iterator = permissions
    		16 |     for_each = var.role_definition_permissions
    		17 | 
    		18 |     content {
    		19 |       actions          = lookup(permissions.value, "actions", null)
    		20 |       data_actions     = lookup(permissions.value, "data_actions", null)
    		21 |       not_actions      = lookup(permissions.value, "not_actions", null)
    		22 |       not_data_actions = lookup(permissions.value, "not_data_actions", null)
    		23 |     }
    		24 |   }
    		25 | 
    		26 |   dynamic "timeouts" {
    		27 |     iterator = timeouts
    		28 |     for_each = length(keys(var.role_definition_timeouts)) > 0 ? [var.role_definition_timeouts] : []
    		29 | 
    		30 |     content {
    		31 |       create = lookup(timeouts.value, "create", null)
    		32 |       read   = lookup(timeouts.value, "read", null)
    		33 |       update = lookup(timeouts.value, "update", null)
    		34 |       delete = lookup(timeouts.value, "delete", null)
    		35 |     }
    		36 |   }
    		37 | 
    		38 |   lifecycle {
    		39 |     create_before_destroy = true
    		40 |     ignore_changes        = []
    		41 |   }
    		42 | 
    		43 |   depends_on = []
    		44 | }
    Check: CKV_AZURE_98: "Ensure that Azure Container group is deployed into virtual network"
    	FAILED for resource: module.container.azurerm_container_group.container_group[0]
    	File: /azure/modules/container/container_group.tf:4-252
    	Calling File: /azure/examples/container/main.tf:35-67
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/azure-policies/azure-networking-policies/ensure-that-azure-container-container-group-is-deployed-into-virtual-network.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AZURE_96: "Ensure that MySQL server enables infrastructure encryption"
    	FAILED for resource: module.database_mysql.azurerm_mysql_server.mysql_server[0]
    	File: /azure/modules/database_mysql/mysql_server.tf:4-82
    	Calling File: /azure/examples/database_mysql/main.tf:46-114
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/azure-policies/azure-general-policies/ensure-that-postgresql-server-enables-infrastructure-encryption-1.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AZURE_53: "Ensure 'public network access enabled' is set to 'False' for mySQL servers"
    	FAILED for resource: module.database_mysql.azurerm_mysql_server.mysql_server[0]
    	File: /azure/modules/database_mysql/mysql_server.tf:4-82
    	Calling File: /azure/examples/database_mysql/main.tf:46-114
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/azure-policies/azure-networking-policies/ensure-public-network-access-enabled-is-set-to-false-for-mysql-servers.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AZURE_94: "Ensure that My SQL server enables geo-redundant backups"
    	FAILED for resource: module.database_mysql.azurerm_mysql_server.mysql_server[0]
    	File: /azure/modules/database_mysql/mysql_server.tf:4-82
    	Calling File: /azure/examples/database_mysql/main.tf:46-114
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/azure-policies/azure-general-policies/ensure-that-my-sql-server-enables-geo-redundant-backups.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AZURE_9: "Ensure that RDP access is restricted from the internet"
    	FAILED for resource: module.network_sg.azurerm_network_security_group.network_security_group[0]
    	File: /azure/modules/network/network_security_group.tf:4-61
    	Calling File: /azure/examples/network/main.tf:45-80
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/azure-policies/azure-networking-policies/bc-azr-networking-2.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AZURE_10: "Ensure that SSH access is restricted from the internet"
    	FAILED for resource: module.network_sg.azurerm_network_security_group.network_security_group[0]
    	File: /azure/modules/network/network_security_group.tf:4-61
    	Calling File: /azure/examples/network/main.tf:45-80
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/azure-policies/azure-networking-policies/bc-azr-networking-3.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AZURE_160: "Ensure that HTTP (port 80) access is restricted from the internet"
    	FAILED for resource: module.network_sg.azurerm_network_security_group.network_security_group[0]
    	File: /azure/modules/network/network_security_group.tf:4-61
    	Calling File: /azure/examples/network/main.tf:45-80
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/azure-policies/azure-networking-policies/ensure-azure-http-port-80-access-from-the-internet-is-restricted.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AZURE_183: "Ensure that VNET uses local DNS addresses"
    	FAILED for resource: module.virtual_network.azurerm_virtual_network.virtual_network
    	File: /azure/modules/network/virtual_network.tf:4-66
    	Calling File: /azure/examples/network/main.tf:82-118
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AZURE_44: "Ensure Storage Account is using the latest version of TLS encryption"
    	FAILED for resource: module.storage_account.azurerm_storage_account.storage_account[0]
    	File: /azure/modules/storage/storage_account.tf:4-308
    	Calling File: /azure/examples/storage/main.tf:45-79
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/azure-policies/azure-storage-policies/bc-azr-storage-2.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AZURE_43: "Ensure Storage Accounts adhere to the naming rules"
    	FAILED for resource: module.storage_account.azurerm_storage_account.storage_account[0]
    	File: /azure/modules/storage/storage_account.tf:4-308
    	Calling File: /azure/examples/storage/main.tf:45-79
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/azure-policies/azure-general-policies/ensure-cognitive-services-account-encryption-cmks-are-enabled.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AZURE_35: "Ensure default network access rule for Storage Accounts is set to deny"
    	FAILED for resource: module.storage_account.azurerm_storage_account.storage_account[0]
    	File: /azure/modules/storage/storage_account.tf:4-308
    	Calling File: /azure/examples/storage/main.tf:45-79
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/azure-policies/azure-networking-policies/set-default-network-access-rule-for-storage-accounts-to-deny.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AZURE_59: "Ensure that Storage accounts disallow public access"
    	FAILED for resource: module.storage_account.azurerm_storage_account.storage_account[0]
    	File: /azure/modules/storage/storage_account.tf:4-308
    	Calling File: /azure/examples/storage/main.tf:45-79
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/azure-policies/azure-networking-policies/ensure-that-storage-accounts-disallow-public-access.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AZURE_36: "Ensure 'Trusted Microsoft Services' is enabled for Storage Account access"
    	FAILED for resource: module.storage_account.azurerm_storage_account.storage_account[0]
    	File: /azure/modules/storage/storage_account.tf:4-308
    	Calling File: /azure/examples/storage/main.tf:45-79
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/azure-policies/azure-networking-policies/enable-trusted-microsoft-services-for-storage-account-access.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AZURE_35: "Ensure default network access rule for Storage Accounts is set to deny"
    	FAILED for resource: module.storage_account.azurerm_storage_account_network_rules.storage_account_network_rules[0]
    	File: /azure/modules/storage/storage_account_network_rules.tf:4-45
    	Calling File: /azure/examples/storage/main.tf:45-79
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/azure-policies/azure-networking-policies/set-default-network-access-rule-for-storage-accounts-to-deny.html
    
    		4  | resource "azurerm_storage_account_network_rules" "storage_account_network_rules" {
    		5  |   count = var.enable_storage_account_network_rules ? 1 : 0
    		6  | 
    		7  |   default_action = var.storage_account_network_rules_default_action
    		8  | 
    		9  |   storage_account_id         = var.storage_account_network_rules_storage_account_id != "" ? var.storage_account_network_rules_storage_account_id : (var.enable_storage_account ? azurerm_storage_account.storage_account[count.index].id : null)
    		10 |   bypass                     = var.storage_account_network_rules_bypass
    		11 |   ip_rules                   = var.storage_account_network_rules_ip_rules
    		12 |   virtual_network_subnet_ids = var.storage_account_network_rules_virtual_network_subnet_ids
    		13 | 
    		14 |   dynamic "private_link_access" {
    		15 |     iterator = private_link_access
    		16 |     for_each = length(keys(var.storage_account_network_rules_private_link_access)) > 0 ? [var.storage_account_network_rules_private_link_access] : []
    		17 | 
    		18 |     content {
    		19 |       endpoint_resource_id = lookup(private_link_access.value, "endpoint_resource_id", null)
    		20 | 
    		21 |       endpoint_tenant_id = lookup(private_link_access.value, "endpoint_tenant_id", null)
    		22 |     }
    		23 |   }
    		24 | 
    		25 |   dynamic "timeouts" {
    		26 |     iterator = timeouts
    		27 |     for_each = length(keys(var.storage_account_network_rules_timeouts)) > 0 ? [var.storage_account_network_rules_timeouts] : []
    		28 | 
    		29 |     content {
    		30 |       create = lookup(timeouts.value, "create", null)
    		31 |       read   = lookup(timeouts.value, "read", null)
    		32 |       update = lookup(timeouts.value, "update", null)
    		33 |       delete = lookup(timeouts.value, "delete", null)
    		34 |     }
    		35 |   }
    		36 | 
    		37 |   lifecycle {
    		38 |     create_before_destroy = true
    		39 |     ignore_changes        = []
    		40 |   }
    		41 | 
    		42 |   depends_on = [
    		43 |     azurerm_storage_account.storage_account
    		44 |   ]
    		45 | }
    Check: CKV_GCP_39: "Ensure Compute instances are launched with Shielded VM enabled"
    	FAILED for resource: module.compute_instance.google_compute_instance.compute_instance[0]
    	File: /google_cloud_platform/modules/compute_instance/compute_instance.tf:4-143
    	Calling File: /google_cloud_platform/examples/compute_target_pool/main.tf:15-24
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/bc-gcp-general-y.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_40: "Ensure that Compute instances do not have public IP addresses"
    	FAILED for resource: module.compute_instance.google_compute_instance.compute_instance[0]
    	File: /google_cloud_platform/modules/compute_instance/compute_instance.tf:4-143
    	Calling File: /google_cloud_platform/examples/compute_target_pool/main.tf:15-24
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-public-policies/bc-gcp-public-2.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_32: "Ensure 'Block Project-wide SSH keys' is enabled for VM instances"
    	FAILED for resource: module.compute_instance.google_compute_instance.compute_instance[0]
    	File: /google_cloud_platform/modules/compute_instance/compute_instance.tf:4-143
    	Calling File: /google_cloud_platform/examples/compute_target_pool/main.tf:15-24
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/bc-gcp-networking-8.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_39: "Ensure Compute instances are launched with Shielded VM enabled"
    	FAILED for resource: module.compute_instance.google_compute_instance.compute_instance_with_attached_disk[0]
    	File: /google_cloud_platform/modules/compute_instance/compute_instance.tf:147-285
    	Calling File: /google_cloud_platform/examples/compute_instance/main.tf:15-26
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/bc-gcp-general-y.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_40: "Ensure that Compute instances do not have public IP addresses"
    	FAILED for resource: module.compute_instance.google_compute_instance.compute_instance_with_attached_disk[0]
    	File: /google_cloud_platform/modules/compute_instance/compute_instance.tf:147-285
    	Calling File: /google_cloud_platform/examples/compute_instance/main.tf:15-26
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-public-policies/bc-gcp-public-2.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_32: "Ensure 'Block Project-wide SSH keys' is enabled for VM instances"
    	FAILED for resource: module.compute_instance.google_compute_instance.compute_instance_with_attached_disk[0]
    	File: /google_cloud_platform/modules/compute_instance/compute_instance.tf:147-285
    	Calling File: /google_cloud_platform/examples/compute_instance/main.tf:15-26
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/bc-gcp-networking-8.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_39: "Ensure Compute instances are launched with Shielded VM enabled"
    	FAILED for resource: module.compute_instance.google_compute_instance.compute_instance[1]
    	File: /google_cloud_platform/modules/compute_instance/compute_instance.tf:4-143
    	Calling File: /google_cloud_platform/examples/compute_target_pool/main.tf:15-24
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/bc-gcp-general-y.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_40: "Ensure that Compute instances do not have public IP addresses"
    	FAILED for resource: module.compute_instance.google_compute_instance.compute_instance[1]
    	File: /google_cloud_platform/modules/compute_instance/compute_instance.tf:4-143
    	Calling File: /google_cloud_platform/examples/compute_target_pool/main.tf:15-24
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-public-policies/bc-gcp-public-2.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_32: "Ensure 'Block Project-wide SSH keys' is enabled for VM instances"
    	FAILED for resource: module.compute_instance.google_compute_instance.compute_instance[1]
    	File: /google_cloud_platform/modules/compute_instance/compute_instance.tf:4-143
    	Calling File: /google_cloud_platform/examples/compute_target_pool/main.tf:15-24
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/bc-gcp-networking-8.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_39: "Ensure Compute instances are launched with Shielded VM enabled"
    	FAILED for resource: module.compute_instance.google_compute_instance.compute_instance_with_attached_disk[1]
    	File: /google_cloud_platform/modules/compute_instance/compute_instance.tf:147-285
    	Calling File: /google_cloud_platform/examples/compute_instance/main.tf:15-26
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/bc-gcp-general-y.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_40: "Ensure that Compute instances do not have public IP addresses"
    	FAILED for resource: module.compute_instance.google_compute_instance.compute_instance_with_attached_disk[1]
    	File: /google_cloud_platform/modules/compute_instance/compute_instance.tf:147-285
    	Calling File: /google_cloud_platform/examples/compute_instance/main.tf:15-26
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-public-policies/bc-gcp-public-2.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_32: "Ensure 'Block Project-wide SSH keys' is enabled for VM instances"
    	FAILED for resource: module.compute_instance.google_compute_instance.compute_instance_with_attached_disk[1]
    	File: /google_cloud_platform/modules/compute_instance/compute_instance.tf:147-285
    	Calling File: /google_cloud_platform/examples/compute_instance/main.tf:15-26
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/bc-gcp-networking-8.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_39: "Ensure Compute instances are launched with Shielded VM enabled"
    	FAILED for resource: module.compute_instance_template.google_compute_instance_template.compute_instance_template
    	File: /google_cloud_platform/modules/compute_instance_template/compute_instance_template.tf:4-91
    	Calling File: /google_cloud_platform/examples/compute_instance_template/main.tf:14-29
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/bc-gcp-general-y.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_40: "Ensure that Compute instances do not have public IP addresses"
    	FAILED for resource: module.compute_instance_template.google_compute_instance_template.compute_instance_template
    	File: /google_cloud_platform/modules/compute_instance_template/compute_instance_template.tf:4-91
    	Calling File: /google_cloud_platform/examples/compute_instance_template/main.tf:14-29
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-public-policies/bc-gcp-public-2.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_32: "Ensure 'Block Project-wide SSH keys' is enabled for VM instances"
    	FAILED for resource: module.compute_instance_template.google_compute_instance_template.compute_instance_template
    	File: /google_cloud_platform/modules/compute_instance_template/compute_instance_template.tf:4-91
    	Calling File: /google_cloud_platform/examples/compute_instance_template/main.tf:14-29
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/bc-gcp-networking-8.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
    	FAILED for resource: module.compute_subnetwork.google_compute_subnetwork.compute_subnetwork[0]
    	File: /google_cloud_platform/modules/compute_network/compute_network.tf:38-61
    	Calling File: /google_cloud_platform/examples/vpc/vpc-with-custom-subnet/main.tf:22-32
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
    
    		38 | resource "google_compute_subnetwork" "compute_subnetwork" {
    		39 |   count = var.enable_compute_subnetwork && !var.enable_secondary_ip_range ? 1 : 0
    		40 | 
    		41 |   name          = "${lower(var.name)}-subnetwork-${lower(var.environment)}"
    		42 |   description   = var.description
    		43 |   project       = var.project
    		44 |   ip_cidr_range = var.ip_cidr_range
    		45 |   region        = var.region
    		46 |   network       = var.network
    		47 | 
    		48 |   enable_flow_logs         = var.enable_flow_logs
    		49 |   private_ip_google_access = var.private_ip_google_access
    		50 | 
    		51 |   timeouts {
    		52 |     create = var.timeouts_create
    		53 |     update = var.timeouts_update
    		54 |     delete = var.timeouts_delete
    		55 |   }
    		56 | 
    		57 |   lifecycle {
    		58 |     ignore_changes        = []
    		59 |     create_before_destroy = true
    		60 |   }
    		61 | }
    
    Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
    	FAILED for resource: module.compute_subnetwork.google_compute_subnetwork.compute_subnetwork[0]
    	File: /google_cloud_platform/modules/compute_network/compute_network.tf:38-61
    	Calling File: /google_cloud_platform/examples/vpc/vpc-with-custom-subnet/main.tf:22-32
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
    
    		38 | resource "google_compute_subnetwork" "compute_subnetwork" {
    		39 |   count = var.enable_compute_subnetwork && !var.enable_secondary_ip_range ? 1 : 0
    		40 | 
    		41 |   name          = "${lower(var.name)}-subnetwork-${lower(var.environment)}"
    		42 |   description   = var.description
    		43 |   project       = var.project
    		44 |   ip_cidr_range = var.ip_cidr_range
    		45 |   region        = var.region
    		46 |   network       = var.network
    		47 | 
    		48 |   enable_flow_logs         = var.enable_flow_logs
    		49 |   private_ip_google_access = var.private_ip_google_access
    		50 | 
    		51 |   timeouts {
    		52 |     create = var.timeouts_create
    		53 |     update = var.timeouts_update
    		54 |     delete = var.timeouts_delete
    		55 |   }
    		56 | 
    		57 |   lifecycle {
    		58 |     ignore_changes        = []
    		59 |     create_before_destroy = true
    		60 |   }
    		61 | }
    
    Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
    	FAILED for resource: module.compute_subnetwork.google_compute_subnetwork.compute_subnetwork[0]
    	File: /google_cloud_platform/modules/compute_network/compute_network.tf:38-61
    	Calling File: /google_cloud_platform/examples/vpc/vpc-with-custom-subnet/main.tf:22-32
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
    
    		38 | resource "google_compute_subnetwork" "compute_subnetwork" {
    		39 |   count = var.enable_compute_subnetwork && !var.enable_secondary_ip_range ? 1 : 0
    		40 | 
    		41 |   name          = "${lower(var.name)}-subnetwork-${lower(var.environment)}"
    		42 |   description   = var.description
    		43 |   project       = var.project
    		44 |   ip_cidr_range = var.ip_cidr_range
    		45 |   region        = var.region
    		46 |   network       = var.network
    		47 | 
    		48 |   enable_flow_logs         = var.enable_flow_logs
    		49 |   private_ip_google_access = var.private_ip_google_access
    		50 | 
    		51 |   timeouts {
    		52 |     create = var.timeouts_create
    		53 |     update = var.timeouts_update
    		54 |     delete = var.timeouts_delete
    		55 |   }
    		56 | 
    		57 |   lifecycle {
    		58 |     ignore_changes        = []
    		59 |     create_before_destroy = true
    		60 |   }
    		61 | }
    
    Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
    	FAILED for resource: module.compute_subnetwork.google_compute_subnetwork.compute_subnetwork_with_secondary_ip_range[0]
    	File: /google_cloud_platform/modules/compute_network/compute_network.tf:63-91
    	Calling File: /google_cloud_platform/examples/vpc/vpc-with-custom-subnet/main.tf:22-32
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
    
    		63 | resource "google_compute_subnetwork" "compute_subnetwork_with_secondary_ip_range" {
    		64 |   count = var.enable_compute_subnetwork && var.enable_secondary_ip_range ? 1 : 0
    		65 | 
    		66 |   name          = "${lower(var.name)}-subnetwork-${lower(var.environment)}"
    		67 |   description   = var.description
    		68 |   project       = var.project
    		69 |   ip_cidr_range = var.ip_cidr_range
    		70 |   region        = var.region
    		71 |   network       = var.network
    		72 | 
    		73 |   enable_flow_logs         = var.enable_flow_logs
    		74 |   private_ip_google_access = var.private_ip_google_access
    		75 | 
    		76 |   secondary_ip_range {
    		77 |     range_name    = var.secondary_ip_range_name
    		78 |     ip_cidr_range = var.secondary_ip_range_cidr
    		79 |   }
    		80 | 
    		81 |   timeouts {
    		82 |     create = var.timeouts_create
    		83 |     update = var.timeouts_update
    		84 |     delete = var.timeouts_delete
    		85 |   }
    		86 | 
    		87 |   lifecycle {
    		88 |     ignore_changes        = []
    		89 |     create_before_destroy = true
    		90 |   }
    		91 | }
    
    Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
    	FAILED for resource: module.compute_subnetwork.google_compute_subnetwork.compute_subnetwork_with_secondary_ip_range[0]
    	File: /google_cloud_platform/modules/compute_network/compute_network.tf:63-91
    	Calling File: /google_cloud_platform/examples/vpc/vpc-with-custom-subnet/main.tf:22-32
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
    
    		63 | resource "google_compute_subnetwork" "compute_subnetwork_with_secondary_ip_range" {
    		64 |   count = var.enable_compute_subnetwork && var.enable_secondary_ip_range ? 1 : 0
    		65 | 
    		66 |   name          = "${lower(var.name)}-subnetwork-${lower(var.environment)}"
    		67 |   description   = var.description
    		68 |   project       = var.project
    		69 |   ip_cidr_range = var.ip_cidr_range
    		70 |   region        = var.region
    		71 |   network       = var.network
    		72 | 
    		73 |   enable_flow_logs         = var.enable_flow_logs
    		74 |   private_ip_google_access = var.private_ip_google_access
    		75 | 
    		76 |   secondary_ip_range {
    		77 |     range_name    = var.secondary_ip_range_name
    		78 |     ip_cidr_range = var.secondary_ip_range_cidr
    		79 |   }
    		80 | 
    		81 |   timeouts {
    		82 |     create = var.timeouts_create
    		83 |     update = var.timeouts_update
    		84 |     delete = var.timeouts_delete
    		85 |   }
    		86 | 
    		87 |   lifecycle {
    		88 |     ignore_changes        = []
    		89 |     create_before_destroy = true
    		90 |   }
    		91 | }
    
    Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
    	FAILED for resource: module.compute_subnetwork.google_compute_subnetwork.compute_subnetwork_with_secondary_ip_range[0]
    	File: /google_cloud_platform/modules/compute_network/compute_network.tf:63-91
    	Calling File: /google_cloud_platform/examples/vpc/vpc-with-custom-subnet/main.tf:22-32
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
    
    		63 | resource "google_compute_subnetwork" "compute_subnetwork_with_secondary_ip_range" {
    		64 |   count = var.enable_compute_subnetwork && var.enable_secondary_ip_range ? 1 : 0
    		65 | 
    		66 |   name          = "${lower(var.name)}-subnetwork-${lower(var.environment)}"
    		67 |   description   = var.description
    		68 |   project       = var.project
    		69 |   ip_cidr_range = var.ip_cidr_range
    		70 |   region        = var.region
    		71 |   network       = var.network
    		72 | 
    		73 |   enable_flow_logs         = var.enable_flow_logs
    		74 |   private_ip_google_access = var.private_ip_google_access
    		75 | 
    		76 |   secondary_ip_range {
    		77 |     range_name    = var.secondary_ip_range_name
    		78 |     ip_cidr_range = var.secondary_ip_range_cidr
    		79 |   }
    		80 | 
    		81 |   timeouts {
    		82 |     create = var.timeouts_create
    		83 |     update = var.timeouts_update
    		84 |     delete = var.timeouts_delete
    		85 |   }
    		86 | 
    		87 |   lifecycle {
    		88 |     ignore_changes        = []
    		89 |     create_before_destroy = true
    		90 |   }
    		91 | }
    
    Check: CKV_GCP_26: "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network"
    	FAILED for resource: module.compute_subnetwork.google_compute_subnetwork.compute_subnetwork_with_secondary_ip_range
    	File: /google_cloud_platform/modules/compute_network/compute_network.tf:63-91
    	Calling File: /google_cloud_platform/examples/compute_route/main.tf:22-31
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/bc-gcp-logging-1.html
    
    		63 | resource "google_compute_subnetwork" "compute_subnetwork_with_secondary_ip_range" {
    		64 |   count = var.enable_compute_subnetwork && var.enable_secondary_ip_range ? 1 : 0
    		65 | 
    		66 |   name          = "${lower(var.name)}-subnetwork-${lower(var.environment)}"
    		67 |   description   = var.description
    		68 |   project       = var.project
    		69 |   ip_cidr_range = var.ip_cidr_range
    		70 |   region        = var.region
    		71 |   network       = var.network
    		72 | 
    		73 |   enable_flow_logs         = var.enable_flow_logs
    		74 |   private_ip_google_access = var.private_ip_google_access
    		75 | 
    		76 |   secondary_ip_range {
    		77 |     range_name    = var.secondary_ip_range_name
    		78 |     ip_cidr_range = var.secondary_ip_range_cidr
    		79 |   }
    		80 | 
    		81 |   timeouts {
    		82 |     create = var.timeouts_create
    		83 |     update = var.timeouts_update
    		84 |     delete = var.timeouts_delete
    		85 |   }
    		86 | 
    		87 |   lifecycle {
    		88 |     ignore_changes        = []
    		89 |     create_before_destroy = true
    		90 |   }
    		91 | }
    
    Check: CKV_GCP_76: "Ensure that Private google access is enabled for IPV6"
    	FAILED for resource: module.compute_subnetwork.google_compute_subnetwork.compute_subnetwork_with_secondary_ip_range
    	File: /google_cloud_platform/modules/compute_network/compute_network.tf:63-91
    	Calling File: /google_cloud_platform/examples/compute_route/main.tf:22-31
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-private-google-access-is-enabled-for-ipv6.html
    
    		63 | resource "google_compute_subnetwork" "compute_subnetwork_with_secondary_ip_range" {
    		64 |   count = var.enable_compute_subnetwork && var.enable_secondary_ip_range ? 1 : 0
    		65 | 
    		66 |   name          = "${lower(var.name)}-subnetwork-${lower(var.environment)}"
    		67 |   description   = var.description
    		68 |   project       = var.project
    		69 |   ip_cidr_range = var.ip_cidr_range
    		70 |   region        = var.region
    		71 |   network       = var.network
    		72 | 
    		73 |   enable_flow_logs         = var.enable_flow_logs
    		74 |   private_ip_google_access = var.private_ip_google_access
    		75 | 
    		76 |   secondary_ip_range {
    		77 |     range_name    = var.secondary_ip_range_name
    		78 |     ip_cidr_range = var.secondary_ip_range_cidr
    		79 |   }
    		80 | 
    		81 |   timeouts {
    		82 |     create = var.timeouts_create
    		83 |     update = var.timeouts_update
    		84 |     delete = var.timeouts_delete
    		85 |   }
    		86 | 
    		87 |   lifecycle {
    		88 |     ignore_changes        = []
    		89 |     create_before_destroy = true
    		90 |   }
    		91 | }
    
    Check: CKV_GCP_74: "Ensure that private_ip_google_access is enabled for Subnet"
    	FAILED for resource: module.compute_subnetwork.google_compute_subnetwork.compute_subnetwork_with_secondary_ip_range
    	File: /google_cloud_platform/modules/compute_network/compute_network.tf:63-91
    	Calling File: /google_cloud_platform/examples/compute_route/main.tf:22-31
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-subnet-has-a-private-ip-google-access.html
    
    		63 | resource "google_compute_subnetwork" "compute_subnetwork_with_secondary_ip_range" {
    		64 |   count = var.enable_compute_subnetwork && var.enable_secondary_ip_range ? 1 : 0
    		65 | 
    		66 |   name          = "${lower(var.name)}-subnetwork-${lower(var.environment)}"
    		67 |   description   = var.description
    		68 |   project       = var.project
    		69 |   ip_cidr_range = var.ip_cidr_range
    		70 |   region        = var.region
    		71 |   network       = var.network
    		72 | 
    		73 |   enable_flow_logs         = var.enable_flow_logs
    		74 |   private_ip_google_access = var.private_ip_google_access
    		75 | 
    		76 |   secondary_ip_range {
    		77 |     range_name    = var.secondary_ip_range_name
    		78 |     ip_cidr_range = var.secondary_ip_range_cidr
    		79 |   }
    		80 | 
    		81 |   timeouts {
    		82 |     create = var.timeouts_create
    		83 |     update = var.timeouts_update
    		84 |     delete = var.timeouts_delete
    		85 |   }
    		86 | 
    		87 |   lifecycle {
    		88 |     ignore_changes        = []
    		89 |     create_before_destroy = true
    		90 |   }
    		91 | }
    
    Check: CKV_GCP_66: "Ensure use of Binary Authorization"
    	FAILED for resource: module.container_cluster.google_container_cluster.container_cluster_zone[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:4-123
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:29-43
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/ensure-use-of-binary-authorization.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_24: "Ensure PodSecurityPolicy controller is enabled on the Kubernetes Engine Clusters"
    	FAILED for resource: module.container_cluster.google_container_cluster.container_cluster_zone[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:4-123
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:29-43
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/bc-gcp-kubernetes-9.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_65: "Manage Kubernetes RBAC users with Google Groups for GKE"
    	FAILED for resource: module.container_cluster.google_container_cluster.container_cluster_zone[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:4-123
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:29-43
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/manage-kubernetes-rbac-users-with-google-groups-for-gke.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_12: "Ensure Network Policy is enabled on Kubernetes Engine Clusters"
    	FAILED for resource: module.container_cluster.google_container_cluster.container_cluster_zone[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:4-123
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:29-43
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/bc-gcp-kubernetes-7.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_25: "Ensure Kubernetes Cluster is created with Private cluster enabled"
    	FAILED for resource: module.container_cluster.google_container_cluster.container_cluster_zone[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:4-123
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:29-43
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/bc-gcp-kubernetes-6.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_70: "Ensure the GKE Release Channel is set"
    	FAILED for resource: module.container_cluster.google_container_cluster.container_cluster_zone[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:4-123
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:29-43
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/ensure-the-gke-release-channel-is-set.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_68: "Ensure Secure Boot for Shielded GKE Nodes is Enabled"
    	FAILED for resource: module.container_cluster.google_container_cluster.container_cluster_zone[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:4-123
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:29-43
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/ensure-secure-boot-for-shielded-gke-nodes-is-enabled.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_21: "Ensure Kubernetes Clusters are configured with Labels"
    	FAILED for resource: module.container_cluster.google_container_cluster.container_cluster_zone[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:4-123
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:29-43
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/bc-gcp-kubernetes-13.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_19: "Ensure GKE basic auth is disabled"
    	FAILED for resource: module.container_cluster.google_container_cluster.container_cluster_zone[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:4-123
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:29-43
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/bc-gcp-kubernetes-11.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_69: "Ensure the GKE Metadata Server is Enabled"
    	FAILED for resource: module.container_cluster.google_container_cluster.container_cluster_zone[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:4-123
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:29-43
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/ensure-the-gke-metadata-server-is-enabled.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_23: "Ensure Kubernetes Cluster is created with Alias IP ranges enabled"
    	FAILED for resource: module.container_cluster.google_container_cluster.container_cluster_zone[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:4-123
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:29-43
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/bc-gcp-kubernetes-15.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_61: "Enable VPC Flow Logs and Intranode Visibility"
    	FAILED for resource: module.container_cluster.google_container_cluster.container_cluster_zone[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:4-123
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:29-43
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/enable-vpc-flow-logs-and-intranode-visibility.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_64: "Ensure clusters are created with Private Nodes"
    	FAILED for resource: module.container_cluster.google_container_cluster.container_cluster_zone[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:4-123
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:29-43
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/ensure-clusters-are-created-with-private-nodes.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_66: "Ensure use of Binary Authorization"
    	FAILED for resource: module.container_cluster.google_container_cluster.container_cluster_region[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:125-244
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:29-43
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/ensure-use-of-binary-authorization.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_24: "Ensure PodSecurityPolicy controller is enabled on the Kubernetes Engine Clusters"
    	FAILED for resource: module.container_cluster.google_container_cluster.container_cluster_region[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:125-244
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:29-43
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/bc-gcp-kubernetes-9.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_65: "Manage Kubernetes RBAC users with Google Groups for GKE"
    	FAILED for resource: module.container_cluster.google_container_cluster.container_cluster_region[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:125-244
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:29-43
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/manage-kubernetes-rbac-users-with-google-groups-for-gke.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_12: "Ensure Network Policy is enabled on Kubernetes Engine Clusters"
    	FAILED for resource: module.container_cluster.google_container_cluster.container_cluster_region[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:125-244
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:29-43
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/bc-gcp-kubernetes-7.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_25: "Ensure Kubernetes Cluster is created with Private cluster enabled"
    	FAILED for resource: module.container_cluster.google_container_cluster.container_cluster_region[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:125-244
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:29-43
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/bc-gcp-kubernetes-6.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_70: "Ensure the GKE Release Channel is set"
    	FAILED for resource: module.container_cluster.google_container_cluster.container_cluster_region[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:125-244
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:29-43
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/ensure-the-gke-release-channel-is-set.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_68: "Ensure Secure Boot for Shielded GKE Nodes is Enabled"
    	FAILED for resource: module.container_cluster.google_container_cluster.container_cluster_region[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:125-244
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:29-43
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/ensure-secure-boot-for-shielded-gke-nodes-is-enabled.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_21: "Ensure Kubernetes Clusters are configured with Labels"
    	FAILED for resource: module.container_cluster.google_container_cluster.container_cluster_region[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:125-244
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:29-43
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/bc-gcp-kubernetes-13.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_19: "Ensure GKE basic auth is disabled"
    	FAILED for resource: module.container_cluster.google_container_cluster.container_cluster_region[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:125-244
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:29-43
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/bc-gcp-kubernetes-11.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_69: "Ensure the GKE Metadata Server is Enabled"
    	FAILED for resource: module.container_cluster.google_container_cluster.container_cluster_region[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:125-244
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:29-43
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/ensure-the-gke-metadata-server-is-enabled.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_61: "Enable VPC Flow Logs and Intranode Visibility"
    	FAILED for resource: module.container_cluster.google_container_cluster.container_cluster_region[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:125-244
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:29-43
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/enable-vpc-flow-logs-and-intranode-visibility.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_64: "Ensure clusters are created with Private Nodes"
    	FAILED for resource: module.container_cluster.google_container_cluster.container_cluster_region[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:125-244
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:29-43
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/ensure-clusters-are-created-with-private-nodes.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_68: "Ensure Secure Boot for Shielded GKE Nodes is Enabled"
    	FAILED for resource: module.container_cluster.google_container_node_pool.container_node_pool_zone[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:248-311
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:29-43
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/ensure-secure-boot-for-shielded-gke-nodes-is-enabled.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_69: "Ensure the GKE Metadata Server is Enabled"
    	FAILED for resource: module.container_cluster.google_container_node_pool.container_node_pool_zone[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:248-311
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:29-43
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/ensure-the-gke-metadata-server-is-enabled.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_68: "Ensure Secure Boot for Shielded GKE Nodes is Enabled"
    	FAILED for resource: module.container_cluster.google_container_node_pool.container_node_pool_region[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:313-374
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:29-43
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/ensure-secure-boot-for-shielded-gke-nodes-is-enabled.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_69: "Ensure the GKE Metadata Server is Enabled"
    	FAILED for resource: module.container_cluster.google_container_node_pool.container_node_pool_region[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:313-374
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:29-43
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/ensure-the-gke-metadata-server-is-enabled.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_66: "Ensure use of Binary Authorization"
    	FAILED for resource: module.node_pool.google_container_cluster.container_cluster_zone[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:4-123
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:45-57
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/ensure-use-of-binary-authorization.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_24: "Ensure PodSecurityPolicy controller is enabled on the Kubernetes Engine Clusters"
    	FAILED for resource: module.node_pool.google_container_cluster.container_cluster_zone[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:4-123
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:45-57
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/bc-gcp-kubernetes-9.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_65: "Manage Kubernetes RBAC users with Google Groups for GKE"
    	FAILED for resource: module.node_pool.google_container_cluster.container_cluster_zone[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:4-123
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:45-57
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/manage-kubernetes-rbac-users-with-google-groups-for-gke.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_12: "Ensure Network Policy is enabled on Kubernetes Engine Clusters"
    	FAILED for resource: module.node_pool.google_container_cluster.container_cluster_zone[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:4-123
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:45-57
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/bc-gcp-kubernetes-7.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_25: "Ensure Kubernetes Cluster is created with Private cluster enabled"
    	FAILED for resource: module.node_pool.google_container_cluster.container_cluster_zone[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:4-123
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:45-57
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/bc-gcp-kubernetes-6.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_70: "Ensure the GKE Release Channel is set"
    	FAILED for resource: module.node_pool.google_container_cluster.container_cluster_zone[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:4-123
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:45-57
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/ensure-the-gke-release-channel-is-set.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_68: "Ensure Secure Boot for Shielded GKE Nodes is Enabled"
    	FAILED for resource: module.node_pool.google_container_cluster.container_cluster_zone[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:4-123
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:45-57
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/ensure-secure-boot-for-shielded-gke-nodes-is-enabled.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_21: "Ensure Kubernetes Clusters are configured with Labels"
    	FAILED for resource: module.node_pool.google_container_cluster.container_cluster_zone[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:4-123
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:45-57
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/bc-gcp-kubernetes-13.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_19: "Ensure GKE basic auth is disabled"
    	FAILED for resource: module.node_pool.google_container_cluster.container_cluster_zone[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:4-123
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:45-57
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/bc-gcp-kubernetes-11.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_69: "Ensure the GKE Metadata Server is Enabled"
    	FAILED for resource: module.node_pool.google_container_cluster.container_cluster_zone[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:4-123
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:45-57
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/ensure-the-gke-metadata-server-is-enabled.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_23: "Ensure Kubernetes Cluster is created with Alias IP ranges enabled"
    	FAILED for resource: module.node_pool.google_container_cluster.container_cluster_zone[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:4-123
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:45-57
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/bc-gcp-kubernetes-15.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_61: "Enable VPC Flow Logs and Intranode Visibility"
    	FAILED for resource: module.node_pool.google_container_cluster.container_cluster_zone[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:4-123
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:45-57
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/enable-vpc-flow-logs-and-intranode-visibility.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_64: "Ensure clusters are created with Private Nodes"
    	FAILED for resource: module.node_pool.google_container_cluster.container_cluster_zone[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:4-123
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:45-57
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/ensure-clusters-are-created-with-private-nodes.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_66: "Ensure use of Binary Authorization"
    	FAILED for resource: module.node_pool.google_container_cluster.container_cluster_region[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:125-244
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:45-57
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/ensure-use-of-binary-authorization.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_24: "Ensure PodSecurityPolicy controller is enabled on the Kubernetes Engine Clusters"
    	FAILED for resource: module.node_pool.google_container_cluster.container_cluster_region[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:125-244
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:45-57
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/bc-gcp-kubernetes-9.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_65: "Manage Kubernetes RBAC users with Google Groups for GKE"
    	FAILED for resource: module.node_pool.google_container_cluster.container_cluster_region[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:125-244
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:45-57
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/manage-kubernetes-rbac-users-with-google-groups-for-gke.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_12: "Ensure Network Policy is enabled on Kubernetes Engine Clusters"
    	FAILED for resource: module.node_pool.google_container_cluster.container_cluster_region[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:125-244
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:45-57
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/bc-gcp-kubernetes-7.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_25: "Ensure Kubernetes Cluster is created with Private cluster enabled"
    	FAILED for resource: module.node_pool.google_container_cluster.container_cluster_region[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:125-244
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:45-57
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/bc-gcp-kubernetes-6.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_70: "Ensure the GKE Release Channel is set"
    	FAILED for resource: module.node_pool.google_container_cluster.container_cluster_region[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:125-244
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:45-57
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/ensure-the-gke-release-channel-is-set.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_68: "Ensure Secure Boot for Shielded GKE Nodes is Enabled"
    	FAILED for resource: module.node_pool.google_container_cluster.container_cluster_region[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:125-244
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:45-57
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/ensure-secure-boot-for-shielded-gke-nodes-is-enabled.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_21: "Ensure Kubernetes Clusters are configured with Labels"
    	FAILED for resource: module.node_pool.google_container_cluster.container_cluster_region[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:125-244
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:45-57
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/bc-gcp-kubernetes-13.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_19: "Ensure GKE basic auth is disabled"
    	FAILED for resource: module.node_pool.google_container_cluster.container_cluster_region[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:125-244
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:45-57
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/bc-gcp-kubernetes-11.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_69: "Ensure the GKE Metadata Server is Enabled"
    	FAILED for resource: module.node_pool.google_container_cluster.container_cluster_region[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:125-244
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:45-57
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/ensure-the-gke-metadata-server-is-enabled.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_61: "Enable VPC Flow Logs and Intranode Visibility"
    	FAILED for resource: module.node_pool.google_container_cluster.container_cluster_region[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:125-244
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:45-57
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/enable-vpc-flow-logs-and-intranode-visibility.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_64: "Ensure clusters are created with Private Nodes"
    	FAILED for resource: module.node_pool.google_container_cluster.container_cluster_region[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:125-244
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:45-57
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/ensure-clusters-are-created-with-private-nodes.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_68: "Ensure Secure Boot for Shielded GKE Nodes is Enabled"
    	FAILED for resource: module.node_pool.google_container_node_pool.container_node_pool_zone[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:248-311
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:45-57
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/ensure-secure-boot-for-shielded-gke-nodes-is-enabled.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_69: "Ensure the GKE Metadata Server is Enabled"
    	FAILED for resource: module.node_pool.google_container_node_pool.container_node_pool_zone[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:248-311
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:45-57
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/ensure-the-gke-metadata-server-is-enabled.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_68: "Ensure Secure Boot for Shielded GKE Nodes is Enabled"
    	FAILED for resource: module.node_pool.google_container_node_pool.container_node_pool_region[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:313-374
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:45-57
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/ensure-secure-boot-for-shielded-gke-nodes-is-enabled.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_69: "Ensure the GKE Metadata Server is Enabled"
    	FAILED for resource: module.node_pool.google_container_node_pool.container_node_pool_region[0]
    	File: /google_cloud_platform/modules/container_cluster/container_cluster.tf:313-374
    	Calling File: /google_cloud_platform/examples/container_cluster/main.tf:45-57
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-kubernetes-policies/ensure-the-gke-metadata-server-is-enabled.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_94: "Ensure Dataflow jobs are private"
    	FAILED for resource: module.dataflow_job.google_dataflow_job.dataflow_job
    	File: /google_cloud_platform/modules/dataflow_job/dataflow_job.tf:4-22
    	Calling File: /google_cloud_platform/examples/dataflow_job/main.tf:14-20
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-public-policies/ensure-gcp-cloud-dataflow-job-has-public-ips.html
    
    		4  | resource "google_dataflow_job" "dataflow_job" {
    		5  | 
    		6  |   name    = "${lower(var.name)}-df-job-${lower(var.environment)}"
    		7  |   project = var.project
    		8  |   zone    = var.zone
    		9  | 
    		10 |   template_gcs_path = var.template_gcs_path
    		11 |   temp_gcs_location = var.temp_gcs_location
    		12 | 
    		13 |   max_workers = var.max_workers
    		14 |   on_delete   = var.on_delete
    		15 | 
    		16 |   parameters = ["${var.parameters}"]
    		17 | 
    		18 |   lifecycle {
    		19 |     ignore_changes        = []
    		20 |     create_before_destroy = true
    		21 |   }
    		22 | }
    
    Check: CKV_GCP_90: "Ensure data flow jobs are encrypted with Customer Supplied Encryption Keys (CSEK)"
    	FAILED for resource: module.dataflow_job.google_dataflow_job.dataflow_job
    	File: /google_cloud_platform/modules/dataflow_job/dataflow_job.tf:4-22
    	Calling File: /google_cloud_platform/examples/dataflow_job/main.tf:14-20
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-data-flow-jobs-are-encrypted-with-customer-supplied-encryption-keys-csek.html
    
    		4  | resource "google_dataflow_job" "dataflow_job" {
    		5  | 
    		6  |   name    = "${lower(var.name)}-df-job-${lower(var.environment)}"
    		7  |   project = var.project
    		8  |   zone    = var.zone
    		9  | 
    		10 |   template_gcs_path = var.template_gcs_path
    		11 |   temp_gcs_location = var.temp_gcs_location
    		12 | 
    		13 |   max_workers = var.max_workers
    		14 |   on_delete   = var.on_delete
    		15 | 
    		16 |   parameters = ["${var.parameters}"]
    		17 | 
    		18 |   lifecycle {
    		19 |     ignore_changes        = []
    		20 |     create_before_destroy = true
    		21 |   }
    		22 | }
    
    Check: CKV_GCP_81: "Ensure Big Query Datasets are encrypted with Customer Supplied Encryption Keys (CSEK)"
    	FAILED for resource: module.google_bigquery.google_bigquery_dataset.bigquery_dataset[0]
    	File: /google_cloud_platform/modules/google_bigquery/google_bigquery.tf:14-41
    	Calling File: /google_cloud_platform/examples/google_bigquery/main.tf:14-23
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-big-query-tables-are-encrypted-with-customer-supplied-encryption-keys-csek-1.html
    
    		14 | resource "google_bigquery_dataset" "bigquery_dataset" {
    		15 |   count = var.enable_bigquery_dataset ? 1 : 0
    		16 | 
    		17 |   dataset_id                  = length(var.dataset_id) > 0 ? var.dataset_id : "${random_integer.dataset.result}"
    		18 |   friendly_name               = length(var.friendly_name) > 0 ? var.friendly_name : "${lower(var.name)}-bq-dataset-${lower(var.environment)}"
    		19 |   description                 = var.description
    		20 |   project                     = var.project
    		21 |   location                    = var.location
    		22 |   default_table_expiration_ms = var.default_table_expiration_ms
    		23 | 
    		24 |   labels {
    		25 |     name          = "${lower(var.name)}-bq-dataset-${lower(var.environment)}"
    		26 |     dataset_id    = length(var.dataset_id) > 0 ? var.dataset_id : "${random_integer.dataset.result}"
    		27 |     environment   = lower(var.environment)
    		28 |     orchestration = lower(var.orchestration)
    		29 |   }
    		30 | 
    		31 |   lifecycle {
    		32 |     ignore_changes = [
    		33 |       dataset_id
    		34 |     ]
    		35 |     create_before_destroy = true
    		36 |   }
    		37 | 
    		38 |   depends_on = [
    		39 |     random_integer.dataset
    		40 |   ]
    		41 | }
    
    Check: CKV_GCP_85: "Ensure Big Table Instances are encrypted with Customer Supplied Encryption Keys (CSEK)"
    	FAILED for resource: module.google_bigtable.google_bigtable_instance.bigtable_instance[0]
    	File: /google_cloud_platform/modules/google_bigtable/google_bigtable.tf:4-20
    	Calling File: /google_cloud_platform/examples/google_bigtable/main.tf:14-23
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-big-table-instances-are-encrypted-with-customer-supplied-encryption-keys-cseks.html
    
    		4  | resource "google_bigtable_instance" "bigtable_instance" {
    		5  |   count = var.enable_bigtable_instance ? 1 : 0
    		6  | 
    		7  |   name          = "${lower(var.name)}-bt-instance-${lower(var.environment)}"
    		8  |   display_name  = var.display_name
    		9  |   cluster_id    = length(var.cluster_id) > 0 ? var.cluster_id : "${lower(var.name)}-bt-instance-${lower(var.environment)}"
    		10 |   project       = var.project
    		11 |   zone          = var.zone
    		12 |   num_nodes     = var.num_nodes
    		13 |   instance_type = var.instance_type
    		14 |   storage_type  = var.storage_type
    		15 | 
    		16 |   lifecycle {
    		17 |     ignore_changes        = []
    		18 |     create_before_destroy = true
    		19 |   }
    		20 | }
    
    Check: CKV_GCP_16: "Ensure that DNSSEC is enabled for Cloud DNS"
    	FAILED for resource: module.google_dns.google_dns_managed_zone.dns_managed_zone[0]
    	File: /google_cloud_platform/modules/google_dns/google_dns.tf:4-16
    	Calling File: /google_cloud_platform/examples/google_dns/main.tf:14-25
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/bc-gcp-networking-5.html
    
    		4  | resource "google_dns_managed_zone" "dns_managed_zone" {
    		5  |   count = var.enable_dns_managed_zone && length(var.dns_name) > 0 && length(var.description) > 0 ? 1 : 0
    		6  | 
    		7  |   name        = "${lower(var.name)}-dns-mz-${lower(var.environment)}"
    		8  |   description = var.description
    		9  |   project     = var.project
    		10 |   dns_name    = var.dns_name
    		11 | 
    		12 |   lifecycle {
    		13 |     ignore_changes        = []
    		14 |     create_before_destroy = true
    		15 |   }
    		16 | }
    
    Check: CKV_GCP_83: "Ensure PubSub Topics are encrypted with Customer Supplied Encryption Keys (CSEK)"
    	FAILED for resource: module.google_pubsub.google_pubsub_topic.pubsub_topic[0]
    	File: /google_cloud_platform/modules/google_pubsub/google_pubsub.tf:4-14
    	Calling File: /google_cloud_platform/examples/google_pubsub/main.tf:14-40
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-pubsub-topics-are-encrypted-with-customer-supplied-encryption-keys-csek.html
    
    		4  | resource "google_pubsub_topic" "pubsub_topic" {
    		5  |   count = var.enable_pubsub_topic ? 1 : 0
    		6  | 
    		7  |   name    = "${lower(var.name)}-ps-topic-${lower(var.environment)}"
    		8  |   project = var.project
    		9  | 
    		10 |   lifecycle {
    		11 |     ignore_changes        = []
    		12 |     create_before_destroy = true
    		13 |   }
    		14 | }
    
    Check: CKV_GCP_27: "Ensure that the default network does not exist in a project"
    	FAILED for resource: module.project.google_project.project[0]
    	File: /google_cloud_platform/modules/project/outputs.tf:14-35
    	Calling File: /google_cloud_platform/examples/project/main.tf:14-30
    	Guide: https://docs.bridgecrew.io/docs/bc_gcp_networking_7
    
    		14 | resource "google_project" "project" {
    		15 |   count = var.billing_account != "" && var.org_id != "" ? 1 : 0
    		16 | 
    		17 |   name            = var.name
    		18 |   project_id      = var.project_id == "" ? random_id.id.hex : var.project_id
    		19 |   billing_account = var.billing_account
    		20 |   org_id          = var.org_id
    		21 | 
    		22 |   skip_delete         = var.skip_delete
    		23 |   auto_create_network = var.auto_create_network
    		24 | 
    		25 |   labels {
    		26 |     Name          = var.name
    		27 |     Environment   = var.environment
    		28 |     Orchestration = var.orchestration
    		29 |     Createdby     = var.createdby
    		30 |   }
    		31 | 
    		32 |   depends_on = [
    		33 |     random_id.id
    		34 |   ]
    		35 | }
    
    Check: CKV_GCP_27: "Ensure that the default network does not exist in a project"
    	FAILED for resource: module.project.google_project.specific_project[0]
    	File: /google_cloud_platform/modules/project/outputs.tf:40-61
    	Calling File: /google_cloud_platform/examples/project/main.tf:14-30
    	Guide: https://docs.bridgecrew.io/docs/bc_gcp_networking_7
    
    		40 | resource "google_project" "specific_project" {
    		41 |   count = var.org_id != "" && var.enable_specific_folder ? 1 : 0
    		42 | 
    		43 |   name = var.name
    		44 |   #project_id      = "${random_id.id.hex}"
    		45 |   project_id = var.project_id == "" ? random_id.id.hex : var.project_id
    		46 |   folder_id  = google_folder.specific_folder.name
    		47 | 
    		48 |   skip_delete         = var.skip_delete
    		49 |   auto_create_network = var.auto_create_network
    		50 | 
    		51 |   labels {
    		52 |     Name          = var.name
    		53 |     Environment   = var.environment
    		54 |     Orchestration = var.orchestration
    		55 |     Createdby     = var.createdby
    		56 |   }
    		57 | 
    		58 |   depends_on = [
    		59 |     google_folder.specific_folder
    		60 |   ]
    		61 | }
    
    Check: CKV_GCP_45: "Ensure no roles that enable to impersonate and manage all service accounts are used at an organization level"
    	FAILED for resource: module.project.google_organization_iam_member.organization_iam_member[0]
    	File: /google_cloud_platform/modules/project/outputs.tf:110-117
    	Calling File: /google_cloud_platform/examples/project/main.tf:14-30
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-iam-policies/bc-gcp-iam-6.html
    
    		110 | resource "google_organization_iam_member" "organization_iam_member" {
    		111 |   count = var.org_id != "" && var.enable_organization_iam_member ? 1 : 0
    		112 | 
    		113 | 
    		114 |   org_id = var.org_id
    		115 |   role   = "roles/editor"
    		116 |   member = "user:[email protected]"
    		117 | }
    
    Check: CKV_GCP_115: "Ensure basic roles are not used at organization level."
    	FAILED for resource: module.project.google_organization_iam_member.organization_iam_member[0]
    	File: /google_cloud_platform/modules/project/outputs.tf:110-117
    	Calling File: /google_cloud_platform/examples/project/main.tf:14-30
    
    		110 | resource "google_organization_iam_member" "organization_iam_member" {
    		111 |   count = var.org_id != "" && var.enable_organization_iam_member ? 1 : 0
    		112 | 
    		113 | 
    		114 |   org_id = var.org_id
    		115 |   role   = "roles/editor"
    		116 |   member = "user:[email protected]"
    		117 | }
    
    Check: CKV_GCP_95: "Ensure Memorystore for Redis has AUTH enabled"
    	FAILED for resource: module.redis_instance.google_redis_instance.redis_instance[0]
    	File: /google_cloud_platform/modules/redis_instance/redis_instance.tf:4-38
    	Calling File: /google_cloud_platform/examples/redis_instance/main.tf:14-19
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-memorystore-for-redis-is-auth-enabled.html
    
    		4  | resource "google_redis_instance" "redis_instance" {
    		5  |   count = var.count_redis_instance
    		6  | 
    		7  |   name           = "${lower(var.name)}-ri-${lower(var.environment)}-${count.index + 1}"
    		8  |   memory_size_gb = var.memory_size_gb
    		9  |   tier           = var.tier
    		10 | 
    		11 |   project                 = var.project
    		12 |   region                  = var.region
    		13 |   location_id             = var.location_id
    		14 |   alternative_location_id = var.alternative_location_id
    		15 | 
    		16 |   authorized_network = var.authorized_network
    		17 | 
    		18 |   redis_version     = var.redis_version
    		19 |   display_name      = length(var.display_name) > 0 ? var.display_name : "${lower(var.name)}-ri-${lower(var.environment)}"
    		20 |   reserved_ip_range = var.reserved_ip_range
    		21 | 
    		22 |   timeouts {
    		23 |     create = var.timeouts_create
    		24 |     update = var.timeouts_update
    		25 |     delete = var.timeouts_delete
    		26 |   }
    		27 | 
    		28 |   labels {
    		29 |     name          = "${lower(var.name)}-ri-${lower(var.environment)}-${count.index + 1}"
    		30 |     environment   = lower(var.environment)
    		31 |     orchestration = lower(var.orchestration)
    		32 |   }
    		33 | 
    		34 |   lifecycle {
    		35 |     ignore_changes        = []
    		36 |     create_before_destroy = true
    		37 |   }
    		38 | }
    
    Check: CKV_GCP_97: "Ensure Memorystore for Redis uses intransit encryption"
    	FAILED for resource: module.redis_instance.google_redis_instance.redis_instance[0]
    	File: /google_cloud_platform/modules/redis_instance/redis_instance.tf:4-38
    	Calling File: /google_cloud_platform/examples/redis_instance/main.tf:14-19
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-memorystore-for-redis-uses-intransit-encryption.html
    
    		4  | resource "google_redis_instance" "redis_instance" {
    		5  |   count = var.count_redis_instance
    		6  | 
    		7  |   name           = "${lower(var.name)}-ri-${lower(var.environment)}-${count.index + 1}"
    		8  |   memory_size_gb = var.memory_size_gb
    		9  |   tier           = var.tier
    		10 | 
    		11 |   project                 = var.project
    		12 |   region                  = var.region
    		13 |   location_id             = var.location_id
    		14 |   alternative_location_id = var.alternative_location_id
    		15 | 
    		16 |   authorized_network = var.authorized_network
    		17 | 
    		18 |   redis_version     = var.redis_version
    		19 |   display_name      = length(var.display_name) > 0 ? var.display_name : "${lower(var.name)}-ri-${lower(var.environment)}"
    		20 |   reserved_ip_range = var.reserved_ip_range
    		21 | 
    		22 |   timeouts {
    		23 |     create = var.timeouts_create
    		24 |     update = var.timeouts_update
    		25 |     delete = var.timeouts_delete
    		26 |   }
    		27 | 
    		28 |   labels {
    		29 |     name          = "${lower(var.name)}-ri-${lower(var.environment)}-${count.index + 1}"
    		30 |     environment   = lower(var.environment)
    		31 |     orchestration = lower(var.orchestration)
    		32 |   }
    		33 | 
    		34 |   lifecycle {
    		35 |     ignore_changes        = []
    		36 |     create_before_destroy = true
    		37 |   }
    		38 | }
    
    Check: CKV_GCP_6: "Ensure all Cloud SQL database instance requires all incoming connections to use SSL"
    	FAILED for resource: module.sql_database.google_sql_database_instance.sql_database_instance_mysql[0]
    	File: /google_cloud_platform/modules/sql_database/sql_database.tf:4-67
    	Calling File: /google_cloud_platform/examples/sql_database/main.tf:14-68
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/bc-gcp-general-1.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_79: "Ensure SQL database is using latest Major version"
    	FAILED for resource: module.sql_database.google_sql_database_instance.sql_database_instance_mysql[0]
    	File: /google_cloud_platform/modules/sql_database/sql_database.tf:4-67
    	Calling File: /google_cloud_platform/examples/sql_database/main.tf:14-68
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-sql-database-uses-the-latest-major-version.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_11: "Ensure that Cloud SQL database Instances are not open to the world"
    	FAILED for resource: module.sql_database.google_sql_database_instance.sql_database_instance_mysql[0]
    	File: /google_cloud_platform/modules/sql_database/sql_database.tf:4-67
    	Calling File: /google_cloud_platform/examples/sql_database/main.tf:14-68
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/bc-gcp-networking-4.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_60: "Ensure Cloud SQL database does not have public IP"
    	FAILED for resource: module.sql_database.google_sql_database_instance.sql_database_instance_mysql[0]
    	File: /google_cloud_platform/modules/sql_database/sql_database.tf:4-67
    	Calling File: /google_cloud_platform/examples/sql_database/main.tf:14-68
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/cloud-sql-policies/bc-gcp-sql-11.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_6: "Ensure all Cloud SQL database instance requires all incoming connections to use SSL"
    	FAILED for resource: module.sql_database.google_sql_database_instance.sql_database_instance_postgres
    	File: /google_cloud_platform/modules/sql_database/sql_database.tf:69-135
    	Calling File: /google_cloud_platform/examples/sql_database/main.tf:14-68
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/bc-gcp-general-1.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_79: "Ensure SQL database is using latest Major version"
    	FAILED for resource: module.sql_database.google_sql_database_instance.sql_database_instance_postgres
    	File: /google_cloud_platform/modules/sql_database/sql_database.tf:69-135
    	Calling File: /google_cloud_platform/examples/sql_database/main.tf:14-68
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-sql-database-uses-the-latest-major-version.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_11: "Ensure that Cloud SQL database Instances are not open to the world"
    	FAILED for resource: module.sql_database.google_sql_database_instance.sql_database_instance_postgres
    	File: /google_cloud_platform/modules/sql_database/sql_database.tf:69-135
    	Calling File: /google_cloud_platform/examples/sql_database/main.tf:14-68
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/bc-gcp-networking-4.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_60: "Ensure Cloud SQL database does not have public IP"
    	FAILED for resource: module.sql_database.google_sql_database_instance.sql_database_instance_postgres
    	File: /google_cloud_platform/modules/sql_database/sql_database.tf:69-135
    	Calling File: /google_cloud_platform/examples/sql_database/main.tf:14-68
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/cloud-sql-policies/bc-gcp-sql-11.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_6: "Ensure all Cloud SQL database instance requires all incoming connections to use SSL"
    	FAILED for resource: module.sql_database.google_sql_database_instance.sql_database_instance_mysql_replication[0]
    	File: /google_cloud_platform/modules/sql_database/sql_database.tf:139-215
    	Calling File: /google_cloud_platform/examples/sql_database/main.tf:14-68
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/bc-gcp-general-1.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_79: "Ensure SQL database is using latest Major version"
    	FAILED for resource: module.sql_database.google_sql_database_instance.sql_database_instance_mysql_replication[0]
    	File: /google_cloud_platform/modules/sql_database/sql_database.tf:139-215
    	Calling File: /google_cloud_platform/examples/sql_database/main.tf:14-68
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-sql-database-uses-the-latest-major-version.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_11: "Ensure that Cloud SQL database Instances are not open to the world"
    	FAILED for resource: module.sql_database.google_sql_database_instance.sql_database_instance_mysql_replication[0]
    	File: /google_cloud_platform/modules/sql_database/sql_database.tf:139-215
    	Calling File: /google_cloud_platform/examples/sql_database/main.tf:14-68
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/bc-gcp-networking-4.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_60: "Ensure Cloud SQL database does not have public IP"
    	FAILED for resource: module.sql_database.google_sql_database_instance.sql_database_instance_mysql_replication[0]
    	File: /google_cloud_platform/modules/sql_database/sql_database.tf:139-215
    	Calling File: /google_cloud_platform/examples/sql_database/main.tf:14-68
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/cloud-sql-policies/bc-gcp-sql-11.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_6: "Ensure all Cloud SQL database instance requires all incoming connections to use SSL"
    	FAILED for resource: module.sql_database.google_sql_database_instance.sql_database_instance_postgres_replication
    	File: /google_cloud_platform/modules/sql_database/sql_database.tf:217-296
    	Calling File: /google_cloud_platform/examples/sql_database/main.tf:14-68
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/bc-gcp-general-1.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_79: "Ensure SQL database is using latest Major version"
    	FAILED for resource: module.sql_database.google_sql_database_instance.sql_database_instance_postgres_replication
    	File: /google_cloud_platform/modules/sql_database/sql_database.tf:217-296
    	Calling File: /google_cloud_platform/examples/sql_database/main.tf:14-68
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-sql-database-uses-the-latest-major-version.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_11: "Ensure that Cloud SQL database Instances are not open to the world"
    	FAILED for resource: module.sql_database.google_sql_database_instance.sql_database_instance_postgres_replication
    	File: /google_cloud_platform/modules/sql_database/sql_database.tf:217-296
    	Calling File: /google_cloud_platform/examples/sql_database/main.tf:14-68
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/bc-gcp-networking-4.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_60: "Ensure Cloud SQL database does not have public IP"
    	FAILED for resource: module.sql_database.google_sql_database_instance.sql_database_instance_postgres_replication
    	File: /google_cloud_platform/modules/sql_database/sql_database.tf:217-296
    	Calling File: /google_cloud_platform/examples/sql_database/main.tf:14-68
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/cloud-sql-policies/bc-gcp-sql-11.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_114: "Ensure public access prevention is enforced on Cloud Storage bucket"
    	FAILED for resource: module.storage_bucket.google_storage_bucket.storage_bucket[0]
    	File: /google_cloud_platform/modules/storage_bucket/storage_bucket.tf:4-59
    	Calling File: /google_cloud_platform/examples/storage_bucket/main.tf:14-21
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_78: "Ensure Cloud storage has versioning enabled"
    	FAILED for resource: module.storage_bucket.google_storage_bucket.storage_bucket[0]
    	File: /google_cloud_platform/modules/storage_bucket/storage_bucket.tf:4-59
    	Calling File: /google_cloud_platform/examples/storage_bucket/main.tf:14-21
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-general-policies/ensure-gcp-cloud-storage-has-versioning-enabled.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_GCP_29: "Ensure that Cloud Storage buckets have uniform bucket-level access enabled"
    	FAILED for resource: module.storage_bucket.google_storage_bucket.storage_bucket[0]
    	File: /google_cloud_platform/modules/storage_bucket/storage_bucket.tf:4-59
    	Calling File: /google_cloud_platform/examples/storage_bucket/main.tf:14-21
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-storage-gcs-policies/bc-gcp-gcs-2.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_K8S_42: "Ensure that default service accounts are not actively used"
    	FAILED for resource: module.k8s_cluster_role_binding.kubernetes_cluster_role_binding.cluster_role_binding[0]
    	File: /kubernetes/modules/k8s_cluster_role/cluster_role_binding.tf:4-45
    	Calling File: /kubernetes/examples/k8s_cluster_role/main.tf:86-126
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/ensure-default-service-accounts-are-not-actively-used.html
    
    		4  | resource "kubernetes_cluster_role_binding" "cluster_role_binding" {
    		5  |   count = var.enable_cluster_role_binding ? 1 : 0
    		6  | 
    		7  |   metadata {
    		8  |     name = var.cluster_role_binding_name != "" ? var.cluster_role_binding_name : "${lower(var.name)}-cluster-role-binding-${lower(var.environment)}"
    		9  |     // name          = var.cluster_role_binding_name != "" ? var.cluster_role_binding_name : (var.cluster_role_binding_generate_name == null ? "${lower(var.name)}-cluster-role-${lower(var.environment)}" : null)
    		10 |     // generate_name = var.cluster_role_binding_generate_name != null ? (var.cluster_role_binding_name == "" ? var.cluster_role_binding_generate_name : null) : null
    		11 | 
    		12 |     annotations = var.cluster_role_binding_annotations
    		13 |     labels      = var.cluster_role_binding_labels
    		14 |   }
    		15 | 
    		16 |   dynamic "role_ref" {
    		17 |     iterator = role_ref
    		18 |     for_each = var.cluster_role_binding_role_refs
    		19 | 
    		20 |     content {
    		21 |       api_group = lookup(role_ref.value, "api_group", null)
    		22 |       kind      = lookup(role_ref.value, "kind", null)
    		23 |       name      = lookup(role_ref.value, "name", null)
    		24 |     }
    		25 |   }
    		26 | 
    		27 |   dynamic "subject" {
    		28 |     iterator = subject
    		29 |     for_each = var.cluster_role_binding_subjects
    		30 | 
    		31 |     content {
    		32 |       name      = lookup(subject.value, "name", null)
    		33 |       kind      = lookup(subject.value, "kind", null)
    		34 |       namespace = lookup(subject.value, "namespace", null)
    		35 |       api_group = lookup(subject.value, "api_group", null)
    		36 |     }
    		37 |   }
    		38 | 
    		39 |   lifecycle {
    		40 |     create_before_destroy = true
    		41 |     ignore_changes        = []
    		42 |   }
    		43 | 
    		44 |   depends_on = []
    		45 | }
    
    Check: CKV_K8S_21: "The default namespace should not be used"
    	FAILED for resource: module.k8s_config_map_suffix.kubernetes_config_map.config_map[0]
    	File: /kubernetes/modules/k8s_config_map/config_map.tf:4-26
    	Calling File: /kubernetes/examples/k8s_config_map/main.tf:61-83
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/bc-k8s-20.html
    
    		4  | resource "kubernetes_config_map" "config_map" {
    		5  |   count = var.enable_config_map ? 1 : 0
    		6  | 
    		7  |   metadata {
    		8  |     name          = var.config_map_name != "" ? var.config_map_name : (var.config_map_generate_name == null ? "${lower(var.name)}-cm-${lower(var.environment)}" : null)
    		9  |     generate_name = var.config_map_generate_name != null ? (var.config_map_name == "" ? var.config_map_generate_name : null) : null
    		10 | 
    		11 |     annotations = var.config_map_annotations
    		12 |     labels      = var.config_map_labels
    		13 | 
    		14 |     namespace = var.config_map_namespace
    		15 |   }
    		16 | 
    		17 |   data        = var.data
    		18 |   binary_data = var.binary_data
    		19 | 
    		20 |   lifecycle {
    		21 |     create_before_destroy = true
    		22 |     ignore_changes        = []
    		23 |   }
    		24 | 
    		25 |   depends_on = []
    		26 | }
    
    Check: CKV_K8S_42: "Ensure that default service accounts are not actively used"
    	FAILED for resource: module.k8s_role_binding.kubernetes_role_binding.role_binding[0]
    	File: /kubernetes/modules/k8s_role/kubernetes_role_binding.tf:4-46
    	Calling File: /kubernetes/examples/k8s_role/main.tf:51-96
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/kubernetes-policies/kubernetes-policy-index/ensure-default-service-accounts-are-not-actively-used.html
    
    		4  | resource "kubernetes_role_binding" "role_binding" {
    		5  |   count = var.enable_role_binding ? 1 : 0
    		6  | 
    		7  |   metadata {
    		8  |     name = var.role_binding_name != "" ? var.role_binding_name : "${lower(var.name)}-cluster-role-${lower(var.environment)}"
    		9  |     // name          = var.role_binding_name != "" ? var.role_binding_name : (var.role_binding_generate_name == null ? "${lower(var.name)}-cluster-role-${lower(var.environment)}" : null)
    		10 |     // generate_name = var.role_binding_generate_name != null ? (var.role_binding_name == "" ? var.role_binding_generate_name : null) : null
    		11 | 
    		12 |     annotations = var.role_binding_annotations
    		13 |     labels      = var.role_binding_labels
    		14 |     namespace   = var.role_binding_namespace
    		15 |   }
    		16 | 
    		17 |   dynamic "role_ref" {
    		18 |     iterator = role_ref
    		19 |     for_each = var.role_binding_role_refs
    		20 | 
    		21 |     content {
    		22 |       api_group = lookup(role_ref.value, "api_group", null)
    		23 |       kind      = lookup(role_ref.value, "kind", null)
    		24 |       name      = lookup(role_ref.value, "name", null)
    		25 |     }
    		26 |   }
    		27 | 
    		28 |   dynamic "subject" {
    		29 |     iterator = subject
    		30 |     for_each = var.role_binding_subjects
    		31 | 
    		32 |     content {
    		33 |       name      = lookup(subject.value, "name", null)
    		34 |       kind      = lookup(subject.value, "kind", null)
    		35 |       namespace = lookup(subject.value, "namespace", null)
    		36 |       api_group = lookup(subject.value, "api_group", null)
    		37 |     }
    		38 |   }
    		39 | 
    		40 |   lifecycle {
    		41 |     create_before_destroy = true
    		42 |     ignore_changes        = []
    		43 |   }
    		44 | 
    		45 |   depends_on = []
    		46 | }
    
    Check: CKV2_AZURE_20: "Ensure Storage logging is enabled for Table service for read requests"
    	FAILED for resource: module.storage_blob.azurerm_storage_table.storage_table
    	File: /azure/modules/storage/storage_table.tf:4-50
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/azure-policies/azure-logging-policies/ensure-storage-logging-is-enabled-for-table-service-for-read-requests.html
    
    		4  | resource "azurerm_storage_table" "storage_table" {
    		5  |   count = var.enable_storage_table ? 1 : 0
    		6  | 
    		7  |   name                 = var.storage_table_name != "" ? var.storage_table_name : "${lower(var.name)}-storage-table-${lower(var.environment)}"
    		8  |   storage_account_name = var.storage_table_storage_account_name != "" ? var.storage_table_storage_account_name : (var.enable_storage_account ? azurerm_storage_account.storage_account[count.index].name : null)
    		9  | 
    		10 |   dynamic "acl" {
    		11 |     iterator = acl
    		12 |     for_each = var.storage_table_acl
    		13 | 
    		14 |     content {
    		15 |       id = lookup(acl.value, "id", null)
    		16 | 
    		17 |       dynamic "access_policy" {
    		18 |         iterator = access_policy
    		19 |         for_each = length(keys(lookup(acl.value, "access_policy", {}))) > 0 ? [lookup(acl.value, "access_policy", {})] : []
    		20 | 
    		21 |         content {
    		22 |           expiry      = lookup(access_policy.value, "expiry", null)
    		23 |           permissions = lookup(access_policy.value, "permissions", null)
    		24 |           start       = lookup(access_policy.value, "start", null)
    		25 |         }
    		26 |       }
    		27 |     }
    		28 |   }
    		29 | 
    		30 |   dynamic "timeouts" {
    		31 |     iterator = timeouts
    		32 |     for_each = length(keys(var.storage_table_timeouts)) > 0 ? [var.storage_table_timeouts] : []
    		33 | 
    		34 |     content {
    		35 |       create = lookup(timeouts.value, "create", null)
    		36 |       read   = lookup(timeouts.value, "read", null)
    		37 |       update = lookup(timeouts.value, "update", null)
    		38 |       delete = lookup(timeouts.value, "delete", null)
    		39 |     }
    		40 |   }
    		41 | 
    		42 |   lifecycle {
    		43 |     create_before_destroy = true
    		44 |     ignore_changes        = []
    		45 |   }
    		46 | 
    		47 |   depends_on = [
    		48 |     azurerm_storage_account.storage_account
    		49 |   ]
    		50 | }
    Check: CKV2_AZURE_20: "Ensure Storage logging is enabled for Table service for read requests"
    	FAILED for resource: module.storage_container.azurerm_storage_table.storage_table
    	File: /azure/modules/storage/storage_table.tf:4-50
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/azure-policies/azure-logging-policies/ensure-storage-logging-is-enabled-for-table-service-for-read-requests.html
    
    		4  | resource "azurerm_storage_table" "storage_table" {
    		5  |   count = var.enable_storage_table ? 1 : 0
    		6  | 
    		7  |   name                 = var.storage_table_name != "" ? var.storage_table_name : "${lower(var.name)}-storage-table-${lower(var.environment)}"
    		8  |   storage_account_name = var.storage_table_storage_account_name != "" ? var.storage_table_storage_account_name : (var.enable_storage_account ? azurerm_storage_account.storage_account[count.index].name : null)
    		9  | 
    		10 |   dynamic "acl" {
    		11 |     iterator = acl
    		12 |     for_each = var.storage_table_acl
    		13 | 
    		14 |     content {
    		15 |       id = lookup(acl.value, "id", null)
    		16 | 
    		17 |       dynamic "access_policy" {
    		18 |         iterator = access_policy
    		19 |         for_each = length(keys(lookup(acl.value, "access_policy", {}))) > 0 ? [lookup(acl.value, "access_policy", {})] : []
    		20 | 
    		21 |         content {
    		22 |           expiry      = lookup(access_policy.value, "expiry", null)
    		23 |           permissions = lookup(access_policy.value, "permissions", null)
    		24 |           start       = lookup(access_policy.value, "start", null)
    		25 |         }
    		26 |       }
    		27 |     }
    		28 |   }
    		29 | 
    		30 |   dynamic "timeouts" {
    		31 |     iterator = timeouts
    		32 |     for_each = length(keys(var.storage_table_timeouts)) > 0 ? [var.storage_table_timeouts] : []
    		33 | 
    		34 |     content {
    		35 |       create = lookup(timeouts.value, "create", null)
    		36 |       read   = lookup(timeouts.value, "read", null)
    		37 |       update = lookup(timeouts.value, "update", null)
    		38 |       delete = lookup(timeouts.value, "delete", null)
    		39 |     }
    		40 |   }
    		41 | 
    		42 |   lifecycle {
    		43 |     create_before_destroy = true
    		44 |     ignore_changes        = []
    		45 |   }
    		46 | 
    		47 |   depends_on = [
    		48 |     azurerm_storage_account.storage_account
    		49 |   ]
    		50 | }
    Check: CKV2_AZURE_20: "Ensure Storage logging is enabled for Table service for read requests"
    	FAILED for resource: module.storage_share.azurerm_storage_table.storage_table
    	File: /azure/modules/storage/storage_table.tf:4-50
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/azure-policies/azure-logging-policies/ensure-storage-logging-is-enabled-for-table-service-for-read-requests.html
    
    		4  | resource "azurerm_storage_table" "storage_table" {
    		5  |   count = var.enable_storage_table ? 1 : 0
    		6  | 
    		7  |   name                 = var.storage_table_name != "" ? var.storage_table_name : "${lower(var.name)}-storage-table-${lower(var.environment)}"
    		8  |   storage_account_name = var.storage_table_storage_account_name != "" ? var.storage_table_storage_account_name : (var.enable_storage_account ? azurerm_storage_account.storage_account[count.index].name : null)
    		9  | 
    		10 |   dynamic "acl" {
    		11 |     iterator = acl
    		12 |     for_each = var.storage_table_acl
    		13 | 
    		14 |     content {
    		15 |       id = lookup(acl.value, "id", null)
    		16 | 
    		17 |       dynamic "access_policy" {
    		18 |         iterator = access_policy
    		19 |         for_each = length(keys(lookup(acl.value, "access_policy", {}))) > 0 ? [lookup(acl.value, "access_policy", {})] : []
    		20 | 
    		21 |         content {
    		22 |           expiry      = lookup(access_policy.value, "expiry", null)
    		23 |           permissions = lookup(access_policy.value, "permissions", null)
    		24 |           start       = lookup(access_policy.value, "start", null)
    		25 |         }
    		26 |       }
    		27 |     }
    		28 |   }
    		29 | 
    		30 |   dynamic "timeouts" {
    		31 |     iterator = timeouts
    		32 |     for_each = length(keys(var.storage_table_timeouts)) > 0 ? [var.storage_table_timeouts] : []
    		33 | 
    		34 |     content {
    		35 |       create = lookup(timeouts.value, "create", null)
    		36 |       read   = lookup(timeouts.value, "read", null)
    		37 |       update = lookup(timeouts.value, "update", null)
    		38 |       delete = lookup(timeouts.value, "delete", null)
    		39 |     }
    		40 |   }
    		41 | 
    		42 |   lifecycle {
    		43 |     create_before_destroy = true
    		44 |     ignore_changes        = []
    		45 |   }
    		46 | 
    		47 |   depends_on = [
    		48 |     azurerm_storage_account.storage_account
    		49 |   ]
    		50 | }
    Check: CKV2_AZURE_20: "Ensure Storage logging is enabled for Table service for read requests"
    	FAILED for resource: module.storage_sync.azurerm_storage_table.storage_table
    	File: /azure/modules/storage/storage_table.tf:4-50
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/azure-policies/azure-logging-policies/ensure-storage-logging-is-enabled-for-table-service-for-read-requests.html
    
    		4  | resource "azurerm_storage_table" "storage_table" {
    		5  |   count = var.enable_storage_table ? 1 : 0
    		6  | 
    		7  |   name                 = var.storage_table_name != "" ? var.storage_table_name : "${lower(var.name)}-storage-table-${lower(var.environment)}"
    		8  |   storage_account_name = var.storage_table_storage_account_name != "" ? var.storage_table_storage_account_name : (var.enable_storage_account ? azurerm_storage_account.storage_account[count.index].name : null)
    		9  | 
    		10 |   dynamic "acl" {
    		11 |     iterator = acl
    		12 |     for_each = var.storage_table_acl
    		13 | 
    		14 |     content {
    		15 |       id = lookup(acl.value, "id", null)
    		16 | 
    		17 |       dynamic "access_policy" {
    		18 |         iterator = access_policy
    		19 |         for_each = length(keys(lookup(acl.value, "access_policy", {}))) > 0 ? [lookup(acl.value, "access_policy", {})] : []
    		20 | 
    		21 |         content {
    		22 |           expiry      = lookup(access_policy.value, "expiry", null)
    		23 |           permissions = lookup(access_policy.value, "permissions", null)
    		24 |           start       = lookup(access_policy.value, "start", null)
    		25 |         }
    		26 |       }
    		27 |     }
    		28 |   }
    		29 | 
    		30 |   dynamic "timeouts" {
    		31 |     iterator = timeouts
    		32 |     for_each = length(keys(var.storage_table_timeouts)) > 0 ? [var.storage_table_timeouts] : []
    		33 | 
    		34 |     content {
    		35 |       create = lookup(timeouts.value, "create", null)
    		36 |       read   = lookup(timeouts.value, "read", null)
    		37 |       update = lookup(timeouts.value, "update", null)
    		38 |       delete = lookup(timeouts.value, "delete", null)
    		39 |     }
    		40 |   }
    		41 | 
    		42 |   lifecycle {
    		43 |     create_before_destroy = true
    		44 |     ignore_changes        = []
    		45 |   }
    		46 | 
    		47 |   depends_on = [
    		48 |     azurerm_storage_account.storage_account
    		49 |   ]
    		50 | }
    Check: CKV2_AZURE_20: "Ensure Storage logging is enabled for Table service for read requests"
    	FAILED for resource: module.storage_account.azurerm_storage_table.storage_table
    	File: /azure/modules/storage/storage_table.tf:4-50
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/azure-policies/azure-logging-policies/ensure-storage-logging-is-enabled-for-table-service-for-read-requests.html
    
    		4  | resource "azurerm_storage_table" "storage_table" {
    		5  |   count = var.enable_storage_table ? 1 : 0
    		6  | 
    		7  |   name                 = var.storage_table_name != "" ? var.storage_table_name : "${lower(var.name)}-storage-table-${lower(var.environment)}"
    		8  |   storage_account_name = var.storage_table_storage_account_name != "" ? var.storage_table_storage_account_name : (var.enable_storage_account ? azurerm_storage_account.storage_account[count.index].name : null)
    		9  | 
    		10 |   dynamic "acl" {
    		11 |     iterator = acl
    		12 |     for_each = var.storage_table_acl
    		13 | 
    		14 |     content {
    		15 |       id = lookup(acl.value, "id", null)
    		16 | 
    		17 |       dynamic "access_policy" {
    		18 |         iterator = access_policy
    		19 |         for_each = length(keys(lookup(acl.value, "access_policy", {}))) > 0 ? [lookup(acl.value, "access_policy", {})] : []
    		20 | 
    		21 |         content {
    		22 |           expiry      = lookup(access_policy.value, "expiry", null)
    		23 |           permissions = lookup(access_policy.value, "permissions", null)
    		24 |           start       = lookup(access_policy.value, "start", null)
    		25 |         }
    		26 |       }
    		27 |     }
    		28 |   }
    		29 | 
    		30 |   dynamic "timeouts" {
    		31 |     iterator = timeouts
    		32 |     for_each = length(keys(var.storage_table_timeouts)) > 0 ? [var.storage_table_timeouts] : []
    		33 | 
    		34 |     content {
    		35 |       create = lookup(timeouts.value, "create", null)
    		36 |       read   = lookup(timeouts.value, "read", null)
    		37 |       update = lookup(timeouts.value, "update", null)
    		38 |       delete = lookup(timeouts.value, "delete", null)
    		39 |     }
    		40 |   }
    		41 | 
    		42 |   lifecycle {
    		43 |     create_before_destroy = true
    		44 |     ignore_changes        = []
    		45 |   }
    		46 | 
    		47 |   depends_on = [
    		48 |     azurerm_storage_account.storage_account
    		49 |   ]
    		50 | }
    Check: CKV2_AZURE_33: "Ensure storage account is configured with private endpoint"
    	FAILED for resource: module.storage_account.azurerm_storage_account.storage_account[0]
    	File: /azure/modules/storage/storage_account.tf:4-308
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV2_AZURE_33: "Ensure storage account is configured with private endpoint"
    	FAILED for resource: module.storage_blob.azurerm_storage_account.storage_account
    	File: /azure/modules/storage/storage_account.tf:4-308
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV2_AZURE_33: "Ensure storage account is configured with private endpoint"
    	FAILED for resource: module.storage_container.azurerm_storage_account.storage_account
    	File: /azure/modules/storage/storage_account.tf:4-308
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV2_AZURE_33: "Ensure storage account is configured with private endpoint"
    	FAILED for resource: module.storage_share.azurerm_storage_account.storage_account
    	File: /azure/modules/storage/storage_account.tf:4-308
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV2_AZURE_33: "Ensure storage account is configured with private endpoint"
    	FAILED for resource: module.storage_sync.azurerm_storage_account.storage_account
    	File: /azure/modules/storage/storage_account.tf:4-308
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV2_AZURE_21: "Ensure Storage logging is enabled for Blob service for read requests"
    	FAILED for resource: module.storage_share.azurerm_storage_container.storage_container
    	File: /azure/modules/storage/storage_container.tf:4-33
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/azure-policies/azure-logging-policies/ensure-storage-logging-is-enabled-for-blob-service-for-read-requests.html
    
    		4  | resource "azurerm_storage_container" "storage_container" {
    		5  |   count = var.enable_storage_container ? 1 : 0
    		6  | 
    		7  |   name                 = var.storage_container_name != "" ? var.storage_container_name : "${lower(var.name)}-storage-container-${lower(var.environment)}"
    		8  |   storage_account_name = var.storage_container_storage_account_name != "" ? var.storage_container_storage_account_name : (var.enable_storage_account ? azurerm_storage_account.storage_account[count.index].name : null)
    		9  | 
    		10 |   container_access_type = var.storage_container_container_access_type
    		11 |   metadata              = var.storage_container_metadata
    		12 | 
    		13 |   dynamic "timeouts" {
    		14 |     iterator = timeouts
    		15 |     for_each = length(keys(var.storage_container_timeouts)) > 0 ? [var.storage_container_timeouts] : []
    		16 | 
    		17 |     content {
    		18 |       create = lookup(timeouts.value, "create", null)
    		19 |       read   = lookup(timeouts.value, "read", null)
    		20 |       update = lookup(timeouts.value, "update", null)
    		21 |       delete = lookup(timeouts.value, "delete", null)
    		22 |     }
    		23 |   }
    		24 | 
    		25 |   lifecycle {
    		26 |     create_before_destroy = true
    		27 |     ignore_changes        = []
    		28 |   }
    		29 | 
    		30 |   depends_on = [
    		31 |     azurerm_storage_account.storage_account
    		32 |   ]
    		33 | }
    Check: CKV2_AZURE_21: "Ensure Storage logging is enabled for Blob service for read requests"
    	FAILED for resource: module.storage_sync.azurerm_storage_container.storage_container
    	File: /azure/modules/storage/storage_container.tf:4-33
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/azure-policies/azure-logging-policies/ensure-storage-logging-is-enabled-for-blob-service-for-read-requests.html
    
    		4  | resource "azurerm_storage_container" "storage_container" {
    		5  |   count = var.enable_storage_container ? 1 : 0
    		6  | 
    		7  |   name                 = var.storage_container_name != "" ? var.storage_container_name : "${lower(var.name)}-storage-container-${lower(var.environment)}"
    		8  |   storage_account_name = var.storage_container_storage_account_name != "" ? var.storage_container_storage_account_name : (var.enable_storage_account ? azurerm_storage_account.storage_account[count.index].name : null)
    		9  | 
    		10 |   container_access_type = var.storage_container_container_access_type
    		11 |   metadata              = var.storage_container_metadata
    		12 | 
    		13 |   dynamic "timeouts" {
    		14 |     iterator = timeouts
    		15 |     for_each = length(keys(var.storage_container_timeouts)) > 0 ? [var.storage_container_timeouts] : []
    		16 | 
    		17 |     content {
    		18 |       create = lookup(timeouts.value, "create", null)
    		19 |       read   = lookup(timeouts.value, "read", null)
    		20 |       update = lookup(timeouts.value, "update", null)
    		21 |       delete = lookup(timeouts.value, "delete", null)
    		22 |     }
    		23 |   }
    		24 | 
    		25 |   lifecycle {
    		26 |     create_before_destroy = true
    		27 |     ignore_changes        = []
    		28 |   }
    		29 | 
    		30 |   depends_on = [
    		31 |     azurerm_storage_account.storage_account
    		32 |   ]
    		33 | }
    Check: CKV2_AZURE_21: "Ensure Storage logging is enabled for Blob service for read requests"
    	FAILED for resource: module.storage_blob.azurerm_storage_container.storage_container[0]
    	File: /azure/modules/storage/storage_container.tf:4-33
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/azure-policies/azure-logging-policies/ensure-storage-logging-is-enabled-for-blob-service-for-read-requests.html
    
    		4  | resource "azurerm_storage_container" "storage_container" {
    		5  |   count = var.enable_storage_container ? 1 : 0
    		6  | 
    		7  |   name                 = var.storage_container_name != "" ? var.storage_container_name : "${lower(var.name)}-storage-container-${lower(var.environment)}"
    		8  |   storage_account_name = var.storage_container_storage_account_name != "" ? var.storage_container_storage_account_name : (var.enable_storage_account ? azurerm_storage_account.storage_account[count.index].name : null)
    		9  | 
    		10 |   container_access_type = var.storage_container_container_access_type
    		11 |   metadata              = var.storage_container_metadata
    		12 | 
    		13 |   dynamic "timeouts" {
    		14 |     iterator = timeouts
    		15 |     for_each = length(keys(var.storage_container_timeouts)) > 0 ? [var.storage_container_timeouts] : []
    		16 | 
    		17 |     content {
    		18 |       create = lookup(timeouts.value, "create", null)
    		19 |       read   = lookup(timeouts.value, "read", null)
    		20 |       update = lookup(timeouts.value, "update", null)
    		21 |       delete = lookup(timeouts.value, "delete", null)
    		22 |     }
    		23 |   }
    		24 | 
    		25 |   lifecycle {
    		26 |     create_before_destroy = true
    		27 |     ignore_changes        = []
    		28 |   }
    		29 | 
    		30 |   depends_on = [
    		31 |     azurerm_storage_account.storage_account
    		32 |   ]
    		33 | }
    Check: CKV2_AZURE_21: "Ensure Storage logging is enabled for Blob service for read requests"
    	FAILED for resource: module.storage_container.azurerm_storage_container.storage_container[0]
    	File: /azure/modules/storage/storage_container.tf:4-33
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/azure-policies/azure-logging-policies/ensure-storage-logging-is-enabled-for-blob-service-for-read-requests.html
    
    		4  | resource "azurerm_storage_container" "storage_container" {
    		5  |   count = var.enable_storage_container ? 1 : 0
    		6  | 
    		7  |   name                 = var.storage_container_name != "" ? var.storage_container_name : "${lower(var.name)}-storage-container-${lower(var.environment)}"
    		8  |   storage_account_name = var.storage_container_storage_account_name != "" ? var.storage_container_storage_account_name : (var.enable_storage_account ? azurerm_storage_account.storage_account[count.index].name : null)
    		9  | 
    		10 |   container_access_type = var.storage_container_container_access_type
    		11 |   metadata              = var.storage_container_metadata
    		12 | 
    		13 |   dynamic "timeouts" {
    		14 |     iterator = timeouts
    		15 |     for_each = length(keys(var.storage_container_timeouts)) > 0 ? [var.storage_container_timeouts] : []
    		16 | 
    		17 |     content {
    		18 |       create = lookup(timeouts.value, "create", null)
    		19 |       read   = lookup(timeouts.value, "read", null)
    		20 |       update = lookup(timeouts.value, "update", null)
    		21 |       delete = lookup(timeouts.value, "delete", null)
    		22 |     }
    		23 |   }
    		24 | 
    		25 |   lifecycle {
    		26 |     create_before_destroy = true
    		27 |     ignore_changes        = []
    		28 |   }
    		29 | 
    		30 |   depends_on = [
    		31 |     azurerm_storage_account.storage_account
    		32 |   ]
    		33 | }
    Check: CKV2_AZURE_21: "Ensure Storage logging is enabled for Blob service for read requests"
    	FAILED for resource: module.storage_account.azurerm_storage_container.storage_container
    	File: /azure/modules/storage/storage_container.tf:4-33
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/azure-policies/azure-logging-policies/ensure-storage-logging-is-enabled-for-blob-service-for-read-requests.html
    
    		4  | resource "azurerm_storage_container" "storage_container" {
    		5  |   count = var.enable_storage_container ? 1 : 0
    		6  | 
    		7  |   name                 = var.storage_container_name != "" ? var.storage_container_name : "${lower(var.name)}-storage-container-${lower(var.environment)}"
    		8  |   storage_account_name = var.storage_container_storage_account_name != "" ? var.storage_container_storage_account_name : (var.enable_storage_account ? azurerm_storage_account.storage_account[count.index].name : null)
    		9  | 
    		10 |   container_access_type = var.storage_container_container_access_type
    		11 |   metadata              = var.storage_container_metadata
    		12 | 
    		13 |   dynamic "timeouts" {
    		14 |     iterator = timeouts
    		15 |     for_each = length(keys(var.storage_container_timeouts)) > 0 ? [var.storage_container_timeouts] : []
    		16 | 
    		17 |     content {
    		18 |       create = lookup(timeouts.value, "create", null)
    		19 |       read   = lookup(timeouts.value, "read", null)
    		20 |       update = lookup(timeouts.value, "update", null)
    		21 |       delete = lookup(timeouts.value, "delete", null)
    		22 |     }
    		23 |   }
    		24 | 
    		25 |   lifecycle {
    		26 |     create_before_destroy = true
    		27 |     ignore_changes        = []
    		28 |   }
    		29 | 
    		30 |   depends_on = [
    		31 |     azurerm_storage_account.storage_account
    		32 |   ]
    		33 | }
    Check: CKV2_AZURE_29: "Ensure AKS cluster has Azure CNI networking enabled"
    	FAILED for resource: module.aks.azurerm_kubernetes_cluster.kubernetes_cluster[0]
    	File: /azure/modules/aks/kubernetes_cluster.tf:4-311
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV2_AZURE_38: "Ensure soft-delete is enabled on Azure storage account"
    	FAILED for resource: module.storage_account.azurerm_storage_account.storage_account[0]
    	File: /azure/modules/storage/storage_account.tf:4-308
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV2_AZURE_38: "Ensure soft-delete is enabled on Azure storage account"
    	FAILED for resource: module.storage_blob.azurerm_storage_account.storage_account
    	File: /azure/modules/storage/storage_account.tf:4-308
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV2_AZURE_38: "Ensure soft-delete is enabled on Azure storage account"
    	FAILED for resource: module.storage_container.azurerm_storage_account.storage_account
    	File: /azure/modules/storage/storage_account.tf:4-308
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV2_AZURE_38: "Ensure soft-delete is enabled on Azure storage account"
    	FAILED for resource: module.storage_share.azurerm_storage_account.storage_account
    	File: /azure/modules/storage/storage_account.tf:4-308
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV2_AZURE_38: "Ensure soft-delete is enabled on Azure storage account"
    	FAILED for resource: module.storage_sync.azurerm_storage_account.storage_account
    	File: /azure/modules/storage/storage_account.tf:4-308
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV2_AZURE_16: "Ensure that MySQL server enables customer-managed key for encryption"
    	FAILED for resource: module.database_mysql.azurerm_mysql_server.mysql_server[0]
    	File: /azure/modules/database_mysql/mysql_server.tf:4-82
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/azure-policies/azure-general-policies/ensure-that-mysql-server-enables-customer-managed-key-for-encryption.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV2_GCP_12: "Ensure GCP compute firewall ingress does not allow unrestricted access to all ports"
    	FAILED for resource: module.compute_firewall.google_compute_firewall.compute_firewall_all_ingress
    	File: /google_cloud_platform/modules/compute_firewall/compute_firewall.tf:4-26
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-google-compute-firewall-ingress-does-not-allow-unrestricted-access-to-all-ports.html
    
    		4  | resource "google_compute_firewall" "compute_firewall_all_ingress" {
    		5  |   count = var.enable_all_ingress && upper(var.direction) == "INGRESS" ? 1 : 0
    		6  | 
    		7  |   name        = "${lower(var.name)}-fw-${lower(var.environment)}-${lower(var.direction)}"
    		8  |   description = var.description
    		9  | 
    		10 |   project = var.project
    		11 | 
    		12 |   network = var.network
    		13 | 
    		14 |   priority      = var.priority
    		15 |   source_ranges = var.source_ranges
    		16 |   source_tags   = ["${var.source_tags}"]
    		17 |   target_tags   = ["${var.target_tags}"]
    		18 |   direction     = var.direction
    		19 |   #destination_ranges      = ["${var.destination_ranges}"]
    		20 |   #source_service_accounts = ["${var.source_service_accounts}"]
    		21 |   #target_service_accounts = ["${var.target_service_accounts}"]
    		22 | 
    		23 |   allow {
    		24 |     protocol = "all"
    		25 |   }
    		26 | }
    
    Check: CKV2_AZURE_31: "Ensure VNET subnet is configured with a Network Security Group (NSG)"
    	FAILED for resource: module.bastion_host.azurerm_subnet.subnet
    	File: /azure/modules/network/subnet.tf:4-56
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV2_AZURE_31: "Ensure VNET subnet is configured with a Network Security Group (NSG)"
    	FAILED for resource: module.network_sg.azurerm_subnet.subnet
    	File: /azure/modules/network/subnet.tf:4-56
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV2_AZURE_31: "Ensure VNET subnet is configured with a Network Security Group (NSG)"
    	FAILED for resource: module.public_ip.azurerm_subnet.subnet
    	File: /azure/modules/network/subnet.tf:4-56
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV2_AZURE_31: "Ensure VNET subnet is configured with a Network Security Group (NSG)"
    	FAILED for resource: module.subnet.azurerm_subnet.subnet
    	File: /azure/modules/network/subnet.tf:4-56
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV2_AZURE_31: "Ensure VNET subnet is configured with a Network Security Group (NSG)"
    	FAILED for resource: module.virtual_network.azurerm_subnet.subnet
    	File: /azure/modules/network/subnet.tf:4-56
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV2_GCP_20: "Ensure MySQL DB instance has point-in-time recovery backup configured"
    	FAILED for resource: module.sql_database.google_sql_database_instance.sql_database_instance_mysql[0]
    	File: /google_cloud_platform/modules/sql_database/sql_database.tf:4-67
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV2_GCP_20: "Ensure MySQL DB instance has point-in-time recovery backup configured"
    	FAILED for resource: module.sql_database.google_sql_database_instance.sql_database_instance_postgres
    	File: /google_cloud_platform/modules/sql_database/sql_database.tf:69-135
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV2_GCP_20: "Ensure MySQL DB instance has point-in-time recovery backup configured"
    	FAILED for resource: module.sql_database.google_sql_database_instance.sql_database_instance_mysql_replication[0]
    	File: /google_cloud_platform/modules/sql_database/sql_database.tf:139-215
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV2_GCP_20: "Ensure MySQL DB instance has point-in-time recovery backup configured"
    	FAILED for resource: module.sql_database.google_sql_database_instance.sql_database_instance_postgres_replication
    	File: /google_cloud_platform/modules/sql_database/sql_database.tf:217-296
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
    	FAILED for resource: module.project.google_project.project[0]
    	File: /google_cloud_platform/modules/project/outputs.tf:14-35
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
    
    		14 | resource "google_project" "project" {
    		15 |   count = var.billing_account != "" && var.org_id != "" ? 1 : 0
    		16 | 
    		17 |   name            = var.name
    		18 |   project_id      = var.project_id == "" ? random_id.id.hex : var.project_id
    		19 |   billing_account = var.billing_account
    		20 |   org_id          = var.org_id
    		21 | 
    		22 |   skip_delete         = var.skip_delete
    		23 |   auto_create_network = var.auto_create_network
    		24 | 
    		25 |   labels {
    		26 |     Name          = var.name
    		27 |     Environment   = var.environment
    		28 |     Orchestration = var.orchestration
    		29 |     Createdby     = var.createdby
    		30 |   }
    		31 | 
    		32 |   depends_on = [
    		33 |     random_id.id
    		34 |   ]
    		35 | }
    
    Check: CKV2_GCP_5: "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project"
    	FAILED for resource: module.project.google_project.specific_project[0]
    	File: /google_cloud_platform/modules/project/outputs.tf:40-61
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/logging-policies-1/ensure-that-cloud-audit-logging-is-configured-properly-across-all-services-and-all-users-from-a-project.html
    
    		40 | resource "google_project" "specific_project" {
    		41 |   count = var.org_id != "" && var.enable_specific_folder ? 1 : 0
    		42 | 
    		43 |   name = var.name
    		44 |   #project_id      = "${random_id.id.hex}"
    		45 |   project_id = var.project_id == "" ? random_id.id.hex : var.project_id
    		46 |   folder_id  = google_folder.specific_folder.name
    		47 | 
    		48 |   skip_delete         = var.skip_delete
    		49 |   auto_create_network = var.auto_create_network
    		50 | 
    		51 |   labels {
    		52 |     Name          = var.name
    		53 |     Environment   = var.environment
    		54 |     Orchestration = var.orchestration
    		55 |     Createdby     = var.createdby
    		56 |   }
    		57 | 
    		58 |   depends_on = [
    		59 |     google_folder.specific_folder
    		60 |   ]
    		61 | }
    
    Check: CKV2_GCP_11: "Ensure GCP GCR Container Vulnerability Scanning is enabled"
    	FAILED for resource: module.project.google_project_services.project_services[0]
    	File: /google_cloud_platform/modules/project/outputs.tf:75-82
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-gcr-container-vulnerability-scanning-is-enabled.html
    
    		75 | resource "google_project_services" "project_services" {
    		76 |   count = length(var.google_project_services) > 0 && var.billing_account != "" && var.org_id != "" || length(var.google_project_services) > 0 && var.org_id != "" && var.enable_specific_folder ? 1 : 0
    		77 | 
    		78 |   project  = var.project_id == "" ? random_id.id.hex : var.project_id
    		79 |   services = ["${var.google_project_services}"]
    		80 | 
    		81 |   disable_on_destroy = var.disable_on_destroy
    		82 | }
    
    Check: CKV2_GCP_10: "Ensure GCP Cloud Function HTTP trigger is secured"
    	FAILED for resource: module.google_cloudfunctions.google_cloudfunctions_function.cloudfunctions_function_http[0]
    	File: /google_cloud_platform/modules/google_cloudfunctions/google_cloudfunctions.tf:4-30
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-cloud-function-http-trigger-is-secured.html
    
    		4  | resource "google_cloudfunctions_function" "cloudfunctions_function_http" {
    		5  |   count = var.trigger_http ? 1 : 0
    		6  | 
    		7  |   name        = "${lower(var.name)}-cf-function-${lower(var.environment)}"
    		8  |   description = var.description
    		9  |   project     = var.project
    		10 |   region      = var.region
    		11 | 
    		12 |   source_archive_bucket = var.source_archive_bucket
    		13 |   source_archive_object = var.source_archive_object
    		14 | 
    		15 |   available_memory_mb = var.available_memory_mb
    		16 |   timeout             = var.timeout
    		17 |   entry_point         = var.entry_point
    		18 |   trigger_http        = var.trigger_http
    		19 | 
    		20 |   labels {
    		21 |     name          = "${lower(var.name)}-cf-function-${lower(var.environment)}"
    		22 |     environment   = lower(var.environment)
    		23 |     orchestration = lower(var.orchestration)
    		24 |   }
    		25 | 
    		26 |   lifecycle {
    		27 |     ignore_changes        = []
    		28 |     create_before_destroy = true
    		29 |   }
    		30 | }
    
    Check: CKV2_GCP_10: "Ensure GCP Cloud Function HTTP trigger is secured"
    	FAILED for resource: module.google_cloudfunctions.google_cloudfunctions_function.cloudfunctions_function_https
    	File: /google_cloud_platform/modules/google_cloudfunctions/google_cloudfunctions.tf:32-62
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/google-cloud-policies/google-cloud-networking-policies/ensure-gcp-cloud-function-http-trigger-is-secured.html
    
    		32 | resource "google_cloudfunctions_function" "cloudfunctions_function_https" {
    		33 |   count = !var.trigger_http ? 1 : 0
    		34 | 
    		35 |   name        = "${lower(var.name)}-cf-function-${lower(var.environment)}"
    		36 |   description = var.description
    		37 |   project     = var.project
    		38 |   region      = var.region
    		39 | 
    		40 |   source_archive_bucket = var.source_archive_bucket
    		41 |   source_archive_object = var.source_archive_object
    		42 | 
    		43 |   available_memory_mb = var.available_memory_mb
    		44 |   timeout             = var.timeout
    		45 |   entry_point         = var.entry_point
    		46 |   trigger_http        = var.trigger_http
    		47 | 
    		48 |   trigger_bucket   = var.trigger_bucket
    		49 |   trigger_topic    = var.trigger_topic
    		50 |   retry_on_failure = var.retry_on_failure
    		51 | 
    		52 |   labels {
    		53 |     name          = "${lower(var.name)}-cf-function-${lower(var.environment)}"
    		54 |     environment   = lower(var.environment)
    		55 |     orchestration = lower(var.orchestration)
    		56 |   }
    		57 | 
    		58 |   lifecycle {
    		59 |     ignore_changes        = []
    		60 |     create_before_destroy = true
    		61 |   }
    		62 | }
    
    Check: CKV2_AWS_60: "Ensure RDS instance with copy tags to snapshots is enabled"
    	FAILED for resource: module.db_instance-rds-oracle.aws_db_instance.db_instance[0]
    	File: /aws/modules/rds/db_instance.tf:4-106
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV2_AWS_60: "Ensure RDS instance with copy tags to snapshots is enabled"
    	FAILED for resource: module.rds_cluster.aws_db_instance.db_instance
    	File: /aws/modules/rds/db_instance.tf:4-106
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV2_GCP_18: "Ensure GCP network defines a firewall and does not use the default firewall"
    	FAILED for resource: module.compute_network.google_compute_network.compute_network[0]
    	File: /google_cloud_platform/modules/compute_network/compute_network.tf:4-18
    
    		4  | resource "google_compute_network" "compute_network" {
    		5  |   count = var.enable_compute_network ? 1 : 0
    		6  | 
    		7  |   name        = "${lower(var.name)}-cn-network-${lower(var.environment)}"
    		8  |   description = var.description
    		9  |   project     = var.project
    		10 | 
    		11 |   auto_create_subnetworks = var.auto_create_subnetworks
    		12 |   routing_mode            = var.routing_mode
    		13 | 
    		14 |   lifecycle {
    		15 |     ignore_changes        = []
    		16 |     create_before_destroy = true
    		17 |   }
    		18 | }
    
    Check: CKV2_GCP_18: "Ensure GCP network defines a firewall and does not use the default firewall"
    	FAILED for resource: module.compute_network2.google_compute_network.compute_network[0]
    	File: /google_cloud_platform/modules/compute_network/compute_network.tf:4-18
    
    		4  | resource "google_compute_network" "compute_network" {
    		5  |   count = var.enable_compute_network ? 1 : 0
    		6  | 
    		7  |   name        = "${lower(var.name)}-cn-network-${lower(var.environment)}"
    		8  |   description = var.description
    		9  |   project     = var.project
    		10 | 
    		11 |   auto_create_subnetworks = var.auto_create_subnetworks
    		12 |   routing_mode            = var.routing_mode
    		13 | 
    		14 |   lifecycle {
    		15 |     ignore_changes        = []
    		16 |     create_before_destroy = true
    		17 |   }
    		18 | }
    
    Check: CKV2_GCP_18: "Ensure GCP network defines a firewall and does not use the default firewall"
    	FAILED for resource: module.compute_network_peering.google_compute_network.compute_network
    	File: /google_cloud_platform/modules/compute_network/compute_network.tf:4-18
    
    		4  | resource "google_compute_network" "compute_network" {
    		5  |   count = var.enable_compute_network ? 1 : 0
    		6  | 
    		7  |   name        = "${lower(var.name)}-cn-network-${lower(var.environment)}"
    		8  |   description = var.description
    		9  |   project     = var.project
    		10 | 
    		11 |   auto_create_subnetworks = var.auto_create_subnetworks
    		12 |   routing_mode            = var.routing_mode
    		13 | 
    		14 |   lifecycle {
    		15 |     ignore_changes        = []
    		16 |     create_before_destroy = true
    		17 |   }
    		18 | }
    
    Check: CKV2_GCP_18: "Ensure GCP network defines a firewall and does not use the default firewall"
    	FAILED for resource: module.compute_subnetwork.google_compute_network.compute_network
    	File: /google_cloud_platform/modules/compute_network/compute_network.tf:4-18
    
    		4  | resource "google_compute_network" "compute_network" {
    		5  |   count = var.enable_compute_network ? 1 : 0
    		6  | 
    		7  |   name        = "${lower(var.name)}-cn-network-${lower(var.environment)}"
    		8  |   description = var.description
    		9  |   project     = var.project
    		10 | 
    		11 |   auto_create_subnetworks = var.auto_create_subnetworks
    		12 |   routing_mode            = var.routing_mode
    		13 | 
    		14 |   lifecycle {
    		15 |     ignore_changes        = []
    		16 |     create_before_destroy = true
    		17 |   }
    		18 | }
    
    Check: CKV2_GCP_18: "Ensure GCP network defines a firewall and does not use the default firewall"
    	FAILED for resource: module.compute_subnetwork_iam_binding.google_compute_network.compute_network
    	File: /google_cloud_platform/modules/compute_network/compute_network.tf:4-18
    
    		4  | resource "google_compute_network" "compute_network" {
    		5  |   count = var.enable_compute_network ? 1 : 0
    		6  | 
    		7  |   name        = "${lower(var.name)}-cn-network-${lower(var.environment)}"
    		8  |   description = var.description
    		9  |   project     = var.project
    		10 | 
    		11 |   auto_create_subnetworks = var.auto_create_subnetworks
    		12 |   routing_mode            = var.routing_mode
    		13 | 
    		14 |   lifecycle {
    		15 |     ignore_changes        = []
    		16 |     create_before_destroy = true
    		17 |   }
    		18 | }
    
    Check: CKV2_GCP_18: "Ensure GCP network defines a firewall and does not use the default firewall"
    	FAILED for resource: module.compute_subnetwork_iam_member.google_compute_network.compute_network
    	File: /google_cloud_platform/modules/compute_network/compute_network.tf:4-18
    
    		4  | resource "google_compute_network" "compute_network" {
    		5  |   count = var.enable_compute_network ? 1 : 0
    		6  | 
    		7  |   name        = "${lower(var.name)}-cn-network-${lower(var.environment)}"
    		8  |   description = var.description
    		9  |   project     = var.project
    		10 | 
    		11 |   auto_create_subnetworks = var.auto_create_subnetworks
    		12 |   routing_mode            = var.routing_mode
    		13 | 
    		14 |   lifecycle {
    		15 |     ignore_changes        = []
    		16 |     create_before_destroy = true
    		17 |   }
    		18 | }
    
    Check: CKV2_GCP_18: "Ensure GCP network defines a firewall and does not use the default firewall"
    	FAILED for resource: module.compute_subnetwork_iam_policy.google_compute_network.compute_network
    	File: /google_cloud_platform/modules/compute_network/compute_network.tf:4-18
    
    		4  | resource "google_compute_network" "compute_network" {
    		5  |   count = var.enable_compute_network ? 1 : 0
    		6  | 
    		7  |   name        = "${lower(var.name)}-cn-network-${lower(var.environment)}"
    		8  |   description = var.description
    		9  |   project     = var.project
    		10 | 
    		11 |   auto_create_subnetworks = var.auto_create_subnetworks
    		12 |   routing_mode            = var.routing_mode
    		13 | 
    		14 |   lifecycle {
    		15 |     ignore_changes        = []
    		16 |     create_before_destroy = true
    		17 |   }
    		18 | }
    
    Check: CKV2_AWS_49: "Ensure AWS Database Migration Service endpoints have SSL configured"
    	FAILED for resource: module.source_dms_endpoint.aws_dms_endpoint.dms_endpoint[0]
    	File: /aws/modules/dms/dms_endpoint.tf:4-100
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-aws-database-migration-service-endpoints-have-ssl-configured.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV2_AWS_62: "Ensure S3 buckets should have event notifications enabled"
    	FAILED for resource: module.s3.aws_s3_bucket.s3_bucket[0]
    	File: /aws/modules/s3/s3_bucket.tf:4-26
    
    		4  | resource "aws_s3_bucket" "s3_bucket" {
    		5  |   count = var.enable_s3_bucket ? 1 : 0
    		6  | 
    		7  |   bucket        = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : null
    		8  |   bucket_prefix = var.s3_bucket_prefix != null && var.s3_bucket_name == null ? lower(var.s3_bucket_prefix) : null
    		9  | 
    		10 |   force_destroy       = var.s3_bucket_force_destroy
    		11 |   object_lock_enabled = var.s3_bucket_object_lock_enabled
    		12 | 
    		13 |   tags = merge(
    		14 |     {
    		15 |       Name = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : lower(var.s3_bucket_prefix)
    		16 |     },
    		17 |     var.tags
    		18 |   )
    		19 | 
    		20 |   lifecycle {
    		21 |     create_before_destroy = true
    		22 |     ignore_changes        = []
    		23 |   }
    		24 | 
    		25 |   depends_on = []
    		26 | }
    
    Check: CKV2_AWS_62: "Ensure S3 buckets should have event notifications enabled"
    	FAILED for resource: module.s3_bucket_public_access_block.aws_s3_bucket.s3_bucket[0]
    	File: /aws/modules/s3/s3_bucket.tf:4-26
    
    		4  | resource "aws_s3_bucket" "s3_bucket" {
    		5  |   count = var.enable_s3_bucket ? 1 : 0
    		6  | 
    		7  |   bucket        = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : null
    		8  |   bucket_prefix = var.s3_bucket_prefix != null && var.s3_bucket_name == null ? lower(var.s3_bucket_prefix) : null
    		9  | 
    		10 |   force_destroy       = var.s3_bucket_force_destroy
    		11 |   object_lock_enabled = var.s3_bucket_object_lock_enabled
    		12 | 
    		13 |   tags = merge(
    		14 |     {
    		15 |       Name = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : lower(var.s3_bucket_prefix)
    		16 |     },
    		17 |     var.tags
    		18 |   )
    		19 | 
    		20 |   lifecycle {
    		21 |     create_before_destroy = true
    		22 |     ignore_changes        = []
    		23 |   }
    		24 | 
    		25 |   depends_on = []
    		26 | }
    
    Check: CKV2_AWS_62: "Ensure S3 buckets should have event notifications enabled"
    	FAILED for resource: module.s3_private_bucket.aws_s3_bucket.s3_bucket[0]
    	File: /aws/modules/s3/s3_bucket.tf:4-26
    
    		4  | resource "aws_s3_bucket" "s3_bucket" {
    		5  |   count = var.enable_s3_bucket ? 1 : 0
    		6  | 
    		7  |   bucket        = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : null
    		8  |   bucket_prefix = var.s3_bucket_prefix != null && var.s3_bucket_name == null ? lower(var.s3_bucket_prefix) : null
    		9  | 
    		10 |   force_destroy       = var.s3_bucket_force_destroy
    		11 |   object_lock_enabled = var.s3_bucket_object_lock_enabled
    		12 | 
    		13 |   tags = merge(
    		14 |     {
    		15 |       Name = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : lower(var.s3_bucket_prefix)
    		16 |     },
    		17 |     var.tags
    		18 |   )
    		19 | 
    		20 |   lifecycle {
    		21 |     create_before_destroy = true
    		22 |     ignore_changes        = []
    		23 |   }
    		24 | 
    		25 |   depends_on = []
    		26 | }
    
    Check: CKV2_AWS_62: "Ensure S3 buckets should have event notifications enabled"
    	FAILED for resource: module.s3_flow_logs.aws_s3_bucket.s3_bucket[0]
    	File: /aws/modules/s3/s3_bucket.tf:4-26
    
    		4  | resource "aws_s3_bucket" "s3_bucket" {
    		5  |   count = var.enable_s3_bucket ? 1 : 0
    		6  | 
    		7  |   bucket        = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : null
    		8  |   bucket_prefix = var.s3_bucket_prefix != null && var.s3_bucket_name == null ? lower(var.s3_bucket_prefix) : null
    		9  | 
    		10 |   force_destroy       = var.s3_bucket_force_destroy
    		11 |   object_lock_enabled = var.s3_bucket_object_lock_enabled
    		12 | 
    		13 |   tags = merge(
    		14 |     {
    		15 |       Name = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : lower(var.s3_bucket_prefix)
    		16 |     },
    		17 |     var.tags
    		18 |   )
    		19 | 
    		20 |   lifecycle {
    		21 |     create_before_destroy = true
    		22 |     ignore_changes        = []
    		23 |   }
    		24 | 
    		25 |   depends_on = []
    		26 | }
    
    Check: CKV_AWS_144: "Ensure that S3 bucket has cross-region replication enabled"
    	FAILED for resource: module.s3.aws_s3_bucket.s3_bucket[0]
    	File: /aws/modules/s3/s3_bucket.tf:4-26
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-s3-bucket-has-cross-region-replication-enabled.html
    
    		4  | resource "aws_s3_bucket" "s3_bucket" {
    		5  |   count = var.enable_s3_bucket ? 1 : 0
    		6  | 
    		7  |   bucket        = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : null
    		8  |   bucket_prefix = var.s3_bucket_prefix != null && var.s3_bucket_name == null ? lower(var.s3_bucket_prefix) : null
    		9  | 
    		10 |   force_destroy       = var.s3_bucket_force_destroy
    		11 |   object_lock_enabled = var.s3_bucket_object_lock_enabled
    		12 | 
    		13 |   tags = merge(
    		14 |     {
    		15 |       Name = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : lower(var.s3_bucket_prefix)
    		16 |     },
    		17 |     var.tags
    		18 |   )
    		19 | 
    		20 |   lifecycle {
    		21 |     create_before_destroy = true
    		22 |     ignore_changes        = []
    		23 |   }
    		24 | 
    		25 |   depends_on = []
    		26 | }
    
    Check: CKV_AWS_144: "Ensure that S3 bucket has cross-region replication enabled"
    	FAILED for resource: module.s3_bucket_public_access_block.aws_s3_bucket.s3_bucket[0]
    	File: /aws/modules/s3/s3_bucket.tf:4-26
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-s3-bucket-has-cross-region-replication-enabled.html
    
    		4  | resource "aws_s3_bucket" "s3_bucket" {
    		5  |   count = var.enable_s3_bucket ? 1 : 0
    		6  | 
    		7  |   bucket        = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : null
    		8  |   bucket_prefix = var.s3_bucket_prefix != null && var.s3_bucket_name == null ? lower(var.s3_bucket_prefix) : null
    		9  | 
    		10 |   force_destroy       = var.s3_bucket_force_destroy
    		11 |   object_lock_enabled = var.s3_bucket_object_lock_enabled
    		12 | 
    		13 |   tags = merge(
    		14 |     {
    		15 |       Name = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : lower(var.s3_bucket_prefix)
    		16 |     },
    		17 |     var.tags
    		18 |   )
    		19 | 
    		20 |   lifecycle {
    		21 |     create_before_destroy = true
    		22 |     ignore_changes        = []
    		23 |   }
    		24 | 
    		25 |   depends_on = []
    		26 | }
    
    Check: CKV_AWS_144: "Ensure that S3 bucket has cross-region replication enabled"
    	FAILED for resource: module.s3_private_bucket.aws_s3_bucket.s3_bucket[0]
    	File: /aws/modules/s3/s3_bucket.tf:4-26
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-s3-bucket-has-cross-region-replication-enabled.html
    
    		4  | resource "aws_s3_bucket" "s3_bucket" {
    		5  |   count = var.enable_s3_bucket ? 1 : 0
    		6  | 
    		7  |   bucket        = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : null
    		8  |   bucket_prefix = var.s3_bucket_prefix != null && var.s3_bucket_name == null ? lower(var.s3_bucket_prefix) : null
    		9  | 
    		10 |   force_destroy       = var.s3_bucket_force_destroy
    		11 |   object_lock_enabled = var.s3_bucket_object_lock_enabled
    		12 | 
    		13 |   tags = merge(
    		14 |     {
    		15 |       Name = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : lower(var.s3_bucket_prefix)
    		16 |     },
    		17 |     var.tags
    		18 |   )
    		19 | 
    		20 |   lifecycle {
    		21 |     create_before_destroy = true
    		22 |     ignore_changes        = []
    		23 |   }
    		24 | 
    		25 |   depends_on = []
    		26 | }
    
    Check: CKV_AWS_144: "Ensure that S3 bucket has cross-region replication enabled"
    	FAILED for resource: module.s3_flow_logs.aws_s3_bucket.s3_bucket[0]
    	File: /aws/modules/s3/s3_bucket.tf:4-26
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-s3-bucket-has-cross-region-replication-enabled.html
    
    		4  | resource "aws_s3_bucket" "s3_bucket" {
    		5  |   count = var.enable_s3_bucket ? 1 : 0
    		6  | 
    		7  |   bucket        = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : null
    		8  |   bucket_prefix = var.s3_bucket_prefix != null && var.s3_bucket_name == null ? lower(var.s3_bucket_prefix) : null
    		9  | 
    		10 |   force_destroy       = var.s3_bucket_force_destroy
    		11 |   object_lock_enabled = var.s3_bucket_object_lock_enabled
    		12 | 
    		13 |   tags = merge(
    		14 |     {
    		15 |       Name = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : lower(var.s3_bucket_prefix)
    		16 |     },
    		17 |     var.tags
    		18 |   )
    		19 | 
    		20 |   lifecycle {
    		21 |     create_before_destroy = true
    		22 |     ignore_changes        = []
    		23 |   }
    		24 | 
    		25 |   depends_on = []
    		26 | }
    
    Check: CKV2_AWS_1: "Ensure that all NACL are attached to subnets"
    	FAILED for resource: module.vpc.aws_network_acl.network_acl
    	File: /aws/modules/vpc/network_acl.tf:4-59
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-that-all-nacl-are-attached-to-subnets.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV2_AWS_1: "Ensure that all NACL are attached to subnets"
    	FAILED for resource: module.vpc.aws_network_acl.network_acl[0]
    	File: /aws/modules/vpc/network_acl.tf:4-59
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-that-all-nacl-are-attached-to-subnets.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV2_AWS_1: "Ensure that all NACL are attached to subnets"
    	FAILED for resource: module.vpc_1.aws_network_acl.network_acl
    	File: /aws/modules/vpc/network_acl.tf:4-59
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-that-all-nacl-are-attached-to-subnets.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV2_AWS_1: "Ensure that all NACL are attached to subnets"
    	FAILED for resource: module.vpc_2.aws_network_acl.network_acl[0]
    	File: /aws/modules/vpc/network_acl.tf:4-59
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-that-all-nacl-are-attached-to-subnets.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV2_AWS_1: "Ensure that all NACL are attached to subnets"
    	FAILED for resource: module.vpc_custom_routings.aws_network_acl.network_acl
    	File: /aws/modules/vpc/network_acl.tf:4-59
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-that-all-nacl-are-attached-to-subnets.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV2_AWS_1: "Ensure that all NACL are attached to subnets"
    	FAILED for resource: module.vpc_endpoint.aws_network_acl.network_acl
    	File: /aws/modules/vpc/network_acl.tf:4-59
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-that-all-nacl-are-attached-to-subnets.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV2_AWS_1: "Ensure that all NACL are attached to subnets"
    	FAILED for resource: module.vpc_vpn.aws_network_acl.network_acl
    	File: /aws/modules/vpc/network_acl.tf:4-59
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-that-all-nacl-are-attached-to-subnets.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV2_AWS_47: "Ensure AWS CloudFront attached WAFv2 WebACL is configured with AMR for Log4j Vulnerability"
    	FAILED for resource: module.cloudfront.aws_cloudfront_distribution.cloudfront_distribution[0]
    	File: /aws/modules/cloudfront/cloudfront_distribution.tf:4-281
    	Guide: https://docs.bridgecrew.io/docs/ensure-aws-cloudfront-attached-wafv2-webacl-is-configured-with-amr-for-log4j-vulnerability
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV2_AWS_7: "Ensure that Amazon EMR clusters' security groups are not open to the world"
    	FAILED for resource: module.emr.aws_emr_cluster.emr_cluster[0]
    	File: /aws/modules/emr/emr_cluster.tf:4-308
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-that-amazon-emr-clusters-security-groups-are-not-open-to-the-world.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV2_AWS_16: "Ensure that Auto Scaling is enabled on your DynamoDB tables"
    	FAILED for resource: module.dynamodb.aws_dynamodb_table.dynamodb_table[0]
    	File: /aws/modules/dynamodb/dynamodb_table.tf:4-110
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-auto-scaling-is-enabled-on-your-dynamodb-tables.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV2_AWS_27: "Ensure Postgres RDS as aws_rds_cluster has Query Logging enabled"
    	FAILED for resource: module.rds_cluster.aws_rds_cluster.rds_cluster[0]
    	File: /aws/modules/rds/rds_cluster.tf:4-106
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-logging-32.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV2_AWS_28: "Ensure public facing ALB are protected by WAF"
    	FAILED for resource: module.alb.aws_lb.alb[0]
    	File: /aws/modules/alb/lb.tf:4-70
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-public-facing-alb-are-protected-by-waf.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV2_AWS_28: "Ensure public facing ALB are protected by WAF"
    	FAILED for resource: module.alb_name_prefix.aws_lb.alb
    	File: /aws/modules/alb/lb.tf:4-70
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-public-facing-alb-are-protected-by-waf.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV2_AWS_57: "Ensure Secrets Manager secrets should have automatic rotation enabled"
    	FAILED for resource: module.secretsmanager.aws_secretsmanager_secret.secretsmanager_secret[0]
    	File: /aws/modules/secretsmanager/secretsmanager_secret.tf:4-37
    
    		4  | resource "aws_secretsmanager_secret" "secretsmanager_secret" {
    		5  |   count = var.enable_secretsmanager_secret ? 1 : 0
    		6  | 
    		7  |   name                    = var.secretsmanager_secret_name != null && var.secretsmanager_secret_name_prefix == null ? lower(var.secretsmanager_secret_name) : null
    		8  |   name_prefix             = var.secretsmanager_secret_name_prefix != null && var.secretsmanager_secret_name == null ? lower(var.secretsmanager_secret_name_prefix) : null
    		9  |   description             = var.secretsmanager_secret_description
    		10 |   kms_key_id              = var.secretsmanager_secret_kms_key_id
    		11 |   policy                  = var.secretsmanager_secret_policy
    		12 |   recovery_window_in_days = var.secretsmanager_secret_recovery_window_in_days
    		13 |   rotation_lambda_arn     = var.secretsmanager_secret_rotation_lambda_arn
    		14 | 
    		15 |   dynamic "rotation_rules" {
    		16 |     iterator = rotation_rules
    		17 |     for_each = var.secretsmanager_secret_rotation_rules
    		18 | 
    		19 |     content {
    		20 |       automatically_after_days = lookup(rotation_rules.value, "automatically_after_days", null)
    		21 |     }
    		22 |   }
    		23 | 
    		24 |   tags = merge(
    		25 |     {
    		26 |       Name = var.secretsmanager_secret_name != null && var.secretsmanager_secret_name_prefix == null ? lower(var.secretsmanager_secret_name) : lower(var.secretsmanager_secret_name_prefix)
    		27 |     },
    		28 |     var.tags
    		29 |   )
    		30 | 
    		31 |   lifecycle {
    		32 |     create_before_destroy = true
    		33 |     ignore_changes        = []
    		34 |   }
    		35 | 
    		36 |   depends_on = []
    		37 | }
    
    Check: CKV2_AWS_12: "Ensure the default security group of every VPC restricts all traffic"
    	FAILED for resource: module.vpc.aws_vpc.vpc[0]
    	File: /aws/modules/vpc/vpc.tf:4-29
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-4.html
    
    		4  | resource "aws_vpc" "vpc" {
    		5  |   count = var.enable_vpc ? 1 : 0
    		6  | 
    		7  |   cidr_block = cidrsubnet(var.vpc_cidr_block, 0, 0)
    		8  | 
    		9  |   instance_tenancy                 = var.vpc_instance_tenancy
    		10 |   enable_dns_support               = var.vpc_enable_dns_support
    		11 |   enable_dns_hostnames             = var.vpc_enable_dns_hostnames
    		12 |   enable_classiclink               = var.vpc_enable_classiclink
    		13 |   enable_classiclink_dns_support   = var.vpc_enable_classiclink_dns_support
    		14 |   assign_generated_ipv6_cidr_block = var.vpc_assign_generated_ipv6_cidr_block
    		15 | 
    		16 |   tags = merge(
    		17 |     {
    		18 |       Name = var.vpc_name != "" ? lower(var.vpc_name) : "${lower(var.name)}-vpc-${lower(var.environment)}"
    		19 |     },
    		20 |     var.tags
    		21 |   )
    		22 | 
    		23 |   lifecycle {
    		24 |     create_before_destroy = true
    		25 |     ignore_changes        = []
    		26 |   }
    		27 | 
    		28 |   depends_on = []
    		29 | }
    
    Check: CKV2_AWS_12: "Ensure the default security group of every VPC restricts all traffic"
    	FAILED for resource: module.vpc_1.aws_vpc.vpc[0]
    	File: /aws/modules/vpc/vpc.tf:4-29
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-4.html
    
    		4  | resource "aws_vpc" "vpc" {
    		5  |   count = var.enable_vpc ? 1 : 0
    		6  | 
    		7  |   cidr_block = cidrsubnet(var.vpc_cidr_block, 0, 0)
    		8  | 
    		9  |   instance_tenancy                 = var.vpc_instance_tenancy
    		10 |   enable_dns_support               = var.vpc_enable_dns_support
    		11 |   enable_dns_hostnames             = var.vpc_enable_dns_hostnames
    		12 |   enable_classiclink               = var.vpc_enable_classiclink
    		13 |   enable_classiclink_dns_support   = var.vpc_enable_classiclink_dns_support
    		14 |   assign_generated_ipv6_cidr_block = var.vpc_assign_generated_ipv6_cidr_block
    		15 | 
    		16 |   tags = merge(
    		17 |     {
    		18 |       Name = var.vpc_name != "" ? lower(var.vpc_name) : "${lower(var.name)}-vpc-${lower(var.environment)}"
    		19 |     },
    		20 |     var.tags
    		21 |   )
    		22 | 
    		23 |   lifecycle {
    		24 |     create_before_destroy = true
    		25 |     ignore_changes        = []
    		26 |   }
    		27 | 
    		28 |   depends_on = []
    		29 | }
    
    Check: CKV2_AWS_12: "Ensure the default security group of every VPC restricts all traffic"
    	FAILED for resource: module.vpc_2.aws_vpc.vpc[0]
    	File: /aws/modules/vpc/vpc.tf:4-29
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-4.html
    
    		4  | resource "aws_vpc" "vpc" {
    		5  |   count = var.enable_vpc ? 1 : 0
    		6  | 
    		7  |   cidr_block = cidrsubnet(var.vpc_cidr_block, 0, 0)
    		8  | 
    		9  |   instance_tenancy                 = var.vpc_instance_tenancy
    		10 |   enable_dns_support               = var.vpc_enable_dns_support
    		11 |   enable_dns_hostnames             = var.vpc_enable_dns_hostnames
    		12 |   enable_classiclink               = var.vpc_enable_classiclink
    		13 |   enable_classiclink_dns_support   = var.vpc_enable_classiclink_dns_support
    		14 |   assign_generated_ipv6_cidr_block = var.vpc_assign_generated_ipv6_cidr_block
    		15 | 
    		16 |   tags = merge(
    		17 |     {
    		18 |       Name = var.vpc_name != "" ? lower(var.vpc_name) : "${lower(var.name)}-vpc-${lower(var.environment)}"
    		19 |     },
    		20 |     var.tags
    		21 |   )
    		22 | 
    		23 |   lifecycle {
    		24 |     create_before_destroy = true
    		25 |     ignore_changes        = []
    		26 |   }
    		27 | 
    		28 |   depends_on = []
    		29 | }
    
    Check: CKV2_AWS_12: "Ensure the default security group of every VPC restricts all traffic"
    	FAILED for resource: module.vpc_custom_routings.aws_vpc.vpc[0]
    	File: /aws/modules/vpc/vpc.tf:4-29
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-4.html
    
    		4  | resource "aws_vpc" "vpc" {
    		5  |   count = var.enable_vpc ? 1 : 0
    		6  | 
    		7  |   cidr_block = cidrsubnet(var.vpc_cidr_block, 0, 0)
    		8  | 
    		9  |   instance_tenancy                 = var.vpc_instance_tenancy
    		10 |   enable_dns_support               = var.vpc_enable_dns_support
    		11 |   enable_dns_hostnames             = var.vpc_enable_dns_hostnames
    		12 |   enable_classiclink               = var.vpc_enable_classiclink
    		13 |   enable_classiclink_dns_support   = var.vpc_enable_classiclink_dns_support
    		14 |   assign_generated_ipv6_cidr_block = var.vpc_assign_generated_ipv6_cidr_block
    		15 | 
    		16 |   tags = merge(
    		17 |     {
    		18 |       Name = var.vpc_name != "" ? lower(var.vpc_name) : "${lower(var.name)}-vpc-${lower(var.environment)}"
    		19 |     },
    		20 |     var.tags
    		21 |   )
    		22 | 
    		23 |   lifecycle {
    		24 |     create_before_destroy = true
    		25 |     ignore_changes        = []
    		26 |   }
    		27 | 
    		28 |   depends_on = []
    		29 | }
    
    Check: CKV2_AWS_12: "Ensure the default security group of every VPC restricts all traffic"
    	FAILED for resource: module.vpc_endpoint.aws_vpc.vpc[0]
    	File: /aws/modules/vpc/vpc.tf:4-29
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-4.html
    
    		4  | resource "aws_vpc" "vpc" {
    		5  |   count = var.enable_vpc ? 1 : 0
    		6  | 
    		7  |   cidr_block = cidrsubnet(var.vpc_cidr_block, 0, 0)
    		8  | 
    		9  |   instance_tenancy                 = var.vpc_instance_tenancy
    		10 |   enable_dns_support               = var.vpc_enable_dns_support
    		11 |   enable_dns_hostnames             = var.vpc_enable_dns_hostnames
    		12 |   enable_classiclink               = var.vpc_enable_classiclink
    		13 |   enable_classiclink_dns_support   = var.vpc_enable_classiclink_dns_support
    		14 |   assign_generated_ipv6_cidr_block = var.vpc_assign_generated_ipv6_cidr_block
    		15 | 
    		16 |   tags = merge(
    		17 |     {
    		18 |       Name = var.vpc_name != "" ? lower(var.vpc_name) : "${lower(var.name)}-vpc-${lower(var.environment)}"
    		19 |     },
    		20 |     var.tags
    		21 |   )
    		22 | 
    		23 |   lifecycle {
    		24 |     create_before_destroy = true
    		25 |     ignore_changes        = []
    		26 |   }
    		27 | 
    		28 |   depends_on = []
    		29 | }
    
    Check: CKV2_AWS_12: "Ensure the default security group of every VPC restricts all traffic"
    	FAILED for resource: module.vpc_endpoint_service.aws_vpc.vpc
    	File: /aws/modules/vpc/vpc.tf:4-29
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-4.html
    
    		4  | resource "aws_vpc" "vpc" {
    		5  |   count = var.enable_vpc ? 1 : 0
    		6  | 
    		7  |   cidr_block = cidrsubnet(var.vpc_cidr_block, 0, 0)
    		8  | 
    		9  |   instance_tenancy                 = var.vpc_instance_tenancy
    		10 |   enable_dns_support               = var.vpc_enable_dns_support
    		11 |   enable_dns_hostnames             = var.vpc_enable_dns_hostnames
    		12 |   enable_classiclink               = var.vpc_enable_classiclink
    		13 |   enable_classiclink_dns_support   = var.vpc_enable_classiclink_dns_support
    		14 |   assign_generated_ipv6_cidr_block = var.vpc_assign_generated_ipv6_cidr_block
    		15 | 
    		16 |   tags = merge(
    		17 |     {
    		18 |       Name = var.vpc_name != "" ? lower(var.vpc_name) : "${lower(var.name)}-vpc-${lower(var.environment)}"
    		19 |     },
    		20 |     var.tags
    		21 |   )
    		22 | 
    		23 |   lifecycle {
    		24 |     create_before_destroy = true
    		25 |     ignore_changes        = []
    		26 |   }
    		27 | 
    		28 |   depends_on = []
    		29 | }
    
    Check: CKV2_AWS_12: "Ensure the default security group of every VPC restricts all traffic"
    	FAILED for resource: module.vpc_vpn.aws_vpc.vpc[0]
    	File: /aws/modules/vpc/vpc.tf:4-29
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-4.html
    
    		4  | resource "aws_vpc" "vpc" {
    		5  |   count = var.enable_vpc ? 1 : 0
    		6  | 
    		7  |   cidr_block = cidrsubnet(var.vpc_cidr_block, 0, 0)
    		8  | 
    		9  |   instance_tenancy                 = var.vpc_instance_tenancy
    		10 |   enable_dns_support               = var.vpc_enable_dns_support
    		11 |   enable_dns_hostnames             = var.vpc_enable_dns_hostnames
    		12 |   enable_classiclink               = var.vpc_enable_classiclink
    		13 |   enable_classiclink_dns_support   = var.vpc_enable_classiclink_dns_support
    		14 |   assign_generated_ipv6_cidr_block = var.vpc_assign_generated_ipv6_cidr_block
    		15 | 
    		16 |   tags = merge(
    		17 |     {
    		18 |       Name = var.vpc_name != "" ? lower(var.vpc_name) : "${lower(var.name)}-vpc-${lower(var.environment)}"
    		19 |     },
    		20 |     var.tags
    		21 |   )
    		22 | 
    		23 |   lifecycle {
    		24 |     create_before_destroy = true
    		25 |     ignore_changes        = []
    		26 |   }
    		27 | 
    		28 |   depends_on = []
    		29 | }
    
    Check: CKV2_AWS_12: "Ensure the default security group of every VPC restricts all traffic"
    	FAILED for resource: module.vpc_endpoint.aws_vpc.vpc
    	File: /aws/modules/vpc/vpc.tf:4-29
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-4.html
    
    		4  | resource "aws_vpc" "vpc" {
    		5  |   count = var.enable_vpc ? 1 : 0
    		6  | 
    		7  |   cidr_block = cidrsubnet(var.vpc_cidr_block, 0, 0)
    		8  | 
    		9  |   instance_tenancy                 = var.vpc_instance_tenancy
    		10 |   enable_dns_support               = var.vpc_enable_dns_support
    		11 |   enable_dns_hostnames             = var.vpc_enable_dns_hostnames
    		12 |   enable_classiclink               = var.vpc_enable_classiclink
    		13 |   enable_classiclink_dns_support   = var.vpc_enable_classiclink_dns_support
    		14 |   assign_generated_ipv6_cidr_block = var.vpc_assign_generated_ipv6_cidr_block
    		15 | 
    		16 |   tags = merge(
    		17 |     {
    		18 |       Name = var.vpc_name != "" ? lower(var.vpc_name) : "${lower(var.name)}-vpc-${lower(var.environment)}"
    		19 |     },
    		20 |     var.tags
    		21 |   )
    		22 | 
    		23 |   lifecycle {
    		24 |     create_before_destroy = true
    		25 |     ignore_changes        = []
    		26 |   }
    		27 | 
    		28 |   depends_on = []
    		29 | }
    
    Check: CKV2_AWS_12: "Ensure the default security group of every VPC restricts all traffic"
    	FAILED for resource: module.vpc_1.aws_vpc.vpc
    	File: /aws/modules/vpc/vpc.tf:4-29
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-4.html
    
    		4  | resource "aws_vpc" "vpc" {
    		5  |   count = var.enable_vpc ? 1 : 0
    		6  | 
    		7  |   cidr_block = cidrsubnet(var.vpc_cidr_block, 0, 0)
    		8  | 
    		9  |   instance_tenancy                 = var.vpc_instance_tenancy
    		10 |   enable_dns_support               = var.vpc_enable_dns_support
    		11 |   enable_dns_hostnames             = var.vpc_enable_dns_hostnames
    		12 |   enable_classiclink               = var.vpc_enable_classiclink
    		13 |   enable_classiclink_dns_support   = var.vpc_enable_classiclink_dns_support
    		14 |   assign_generated_ipv6_cidr_block = var.vpc_assign_generated_ipv6_cidr_block
    		15 | 
    		16 |   tags = merge(
    		17 |     {
    		18 |       Name = var.vpc_name != "" ? lower(var.vpc_name) : "${lower(var.name)}-vpc-${lower(var.environment)}"
    		19 |     },
    		20 |     var.tags
    		21 |   )
    		22 | 
    		23 |   lifecycle {
    		24 |     create_before_destroy = true
    		25 |     ignore_changes        = []
    		26 |   }
    		27 | 
    		28 |   depends_on = []
    		29 | }
    
    Check: CKV2_AWS_12: "Ensure the default security group of every VPC restricts all traffic"
    	FAILED for resource: module.vpc_2.aws_vpc.vpc
    	File: /aws/modules/vpc/vpc.tf:4-29
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-4.html
    
    		4  | resource "aws_vpc" "vpc" {
    		5  |   count = var.enable_vpc ? 1 : 0
    		6  | 
    		7  |   cidr_block = cidrsubnet(var.vpc_cidr_block, 0, 0)
    		8  | 
    		9  |   instance_tenancy                 = var.vpc_instance_tenancy
    		10 |   enable_dns_support               = var.vpc_enable_dns_support
    		11 |   enable_dns_hostnames             = var.vpc_enable_dns_hostnames
    		12 |   enable_classiclink               = var.vpc_enable_classiclink
    		13 |   enable_classiclink_dns_support   = var.vpc_enable_classiclink_dns_support
    		14 |   assign_generated_ipv6_cidr_block = var.vpc_assign_generated_ipv6_cidr_block
    		15 | 
    		16 |   tags = merge(
    		17 |     {
    		18 |       Name = var.vpc_name != "" ? lower(var.vpc_name) : "${lower(var.name)}-vpc-${lower(var.environment)}"
    		19 |     },
    		20 |     var.tags
    		21 |   )
    		22 | 
    		23 |   lifecycle {
    		24 |     create_before_destroy = true
    		25 |     ignore_changes        = []
    		26 |   }
    		27 | 
    		28 |   depends_on = []
    		29 | }
    
    Check: CKV2_AWS_19: "Ensure that all EIP addresses allocated to a VPC are attached to EC2 instances"
    	FAILED for resource: module.shield.aws_eip.eip
    	File: /aws/modules/shield/eip.tf:1-3
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-that-all-eip-addresses-allocated-to-a-vpc-are-attached-to-ec2-instances.html
    
    		1 | resource "aws_eip" "eip" {
    		2 |   vpc = true
    		3 | }
    Check: CKV2_AWS_50: "Ensure AWS ElastiCache Redis cluster with Multi-AZ Automatic Failover feature set to enabled"
    	FAILED for resource: module.elasticache_single_memcached.aws_elasticache_replication_group.elasticache_replication_group
    	File: /aws/modules/elasticache/elasticache_replication_group.tf:4-66
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-aws-elasticache-redis-cluster-with-multi-az-automatic-failover-feature-set-to-enabled.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV2_AWS_50: "Ensure AWS ElastiCache Redis cluster with Multi-AZ Automatic Failover feature set to enabled"
    	FAILED for resource: module.elasticache_single_redis.aws_elasticache_replication_group.elasticache_replication_group
    	File: /aws/modules/elasticache/elasticache_replication_group.tf:4-66
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-aws-elasticache-redis-cluster-with-multi-az-automatic-failover-feature-set-to-enabled.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV2_AWS_14: "Ensure that IAM groups includes at least one IAM user"
    	FAILED for resource: module.iam_group.aws_iam_group_membership.iam_group_membership[0]
    	File: /aws/modules/iam_group/iam_group_membership.tf:4-20
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-that-iam-groups-include-at-least-one-iam-user.html
    
    		4  | resource "aws_iam_group_membership" "iam_group_membership" {
    		5  |   count = var.enable_iam_group_membership ? 1 : 0
    		6  | 
    		7  |   name = var.iam_group_membership_name != "" ? var.iam_group_membership_name : "${lower(var.name)}-group-membership-${lower(var.environment)}"
    		8  | 
    		9  |   users = var.iam_group_membership_users
    		10 |   group = var.iam_group_membership_group != "" && !var.enable_iam_group ? var.iam_group_membership_group : element(concat(aws_iam_group.iam_group.*.name, [""]), 0)
    		11 | 
    		12 |   lifecycle {
    		13 |     create_before_destroy = true
    		14 |     ignore_changes        = []
    		15 |   }
    		16 | 
    		17 |   depends_on = [
    		18 |     aws_iam_group.iam_group
    		19 |   ]
    		20 | }
    
    Check: CKV2_AWS_33: "Ensure AppSync is protected by WAF"
    	FAILED for resource: module.appsync.aws_appsync_graphql_api.appsync_graphql_api[0]
    	File: /aws/modules/appsync/appsync_graphql_api.tf:4-97
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-aws-appsync-is-protected-by-waf.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV2_AWS_9: "Ensure that EBS are added in the backup plans of AWS Backup"
    	FAILED for resource: module.ebs.aws_ebs_volume.ebs_volume[0]
    	File: /aws/modules/ebs/ebs_volume.tf:4-29
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ebs-are-added-in-the-backup-plans-of-aws-backup.html
    
    		4  | resource "aws_ebs_volume" "ebs_volume" {
    		5  |   count = var.enable_ebs_volume ? 1 : 0
    		6  | 
    		7  |   availability_zone = length(var.ebs_volume_availability_zone) > 0 ? var.ebs_volume_availability_zone : element(split(",", (lookup(var.availability_zones, var.region))), 0)
    		8  |   type              = var.ebs_volume_type
    		9  |   size              = var.ebs_volume_size
    		10 | 
    		11 |   encrypted   = var.ebs_volume_encrypted
    		12 |   iops        = var.ebs_volume_iops
    		13 |   snapshot_id = var.ebs_volume_snapshot_id
    		14 |   kms_key_id  = var.ebs_volume_kms_key_id
    		15 | 
    		16 |   tags = merge(
    		17 |     {
    		18 |       Name = var.ebs_volume_name != "" ? lower(var.ebs_volume_name) : "${lower(var.name)}-ebs-${lower(var.environment)}"
    		19 |     },
    		20 |     var.tags
    		21 |   )
    		22 | 
    		23 |   lifecycle {
    		24 |     create_before_destroy = true
    		25 |     ignore_changes        = []
    		26 |   }
    		27 | 
    		28 |   depends_on = []
    		29 | }
    
    Check: CKV2_AWS_8: "Ensure that RDS clusters has backup plan of AWS Backup"
    	FAILED for resource: module.db_instance-rds-oracle.aws_rds_cluster.rds_cluster
    	File: /aws/modules/rds/rds_cluster.tf:4-106
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-rds-clusters-has-backup-plan-of-aws-backup.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV2_AWS_8: "Ensure that RDS clusters has backup plan of AWS Backup"
    	FAILED for resource: module.rds_cluster.aws_rds_cluster.rds_cluster[0]
    	File: /aws/modules/rds/rds_cluster.tf:4-106
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-rds-clusters-has-backup-plan-of-aws-backup.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV_AWS_103: "Ensure that load balancer is using at least TLS 1.2"
    	FAILED for resource: module.alb.aws_lb_listener.alb_listener[0]
    	File: /aws/modules/alb/lb_listener.tf:4-121
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-43.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV2_AWS_37: "Ensure Codecommit associates an approval rule"
    	FAILED for resource: module.codecommit.aws_codecommit_repository.codecommit_repository[0]
    	File: /aws/modules/codecommit/codecommit_repository.tf:4-25
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-aws-codecommit-is-associated-with-an-approval-rule.html
    
    		4  | resource "aws_codecommit_repository" "codecommit_repository" {
    		5  |   count = var.enable_codecommit_repository ? 1 : 0
    		6  | 
    		7  |   repository_name = var.codecommit_repository_name != "" ? lower(var.codecommit_repository_name) : "${lower(var.name)}-codecommit-repo-${lower(var.environment)}"
    		8  | 
    		9  |   description    = var.codecommit_repository_description
    		10 |   default_branch = var.codecommit_repository_default_branch
    		11 | 
    		12 |   tags = merge(
    		13 |     {
    		14 |       Name = var.codecommit_repository_name != "" ? lower(var.codecommit_repository_name) : "${lower(var.name)}-codecommit-repo-${lower(var.environment)}"
    		15 |     },
    		16 |     var.tags
    		17 |   )
    		18 | 
    		19 |   lifecycle {
    		20 |     create_before_destroy = true
    		21 |     ignore_changes        = []
    		22 |   }
    		23 | 
    		24 |   depends_on = []
    		25 | }
    
    Check: CKV_AWS_21: "Ensure all data stored in the S3 bucket have versioning enabled"
    	FAILED for resource: module.s3.aws_s3_bucket.s3_bucket[0]
    	File: /aws/modules/s3/s3_bucket.tf:4-26
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/s3-policies/s3-16-enable-versioning.html
    
    		4  | resource "aws_s3_bucket" "s3_bucket" {
    		5  |   count = var.enable_s3_bucket ? 1 : 0
    		6  | 
    		7  |   bucket        = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : null
    		8  |   bucket_prefix = var.s3_bucket_prefix != null && var.s3_bucket_name == null ? lower(var.s3_bucket_prefix) : null
    		9  | 
    		10 |   force_destroy       = var.s3_bucket_force_destroy
    		11 |   object_lock_enabled = var.s3_bucket_object_lock_enabled
    		12 | 
    		13 |   tags = merge(
    		14 |     {
    		15 |       Name = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : lower(var.s3_bucket_prefix)
    		16 |     },
    		17 |     var.tags
    		18 |   )
    		19 | 
    		20 |   lifecycle {
    		21 |     create_before_destroy = true
    		22 |     ignore_changes        = []
    		23 |   }
    		24 | 
    		25 |   depends_on = []
    		26 | }
    
    Check: CKV_AWS_21: "Ensure all data stored in the S3 bucket have versioning enabled"
    	FAILED for resource: module.s3_bucket_public_access_block.aws_s3_bucket.s3_bucket[0]
    	File: /aws/modules/s3/s3_bucket.tf:4-26
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/s3-policies/s3-16-enable-versioning.html
    
    		4  | resource "aws_s3_bucket" "s3_bucket" {
    		5  |   count = var.enable_s3_bucket ? 1 : 0
    		6  | 
    		7  |   bucket        = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : null
    		8  |   bucket_prefix = var.s3_bucket_prefix != null && var.s3_bucket_name == null ? lower(var.s3_bucket_prefix) : null
    		9  | 
    		10 |   force_destroy       = var.s3_bucket_force_destroy
    		11 |   object_lock_enabled = var.s3_bucket_object_lock_enabled
    		12 | 
    		13 |   tags = merge(
    		14 |     {
    		15 |       Name = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : lower(var.s3_bucket_prefix)
    		16 |     },
    		17 |     var.tags
    		18 |   )
    		19 | 
    		20 |   lifecycle {
    		21 |     create_before_destroy = true
    		22 |     ignore_changes        = []
    		23 |   }
    		24 | 
    		25 |   depends_on = []
    		26 | }
    
    Check: CKV_AWS_21: "Ensure all data stored in the S3 bucket have versioning enabled"
    	FAILED for resource: module.s3_private_bucket.aws_s3_bucket.s3_bucket[0]
    	File: /aws/modules/s3/s3_bucket.tf:4-26
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/s3-policies/s3-16-enable-versioning.html
    
    		4  | resource "aws_s3_bucket" "s3_bucket" {
    		5  |   count = var.enable_s3_bucket ? 1 : 0
    		6  | 
    		7  |   bucket        = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : null
    		8  |   bucket_prefix = var.s3_bucket_prefix != null && var.s3_bucket_name == null ? lower(var.s3_bucket_prefix) : null
    		9  | 
    		10 |   force_destroy       = var.s3_bucket_force_destroy
    		11 |   object_lock_enabled = var.s3_bucket_object_lock_enabled
    		12 | 
    		13 |   tags = merge(
    		14 |     {
    		15 |       Name = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : lower(var.s3_bucket_prefix)
    		16 |     },
    		17 |     var.tags
    		18 |   )
    		19 | 
    		20 |   lifecycle {
    		21 |     create_before_destroy = true
    		22 |     ignore_changes        = []
    		23 |   }
    		24 | 
    		25 |   depends_on = []
    		26 | }
    
    Check: CKV_AWS_21: "Ensure all data stored in the S3 bucket have versioning enabled"
    	FAILED for resource: module.s3_flow_logs.aws_s3_bucket.s3_bucket[0]
    	File: /aws/modules/s3/s3_bucket.tf:4-26
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/s3-policies/s3-16-enable-versioning.html
    
    		4  | resource "aws_s3_bucket" "s3_bucket" {
    		5  |   count = var.enable_s3_bucket ? 1 : 0
    		6  | 
    		7  |   bucket        = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : null
    		8  |   bucket_prefix = var.s3_bucket_prefix != null && var.s3_bucket_name == null ? lower(var.s3_bucket_prefix) : null
    		9  | 
    		10 |   force_destroy       = var.s3_bucket_force_destroy
    		11 |   object_lock_enabled = var.s3_bucket_object_lock_enabled
    		12 | 
    		13 |   tags = merge(
    		14 |     {
    		15 |       Name = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : lower(var.s3_bucket_prefix)
    		16 |     },
    		17 |     var.tags
    		18 |   )
    		19 | 
    		20 |   lifecycle {
    		21 |     create_before_destroy = true
    		22 |     ignore_changes        = []
    		23 |   }
    		24 | 
    		25 |   depends_on = []
    		26 | }
    
    Check: CKV2_AWS_11: "Ensure VPC flow logging is enabled in all VPCs"
    	FAILED for resource: module.vpc.aws_vpc.vpc[0]
    	File: /aws/modules/vpc/vpc.tf:4-29
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/logging-9-enable-vpc-flow-logging.html
    
    		4  | resource "aws_vpc" "vpc" {
    		5  |   count = var.enable_vpc ? 1 : 0
    		6  | 
    		7  |   cidr_block = cidrsubnet(var.vpc_cidr_block, 0, 0)
    		8  | 
    		9  |   instance_tenancy                 = var.vpc_instance_tenancy
    		10 |   enable_dns_support               = var.vpc_enable_dns_support
    		11 |   enable_dns_hostnames             = var.vpc_enable_dns_hostnames
    		12 |   enable_classiclink               = var.vpc_enable_classiclink
    		13 |   enable_classiclink_dns_support   = var.vpc_enable_classiclink_dns_support
    		14 |   assign_generated_ipv6_cidr_block = var.vpc_assign_generated_ipv6_cidr_block
    		15 | 
    		16 |   tags = merge(
    		17 |     {
    		18 |       Name = var.vpc_name != "" ? lower(var.vpc_name) : "${lower(var.name)}-vpc-${lower(var.environment)}"
    		19 |     },
    		20 |     var.tags
    		21 |   )
    		22 | 
    		23 |   lifecycle {
    		24 |     create_before_destroy = true
    		25 |     ignore_changes        = []
    		26 |   }
    		27 | 
    		28 |   depends_on = []
    		29 | }
    
    Check: CKV2_AWS_11: "Ensure VPC flow logging is enabled in all VPCs"
    	FAILED for resource: module.vpc_1.aws_vpc.vpc[0]
    	File: /aws/modules/vpc/vpc.tf:4-29
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/logging-9-enable-vpc-flow-logging.html
    
    		4  | resource "aws_vpc" "vpc" {
    		5  |   count = var.enable_vpc ? 1 : 0
    		6  | 
    		7  |   cidr_block = cidrsubnet(var.vpc_cidr_block, 0, 0)
    		8  | 
    		9  |   instance_tenancy                 = var.vpc_instance_tenancy
    		10 |   enable_dns_support               = var.vpc_enable_dns_support
    		11 |   enable_dns_hostnames             = var.vpc_enable_dns_hostnames
    		12 |   enable_classiclink               = var.vpc_enable_classiclink
    		13 |   enable_classiclink_dns_support   = var.vpc_enable_classiclink_dns_support
    		14 |   assign_generated_ipv6_cidr_block = var.vpc_assign_generated_ipv6_cidr_block
    		15 | 
    		16 |   tags = merge(
    		17 |     {
    		18 |       Name = var.vpc_name != "" ? lower(var.vpc_name) : "${lower(var.name)}-vpc-${lower(var.environment)}"
    		19 |     },
    		20 |     var.tags
    		21 |   )
    		22 | 
    		23 |   lifecycle {
    		24 |     create_before_destroy = true
    		25 |     ignore_changes        = []
    		26 |   }
    		27 | 
    		28 |   depends_on = []
    		29 | }
    
    Check: CKV2_AWS_11: "Ensure VPC flow logging is enabled in all VPCs"
    	FAILED for resource: module.vpc_2.aws_vpc.vpc[0]
    	File: /aws/modules/vpc/vpc.tf:4-29
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/logging-9-enable-vpc-flow-logging.html
    
    		4  | resource "aws_vpc" "vpc" {
    		5  |   count = var.enable_vpc ? 1 : 0
    		6  | 
    		7  |   cidr_block = cidrsubnet(var.vpc_cidr_block, 0, 0)
    		8  | 
    		9  |   instance_tenancy                 = var.vpc_instance_tenancy
    		10 |   enable_dns_support               = var.vpc_enable_dns_support
    		11 |   enable_dns_hostnames             = var.vpc_enable_dns_hostnames
    		12 |   enable_classiclink               = var.vpc_enable_classiclink
    		13 |   enable_classiclink_dns_support   = var.vpc_enable_classiclink_dns_support
    		14 |   assign_generated_ipv6_cidr_block = var.vpc_assign_generated_ipv6_cidr_block
    		15 | 
    		16 |   tags = merge(
    		17 |     {
    		18 |       Name = var.vpc_name != "" ? lower(var.vpc_name) : "${lower(var.name)}-vpc-${lower(var.environment)}"
    		19 |     },
    		20 |     var.tags
    		21 |   )
    		22 | 
    		23 |   lifecycle {
    		24 |     create_before_destroy = true
    		25 |     ignore_changes        = []
    		26 |   }
    		27 | 
    		28 |   depends_on = []
    		29 | }
    
    Check: CKV2_AWS_11: "Ensure VPC flow logging is enabled in all VPCs"
    	FAILED for resource: module.vpc_custom_routings.aws_vpc.vpc[0]
    	File: /aws/modules/vpc/vpc.tf:4-29
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/logging-9-enable-vpc-flow-logging.html
    
    		4  | resource "aws_vpc" "vpc" {
    		5  |   count = var.enable_vpc ? 1 : 0
    		6  | 
    		7  |   cidr_block = cidrsubnet(var.vpc_cidr_block, 0, 0)
    		8  | 
    		9  |   instance_tenancy                 = var.vpc_instance_tenancy
    		10 |   enable_dns_support               = var.vpc_enable_dns_support
    		11 |   enable_dns_hostnames             = var.vpc_enable_dns_hostnames
    		12 |   enable_classiclink               = var.vpc_enable_classiclink
    		13 |   enable_classiclink_dns_support   = var.vpc_enable_classiclink_dns_support
    		14 |   assign_generated_ipv6_cidr_block = var.vpc_assign_generated_ipv6_cidr_block
    		15 | 
    		16 |   tags = merge(
    		17 |     {
    		18 |       Name = var.vpc_name != "" ? lower(var.vpc_name) : "${lower(var.name)}-vpc-${lower(var.environment)}"
    		19 |     },
    		20 |     var.tags
    		21 |   )
    		22 | 
    		23 |   lifecycle {
    		24 |     create_before_destroy = true
    		25 |     ignore_changes        = []
    		26 |   }
    		27 | 
    		28 |   depends_on = []
    		29 | }
    
    Check: CKV2_AWS_11: "Ensure VPC flow logging is enabled in all VPCs"
    	FAILED for resource: module.vpc_endpoint.aws_vpc.vpc[0]
    	File: /aws/modules/vpc/vpc.tf:4-29
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/logging-9-enable-vpc-flow-logging.html
    
    		4  | resource "aws_vpc" "vpc" {
    		5  |   count = var.enable_vpc ? 1 : 0
    		6  | 
    		7  |   cidr_block = cidrsubnet(var.vpc_cidr_block, 0, 0)
    		8  | 
    		9  |   instance_tenancy                 = var.vpc_instance_tenancy
    		10 |   enable_dns_support               = var.vpc_enable_dns_support
    		11 |   enable_dns_hostnames             = var.vpc_enable_dns_hostnames
    		12 |   enable_classiclink               = var.vpc_enable_classiclink
    		13 |   enable_classiclink_dns_support   = var.vpc_enable_classiclink_dns_support
    		14 |   assign_generated_ipv6_cidr_block = var.vpc_assign_generated_ipv6_cidr_block
    		15 | 
    		16 |   tags = merge(
    		17 |     {
    		18 |       Name = var.vpc_name != "" ? lower(var.vpc_name) : "${lower(var.name)}-vpc-${lower(var.environment)}"
    		19 |     },
    		20 |     var.tags
    		21 |   )
    		22 | 
    		23 |   lifecycle {
    		24 |     create_before_destroy = true
    		25 |     ignore_changes        = []
    		26 |   }
    		27 | 
    		28 |   depends_on = []
    		29 | }
    
    Check: CKV2_AWS_11: "Ensure VPC flow logging is enabled in all VPCs"
    	FAILED for resource: module.vpc_vpn.aws_vpc.vpc[0]
    	File: /aws/modules/vpc/vpc.tf:4-29
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/logging-9-enable-vpc-flow-logging.html
    
    		4  | resource "aws_vpc" "vpc" {
    		5  |   count = var.enable_vpc ? 1 : 0
    		6  | 
    		7  |   cidr_block = cidrsubnet(var.vpc_cidr_block, 0, 0)
    		8  | 
    		9  |   instance_tenancy                 = var.vpc_instance_tenancy
    		10 |   enable_dns_support               = var.vpc_enable_dns_support
    		11 |   enable_dns_hostnames             = var.vpc_enable_dns_hostnames
    		12 |   enable_classiclink               = var.vpc_enable_classiclink
    		13 |   enable_classiclink_dns_support   = var.vpc_enable_classiclink_dns_support
    		14 |   assign_generated_ipv6_cidr_block = var.vpc_assign_generated_ipv6_cidr_block
    		15 | 
    		16 |   tags = merge(
    		17 |     {
    		18 |       Name = var.vpc_name != "" ? lower(var.vpc_name) : "${lower(var.name)}-vpc-${lower(var.environment)}"
    		19 |     },
    		20 |     var.tags
    		21 |   )
    		22 | 
    		23 |   lifecycle {
    		24 |     create_before_destroy = true
    		25 |     ignore_changes        = []
    		26 |   }
    		27 | 
    		28 |   depends_on = []
    		29 | }
    
    Check: CKV2_AWS_6: "Ensure that S3 bucket has a Public Access block"
    	FAILED for resource: module.s3.aws_s3_bucket.s3_bucket[0]
    	File: /aws/modules/s3/s3_bucket.tf:4-26
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/s3-bucket-should-have-public-access-blocks-defaults-to-false-if-the-public-access-block-is-not-attached.html
    
    		4  | resource "aws_s3_bucket" "s3_bucket" {
    		5  |   count = var.enable_s3_bucket ? 1 : 0
    		6  | 
    		7  |   bucket        = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : null
    		8  |   bucket_prefix = var.s3_bucket_prefix != null && var.s3_bucket_name == null ? lower(var.s3_bucket_prefix) : null
    		9  | 
    		10 |   force_destroy       = var.s3_bucket_force_destroy
    		11 |   object_lock_enabled = var.s3_bucket_object_lock_enabled
    		12 | 
    		13 |   tags = merge(
    		14 |     {
    		15 |       Name = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : lower(var.s3_bucket_prefix)
    		16 |     },
    		17 |     var.tags
    		18 |   )
    		19 | 
    		20 |   lifecycle {
    		21 |     create_before_destroy = true
    		22 |     ignore_changes        = []
    		23 |   }
    		24 | 
    		25 |   depends_on = []
    		26 | }
    
    Check: CKV2_AWS_6: "Ensure that S3 bucket has a Public Access block"
    	FAILED for resource: module.s3_bucket_public_access_block.aws_s3_bucket.s3_bucket[0]
    	File: /aws/modules/s3/s3_bucket.tf:4-26
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/s3-bucket-should-have-public-access-blocks-defaults-to-false-if-the-public-access-block-is-not-attached.html
    
    		4  | resource "aws_s3_bucket" "s3_bucket" {
    		5  |   count = var.enable_s3_bucket ? 1 : 0
    		6  | 
    		7  |   bucket        = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : null
    		8  |   bucket_prefix = var.s3_bucket_prefix != null && var.s3_bucket_name == null ? lower(var.s3_bucket_prefix) : null
    		9  | 
    		10 |   force_destroy       = var.s3_bucket_force_destroy
    		11 |   object_lock_enabled = var.s3_bucket_object_lock_enabled
    		12 | 
    		13 |   tags = merge(
    		14 |     {
    		15 |       Name = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : lower(var.s3_bucket_prefix)
    		16 |     },
    		17 |     var.tags
    		18 |   )
    		19 | 
    		20 |   lifecycle {
    		21 |     create_before_destroy = true
    		22 |     ignore_changes        = []
    		23 |   }
    		24 | 
    		25 |   depends_on = []
    		26 | }
    
    Check: CKV2_AWS_6: "Ensure that S3 bucket has a Public Access block"
    	FAILED for resource: module.s3_private_bucket.aws_s3_bucket.s3_bucket[0]
    	File: /aws/modules/s3/s3_bucket.tf:4-26
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/s3-bucket-should-have-public-access-blocks-defaults-to-false-if-the-public-access-block-is-not-attached.html
    
    		4  | resource "aws_s3_bucket" "s3_bucket" {
    		5  |   count = var.enable_s3_bucket ? 1 : 0
    		6  | 
    		7  |   bucket        = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : null
    		8  |   bucket_prefix = var.s3_bucket_prefix != null && var.s3_bucket_name == null ? lower(var.s3_bucket_prefix) : null
    		9  | 
    		10 |   force_destroy       = var.s3_bucket_force_destroy
    		11 |   object_lock_enabled = var.s3_bucket_object_lock_enabled
    		12 | 
    		13 |   tags = merge(
    		14 |     {
    		15 |       Name = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : lower(var.s3_bucket_prefix)
    		16 |     },
    		17 |     var.tags
    		18 |   )
    		19 | 
    		20 |   lifecycle {
    		21 |     create_before_destroy = true
    		22 |     ignore_changes        = []
    		23 |   }
    		24 | 
    		25 |   depends_on = []
    		26 | }
    
    Check: CKV2_AWS_6: "Ensure that S3 bucket has a Public Access block"
    	FAILED for resource: module.s3_flow_logs.aws_s3_bucket.s3_bucket[0]
    	File: /aws/modules/s3/s3_bucket.tf:4-26
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/s3-bucket-should-have-public-access-blocks-defaults-to-false-if-the-public-access-block-is-not-attached.html
    
    		4  | resource "aws_s3_bucket" "s3_bucket" {
    		5  |   count = var.enable_s3_bucket ? 1 : 0
    		6  | 
    		7  |   bucket        = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : null
    		8  |   bucket_prefix = var.s3_bucket_prefix != null && var.s3_bucket_name == null ? lower(var.s3_bucket_prefix) : null
    		9  | 
    		10 |   force_destroy       = var.s3_bucket_force_destroy
    		11 |   object_lock_enabled = var.s3_bucket_object_lock_enabled
    		12 | 
    		13 |   tags = merge(
    		14 |     {
    		15 |       Name = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : lower(var.s3_bucket_prefix)
    		16 |     },
    		17 |     var.tags
    		18 |   )
    		19 | 
    		20 |   lifecycle {
    		21 |     create_before_destroy = true
    		22 |     ignore_changes        = []
    		23 |   }
    		24 | 
    		25 |   depends_on = []
    		26 | }
    
    Check: CKV_AWS_18: "Ensure the S3 bucket has access logging enabled"
    	FAILED for resource: module.s3.aws_s3_bucket.s3_bucket[0]
    	File: /aws/modules/s3/s3_bucket.tf:4-26
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/s3-policies/s3-13-enable-logging.html
    
    		4  | resource "aws_s3_bucket" "s3_bucket" {
    		5  |   count = var.enable_s3_bucket ? 1 : 0
    		6  | 
    		7  |   bucket        = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : null
    		8  |   bucket_prefix = var.s3_bucket_prefix != null && var.s3_bucket_name == null ? lower(var.s3_bucket_prefix) : null
    		9  | 
    		10 |   force_destroy       = var.s3_bucket_force_destroy
    		11 |   object_lock_enabled = var.s3_bucket_object_lock_enabled
    		12 | 
    		13 |   tags = merge(
    		14 |     {
    		15 |       Name = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : lower(var.s3_bucket_prefix)
    		16 |     },
    		17 |     var.tags
    		18 |   )
    		19 | 
    		20 |   lifecycle {
    		21 |     create_before_destroy = true
    		22 |     ignore_changes        = []
    		23 |   }
    		24 | 
    		25 |   depends_on = []
    		26 | }
    
    Check: CKV_AWS_18: "Ensure the S3 bucket has access logging enabled"
    	FAILED for resource: module.s3_bucket_public_access_block.aws_s3_bucket.s3_bucket[0]
    	File: /aws/modules/s3/s3_bucket.tf:4-26
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/s3-policies/s3-13-enable-logging.html
    
    		4  | resource "aws_s3_bucket" "s3_bucket" {
    		5  |   count = var.enable_s3_bucket ? 1 : 0
    		6  | 
    		7  |   bucket        = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : null
    		8  |   bucket_prefix = var.s3_bucket_prefix != null && var.s3_bucket_name == null ? lower(var.s3_bucket_prefix) : null
    		9  | 
    		10 |   force_destroy       = var.s3_bucket_force_destroy
    		11 |   object_lock_enabled = var.s3_bucket_object_lock_enabled
    		12 | 
    		13 |   tags = merge(
    		14 |     {
    		15 |       Name = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : lower(var.s3_bucket_prefix)
    		16 |     },
    		17 |     var.tags
    		18 |   )
    		19 | 
    		20 |   lifecycle {
    		21 |     create_before_destroy = true
    		22 |     ignore_changes        = []
    		23 |   }
    		24 | 
    		25 |   depends_on = []
    		26 | }
    
    Check: CKV_AWS_18: "Ensure the S3 bucket has access logging enabled"
    	FAILED for resource: module.s3_private_bucket.aws_s3_bucket.s3_bucket[0]
    	File: /aws/modules/s3/s3_bucket.tf:4-26
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/s3-policies/s3-13-enable-logging.html
    
    		4  | resource "aws_s3_bucket" "s3_bucket" {
    		5  |   count = var.enable_s3_bucket ? 1 : 0
    		6  | 
    		7  |   bucket        = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : null
    		8  |   bucket_prefix = var.s3_bucket_prefix != null && var.s3_bucket_name == null ? lower(var.s3_bucket_prefix) : null
    		9  | 
    		10 |   force_destroy       = var.s3_bucket_force_destroy
    		11 |   object_lock_enabled = var.s3_bucket_object_lock_enabled
    		12 | 
    		13 |   tags = merge(
    		14 |     {
    		15 |       Name = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : lower(var.s3_bucket_prefix)
    		16 |     },
    		17 |     var.tags
    		18 |   )
    		19 | 
    		20 |   lifecycle {
    		21 |     create_before_destroy = true
    		22 |     ignore_changes        = []
    		23 |   }
    		24 | 
    		25 |   depends_on = []
    		26 | }
    
    Check: CKV_AWS_18: "Ensure the S3 bucket has access logging enabled"
    	FAILED for resource: module.s3_flow_logs.aws_s3_bucket.s3_bucket[0]
    	File: /aws/modules/s3/s3_bucket.tf:4-26
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/s3-policies/s3-13-enable-logging.html
    
    		4  | resource "aws_s3_bucket" "s3_bucket" {
    		5  |   count = var.enable_s3_bucket ? 1 : 0
    		6  | 
    		7  |   bucket        = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : null
    		8  |   bucket_prefix = var.s3_bucket_prefix != null && var.s3_bucket_name == null ? lower(var.s3_bucket_prefix) : null
    		9  | 
    		10 |   force_destroy       = var.s3_bucket_force_destroy
    		11 |   object_lock_enabled = var.s3_bucket_object_lock_enabled
    		12 | 
    		13 |   tags = merge(
    		14 |     {
    		15 |       Name = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : lower(var.s3_bucket_prefix)
    		16 |     },
    		17 |     var.tags
    		18 |   )
    		19 | 
    		20 |   lifecycle {
    		21 |     create_before_destroy = true
    		22 |     ignore_changes        = []
    		23 |   }
    		24 | 
    		25 |   depends_on = []
    		26 | }
    
    Check: CKV2_AWS_4: "Ensure API Gateway stage have logging level defined as appropriate"
    	FAILED for resource: module.api_gateway.aws_api_gateway_stage.api_gateway_stage
    	File: /aws/modules/api_gateway/api_gateway_stage.tf:4-47
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-api-gateway-stage-have-logging-level-defined-as-appropiate.html
    
    		4  | resource "aws_api_gateway_stage" "api_gateway_stage" {
    		5  |   count = var.enable_api_gateway_stage ? 1 : 0
    		6  | 
    		7  |   rest_api_id   = var.api_gateway_stage_rest_api_id != "" && !var.enable_api_gateway_rest_api ? var.api_gateway_stage_rest_api_id : element(concat(aws_api_gateway_rest_api.api_gateway_rest_api.*.id, [""]), 0)
    		8  |   deployment_id = var.api_gateway_stage_deployment_id != "" && !var.enable_api_gateway_deployment ? var.api_gateway_stage_deployment_id : element(concat(aws_api_gateway_deployment.api_gateway_deployment.*.id, [""]), 0)
    		9  |   stage_name    = var.api_gateway_stage_stage_name != "" ? var.api_gateway_stage_stage_name : "${lower(var.name)}-api-gw-state-${lower(var.environment)}"
    		10 | 
    		11 |   description           = var.api_gateway_stage_description
    		12 |   cache_cluster_enabled = var.api_gateway_stage_cache_cluster_enabled
    		13 |   cache_cluster_size    = var.api_gateway_stage_cache_cluster_size
    		14 |   client_certificate_id = var.api_gateway_stage_client_certificate_id != "" && !var.enable_api_gateway_client_certificate ? var.api_gateway_stage_client_certificate_id : element(concat(aws_api_gateway_client_certificate.api_gateway_client_certificate.*.id, [""]), 0)
    		15 |   documentation_version = var.api_gateway_stage_documentation_version != "" && !var.enable_api_gateway_documentation_version ? var.api_gateway_stage_documentation_version : element(concat(aws_api_gateway_documentation_version.api_gateway_documentation_version.*.id, [""]), 0)
    		16 |   variables             = var.api_gateway_stage_variables
    		17 |   xray_tracing_enabled  = var.api_gateway_stage_xray_tracing_enabled
    		18 | 
    		19 |   dynamic "access_log_settings" {
    		20 |     iterator = access_log_settings
    		21 |     for_each = var.api_gateway_stage_access_log_settings
    		22 | 
    		23 |     content {
    		24 |       destination_arn = lookup(access_log_settings.value, "destination_arn", null)
    		25 |       format          = lookup(access_log_settings.value, "format", null)
    		26 |     }
    		27 |   }
    		28 | 
    		29 |   tags = merge(
    		30 |     {
    		31 |       Name = var.api_gateway_stage_stage_name != "" ? var.api_gateway_stage_stage_name : "${lower(var.name)}-api-gw-state-${lower(var.environment)}"
    		32 |     },
    		33 |     var.tags
    		34 |   )
    		35 | 
    		36 |   lifecycle {
    		37 |     create_before_destroy = true
    		38 |     ignore_changes        = []
    		39 |   }
    		40 | 
    		41 |   depends_on = [
    		42 |     aws_api_gateway_rest_api.api_gateway_rest_api,
    		43 |     aws_api_gateway_deployment.api_gateway_deployment,
    		44 |     aws_api_gateway_client_certificate.api_gateway_client_certificate,
    		45 |     aws_api_gateway_documentation_version.api_gateway_documentation_version
    		46 |   ]
    		47 | }
    
    Check: CKV2_AWS_18: "Ensure that Elastic File System (Amazon EFS) file systems are added in the backup plans of AWS Backup"
    	FAILED for resource: module.efs.aws_efs_file_system.efs_file_system[0]
    	File: /aws/modules/efs/efs_file_system.tf:4-37
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-elastic-file-system-amazon-efs-file-systems-are-added-in-the-backup-plans-of-aws-backup.html
    
    		4  | resource "aws_efs_file_system" "efs_file_system" {
    		5  |   count = var.enable_efs_file_system ? 1 : 0
    		6  | 
    		7  |   creation_token   = var.efs_file_system_creation_token
    		8  |   encrypted        = var.efs_file_system_encrypted
    		9  |   kms_key_id       = var.efs_file_system_kms_key_id
    		10 |   performance_mode = var.efs_file_system_performance_mode
    		11 | 
    		12 |   provisioned_throughput_in_mibps = var.efs_file_system_provisioned_throughput_in_mibps
    		13 |   throughput_mode                 = var.efs_file_system_throughput_mode
    		14 | 
    		15 |   dynamic "lifecycle_policy" {
    		16 |     iterator = lifecycle_policy
    		17 |     for_each = var.efs_file_system_lifecycle_policy
    		18 | 
    		19 |     content {
    		20 |       transition_to_ia = lookup(lifecycle_policy.value, "transition_to_ia", null)
    		21 |     }
    		22 |   }
    		23 | 
    		24 |   tags = merge(
    		25 |     {
    		26 |       Name = var.efs_file_system_name != "" ? var.efs_file_system_name : "${lower(var.name)}-efs-${lower(var.environment)}"
    		27 |     },
    		28 |     var.tags
    		29 |   )
    		30 | 
    		31 |   lifecycle {
    		32 |     create_before_destroy = true
    		33 |     ignore_changes        = []
    		34 |   }
    		35 | 
    		36 |   depends_on = []
    		37 | }
    
    Check: CKV2_AWS_18: "Ensure that Elastic File System (Amazon EFS) file systems are added in the backup plans of AWS Backup"
    	FAILED for resource: module.efs_policy.aws_efs_file_system.efs_file_system
    	File: /aws/modules/efs/efs_file_system.tf:4-37
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-elastic-file-system-amazon-efs-file-systems-are-added-in-the-backup-plans-of-aws-backup.html
    
    		4  | resource "aws_efs_file_system" "efs_file_system" {
    		5  |   count = var.enable_efs_file_system ? 1 : 0
    		6  | 
    		7  |   creation_token   = var.efs_file_system_creation_token
    		8  |   encrypted        = var.efs_file_system_encrypted
    		9  |   kms_key_id       = var.efs_file_system_kms_key_id
    		10 |   performance_mode = var.efs_file_system_performance_mode
    		11 | 
    		12 |   provisioned_throughput_in_mibps = var.efs_file_system_provisioned_throughput_in_mibps
    		13 |   throughput_mode                 = var.efs_file_system_throughput_mode
    		14 | 
    		15 |   dynamic "lifecycle_policy" {
    		16 |     iterator = lifecycle_policy
    		17 |     for_each = var.efs_file_system_lifecycle_policy
    		18 | 
    		19 |     content {
    		20 |       transition_to_ia = lookup(lifecycle_policy.value, "transition_to_ia", null)
    		21 |     }
    		22 |   }
    		23 | 
    		24 |   tags = merge(
    		25 |     {
    		26 |       Name = var.efs_file_system_name != "" ? var.efs_file_system_name : "${lower(var.name)}-efs-${lower(var.environment)}"
    		27 |     },
    		28 |     var.tags
    		29 |   )
    		30 | 
    		31 |   lifecycle {
    		32 |     create_before_destroy = true
    		33 |     ignore_changes        = []
    		34 |   }
    		35 | 
    		36 |   depends_on = []
    		37 | }
    
    Check: CKV2_AWS_32: "Ensure CloudFront distribution has a response headers policy attached"
    	FAILED for resource: module.cloudfront.aws_cloudfront_distribution.cloudfront_distribution[0]
    	File: /aws/modules/cloudfront/cloudfront_distribution.tf:4-281
    	Guide: https://docs.bridgecrew.io/docs/bc_aws_networking_65
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV2_AWS_39: "Ensure Domain Name System (DNS) query logging is enabled for Amazon Route 53 hosted zones"
    	FAILED for resource: module.route53.aws_route53_zone.route53_zone[0]
    	File: /aws/modules/route53/route53_zone.tf:4-36
    
    		4  | resource "aws_route53_zone" "route53_zone" {
    		5  |   count = var.enable_route53_zone ? 1 : 0
    		6  | 
    		7  |   name = var.route53_zone_name != "" ? lower(var.route53_zone_name) : "${lower(var.name)}-route53-zone-${lower(var.environment)}"
    		8  | 
    		9  |   comment           = var.route53_zone_comment
    		10 |   force_destroy     = var.route53_zone_force_destroy
    		11 |   delegation_set_id = var.route53_zone_delegation_set_id
    		12 | 
    		13 |   dynamic "vpc" {
    		14 |     iterator = vpc
    		15 |     for_each = var.route53_zone_vpc
    		16 | 
    		17 |     content {
    		18 |       vpc_id     = lookup(vpc.value, "vpc_id", null)
    		19 |       vpc_region = lookup(vpc.value, "vpc_region", null)
    		20 |     }
    		21 |   }
    		22 | 
    		23 |   tags = merge(
    		24 |     {
    		25 |       Name = var.route53_zone_name != "" ? lower(var.route53_zone_name) : "${lower(var.name)}-route53-zone-${lower(var.environment)}"
    		26 |     },
    		27 |     var.tags
    		28 |   )
    		29 | 
    		30 |   lifecycle {
    		31 |     create_before_destroy = true
    		32 |     ignore_changes        = []
    		33 |   }
    		34 | 
    		35 |   depends_on = []
    		36 | }
    
    Check: CKV2_AWS_61: "Ensure that an S3 bucket has a lifecycle configuration"
    	FAILED for resource: module.s3.aws_s3_bucket.s3_bucket[0]
    	File: /aws/modules/s3/s3_bucket.tf:4-26
    
    		4  | resource "aws_s3_bucket" "s3_bucket" {
    		5  |   count = var.enable_s3_bucket ? 1 : 0
    		6  | 
    		7  |   bucket        = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : null
    		8  |   bucket_prefix = var.s3_bucket_prefix != null && var.s3_bucket_name == null ? lower(var.s3_bucket_prefix) : null
    		9  | 
    		10 |   force_destroy       = var.s3_bucket_force_destroy
    		11 |   object_lock_enabled = var.s3_bucket_object_lock_enabled
    		12 | 
    		13 |   tags = merge(
    		14 |     {
    		15 |       Name = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : lower(var.s3_bucket_prefix)
    		16 |     },
    		17 |     var.tags
    		18 |   )
    		19 | 
    		20 |   lifecycle {
    		21 |     create_before_destroy = true
    		22 |     ignore_changes        = []
    		23 |   }
    		24 | 
    		25 |   depends_on = []
    		26 | }
    
    Check: CKV2_AWS_61: "Ensure that an S3 bucket has a lifecycle configuration"
    	FAILED for resource: module.s3_bucket_public_access_block.aws_s3_bucket.s3_bucket[0]
    	File: /aws/modules/s3/s3_bucket.tf:4-26
    
    		4  | resource "aws_s3_bucket" "s3_bucket" {
    		5  |   count = var.enable_s3_bucket ? 1 : 0
    		6  | 
    		7  |   bucket        = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : null
    		8  |   bucket_prefix = var.s3_bucket_prefix != null && var.s3_bucket_name == null ? lower(var.s3_bucket_prefix) : null
    		9  | 
    		10 |   force_destroy       = var.s3_bucket_force_destroy
    		11 |   object_lock_enabled = var.s3_bucket_object_lock_enabled
    		12 | 
    		13 |   tags = merge(
    		14 |     {
    		15 |       Name = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : lower(var.s3_bucket_prefix)
    		16 |     },
    		17 |     var.tags
    		18 |   )
    		19 | 
    		20 |   lifecycle {
    		21 |     create_before_destroy = true
    		22 |     ignore_changes        = []
    		23 |   }
    		24 | 
    		25 |   depends_on = []
    		26 | }
    
    Check: CKV2_AWS_61: "Ensure that an S3 bucket has a lifecycle configuration"
    	FAILED for resource: module.s3_private_bucket.aws_s3_bucket.s3_bucket[0]
    	File: /aws/modules/s3/s3_bucket.tf:4-26
    
    		4  | resource "aws_s3_bucket" "s3_bucket" {
    		5  |   count = var.enable_s3_bucket ? 1 : 0
    		6  | 
    		7  |   bucket        = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : null
    		8  |   bucket_prefix = var.s3_bucket_prefix != null && var.s3_bucket_name == null ? lower(var.s3_bucket_prefix) : null
    		9  | 
    		10 |   force_destroy       = var.s3_bucket_force_destroy
    		11 |   object_lock_enabled = var.s3_bucket_object_lock_enabled
    		12 | 
    		13 |   tags = merge(
    		14 |     {
    		15 |       Name = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : lower(var.s3_bucket_prefix)
    		16 |     },
    		17 |     var.tags
    		18 |   )
    		19 | 
    		20 |   lifecycle {
    		21 |     create_before_destroy = true
    		22 |     ignore_changes        = []
    		23 |   }
    		24 | 
    		25 |   depends_on = []
    		26 | }
    
    Check: CKV2_AWS_61: "Ensure that an S3 bucket has a lifecycle configuration"
    	FAILED for resource: module.s3_flow_logs.aws_s3_bucket.s3_bucket[0]
    	File: /aws/modules/s3/s3_bucket.tf:4-26
    
    		4  | resource "aws_s3_bucket" "s3_bucket" {
    		5  |   count = var.enable_s3_bucket ? 1 : 0
    		6  | 
    		7  |   bucket        = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : null
    		8  |   bucket_prefix = var.s3_bucket_prefix != null && var.s3_bucket_name == null ? lower(var.s3_bucket_prefix) : null
    		9  | 
    		10 |   force_destroy       = var.s3_bucket_force_destroy
    		11 |   object_lock_enabled = var.s3_bucket_object_lock_enabled
    		12 | 
    		13 |   tags = merge(
    		14 |     {
    		15 |       Name = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : lower(var.s3_bucket_prefix)
    		16 |     },
    		17 |     var.tags
    		18 |   )
    		19 | 
    		20 |   lifecycle {
    		21 |     create_before_destroy = true
    		22 |     ignore_changes        = []
    		23 |   }
    		24 | 
    		25 |   depends_on = []
    		26 | }
    
    Check: CKV_AWS_145: "Ensure that S3 buckets are encrypted with KMS by default"
    	FAILED for resource: module.s3.aws_s3_bucket.s3_bucket[0]
    	File: /aws/modules/s3/s3_bucket.tf:4-26
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-s3-buckets-are-encrypted-with-kms-by-default.html
    
    		4  | resource "aws_s3_bucket" "s3_bucket" {
    		5  |   count = var.enable_s3_bucket ? 1 : 0
    		6  | 
    		7  |   bucket        = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : null
    		8  |   bucket_prefix = var.s3_bucket_prefix != null && var.s3_bucket_name == null ? lower(var.s3_bucket_prefix) : null
    		9  | 
    		10 |   force_destroy       = var.s3_bucket_force_destroy
    		11 |   object_lock_enabled = var.s3_bucket_object_lock_enabled
    		12 | 
    		13 |   tags = merge(
    		14 |     {
    		15 |       Name = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : lower(var.s3_bucket_prefix)
    		16 |     },
    		17 |     var.tags
    		18 |   )
    		19 | 
    		20 |   lifecycle {
    		21 |     create_before_destroy = true
    		22 |     ignore_changes        = []
    		23 |   }
    		24 | 
    		25 |   depends_on = []
    		26 | }
    
    Check: CKV_AWS_145: "Ensure that S3 buckets are encrypted with KMS by default"
    	FAILED for resource: module.s3_bucket_public_access_block.aws_s3_bucket.s3_bucket[0]
    	File: /aws/modules/s3/s3_bucket.tf:4-26
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-s3-buckets-are-encrypted-with-kms-by-default.html
    
    		4  | resource "aws_s3_bucket" "s3_bucket" {
    		5  |   count = var.enable_s3_bucket ? 1 : 0
    		6  | 
    		7  |   bucket        = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : null
    		8  |   bucket_prefix = var.s3_bucket_prefix != null && var.s3_bucket_name == null ? lower(var.s3_bucket_prefix) : null
    		9  | 
    		10 |   force_destroy       = var.s3_bucket_force_destroy
    		11 |   object_lock_enabled = var.s3_bucket_object_lock_enabled
    		12 | 
    		13 |   tags = merge(
    		14 |     {
    		15 |       Name = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : lower(var.s3_bucket_prefix)
    		16 |     },
    		17 |     var.tags
    		18 |   )
    		19 | 
    		20 |   lifecycle {
    		21 |     create_before_destroy = true
    		22 |     ignore_changes        = []
    		23 |   }
    		24 | 
    		25 |   depends_on = []
    		26 | }
    
    Check: CKV_AWS_145: "Ensure that S3 buckets are encrypted with KMS by default"
    	FAILED for resource: module.s3_private_bucket.aws_s3_bucket.s3_bucket[0]
    	File: /aws/modules/s3/s3_bucket.tf:4-26
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-s3-buckets-are-encrypted-with-kms-by-default.html
    
    		4  | resource "aws_s3_bucket" "s3_bucket" {
    		5  |   count = var.enable_s3_bucket ? 1 : 0
    		6  | 
    		7  |   bucket        = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : null
    		8  |   bucket_prefix = var.s3_bucket_prefix != null && var.s3_bucket_name == null ? lower(var.s3_bucket_prefix) : null
    		9  | 
    		10 |   force_destroy       = var.s3_bucket_force_destroy
    		11 |   object_lock_enabled = var.s3_bucket_object_lock_enabled
    		12 | 
    		13 |   tags = merge(
    		14 |     {
    		15 |       Name = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : lower(var.s3_bucket_prefix)
    		16 |     },
    		17 |     var.tags
    		18 |   )
    		19 | 
    		20 |   lifecycle {
    		21 |     create_before_destroy = true
    		22 |     ignore_changes        = []
    		23 |   }
    		24 | 
    		25 |   depends_on = []
    		26 | }
    
    Check: CKV_AWS_145: "Ensure that S3 buckets are encrypted with KMS by default"
    	FAILED for resource: module.s3_flow_logs.aws_s3_bucket.s3_bucket[0]
    	File: /aws/modules/s3/s3_bucket.tf:4-26
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-s3-buckets-are-encrypted-with-kms-by-default.html
    
    		4  | resource "aws_s3_bucket" "s3_bucket" {
    		5  |   count = var.enable_s3_bucket ? 1 : 0
    		6  | 
    		7  |   bucket        = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : null
    		8  |   bucket_prefix = var.s3_bucket_prefix != null && var.s3_bucket_name == null ? lower(var.s3_bucket_prefix) : null
    		9  | 
    		10 |   force_destroy       = var.s3_bucket_force_destroy
    		11 |   object_lock_enabled = var.s3_bucket_object_lock_enabled
    		12 | 
    		13 |   tags = merge(
    		14 |     {
    		15 |       Name = var.s3_bucket_name != null && var.s3_bucket_prefix == null ? lower(var.s3_bucket_name) : lower(var.s3_bucket_prefix)
    		16 |     },
    		17 |     var.tags
    		18 |   )
    		19 | 
    		20 |   lifecycle {
    		21 |     create_before_destroy = true
    		22 |     ignore_changes        = []
    		23 |   }
    		24 | 
    		25 |   depends_on = []
    		26 | }
    
    Check: CKV2_AWS_45: "Ensure AWS Config recorder is enabled to record all supported resources"
    	FAILED for resource: module.config.aws_config_configuration_recorder_status.config_configuration_recorder_status[0]
    	File: /aws/modules/config/config_configuration_recorder_status.tf:4-18
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-aws-config-recorder-is-enabled-to-record-all-supported-resources.html
    
    		4  | resource "aws_config_configuration_recorder_status" "config_configuration_recorder_status" {
    		5  |   count = var.enable_config_configuration_recorder_status ? 1 : 0
    		6  | 
    		7  |   name       = var.config_configuration_recorder_status_name != "" && !var.enable_config_configuration_recorder ? var.config_configuration_recorder_status_name : element(concat(aws_config_configuration_recorder.config_configuration_recorder.*.name, [""]), 0)
    		8  |   is_enabled = var.config_configuration_recorder_status_is_enabled
    		9  | 
    		10 |   lifecycle {
    		11 |     create_before_destroy = true
    		12 |     ignore_changes        = []
    		13 |   }
    		14 | 
    		15 |   depends_on = [
    		16 |     aws_config_configuration_recorder.config_configuration_recorder
    		17 |   ]
    		18 | }
    
    Check: CKV2_AWS_5: "Ensure that Security Groups are attached to another resource"
    	FAILED for resource: module.sg.aws_security_group.security_group[0]
    	File: /aws/modules/sg/security_group.tf:4-73
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-that-security-groups-are-attached-to-ec2-instances-or-elastic-network-interfaces-enis.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV2_AWS_5: "Ensure that Security Groups are attached to another resource"
    	FAILED for resource: module.sg_allow_all.aws_security_group.security_group[0]
    	File: /aws/modules/sg/security_group.tf:4-73
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-that-security-groups-are-attached-to-ec2-instances-or-elastic-network-interfaces-enis.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV2_AWS_5: "Ensure that Security Groups are attached to another resource"
    	FAILED for resource: module.sg_default.aws_security_group.security_group
    	File: /aws/modules/sg/security_group.tf:4-73
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-that-security-groups-are-attached-to-ec2-instances-or-elastic-network-interfaces-enis.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV2_AWS_10: "Ensure CloudTrail trails are integrated with CloudWatch Logs"
    	FAILED for resource: module.cloudtrail.aws_cloudtrail.cloudtrail[0]
    	File: /aws/modules/cloudtrail/cloudtrail.tf:4-56
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-cloudtrail-trails-are-integrated-with-cloudwatch-logs.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV2_AWS_10: "Ensure CloudTrail trails are integrated with CloudWatch Logs"
    	FAILED for resource: module.cloudtrail_event_selector_lambda.aws_cloudtrail.cloudtrail[0]
    	File: /aws/modules/cloudtrail/cloudtrail.tf:4-56
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-cloudtrail-trails-are-integrated-with-cloudwatch-logs.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV2_AWS_10: "Ensure CloudTrail trails are integrated with CloudWatch Logs"
    	FAILED for resource: module.cloudtrail_event_selector_s3.aws_cloudtrail.cloudtrail[0]
    	File: /aws/modules/cloudtrail/cloudtrail.tf:4-56
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-cloudtrail-trails-are-integrated-with-cloudwatch-logs.html
    
    		Code lines for this resource are too many. Please use IDE of your choice to review the file.
    Check: CKV2_AWS_21: "Ensure that all IAM users are members of at least one IAM group."
    	FAILED for resource: module.iam_group.aws_iam_group_membership.iam_group_membership[0]
    	File: /aws/modules/iam_group/iam_group_membership.tf:4-20
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-that-all-iam-users-are-members-of-at-least-one-iam-group.html
    
    		4  | resource "aws_iam_group_membership" "iam_group_membership" {
    		5  |   count = var.enable_iam_group_membership ? 1 : 0
    		6  | 
    		7  |   name = var.iam_group_membership_name != "" ? var.iam_group_membership_name : "${lower(var.name)}-group-membership-${lower(var.environment)}"
    		8  | 
    		9  |   users = var.iam_group_membership_users
    		10 |   group = var.iam_group_membership_group != "" && !var.enable_iam_group ? var.iam_group_membership_group : element(concat(aws_iam_group.iam_group.*.name, [""]), 0)
    		11 | 
    		12 |   lifecycle {
    		13 |     create_before_destroy = true
    		14 |     ignore_changes        = []
    		15 |   }
    		16 | 
    		17 |   depends_on = [
    		18 |     aws_iam_group.iam_group
    		19 |   ]
    		20 | }
    
    Check: CKV2_AWS_38: "Ensure Domain Name System Security Extensions (DNSSEC) signing is enabled for Amazon Route 53 public hosted zones"
    	FAILED for resource: module.route53.aws_route53_zone.route53_zone[0]
    	File: /aws/modules/route53/route53_zone.tf:4-36
    
    		4  | resource "aws_route53_zone" "route53_zone" {
    		5  |   count = var.enable_route53_zone ? 1 : 0
    		6  | 
    		7  |   name = var.route53_zone_name != "" ? lower(var.route53_zone_name) : "${lower(var.name)}-route53-zone-${lower(var.environment)}"
    		8  | 
    		9  |   comment           = var.route53_zone_comment
    		10 |   force_destroy     = var.route53_zone_force_destroy
    		11 |   delegation_set_id = var.route53_zone_delegation_set_id
    		12 | 
    		13 |   dynamic "vpc" {
    		14 |     iterator = vpc
    		15 |     for_each = var.route53_zone_vpc
    		16 | 
    		17 |     content {
    		18 |       vpc_id     = lookup(vpc.value, "vpc_id", null)
    		19 |       vpc_region = lookup(vpc.value, "vpc_region", null)
    		20 |     }
    		21 |   }
    		22 | 
    		23 |   tags = merge(
    		24 |     {
    		25 |       Name = var.route53_zone_name != "" ? lower(var.route53_zone_name) : "${lower(var.name)}-route53-zone-${lower(var.environment)}"
    		26 |     },
    		27 |     var.tags
    		28 |   )
    		29 | 
    		30 |   lifecycle {
    		31 |     create_before_destroy = true
    		32 |     ignore_changes        = []
    		33 |   }
    		34 | 
    		35 |   depends_on = []
    		36 | }
    
    Check: CKV2_AWS_38: "Ensure Domain Name System Security Extensions (DNSSEC) signing is enabled for Amazon Route 53 public hosted zones"
    	FAILED for resource: module.route53_cname.aws_route53_zone.route53_zone
    	File: /aws/modules/route53/route53_zone.tf:4-36
    
    		4  | resource "aws_route53_zone" "route53_zone" {
    		5  |   count = var.enable_route53_zone ? 1 : 0
    		6  | 
    		7  |   name = var.route53_zone_name != "" ? lower(var.route53_zone_name) : "${lower(var.name)}-route53-zone-${lower(var.environment)}"
    		8  | 
    		9  |   comment           = var.route53_zone_comment
    		10 |   force_destroy     = var.route53_zone_force_destroy
    		11 |   delegation_set_id = var.route53_zone_delegation_set_id
    		12 | 
    		13 |   dynamic "vpc" {
    		14 |     iterator = vpc
    		15 |     for_each = var.route53_zone_vpc
    		16 | 
    		17 |     content {
    		18 |       vpc_id     = lookup(vpc.value, "vpc_id", null)
    		19 |       vpc_region = lookup(vpc.value, "vpc_region", null)
    		20 |     }
    		21 |   }
    		22 | 
    		23 |   tags = merge(
    		24 |     {
    		25 |       Name = var.route53_zone_name != "" ? lower(var.route53_zone_name) : "${lower(var.name)}-route53-zone-${lower(var.environment)}"
    		26 |     },
    		27 |     var.tags
    		28 |   )
    		29 | 
    		30 |   lifecycle {
    		31 |     create_before_destroy = true
    		32 |     ignore_changes        = []
    		33 |   }
    		34 | 
    		35 |   depends_on = []
    		36 | }
    
    Check: CKV2_AWS_15: "Ensure that auto Scaling groups that are associated with a load balancer, are using Elastic Load Balancing health checks."
    	FAILED for resource: module.lt.aws_autoscaling_attachment.asg_attachment
    	File: /aws/modules/asg/autoscaling_attachment.tf:4-20
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-that-auto-scaling-groups-that-are-associated-with-a-load-balancer-are-using-elastic-load-balancing-health-checks.html
    
    		4  | resource "aws_autoscaling_attachment" "asg_attachment" {
    		5  |   count = var.enable_autoscaling_attachment ? 1 : 0
    		6  | 
    		7  |   autoscaling_group_name = var.autoscaling_group_name != "" ? var.autoscaling_group_name : (var.enable_asg ? element(concat(aws_autoscaling_group.asg.*.name, [""]), 0) : null)
    		8  | 
    		9  |   elb                 = upper(var.load_balancer_type) == "ELB" ? var.load_balancers : null
    		10 |   lb_target_group_arn = upper(var.load_balancer_type) == "ALB" ? var.lb_target_group_arn : null
    		11 | 
    		12 |   lifecycle {
    		13 |     create_before_destroy = true
    		14 |     ignore_changes        = []
    		15 |   }
    		16 | 
    		17 |   depends_on = [
    		18 |     aws_autoscaling_group.asg
    		19 |   ]
    		20 | }
    
    Check: CKV2_AWS_15: "Ensure that auto Scaling groups that are associated with a load balancer, are using Elastic Load Balancing health checks."
    	FAILED for resource: module.asg.aws_autoscaling_attachment.asg_attachment
    	File: /aws/modules/asg/autoscaling_attachment.tf:4-20
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-that-auto-scaling-groups-that-are-associated-with-a-load-balancer-are-using-elastic-load-balancing-health-checks.html
    
    		4  | resource "aws_autoscaling_attachment" "asg_attachment" {
    		5  |   count = var.enable_autoscaling_attachment ? 1 : 0
    		6  | 
    		7  |   autoscaling_group_name = var.autoscaling_group_name != "" ? var.autoscaling_group_name : (var.enable_asg ? element(concat(aws_autoscaling_group.asg.*.name, [""]), 0) : null)
    		8  | 
    		9  |   elb                 = upper(var.load_balancer_type) == "ELB" ? var.load_balancers : null
    		10 |   lb_target_group_arn = upper(var.load_balancer_type) == "ALB" ? var.lb_target_group_arn : null
    		11 | 
    		12 |   lifecycle {
    		13 |     create_before_destroy = true
    		14 |     ignore_changes        = []
    		15 |   }
    		16 | 
    		17 |   depends_on = [
    		18 |     aws_autoscaling_group.asg
    		19 |   ]
    		20 | }
    
    terraform_plan scan results:
    
    Passed checks: 0, Failed checks: 0, Skipped checks: 0, Parsing errors: 1
    
    secrets scan results:
    
    Passed checks: 0, Failed checks: 10, Skipped checks: 0
    
    Check: CKV_SECRET_6: "Base64 High Entropy String"
    	FAILED for resource: 51ab909f465edf3e75934709d2a079474400158e
    	File: /aws/examples/directory_service/main.tf:19-20
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/secrets-policies/secrets-policy-index/git-secrets-6.html
    
    		19 |   directory_service_directory_password = "Supe***************"
    
    Check: CKV_SECRET_6: "Base64 High Entropy String"
    	FAILED for resource: b34331b28704ce3ef0b0c4fb9737a75d54238198
    	File: /aws/examples/kms/main.tf:76-77
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/secrets-policies/secrets-policy-index/git-secrets-6.html
    
    		76 |   "client_secret": "828957**********************************"
    
    Check: CKV_SECRET_6: "Base64 High Entropy String"
    	FAILED for resource: b7515061d61310889975bc0725b5f3f8fcb5c44e
    	File: /aws/examples/mq/main.tf:51-52
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/secrets-policies/secrets-policy-index/git-secrets-6.html
    
    		51 |       password       = "mq_*********"
    
    Check: CKV_SECRET_6: "Base64 High Entropy String"
    	FAILED for resource: 25bf56df1d538fe347ce4926e3b341a49d9e722f
    	File: /aws/examples/rds/main.tf:113-114
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/secrets-policies/secrets-policy-index/git-secrets-6.html
    
    		113 |   db_instance_db_password = "ImP***********"
    
    Check: CKV_SECRET_6: "Base64 High Entropy String"
    	FAILED for resource: 6bb92e6cdc2b24e9e9dc3d2511cf957f5c1ae51d
    	File: /cloudflare/examples/cloudflare_record/main.tf:10-11
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/secrets-policies/secrets-policy-index/git-secrets-6.html
    
    		10 |   api_key = "api*********"
    
    Check: CKV_SECRET_6: "Base64 High Entropy String"
    	FAILED for resource: 4ffcab4dbf3fa2f00801de9eda7304403830d523
    	File: /heroku/examples/heroku_config/main.tf:44-45
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/secrets-policies/secrets-policy-index/git-secrets-6.html
    
    		44 |     PRIVATE_KEY = "some************"
    
    Check: CKV_SECRET_14: "Slack Token"
    	FAILED for resource: fb2784769fce62c7e34b215825277434456b237c
    	File: /newrelic/examples/newrelic_alert/main.tf:38-39
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/secrets-policies/secrets-policy-index/git-secrets-14.html
    
    		38 |   alert_channel_slack_configuration_url     = "https:**************************************************************************"
    
    Check: CKV_SECRET_14: "Slack Token"
    	FAILED for resource: fb2784769fce62c7e34b215825277434456b237c
    	File: /newrelic/examples/newrelic_infra/main.tf:26-27
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/secrets-policies/secrets-policy-index/git-secrets-14.html
    
    		26 |   #alert_channel_slack_configuration_url               = "https:**************************************************************************"
    
    Check: CKV_SECRET_6: "Base64 High Entropy String"
    	FAILED for resource: 88d5f0d556ec8a3f863c0d8ea710db73bc0731f3
    	File: /null_resource/examples/null_resource/main.tf:27-28
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/secrets-policies/secrets-policy-index/git-secrets-6.html
    
    		27 |   # provisioner_file_connection_password       = "pas**********"
    
    Check: CKV_SECRET_6: "Base64 High Entropy String"
    	FAILED for resource: 156283b3938f846e25c7f346d54dea21a7ee6d5b
    	File: /vault/examples/vault_token/main.tf:49-50
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/secrets-policies/secrets-policy-index/git-secrets-6.html
    
    		49 |   token_auth_backend_role_path_suffix            = "pa*********"
    
    github_actions scan results:
    
    Passed checks: 14, Failed checks: 1, Skipped checks: 0
    
    Check: CKV2_GHA_1: "Ensure top-level permissions are not set to write-all"
    	FAILED for resource: on(terraform-lint)
    	File: /.github/workflows/terraform-lint.yaml:0-1
    
    
                    
                  

    Linting

    This repository failed the Experience Builder Terraform Module's Linting validation. This means that a linting tool was not found to be implemented in any of the CICD tool configuration files in the repository.

    There is an opportunity to: