Experience Builder


Terraform

< Back

Repository
stacksimplify / hashicorp-certified-terraform-associate
Description

Hashicorp Certified Terraform Associate

Stars

 457

Failed Checks
  •  Security Scanning
     Linting

  • Scan Date

    2023-10-30 17:57:40

    Security Scanning

    This repository failed the Experience Builder Terraform Module's Security Scanning validation. This means that a security scanning tool was not found to be implemented in any of the CICD tool configuration files in the repository.

    There is an opportunity to:

    Checkov Output
                    
                      2023-10-05 14:47:50,965 [MainThread  ] [WARNI]  Failed to download module app.terraform.io/hcta-demo1/s3-website/aws:1.0.1 (for external modules, the --download-external-modules flag is required)
    2023-10-05 14:47:50,965 [MainThread  ] [WARNI]  Failed to download module terraform-aws-modules/ec2-instance/aws:~>2.0 (for external modules, the --download-external-modules flag is required)
    terraform scan results:
    
    Passed checks: 965, Failed checks: 773, Skipped checks: 0
    
    Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances"
    	FAILED for resource: aws_instance.ec2demo
    	File: /02-Terraform-Basics/02-02-Terraform-Command-Basics/terraform-manifests/ec2-instance.tf:18-21
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html
    
    		18 | resource "aws_instance" "ec2demo" {
    		19 |   ami           = "ami-0be2609ba883822ec" # Amazon Linux in us-east-1, update as per your region
    		20 |   instance_type = "t2.micro"
    		21 | }
    
    Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted"
    	FAILED for resource: aws_instance.ec2demo
    	File: /02-Terraform-Basics/02-02-Terraform-Command-Basics/terraform-manifests/ec2-instance.tf:18-21
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html
    
    		18 | resource "aws_instance" "ec2demo" {
    		19 |   ami           = "ami-0be2609ba883822ec" # Amazon Linux in us-east-1, update as per your region
    		20 |   instance_type = "t2.micro"
    		21 | }
    
    Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled"
    	FAILED for resource: aws_instance.ec2demo
    	File: /02-Terraform-Basics/02-02-Terraform-Command-Basics/terraform-manifests/ec2-instance.tf:18-21
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html
    
    		18 | resource "aws_instance" "ec2demo" {
    		19 |   ami           = "ami-0be2609ba883822ec" # Amazon Linux in us-east-1, update as per your region
    		20 |   instance_type = "t2.micro"
    		21 | }
    
    Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized"
    	FAILED for resource: aws_instance.ec2demo
    	File: /02-Terraform-Basics/02-02-Terraform-Command-Basics/terraform-manifests/ec2-instance.tf:18-21
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html
    
    		18 | resource "aws_instance" "ec2demo" {
    		19 |   ami           = "ami-0be2609ba883822ec" # Amazon Linux in us-east-1, update as per your region
    		20 |   instance_type = "t2.micro"
    		21 | }
    
    Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances"
    	FAILED for resource: aws_instance.ec2demo
    	File: /02-Terraform-Basics/02-03-Terraform-Language-Syntax/terraform-manifests/top-level-blocks-samples.tf:29-32
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html
    
    		29 | resource "aws_instance" "ec2demo" {
    		30 |   ami           = "ami-04d29b6f966df1537" # Amazon Linux
    		31 |   instance_type = var.instance_type
    		32 | }
    
    Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted"
    	FAILED for resource: aws_instance.ec2demo
    	File: /02-Terraform-Basics/02-03-Terraform-Language-Syntax/terraform-manifests/top-level-blocks-samples.tf:29-32
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html
    
    		29 | resource "aws_instance" "ec2demo" {
    		30 |   ami           = "ami-04d29b6f966df1537" # Amazon Linux
    		31 |   instance_type = var.instance_type
    		32 | }
    
    Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled"
    	FAILED for resource: aws_instance.ec2demo
    	File: /02-Terraform-Basics/02-03-Terraform-Language-Syntax/terraform-manifests/top-level-blocks-samples.tf:29-32
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html
    
    		29 | resource "aws_instance" "ec2demo" {
    		30 |   ami           = "ami-04d29b6f966df1537" # Amazon Linux
    		31 |   instance_type = var.instance_type
    		32 | }
    
    Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized"
    	FAILED for resource: aws_instance.ec2demo
    	File: /02-Terraform-Basics/02-03-Terraform-Language-Syntax/terraform-manifests/top-level-blocks-samples.tf:29-32
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html
    
    		29 | resource "aws_instance" "ec2demo" {
    		30 |   ami           = "ami-04d29b6f966df1537" # Amazon Linux
    		31 |   instance_type = var.instance_type
    		32 | }
    
    Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances"
    	FAILED for resource: aws_instance.my-ec2-vm
    	File: /04-Terraform-Resources/04-01-Resource-Syntax-and-Behavior/terraform-manifests-oldv1/c2-ec2-instance.tf:4-13
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html
    
    		4  | resource "aws_instance" "my-ec2-vm" {
    		5  |   ami               = "ami-047a51fa27710816e"
    		6  |   instance_type     = "t2.micro"
    		7  |   availability_zone = "us-east-1a"
    		8  |   #availability_zone = "us-east-1b"
    		9  |   tags = {
    		10 |     "Name" = "web"
    		11 |     #"tag1" = "Update-test-1"    
    		12 |   }
    		13 | }
    
    Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted"
    	FAILED for resource: aws_instance.my-ec2-vm
    	File: /04-Terraform-Resources/04-01-Resource-Syntax-and-Behavior/terraform-manifests-oldv1/c2-ec2-instance.tf:4-13
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html
    
    		4  | resource "aws_instance" "my-ec2-vm" {
    		5  |   ami               = "ami-047a51fa27710816e"
    		6  |   instance_type     = "t2.micro"
    		7  |   availability_zone = "us-east-1a"
    		8  |   #availability_zone = "us-east-1b"
    		9  |   tags = {
    		10 |     "Name" = "web"
    		11 |     #"tag1" = "Update-test-1"    
    		12 |   }
    		13 | }
    
    Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled"
    	FAILED for resource: aws_instance.my-ec2-vm
    	File: /04-Terraform-Resources/04-01-Resource-Syntax-and-Behavior/terraform-manifests-oldv1/c2-ec2-instance.tf:4-13
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html
    
    		4  | resource "aws_instance" "my-ec2-vm" {
    		5  |   ami               = "ami-047a51fa27710816e"
    		6  |   instance_type     = "t2.micro"
    		7  |   availability_zone = "us-east-1a"
    		8  |   #availability_zone = "us-east-1b"
    		9  |   tags = {
    		10 |     "Name" = "web"
    		11 |     #"tag1" = "Update-test-1"    
    		12 |   }
    		13 | }
    
    Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized"
    	FAILED for resource: aws_instance.my-ec2-vm
    	File: /04-Terraform-Resources/04-01-Resource-Syntax-and-Behavior/terraform-manifests-oldv1/c2-ec2-instance.tf:4-13
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html
    
    		4  | resource "aws_instance" "my-ec2-vm" {
    		5  |   ami               = "ami-047a51fa27710816e"
    		6  |   instance_type     = "t2.micro"
    		7  |   availability_zone = "us-east-1a"
    		8  |   #availability_zone = "us-east-1b"
    		9  |   tags = {
    		10 |     "Name" = "web"
    		11 |     #"tag1" = "Update-test-1"    
    		12 |   }
    		13 | }
    
    Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances"
    	FAILED for resource: aws_instance.my-ec2-vm
    	File: /04-Terraform-Resources/04-01-Resource-Syntax-and-Behavior/terraform-manifests/c2-ec2-instance.tf:4-13
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html
    
    		4  | resource "aws_instance" "my-ec2-vm" {
    		5  |   ami               = "ami-047a51fa27710816e"
    		6  |   instance_type     = "t2.micro"
    		7  |   availability_zone = "us-east-1a"
    		8  |   #availability_zone = "us-east-1b"
    		9  |   tags = {
    		10 |     "Name" = "web"
    		11 |     #"tag1" = "Update-test-1"    
    		12 |   }
    		13 | }
    
    Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted"
    	FAILED for resource: aws_instance.my-ec2-vm
    	File: /04-Terraform-Resources/04-01-Resource-Syntax-and-Behavior/terraform-manifests/c2-ec2-instance.tf:4-13
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html
    
    		4  | resource "aws_instance" "my-ec2-vm" {
    		5  |   ami               = "ami-047a51fa27710816e"
    		6  |   instance_type     = "t2.micro"
    		7  |   availability_zone = "us-east-1a"
    		8  |   #availability_zone = "us-east-1b"
    		9  |   tags = {
    		10 |     "Name" = "web"
    		11 |     #"tag1" = "Update-test-1"    
    		12 |   }
    		13 | }
    
    Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled"
    	FAILED for resource: aws_instance.my-ec2-vm
    	File: /04-Terraform-Resources/04-01-Resource-Syntax-and-Behavior/terraform-manifests/c2-ec2-instance.tf:4-13
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html
    
    		4  | resource "aws_instance" "my-ec2-vm" {
    		5  |   ami               = "ami-047a51fa27710816e"
    		6  |   instance_type     = "t2.micro"
    		7  |   availability_zone = "us-east-1a"
    		8  |   #availability_zone = "us-east-1b"
    		9  |   tags = {
    		10 |     "Name" = "web"
    		11 |     #"tag1" = "Update-test-1"    
    		12 |   }
    		13 | }
    
    Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized"
    	FAILED for resource: aws_instance.my-ec2-vm
    	File: /04-Terraform-Resources/04-01-Resource-Syntax-and-Behavior/terraform-manifests/c2-ec2-instance.tf:4-13
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html
    
    		4  | resource "aws_instance" "my-ec2-vm" {
    		5  |   ami               = "ami-047a51fa27710816e"
    		6  |   instance_type     = "t2.micro"
    		7  |   availability_zone = "us-east-1a"
    		8  |   #availability_zone = "us-east-1b"
    		9  |   tags = {
    		10 |     "Name" = "web"
    		11 |     #"tag1" = "Update-test-1"    
    		12 |   }
    		13 | }
    
    Check: CKV_AWS_130: "Ensure VPC subnets do not assign public IP by default"
    	FAILED for resource: aws_subnet.vpc-dev-public-subnet-1
    	File: /04-Terraform-Resources/04-02-Meta-Argument-depends_on/terraform-manifests-oldv1/c2-vpc.tf:11-16
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-vpc-subnets-do-not-assign-public-ip-by-default.html
    
    		11 | resource "aws_subnet" "vpc-dev-public-subnet-1" {
    		12 |   vpc_id                  = aws_vpc.vpc-dev.id
    		13 |   cidr_block              = "10.0.1.0/24"
    		14 |   availability_zone       = "us-east-1a"
    		15 |   map_public_ip_on_launch = true
    		16 | }
    
    Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80"
    	FAILED for resource: aws_security_group.dev-vpc-sg
    	File: /04-Terraform-Resources/04-02-Meta-Argument-depends_on/terraform-manifests-oldv1/c2-vpc.tf:42-70
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80.html
    
    		42 | resource "aws_security_group" "dev-vpc-sg" {
    		43 |   name        = "dev-vpc-default-sg"
    		44 |   description = "Dev VPC Default Security Group"
    		45 |   vpc_id      = aws_vpc.vpc-dev.id
    		46 | 
    		47 |   ingress {
    		48 |     description = "Allow Port 22"
    		49 |     from_port   = 22
    		50 |     to_port     = 22
    		51 |     protocol    = "tcp"
    		52 |     cidr_blocks = ["0.0.0.0/0"]
    		53 |   }
    		54 | 
    		55 |   ingress {
    		56 |     description = "Allow Port 80"
    		57 |     from_port   = 80
    		58 |     to_port     = 80
    		59 |     protocol    = "tcp"
    		60 |     cidr_blocks = ["0.0.0.0/0"]
    		61 |   }
    		62 | 
    		63 |   egress {
    		64 |     description = "Allow all IP and Ports Outbound"
    		65 |     from_port   = 0
    		66 |     to_port     = 0
    		67 |     protocol    = "-1"
    		68 |     cidr_blocks = ["0.0.0.0/0"]
    		69 |   }
    		70 | }
    
    Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22"
    	FAILED for resource: aws_security_group.dev-vpc-sg
    	File: /04-Terraform-Resources/04-02-Meta-Argument-depends_on/terraform-manifests-oldv1/c2-vpc.tf:42-70
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-1-port-security.html
    
    		42 | resource "aws_security_group" "dev-vpc-sg" {
    		43 |   name        = "dev-vpc-default-sg"
    		44 |   description = "Dev VPC Default Security Group"
    		45 |   vpc_id      = aws_vpc.vpc-dev.id
    		46 | 
    		47 |   ingress {
    		48 |     description = "Allow Port 22"
    		49 |     from_port   = 22
    		50 |     to_port     = 22
    		51 |     protocol    = "tcp"
    		52 |     cidr_blocks = ["0.0.0.0/0"]
    		53 |   }
    		54 | 
    		55 |   ingress {
    		56 |     description = "Allow Port 80"
    		57 |     from_port   = 80
    		58 |     to_port     = 80
    		59 |     protocol    = "tcp"
    		60 |     cidr_blocks = ["0.0.0.0/0"]
    		61 |   }
    		62 | 
    		63 |   egress {
    		64 |     description = "Allow all IP and Ports Outbound"
    		65 |     from_port   = 0
    		66 |     to_port     = 0
    		67 |     protocol    = "-1"
    		68 |     cidr_blocks = ["0.0.0.0/0"]
    		69 |   }
    		70 | }
    
    Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances"
    	FAILED for resource: aws_instance.my-ec2-vm
    	File: /04-Terraform-Resources/04-02-Meta-Argument-depends_on/terraform-manifests-oldv1/c3-ec2-instance.tf:2-20
    	Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html
    
    		2  | resource "aws_instance" "my-ec2-vm" {
    		3  |   ami                    = "ami-047a51fa27710816e" # Amazon Linux
    		4  |   instance_type          = "t2.micro"
    		5  |   key_name               = "terraform-key"
    		6  |   subnet_id              = aws_subnet.vpc-dev-public-subnet-1.id
    		7  |   vpc_security_group_ids = [aws_security_group.dev-vpc-sg.id]
    		8  |   #user_data = file("apache-install.sh")
    		9  |   user_data = <<-EOF
    		10 |     #!/bin/bash
    		11 |     sudo yum update -y
    		12 |     sudo yum install httpd -y
    		13 |     sudo systemctl enable httpd
    		14 |     sudo systemctl start httpd
    		15 |     echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 16 | EOF 17 | tags = { 18 | "Name" = "myec2vm" 19 | } 20 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.my-ec2-vm File: /04-Terraform-Resources/04-02-Meta-Argument-depends_on/terraform-manifests-oldv1/c3-ec2-instance.tf:2-20 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | key_name = "terraform-key" 6 | subnet_id = aws_subnet.vpc-dev-public-subnet-1.id 7 | vpc_security_group_ids = [aws_security_group.dev-vpc-sg.id] 8 | #user_data = file("apache-install.sh") 9 | user_data = <<-EOF 10 | #!/bin/bash 11 | sudo yum update -y 12 | sudo yum install httpd -y 13 | sudo systemctl enable httpd 14 | sudo systemctl start httpd 15 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 16 | EOF 17 | tags = { 18 | "Name" = "myec2vm" 19 | } 20 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.my-ec2-vm File: /04-Terraform-Resources/04-02-Meta-Argument-depends_on/terraform-manifests-oldv1/c3-ec2-instance.tf:2-20 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | key_name = "terraform-key" 6 | subnet_id = aws_subnet.vpc-dev-public-subnet-1.id 7 | vpc_security_group_ids = [aws_security_group.dev-vpc-sg.id] 8 | #user_data = file("apache-install.sh") 9 | user_data = <<-EOF 10 | #!/bin/bash 11 | sudo yum update -y 12 | sudo yum install httpd -y 13 | sudo systemctl enable httpd 14 | sudo systemctl start httpd 15 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 16 | EOF 17 | tags = { 18 | "Name" = "myec2vm" 19 | } 20 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.my-ec2-vm File: /04-Terraform-Resources/04-02-Meta-Argument-depends_on/terraform-manifests-oldv1/c3-ec2-instance.tf:2-20 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | key_name = "terraform-key" 6 | subnet_id = aws_subnet.vpc-dev-public-subnet-1.id 7 | vpc_security_group_ids = [aws_security_group.dev-vpc-sg.id] 8 | #user_data = file("apache-install.sh") 9 | user_data = <<-EOF 10 | #!/bin/bash 11 | sudo yum update -y 12 | sudo yum install httpd -y 13 | sudo systemctl enable httpd 14 | sudo systemctl start httpd 15 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 16 | EOF 17 | tags = { 18 | "Name" = "myec2vm" 19 | } 20 | } Check: CKV_AWS_130: "Ensure VPC subnets do not assign public IP by default" FAILED for resource: aws_subnet.vpc-dev-public-subnet-1 File: /04-Terraform-Resources/04-02-Meta-Argument-depends_on/terraform-manifests/c2-vpc.tf:11-16 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-vpc-subnets-do-not-assign-public-ip-by-default.html 11 | resource "aws_subnet" "vpc-dev-public-subnet-1" { 12 | vpc_id = aws_vpc.vpc-dev.id 13 | cidr_block = "10.0.1.0/24" 14 | availability_zone = "us-east-1a" 15 | map_public_ip_on_launch = true 16 | } Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80" FAILED for resource: aws_security_group.dev-vpc-sg File: /04-Terraform-Resources/04-02-Meta-Argument-depends_on/terraform-manifests/c2-vpc.tf:42-70 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80.html 42 | resource "aws_security_group" "dev-vpc-sg" { 43 | name = "dev-vpc-default-sg" 44 | description = "Dev VPC Default Security Group" 45 | vpc_id = aws_vpc.vpc-dev.id 46 | 47 | ingress { 48 | description = "Allow Port 22" 49 | from_port = 22 50 | to_port = 22 51 | protocol = "tcp" 52 | cidr_blocks = ["0.0.0.0/0"] 53 | } 54 | 55 | ingress { 56 | description = "Allow Port 80" 57 | from_port = 80 58 | to_port = 80 59 | protocol = "tcp" 60 | cidr_blocks = ["0.0.0.0/0"] 61 | } 62 | 63 | egress { 64 | description = "Allow all IP and Ports Outbound" 65 | from_port = 0 66 | to_port = 0 67 | protocol = "-1" 68 | cidr_blocks = ["0.0.0.0/0"] 69 | } 70 | } Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22" FAILED for resource: aws_security_group.dev-vpc-sg File: /04-Terraform-Resources/04-02-Meta-Argument-depends_on/terraform-manifests/c2-vpc.tf:42-70 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-1-port-security.html 42 | resource "aws_security_group" "dev-vpc-sg" { 43 | name = "dev-vpc-default-sg" 44 | description = "Dev VPC Default Security Group" 45 | vpc_id = aws_vpc.vpc-dev.id 46 | 47 | ingress { 48 | description = "Allow Port 22" 49 | from_port = 22 50 | to_port = 22 51 | protocol = "tcp" 52 | cidr_blocks = ["0.0.0.0/0"] 53 | } 54 | 55 | ingress { 56 | description = "Allow Port 80" 57 | from_port = 80 58 | to_port = 80 59 | protocol = "tcp" 60 | cidr_blocks = ["0.0.0.0/0"] 61 | } 62 | 63 | egress { 64 | description = "Allow all IP and Ports Outbound" 65 | from_port = 0 66 | to_port = 0 67 | protocol = "-1" 68 | cidr_blocks = ["0.0.0.0/0"] 69 | } 70 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.my-ec2-vm File: /04-Terraform-Resources/04-02-Meta-Argument-depends_on/terraform-manifests/c3-ec2-instance.tf:2-20 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | key_name = "terraform-key" 6 | subnet_id = aws_subnet.vpc-dev-public-subnet-1.id 7 | vpc_security_group_ids = [aws_security_group.dev-vpc-sg.id] 8 | #user_data = file("apache-install.sh") 9 | user_data = <<-EOF 10 | #!/bin/bash 11 | sudo yum update -y 12 | sudo yum install httpd -y 13 | sudo systemctl enable httpd 14 | sudo systemctl start httpd 15 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 16 | EOF 17 | tags = { 18 | "Name" = "myec2vm" 19 | } 20 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.my-ec2-vm File: /04-Terraform-Resources/04-02-Meta-Argument-depends_on/terraform-manifests/c3-ec2-instance.tf:2-20 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | key_name = "terraform-key" 6 | subnet_id = aws_subnet.vpc-dev-public-subnet-1.id 7 | vpc_security_group_ids = [aws_security_group.dev-vpc-sg.id] 8 | #user_data = file("apache-install.sh") 9 | user_data = <<-EOF 10 | #!/bin/bash 11 | sudo yum update -y 12 | sudo yum install httpd -y 13 | sudo systemctl enable httpd 14 | sudo systemctl start httpd 15 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 16 | EOF 17 | tags = { 18 | "Name" = "myec2vm" 19 | } 20 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.my-ec2-vm File: /04-Terraform-Resources/04-02-Meta-Argument-depends_on/terraform-manifests/c3-ec2-instance.tf:2-20 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | key_name = "terraform-key" 6 | subnet_id = aws_subnet.vpc-dev-public-subnet-1.id 7 | vpc_security_group_ids = [aws_security_group.dev-vpc-sg.id] 8 | #user_data = file("apache-install.sh") 9 | user_data = <<-EOF 10 | #!/bin/bash 11 | sudo yum update -y 12 | sudo yum install httpd -y 13 | sudo systemctl enable httpd 14 | sudo systemctl start httpd 15 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 16 | EOF 17 | tags = { 18 | "Name" = "myec2vm" 19 | } 20 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.my-ec2-vm File: /04-Terraform-Resources/04-02-Meta-Argument-depends_on/terraform-manifests/c3-ec2-instance.tf:2-20 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | key_name = "terraform-key" 6 | subnet_id = aws_subnet.vpc-dev-public-subnet-1.id 7 | vpc_security_group_ids = [aws_security_group.dev-vpc-sg.id] 8 | #user_data = file("apache-install.sh") 9 | user_data = <<-EOF 10 | #!/bin/bash 11 | sudo yum update -y 12 | sudo yum install httpd -y 13 | sudo systemctl enable httpd 14 | sudo systemctl start httpd 15 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 16 | EOF 17 | tags = { 18 | "Name" = "myec2vm" 19 | } 20 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.web[0] File: /04-Terraform-Resources/04-03-Meta-Argument-count/terraform-manifests-oldv1/c2-ec2-instance.tf:2-10 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | count = 5 6 | tags = { 7 | "Name" = "web" 8 | #"Name" = "web-${count.index}" 9 | } 10 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.web[0] File: /04-Terraform-Resources/04-03-Meta-Argument-count/terraform-manifests-oldv1/c2-ec2-instance.tf:2-10 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | count = 5 6 | tags = { 7 | "Name" = "web" 8 | #"Name" = "web-${count.index}" 9 | } 10 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.web[0] File: /04-Terraform-Resources/04-03-Meta-Argument-count/terraform-manifests-oldv1/c2-ec2-instance.tf:2-10 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | count = 5 6 | tags = { 7 | "Name" = "web" 8 | #"Name" = "web-${count.index}" 9 | } 10 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.web[0] File: /04-Terraform-Resources/04-03-Meta-Argument-count/terraform-manifests-oldv1/c2-ec2-instance.tf:2-10 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | count = 5 6 | tags = { 7 | "Name" = "web" 8 | #"Name" = "web-${count.index}" 9 | } 10 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.web[1] File: /04-Terraform-Resources/04-03-Meta-Argument-count/terraform-manifests-oldv1/c2-ec2-instance.tf:2-10 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | count = 5 6 | tags = { 7 | "Name" = "web" 8 | #"Name" = "web-${count.index}" 9 | } 10 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.web[1] File: /04-Terraform-Resources/04-03-Meta-Argument-count/terraform-manifests-oldv1/c2-ec2-instance.tf:2-10 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | count = 5 6 | tags = { 7 | "Name" = "web" 8 | #"Name" = "web-${count.index}" 9 | } 10 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.web[1] File: /04-Terraform-Resources/04-03-Meta-Argument-count/terraform-manifests-oldv1/c2-ec2-instance.tf:2-10 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | count = 5 6 | tags = { 7 | "Name" = "web" 8 | #"Name" = "web-${count.index}" 9 | } 10 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.web[1] File: /04-Terraform-Resources/04-03-Meta-Argument-count/terraform-manifests-oldv1/c2-ec2-instance.tf:2-10 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | count = 5 6 | tags = { 7 | "Name" = "web" 8 | #"Name" = "web-${count.index}" 9 | } 10 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.web[2] File: /04-Terraform-Resources/04-03-Meta-Argument-count/terraform-manifests-oldv1/c2-ec2-instance.tf:2-10 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | count = 5 6 | tags = { 7 | "Name" = "web" 8 | #"Name" = "web-${count.index}" 9 | } 10 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.web[2] File: /04-Terraform-Resources/04-03-Meta-Argument-count/terraform-manifests-oldv1/c2-ec2-instance.tf:2-10 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | count = 5 6 | tags = { 7 | "Name" = "web" 8 | #"Name" = "web-${count.index}" 9 | } 10 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.web[2] File: /04-Terraform-Resources/04-03-Meta-Argument-count/terraform-manifests-oldv1/c2-ec2-instance.tf:2-10 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | count = 5 6 | tags = { 7 | "Name" = "web" 8 | #"Name" = "web-${count.index}" 9 | } 10 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.web[2] File: /04-Terraform-Resources/04-03-Meta-Argument-count/terraform-manifests-oldv1/c2-ec2-instance.tf:2-10 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | count = 5 6 | tags = { 7 | "Name" = "web" 8 | #"Name" = "web-${count.index}" 9 | } 10 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.web[3] File: /04-Terraform-Resources/04-03-Meta-Argument-count/terraform-manifests-oldv1/c2-ec2-instance.tf:2-10 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | count = 5 6 | tags = { 7 | "Name" = "web" 8 | #"Name" = "web-${count.index}" 9 | } 10 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.web[3] File: /04-Terraform-Resources/04-03-Meta-Argument-count/terraform-manifests-oldv1/c2-ec2-instance.tf:2-10 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | count = 5 6 | tags = { 7 | "Name" = "web" 8 | #"Name" = "web-${count.index}" 9 | } 10 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.web[3] File: /04-Terraform-Resources/04-03-Meta-Argument-count/terraform-manifests-oldv1/c2-ec2-instance.tf:2-10 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | count = 5 6 | tags = { 7 | "Name" = "web" 8 | #"Name" = "web-${count.index}" 9 | } 10 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.web[3] File: /04-Terraform-Resources/04-03-Meta-Argument-count/terraform-manifests-oldv1/c2-ec2-instance.tf:2-10 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | count = 5 6 | tags = { 7 | "Name" = "web" 8 | #"Name" = "web-${count.index}" 9 | } 10 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.web[4] File: /04-Terraform-Resources/04-03-Meta-Argument-count/terraform-manifests-oldv1/c2-ec2-instance.tf:2-10 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | count = 5 6 | tags = { 7 | "Name" = "web" 8 | #"Name" = "web-${count.index}" 9 | } 10 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.web[4] File: /04-Terraform-Resources/04-03-Meta-Argument-count/terraform-manifests-oldv1/c2-ec2-instance.tf:2-10 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | count = 5 6 | tags = { 7 | "Name" = "web" 8 | #"Name" = "web-${count.index}" 9 | } 10 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.web[4] File: /04-Terraform-Resources/04-03-Meta-Argument-count/terraform-manifests-oldv1/c2-ec2-instance.tf:2-10 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | count = 5 6 | tags = { 7 | "Name" = "web" 8 | #"Name" = "web-${count.index}" 9 | } 10 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.web[4] File: /04-Terraform-Resources/04-03-Meta-Argument-count/terraform-manifests-oldv1/c2-ec2-instance.tf:2-10 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | count = 5 6 | tags = { 7 | "Name" = "web" 8 | #"Name" = "web-${count.index}" 9 | } 10 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.web[0] File: /04-Terraform-Resources/04-03-Meta-Argument-count/terraform-manifests/c2-ec2-instance.tf:2-10 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | count = 5 6 | tags = { 7 | "Name" = "web" 8 | #"Name" = "web-${count.index}" 9 | } 10 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.web[0] File: /04-Terraform-Resources/04-03-Meta-Argument-count/terraform-manifests/c2-ec2-instance.tf:2-10 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | count = 5 6 | tags = { 7 | "Name" = "web" 8 | #"Name" = "web-${count.index}" 9 | } 10 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.web[0] File: /04-Terraform-Resources/04-03-Meta-Argument-count/terraform-manifests/c2-ec2-instance.tf:2-10 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | count = 5 6 | tags = { 7 | "Name" = "web" 8 | #"Name" = "web-${count.index}" 9 | } 10 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.web[0] File: /04-Terraform-Resources/04-03-Meta-Argument-count/terraform-manifests/c2-ec2-instance.tf:2-10 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | count = 5 6 | tags = { 7 | "Name" = "web" 8 | #"Name" = "web-${count.index}" 9 | } 10 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.web[1] File: /04-Terraform-Resources/04-03-Meta-Argument-count/terraform-manifests/c2-ec2-instance.tf:2-10 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | count = 5 6 | tags = { 7 | "Name" = "web" 8 | #"Name" = "web-${count.index}" 9 | } 10 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.web[1] File: /04-Terraform-Resources/04-03-Meta-Argument-count/terraform-manifests/c2-ec2-instance.tf:2-10 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | count = 5 6 | tags = { 7 | "Name" = "web" 8 | #"Name" = "web-${count.index}" 9 | } 10 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.web[1] File: /04-Terraform-Resources/04-03-Meta-Argument-count/terraform-manifests/c2-ec2-instance.tf:2-10 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | count = 5 6 | tags = { 7 | "Name" = "web" 8 | #"Name" = "web-${count.index}" 9 | } 10 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.web[1] File: /04-Terraform-Resources/04-03-Meta-Argument-count/terraform-manifests/c2-ec2-instance.tf:2-10 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | count = 5 6 | tags = { 7 | "Name" = "web" 8 | #"Name" = "web-${count.index}" 9 | } 10 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.web[2] File: /04-Terraform-Resources/04-03-Meta-Argument-count/terraform-manifests/c2-ec2-instance.tf:2-10 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | count = 5 6 | tags = { 7 | "Name" = "web" 8 | #"Name" = "web-${count.index}" 9 | } 10 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.web[2] File: /04-Terraform-Resources/04-03-Meta-Argument-count/terraform-manifests/c2-ec2-instance.tf:2-10 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | count = 5 6 | tags = { 7 | "Name" = "web" 8 | #"Name" = "web-${count.index}" 9 | } 10 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.web[2] File: /04-Terraform-Resources/04-03-Meta-Argument-count/terraform-manifests/c2-ec2-instance.tf:2-10 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | count = 5 6 | tags = { 7 | "Name" = "web" 8 | #"Name" = "web-${count.index}" 9 | } 10 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.web[2] File: /04-Terraform-Resources/04-03-Meta-Argument-count/terraform-manifests/c2-ec2-instance.tf:2-10 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | count = 5 6 | tags = { 7 | "Name" = "web" 8 | #"Name" = "web-${count.index}" 9 | } 10 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.web[3] File: /04-Terraform-Resources/04-03-Meta-Argument-count/terraform-manifests/c2-ec2-instance.tf:2-10 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | count = 5 6 | tags = { 7 | "Name" = "web" 8 | #"Name" = "web-${count.index}" 9 | } 10 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.web[3] File: /04-Terraform-Resources/04-03-Meta-Argument-count/terraform-manifests/c2-ec2-instance.tf:2-10 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | count = 5 6 | tags = { 7 | "Name" = "web" 8 | #"Name" = "web-${count.index}" 9 | } 10 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.web[3] File: /04-Terraform-Resources/04-03-Meta-Argument-count/terraform-manifests/c2-ec2-instance.tf:2-10 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | count = 5 6 | tags = { 7 | "Name" = "web" 8 | #"Name" = "web-${count.index}" 9 | } 10 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.web[3] File: /04-Terraform-Resources/04-03-Meta-Argument-count/terraform-manifests/c2-ec2-instance.tf:2-10 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | count = 5 6 | tags = { 7 | "Name" = "web" 8 | #"Name" = "web-${count.index}" 9 | } 10 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.web[4] File: /04-Terraform-Resources/04-03-Meta-Argument-count/terraform-manifests/c2-ec2-instance.tf:2-10 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | count = 5 6 | tags = { 7 | "Name" = "web" 8 | #"Name" = "web-${count.index}" 9 | } 10 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.web[4] File: /04-Terraform-Resources/04-03-Meta-Argument-count/terraform-manifests/c2-ec2-instance.tf:2-10 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | count = 5 6 | tags = { 7 | "Name" = "web" 8 | #"Name" = "web-${count.index}" 9 | } 10 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.web[4] File: /04-Terraform-Resources/04-03-Meta-Argument-count/terraform-manifests/c2-ec2-instance.tf:2-10 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | count = 5 6 | tags = { 7 | "Name" = "web" 8 | #"Name" = "web-${count.index}" 9 | } 10 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.web[4] File: /04-Terraform-Resources/04-03-Meta-Argument-count/terraform-manifests/c2-ec2-instance.tf:2-10 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | count = 5 6 | tags = { 7 | "Name" = "web" 8 | #"Name" = "web-${count.index}" 9 | } 10 | } Check: CKV_AWS_273: "Ensure access is controlled through SSO and not AWS IAM defined users" FAILED for resource: aws_iam_user.myuser["TMadhu"] File: /04-Terraform-Resources/04-04-Meta-Argument-for_each/oldv1-backup/v2-for_each-toset/c2-iamuser.tf:4-7 4 | resource "aws_iam_user" "myuser" { 5 | for_each = toset(["TJack", "TJames", "TMadhu", "TDave"]) 6 | name = each.key 7 | } Check: CKV_AWS_273: "Ensure access is controlled through SSO and not AWS IAM defined users" FAILED for resource: aws_iam_user.myuser["TJames"] File: /04-Terraform-Resources/04-04-Meta-Argument-for_each/oldv1-backup/v2-for_each-toset/c2-iamuser.tf:4-7 4 | resource "aws_iam_user" "myuser" { 5 | for_each = toset(["TJack", "TJames", "TMadhu", "TDave"]) 6 | name = each.key 7 | } Check: CKV_AWS_273: "Ensure access is controlled through SSO and not AWS IAM defined users" FAILED for resource: aws_iam_user.myuser["TDave"] File: /04-Terraform-Resources/04-04-Meta-Argument-for_each/oldv1-backup/v2-for_each-toset/c2-iamuser.tf:4-7 4 | resource "aws_iam_user" "myuser" { 5 | for_each = toset(["TJack", "TJames", "TMadhu", "TDave"]) 6 | name = each.key 7 | } Check: CKV_AWS_273: "Ensure access is controlled through SSO and not AWS IAM defined users" FAILED for resource: aws_iam_user.myuser["TJack"] File: /04-Terraform-Resources/04-04-Meta-Argument-for_each/oldv1-backup/v2-for_each-toset/c2-iamuser.tf:4-7 4 | resource "aws_iam_user" "myuser" { 5 | for_each = toset(["TJack", "TJames", "TMadhu", "TDave"]) 6 | name = each.key 7 | } Check: CKV_AWS_273: "Ensure access is controlled through SSO and not AWS IAM defined users" FAILED for resource: aws_iam_user.myuser["TMadhu"] File: /04-Terraform-Resources/04-04-Meta-Argument-for_each/v2-for_each-toset/c2-iamuser.tf:4-7 4 | resource "aws_iam_user" "myuser" { 5 | for_each = toset(["TJack", "TJames", "TMadhu", "TDave"]) 6 | name = each.key 7 | } Check: CKV_AWS_273: "Ensure access is controlled through SSO and not AWS IAM defined users" FAILED for resource: aws_iam_user.myuser["TJames"] File: /04-Terraform-Resources/04-04-Meta-Argument-for_each/v2-for_each-toset/c2-iamuser.tf:4-7 4 | resource "aws_iam_user" "myuser" { 5 | for_each = toset(["TJack", "TJames", "TMadhu", "TDave"]) 6 | name = each.key 7 | } Check: CKV_AWS_273: "Ensure access is controlled through SSO and not AWS IAM defined users" FAILED for resource: aws_iam_user.myuser["TDave"] File: /04-Terraform-Resources/04-04-Meta-Argument-for_each/v2-for_each-toset/c2-iamuser.tf:4-7 4 | resource "aws_iam_user" "myuser" { 5 | for_each = toset(["TJack", "TJames", "TMadhu", "TDave"]) 6 | name = each.key 7 | } Check: CKV_AWS_273: "Ensure access is controlled through SSO and not AWS IAM defined users" FAILED for resource: aws_iam_user.myuser["TJack"] File: /04-Terraform-Resources/04-04-Meta-Argument-for_each/v2-for_each-toset/c2-iamuser.tf:4-7 4 | resource "aws_iam_user" "myuser" { 5 | for_each = toset(["TJack", "TJames", "TMadhu", "TDave"]) 6 | name = each.key 7 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.web File: /04-Terraform-Resources/04-05-Meta-Argument-lifecycle/oldv1-backup/v1-create_before_destroy/c2-ec2-instance.tf:2-15 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-0915bcb5fa77e4892" # Amazon Linux 4 | instance_type = "t2.micro" 5 | availability_zone = "us-east-1a" 6 | #availability_zone = "us-east-1b" 7 | tags = { 8 | "Name" = "web-1" 9 | } 10 | /* 11 | lifecycle { 12 | create_before_destroy = true 13 | } 14 | */ 15 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.web File: /04-Terraform-Resources/04-05-Meta-Argument-lifecycle/oldv1-backup/v1-create_before_destroy/c2-ec2-instance.tf:2-15 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-0915bcb5fa77e4892" # Amazon Linux 4 | instance_type = "t2.micro" 5 | availability_zone = "us-east-1a" 6 | #availability_zone = "us-east-1b" 7 | tags = { 8 | "Name" = "web-1" 9 | } 10 | /* 11 | lifecycle { 12 | create_before_destroy = true 13 | } 14 | */ 15 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.web File: /04-Terraform-Resources/04-05-Meta-Argument-lifecycle/oldv1-backup/v1-create_before_destroy/c2-ec2-instance.tf:2-15 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-0915bcb5fa77e4892" # Amazon Linux 4 | instance_type = "t2.micro" 5 | availability_zone = "us-east-1a" 6 | #availability_zone = "us-east-1b" 7 | tags = { 8 | "Name" = "web-1" 9 | } 10 | /* 11 | lifecycle { 12 | create_before_destroy = true 13 | } 14 | */ 15 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.web File: /04-Terraform-Resources/04-05-Meta-Argument-lifecycle/oldv1-backup/v1-create_before_destroy/c2-ec2-instance.tf:2-15 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-0915bcb5fa77e4892" # Amazon Linux 4 | instance_type = "t2.micro" 5 | availability_zone = "us-east-1a" 6 | #availability_zone = "us-east-1b" 7 | tags = { 8 | "Name" = "web-1" 9 | } 10 | /* 11 | lifecycle { 12 | create_before_destroy = true 13 | } 14 | */ 15 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.web File: /04-Terraform-Resources/04-05-Meta-Argument-lifecycle/oldv1-backup/v2-prevent_destroy/c2-ec2-instance.tf:2-11 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-0915bcb5fa77e4892" # Amazon Linux 4 | instance_type = "t2.micro" 5 | tags = { 6 | "Name" = "web-2" 7 | } 8 | lifecycle { 9 | prevent_destroy = true # Default is false 10 | } 11 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.web File: /04-Terraform-Resources/04-05-Meta-Argument-lifecycle/oldv1-backup/v2-prevent_destroy/c2-ec2-instance.tf:2-11 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-0915bcb5fa77e4892" # Amazon Linux 4 | instance_type = "t2.micro" 5 | tags = { 6 | "Name" = "web-2" 7 | } 8 | lifecycle { 9 | prevent_destroy = true # Default is false 10 | } 11 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.web File: /04-Terraform-Resources/04-05-Meta-Argument-lifecycle/oldv1-backup/v2-prevent_destroy/c2-ec2-instance.tf:2-11 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-0915bcb5fa77e4892" # Amazon Linux 4 | instance_type = "t2.micro" 5 | tags = { 6 | "Name" = "web-2" 7 | } 8 | lifecycle { 9 | prevent_destroy = true # Default is false 10 | } 11 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.web File: /04-Terraform-Resources/04-05-Meta-Argument-lifecycle/oldv1-backup/v2-prevent_destroy/c2-ec2-instance.tf:2-11 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-0915bcb5fa77e4892" # Amazon Linux 4 | instance_type = "t2.micro" 5 | tags = { 6 | "Name" = "web-2" 7 | } 8 | lifecycle { 9 | prevent_destroy = true # Default is false 10 | } 11 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.web File: /04-Terraform-Resources/04-05-Meta-Argument-lifecycle/oldv1-backup/v3-ignore_changes/c2-ec2-instance.tf:2-16 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-0915bcb5fa77e4892" # Amazon Linux 4 | instance_type = "t2.micro" 5 | tags = { 6 | "Name" = "web-3" 7 | } 8 | /* 9 | lifecycle { 10 | ignore_changes = [ 11 | # Ignore changes to tags, e.g. because a management agent 12 | # updates these based on some ruleset managed elsewhere. 13 | tags, 14 | ] 15 | }*/ 16 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.web File: /04-Terraform-Resources/04-05-Meta-Argument-lifecycle/oldv1-backup/v3-ignore_changes/c2-ec2-instance.tf:2-16 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-0915bcb5fa77e4892" # Amazon Linux 4 | instance_type = "t2.micro" 5 | tags = { 6 | "Name" = "web-3" 7 | } 8 | /* 9 | lifecycle { 10 | ignore_changes = [ 11 | # Ignore changes to tags, e.g. because a management agent 12 | # updates these based on some ruleset managed elsewhere. 13 | tags, 14 | ] 15 | }*/ 16 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.web File: /04-Terraform-Resources/04-05-Meta-Argument-lifecycle/oldv1-backup/v3-ignore_changes/c2-ec2-instance.tf:2-16 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-0915bcb5fa77e4892" # Amazon Linux 4 | instance_type = "t2.micro" 5 | tags = { 6 | "Name" = "web-3" 7 | } 8 | /* 9 | lifecycle { 10 | ignore_changes = [ 11 | # Ignore changes to tags, e.g. because a management agent 12 | # updates these based on some ruleset managed elsewhere. 13 | tags, 14 | ] 15 | }*/ 16 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.web File: /04-Terraform-Resources/04-05-Meta-Argument-lifecycle/oldv1-backup/v3-ignore_changes/c2-ec2-instance.tf:2-16 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-0915bcb5fa77e4892" # Amazon Linux 4 | instance_type = "t2.micro" 5 | tags = { 6 | "Name" = "web-3" 7 | } 8 | /* 9 | lifecycle { 10 | ignore_changes = [ 11 | # Ignore changes to tags, e.g. because a management agent 12 | # updates these based on some ruleset managed elsewhere. 13 | tags, 14 | ] 15 | }*/ 16 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.web File: /04-Terraform-Resources/04-05-Meta-Argument-lifecycle/v1-create_before_destroy/c2-ec2-instance.tf:2-15 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-0915bcb5fa77e4892" # Amazon Linux 4 | instance_type = "t2.micro" 5 | availability_zone = "us-east-1a" 6 | #availability_zone = "us-east-1b" 7 | tags = { 8 | "Name" = "web-1" 9 | } 10 | /* 11 | lifecycle { 12 | create_before_destroy = true 13 | } 14 | */ 15 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.web File: /04-Terraform-Resources/04-05-Meta-Argument-lifecycle/v1-create_before_destroy/c2-ec2-instance.tf:2-15 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-0915bcb5fa77e4892" # Amazon Linux 4 | instance_type = "t2.micro" 5 | availability_zone = "us-east-1a" 6 | #availability_zone = "us-east-1b" 7 | tags = { 8 | "Name" = "web-1" 9 | } 10 | /* 11 | lifecycle { 12 | create_before_destroy = true 13 | } 14 | */ 15 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.web File: /04-Terraform-Resources/04-05-Meta-Argument-lifecycle/v1-create_before_destroy/c2-ec2-instance.tf:2-15 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-0915bcb5fa77e4892" # Amazon Linux 4 | instance_type = "t2.micro" 5 | availability_zone = "us-east-1a" 6 | #availability_zone = "us-east-1b" 7 | tags = { 8 | "Name" = "web-1" 9 | } 10 | /* 11 | lifecycle { 12 | create_before_destroy = true 13 | } 14 | */ 15 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.web File: /04-Terraform-Resources/04-05-Meta-Argument-lifecycle/v1-create_before_destroy/c2-ec2-instance.tf:2-15 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-0915bcb5fa77e4892" # Amazon Linux 4 | instance_type = "t2.micro" 5 | availability_zone = "us-east-1a" 6 | #availability_zone = "us-east-1b" 7 | tags = { 8 | "Name" = "web-1" 9 | } 10 | /* 11 | lifecycle { 12 | create_before_destroy = true 13 | } 14 | */ 15 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.web File: /04-Terraform-Resources/04-05-Meta-Argument-lifecycle/v2-prevent_destroy/c2-ec2-instance.tf:2-11 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-0915bcb5fa77e4892" # Amazon Linux 4 | instance_type = "t2.micro" 5 | tags = { 6 | "Name" = "web-2" 7 | } 8 | lifecycle { 9 | prevent_destroy = true # Default is false 10 | } 11 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.web File: /04-Terraform-Resources/04-05-Meta-Argument-lifecycle/v2-prevent_destroy/c2-ec2-instance.tf:2-11 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-0915bcb5fa77e4892" # Amazon Linux 4 | instance_type = "t2.micro" 5 | tags = { 6 | "Name" = "web-2" 7 | } 8 | lifecycle { 9 | prevent_destroy = true # Default is false 10 | } 11 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.web File: /04-Terraform-Resources/04-05-Meta-Argument-lifecycle/v2-prevent_destroy/c2-ec2-instance.tf:2-11 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-0915bcb5fa77e4892" # Amazon Linux 4 | instance_type = "t2.micro" 5 | tags = { 6 | "Name" = "web-2" 7 | } 8 | lifecycle { 9 | prevent_destroy = true # Default is false 10 | } 11 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.web File: /04-Terraform-Resources/04-05-Meta-Argument-lifecycle/v2-prevent_destroy/c2-ec2-instance.tf:2-11 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-0915bcb5fa77e4892" # Amazon Linux 4 | instance_type = "t2.micro" 5 | tags = { 6 | "Name" = "web-2" 7 | } 8 | lifecycle { 9 | prevent_destroy = true # Default is false 10 | } 11 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.web File: /04-Terraform-Resources/04-05-Meta-Argument-lifecycle/v3-ignore_changes/c2-ec2-instance.tf:2-16 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-0915bcb5fa77e4892" # Amazon Linux 4 | instance_type = "t2.micro" 5 | tags = { 6 | "Name" = "web-3" 7 | } 8 | /* 9 | lifecycle { 10 | ignore_changes = [ 11 | # Ignore changes to tags, e.g. because a management agent 12 | # updates these based on some ruleset managed elsewhere. 13 | tags, 14 | ] 15 | }*/ 16 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.web File: /04-Terraform-Resources/04-05-Meta-Argument-lifecycle/v3-ignore_changes/c2-ec2-instance.tf:2-16 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-0915bcb5fa77e4892" # Amazon Linux 4 | instance_type = "t2.micro" 5 | tags = { 6 | "Name" = "web-3" 7 | } 8 | /* 9 | lifecycle { 10 | ignore_changes = [ 11 | # Ignore changes to tags, e.g. because a management agent 12 | # updates these based on some ruleset managed elsewhere. 13 | tags, 14 | ] 15 | }*/ 16 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.web File: /04-Terraform-Resources/04-05-Meta-Argument-lifecycle/v3-ignore_changes/c2-ec2-instance.tf:2-16 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-0915bcb5fa77e4892" # Amazon Linux 4 | instance_type = "t2.micro" 5 | tags = { 6 | "Name" = "web-3" 7 | } 8 | /* 9 | lifecycle { 10 | ignore_changes = [ 11 | # Ignore changes to tags, e.g. because a management agent 12 | # updates these based on some ruleset managed elsewhere. 13 | tags, 14 | ] 15 | }*/ 16 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.web File: /04-Terraform-Resources/04-05-Meta-Argument-lifecycle/v3-ignore_changes/c2-ec2-instance.tf:2-16 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-0915bcb5fa77e4892" # Amazon Linux 4 | instance_type = "t2.micro" 5 | tags = { 6 | "Name" = "web-3" 7 | } 8 | /* 9 | lifecycle { 10 | ignore_changes = [ 11 | # Ignore changes to tags, e.g. because a management agent 12 | # updates these based on some ruleset managed elsewhere. 13 | tags, 14 | ] 15 | }*/ 16 | } Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22" FAILED for resource: aws_security_group.vpc-ssh File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v1-Input-Variables-Basic/c3-security-groups.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-1-port-security.html 2 | resource "aws_security_group" "vpc-ssh" { 3 | name = "vpc-ssh" 4 | description = "Dev VPC SSH" 5 | ingress { 6 | description = "Allow Port 22" 7 | from_port = 22 8 | to_port = 22 9 | protocol = "tcp" 10 | cidr_blocks = ["0.0.0.0/0"] 11 | } 12 | egress { 13 | description = "Allow all IP and Ports outbound" 14 | from_port = 0 15 | to_port = 0 16 | protocol = "-1" 17 | cidr_blocks = ["0.0.0.0/0"] 18 | } 19 | } Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80" FAILED for resource: aws_security_group.vpc-web File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v1-Input-Variables-Basic/c3-security-groups.tf:22-49 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80.html 22 | resource "aws_security_group" "vpc-web" { 23 | name = "vpc-web" 24 | description = "Dev VPC Web" 25 | 26 | ingress { 27 | description = "Allow Port 80" 28 | from_port = 80 29 | to_port = 80 30 | protocol = "tcp" 31 | cidr_blocks = ["0.0.0.0/0"] 32 | } 33 | 34 | ingress { 35 | description = "Allow Port 443" 36 | from_port = 443 37 | to_port = 443 38 | protocol = "tcp" 39 | cidr_blocks = ["0.0.0.0/0"] 40 | } 41 | 42 | egress { 43 | description = "Allow all IP and Ports outbound" 44 | from_port = 0 45 | to_port = 0 46 | protocol = "-1" 47 | cidr_blocks = ["0.0.0.0/0"] 48 | } 49 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v1-Input-Variables-Basic/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = "t3.micro" 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v1-Input-Variables-Basic/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = "t3.micro" 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v1-Input-Variables-Basic/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = "t3.micro" 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v1-Input-Variables-Basic/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = "t3.micro" 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_293: "Ensure that AWS database instances have deletion protection enabled" FAILED for resource: aws_db_instance.db1 File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v10-Sensitive-Input-Variables/c3-rds-db.tf:3-11 3 | resource "aws_db_instance" "db1" { 4 | allocated_storage = 5 5 | engine = "mysql" 6 | instance_class = "db.t2.micro" 7 | name = "mydb1" 8 | username = var.db_username 9 | password = var.db_password 10 | skip_final_snapshot = true 11 | } Check: CKV_AWS_129: "Ensure that respective logs of Amazon Relational Database Service (Amazon RDS) are enabled" FAILED for resource: aws_db_instance.db1 File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v10-Sensitive-Input-Variables/c3-rds-db.tf:3-11 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-that-respective-logs-of-amazon-relational-database-service-amazon-rds-are-enabled.html 3 | resource "aws_db_instance" "db1" { 4 | allocated_storage = 5 5 | engine = "mysql" 6 | instance_class = "db.t2.micro" 7 | name = "mydb1" 8 | username = var.db_username 9 | password = var.db_password 10 | skip_final_snapshot = true 11 | } Check: CKV_AWS_161: "Ensure RDS database has IAM authentication enabled" FAILED for resource: aws_db_instance.db1 File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v10-Sensitive-Input-Variables/c3-rds-db.tf:3-11 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-rds-database-has-iam-authentication-enabled.html 3 | resource "aws_db_instance" "db1" { 4 | allocated_storage = 5 5 | engine = "mysql" 6 | instance_class = "db.t2.micro" 7 | name = "mydb1" 8 | username = var.db_username 9 | password = var.db_password 10 | skip_final_snapshot = true 11 | } Check: CKV_AWS_226: "Ensure DB instance gets all minor upgrades automatically" FAILED for resource: aws_db_instance.db1 File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v10-Sensitive-Input-Variables/c3-rds-db.tf:3-11 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-aws-db-instance-gets-all-minor-upgrades-automatically.html 3 | resource "aws_db_instance" "db1" { 4 | allocated_storage = 5 5 | engine = "mysql" 6 | instance_class = "db.t2.micro" 7 | name = "mydb1" 8 | username = var.db_username 9 | password = var.db_password 10 | skip_final_snapshot = true 11 | } Check: CKV_AWS_118: "Ensure that enhanced monitoring is enabled for Amazon RDS instances" FAILED for resource: aws_db_instance.db1 File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v10-Sensitive-Input-Variables/c3-rds-db.tf:3-11 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-enhanced-monitoring-is-enabled-for-amazon-rds-instances.html 3 | resource "aws_db_instance" "db1" { 4 | allocated_storage = 5 5 | engine = "mysql" 6 | instance_class = "db.t2.micro" 7 | name = "mydb1" 8 | username = var.db_username 9 | password = var.db_password 10 | skip_final_snapshot = true 11 | } Check: CKV_AWS_354: "Ensure RDS Performance Insights are encrypted using KMS CMKs" FAILED for resource: aws_db_instance.db1 File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v10-Sensitive-Input-Variables/c3-rds-db.tf:3-11 3 | resource "aws_db_instance" "db1" { 4 | allocated_storage = 5 5 | engine = "mysql" 6 | instance_class = "db.t2.micro" 7 | name = "mydb1" 8 | username = var.db_username 9 | password = var.db_password 10 | skip_final_snapshot = true 11 | } Check: CKV_AWS_353: "Ensure that RDS instances have performance insights enabled" FAILED for resource: aws_db_instance.db1 File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v10-Sensitive-Input-Variables/c3-rds-db.tf:3-11 3 | resource "aws_db_instance" "db1" { 4 | allocated_storage = 5 5 | engine = "mysql" 6 | instance_class = "db.t2.micro" 7 | name = "mydb1" 8 | username = var.db_username 9 | password = var.db_password 10 | skip_final_snapshot = true 11 | } Check: CKV_AWS_16: "Ensure all data stored in the RDS is securely encrypted at rest" FAILED for resource: aws_db_instance.db1 File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v10-Sensitive-Input-Variables/c3-rds-db.tf:3-11 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-4.html 3 | resource "aws_db_instance" "db1" { 4 | allocated_storage = 5 5 | engine = "mysql" 6 | instance_class = "db.t2.micro" 7 | name = "mydb1" 8 | username = var.db_username 9 | password = var.db_password 10 | skip_final_snapshot = true 11 | } Check: CKV_AWS_157: "Ensure that RDS instances have Multi-AZ enabled" FAILED for resource: aws_db_instance.db1 File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v10-Sensitive-Input-Variables/c3-rds-db.tf:3-11 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-73.html 3 | resource "aws_db_instance" "db1" { 4 | allocated_storage = 5 5 | engine = "mysql" 6 | instance_class = "db.t2.micro" 7 | name = "mydb1" 8 | username = var.db_username 9 | password = var.db_password 10 | skip_final_snapshot = true 11 | } Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22" FAILED for resource: aws_security_group.vpc-ssh File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v11-File-Function/c3-security-groups.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-1-port-security.html 2 | resource "aws_security_group" "vpc-ssh" { 3 | name = "vpc-ssh" 4 | description = "Dev VPC SSH" 5 | ingress { 6 | description = "Allow Port 22" 7 | from_port = 22 8 | to_port = 22 9 | protocol = "tcp" 10 | cidr_blocks = ["0.0.0.0/0"] 11 | } 12 | egress { 13 | description = "Allow all IP and Ports outbound" 14 | from_port = 0 15 | to_port = 0 16 | protocol = "-1" 17 | cidr_blocks = ["0.0.0.0/0"] 18 | } 19 | } Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80" FAILED for resource: aws_security_group.vpc-web File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v11-File-Function/c3-security-groups.tf:22-49 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80.html 22 | resource "aws_security_group" "vpc-web" { 23 | name = "vpc-web" 24 | description = "Dev VPC Web" 25 | 26 | ingress { 27 | description = "Allow Port 80" 28 | from_port = 80 29 | to_port = 80 30 | protocol = "tcp" 31 | cidr_blocks = ["0.0.0.0/0"] 32 | } 33 | 34 | ingress { 35 | description = "Allow Port 443" 36 | from_port = 443 37 | to_port = 443 38 | protocol = "tcp" 39 | cidr_blocks = ["0.0.0.0/0"] 40 | } 41 | 42 | egress { 43 | description = "Allow all IP and Ports outbound" 44 | from_port = 0 45 | to_port = 0 46 | protocol = "-1" 47 | cidr_blocks = ["0.0.0.0/0"] 48 | } 49 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v11-File-Function/c4-ec2-instance.tf:2-22 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = file("apache-install.sh") 8 | /* 9 | user_data = <<-EOF 10 | #!/bin/bash 11 | sudo yum update -y 12 | sudo yum install httpd -y 13 | sudo systemctl enable httpd 14 | sudo systemctl start httpd 15 | echo "
    Welcome to StackSimplify ! AWS Infra created using Terraform
    " > /var/www/html/index.html 16 | EOF 17 | */ 18 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 19 | tags = { 20 | "Name" = "web" 21 | } 22 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v11-File-Function/c4-ec2-instance.tf:2-22 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = file("apache-install.sh") 8 | /* 9 | user_data = <<-EOF 10 | #!/bin/bash 11 | sudo yum update -y 12 | sudo yum install httpd -y 13 | sudo systemctl enable httpd 14 | sudo systemctl start httpd 15 | echo "
    Welcome to StackSimplify ! AWS Infra created using Terraform
    " > /var/www/html/index.html 16 | EOF 17 | */ 18 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 19 | tags = { 20 | "Name" = "web" 21 | } 22 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v11-File-Function/c4-ec2-instance.tf:2-22 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = file("apache-install.sh") 8 | /* 9 | user_data = <<-EOF 10 | #!/bin/bash 11 | sudo yum update -y 12 | sudo yum install httpd -y 13 | sudo systemctl enable httpd 14 | sudo systemctl start httpd 15 | echo "
    Welcome to StackSimplify ! AWS Infra created using Terraform
    " > /var/www/html/index.html 16 | EOF 17 | */ 18 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 19 | tags = { 20 | "Name" = "web" 21 | } 22 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v11-File-Function/c4-ec2-instance.tf:2-22 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = file("apache-install.sh") 8 | /* 9 | user_data = <<-EOF 10 | #!/bin/bash 11 | sudo yum update -y 12 | sudo yum install httpd -y 13 | sudo systemctl enable httpd 14 | sudo systemctl start httpd 15 | echo "
    Welcome to StackSimplify ! AWS Infra created using Terraform
    " > /var/www/html/index.html 16 | EOF 17 | */ 18 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 19 | tags = { 20 | "Name" = "web" 21 | } 22 | } Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22" FAILED for resource: aws_security_group.vpc-ssh File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v2-Input-Variables-Assign-when-prompted/c3-security-groups.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-1-port-security.html 2 | resource "aws_security_group" "vpc-ssh" { 3 | name = "vpc-ssh" 4 | description = "Dev VPC SSH" 5 | ingress { 6 | description = "Allow Port 22" 7 | from_port = 22 8 | to_port = 22 9 | protocol = "tcp" 10 | cidr_blocks = ["0.0.0.0/0"] 11 | } 12 | egress { 13 | description = "Allow all IP and Ports outbound" 14 | from_port = 0 15 | to_port = 0 16 | protocol = "-1" 17 | cidr_blocks = ["0.0.0.0/0"] 18 | } 19 | } Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80" FAILED for resource: aws_security_group.vpc-web File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v2-Input-Variables-Assign-when-prompted/c3-security-groups.tf:22-49 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80.html 22 | resource "aws_security_group" "vpc-web" { 23 | name = "vpc-web" 24 | description = "Dev VPC Web" 25 | 26 | ingress { 27 | description = "Allow Port 80" 28 | from_port = 80 29 | to_port = 80 30 | protocol = "tcp" 31 | cidr_blocks = ["0.0.0.0/0"] 32 | } 33 | 34 | ingress { 35 | description = "Allow Port 443" 36 | from_port = 443 37 | to_port = 443 38 | protocol = "tcp" 39 | cidr_blocks = ["0.0.0.0/0"] 40 | } 41 | 42 | egress { 43 | description = "Allow all IP and Ports outbound" 44 | from_port = 0 45 | to_port = 0 46 | protocol = "-1" 47 | cidr_blocks = ["0.0.0.0/0"] 48 | } 49 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v2-Input-Variables-Assign-when-prompted/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v2-Input-Variables-Assign-when-prompted/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v2-Input-Variables-Assign-when-prompted/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v2-Input-Variables-Assign-when-prompted/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22" FAILED for resource: aws_security_group.vpc-ssh File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v3-Input-Variables-Override-default-with-cli-var/c3-security-groups.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-1-port-security.html 2 | resource "aws_security_group" "vpc-ssh" { 3 | name = "vpc-ssh" 4 | description = "Dev VPC SSH" 5 | ingress { 6 | description = "Allow Port 22" 7 | from_port = 22 8 | to_port = 22 9 | protocol = "tcp" 10 | cidr_blocks = ["0.0.0.0/0"] 11 | } 12 | egress { 13 | description = "Allow all IP and Ports outbound" 14 | from_port = 0 15 | to_port = 0 16 | protocol = "-1" 17 | cidr_blocks = ["0.0.0.0/0"] 18 | } 19 | } Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80" FAILED for resource: aws_security_group.vpc-web File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v3-Input-Variables-Override-default-with-cli-var/c3-security-groups.tf:22-49 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80.html 22 | resource "aws_security_group" "vpc-web" { 23 | name = "vpc-web" 24 | description = "Dev VPC Web" 25 | 26 | ingress { 27 | description = "Allow Port 80" 28 | from_port = 80 29 | to_port = 80 30 | protocol = "tcp" 31 | cidr_blocks = ["0.0.0.0/0"] 32 | } 33 | 34 | ingress { 35 | description = "Allow Port 443" 36 | from_port = 443 37 | to_port = 443 38 | protocol = "tcp" 39 | cidr_blocks = ["0.0.0.0/0"] 40 | } 41 | 42 | egress { 43 | description = "Allow all IP and Ports outbound" 44 | from_port = 0 45 | to_port = 0 46 | protocol = "-1" 47 | cidr_blocks = ["0.0.0.0/0"] 48 | } 49 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v3-Input-Variables-Override-default-with-cli-var/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v3-Input-Variables-Override-default-with-cli-var/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v3-Input-Variables-Override-default-with-cli-var/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v3-Input-Variables-Override-default-with-cli-var/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.my-ec2-vm[1] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v3-Input-Variables-Override-default-with-cli-var/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.my-ec2-vm[1] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v3-Input-Variables-Override-default-with-cli-var/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.my-ec2-vm[1] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v3-Input-Variables-Override-default-with-cli-var/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.my-ec2-vm[1] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v3-Input-Variables-Override-default-with-cli-var/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22" FAILED for resource: aws_security_group.vpc-ssh File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v4-Input-Variables-Override-with-Environment-Variables/c3-security-groups.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-1-port-security.html 2 | resource "aws_security_group" "vpc-ssh" { 3 | name = "vpc-ssh" 4 | description = "Dev VPC SSH" 5 | ingress { 6 | description = "Allow Port 22" 7 | from_port = 22 8 | to_port = 22 9 | protocol = "tcp" 10 | cidr_blocks = ["0.0.0.0/0"] 11 | } 12 | egress { 13 | description = "Allow all IP and Ports outbound" 14 | from_port = 0 15 | to_port = 0 16 | protocol = "-1" 17 | cidr_blocks = ["0.0.0.0/0"] 18 | } 19 | } Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80" FAILED for resource: aws_security_group.vpc-web File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v4-Input-Variables-Override-with-Environment-Variables/c3-security-groups.tf:22-49 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80.html 22 | resource "aws_security_group" "vpc-web" { 23 | name = "vpc-web" 24 | description = "Dev VPC Web" 25 | 26 | ingress { 27 | description = "Allow Port 80" 28 | from_port = 80 29 | to_port = 80 30 | protocol = "tcp" 31 | cidr_blocks = ["0.0.0.0/0"] 32 | } 33 | 34 | ingress { 35 | description = "Allow Port 443" 36 | from_port = 443 37 | to_port = 443 38 | protocol = "tcp" 39 | cidr_blocks = ["0.0.0.0/0"] 40 | } 41 | 42 | egress { 43 | description = "Allow all IP and Ports outbound" 44 | from_port = 0 45 | to_port = 0 46 | protocol = "-1" 47 | cidr_blocks = ["0.0.0.0/0"] 48 | } 49 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v4-Input-Variables-Override-with-Environment-Variables/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v4-Input-Variables-Override-with-Environment-Variables/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v4-Input-Variables-Override-with-Environment-Variables/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v4-Input-Variables-Override-with-Environment-Variables/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.my-ec2-vm[1] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v4-Input-Variables-Override-with-Environment-Variables/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.my-ec2-vm[1] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v4-Input-Variables-Override-with-Environment-Variables/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.my-ec2-vm[1] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v4-Input-Variables-Override-with-Environment-Variables/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.my-ec2-vm[1] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v4-Input-Variables-Override-with-Environment-Variables/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22" FAILED for resource: aws_security_group.vpc-ssh File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v5-Input-Variables-Assign-with-terraform-tfvars/c3-security-groups.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-1-port-security.html 2 | resource "aws_security_group" "vpc-ssh" { 3 | name = "vpc-ssh" 4 | description = "Dev VPC SSH" 5 | ingress { 6 | description = "Allow Port 22" 7 | from_port = 22 8 | to_port = 22 9 | protocol = "tcp" 10 | cidr_blocks = ["0.0.0.0/0"] 11 | } 12 | egress { 13 | description = "Allow all IP and Ports outbound" 14 | from_port = 0 15 | to_port = 0 16 | protocol = "-1" 17 | cidr_blocks = ["0.0.0.0/0"] 18 | } 19 | } Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80" FAILED for resource: aws_security_group.vpc-web File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v5-Input-Variables-Assign-with-terraform-tfvars/c3-security-groups.tf:22-49 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80.html 22 | resource "aws_security_group" "vpc-web" { 23 | name = "vpc-web" 24 | description = "Dev VPC Web" 25 | 26 | ingress { 27 | description = "Allow Port 80" 28 | from_port = 80 29 | to_port = 80 30 | protocol = "tcp" 31 | cidr_blocks = ["0.0.0.0/0"] 32 | } 33 | 34 | ingress { 35 | description = "Allow Port 443" 36 | from_port = 443 37 | to_port = 443 38 | protocol = "tcp" 39 | cidr_blocks = ["0.0.0.0/0"] 40 | } 41 | 42 | egress { 43 | description = "Allow all IP and Ports outbound" 44 | from_port = 0 45 | to_port = 0 46 | protocol = "-1" 47 | cidr_blocks = ["0.0.0.0/0"] 48 | } 49 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v5-Input-Variables-Assign-with-terraform-tfvars/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v5-Input-Variables-Assign-with-terraform-tfvars/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v5-Input-Variables-Assign-with-terraform-tfvars/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v5-Input-Variables-Assign-with-terraform-tfvars/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22" FAILED for resource: aws_security_group.vpc-ssh File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v6-Input-Variables-Assign-with-tfvars-var-file/c3-security-groups.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-1-port-security.html 2 | resource "aws_security_group" "vpc-ssh" { 3 | name = "vpc-ssh" 4 | description = "Dev VPC SSH" 5 | ingress { 6 | description = "Allow Port 22" 7 | from_port = 22 8 | to_port = 22 9 | protocol = "tcp" 10 | cidr_blocks = ["0.0.0.0/0"] 11 | } 12 | egress { 13 | description = "Allow all IP and Ports outbound" 14 | from_port = 0 15 | to_port = 0 16 | protocol = "-1" 17 | cidr_blocks = ["0.0.0.0/0"] 18 | } 19 | } Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80" FAILED for resource: aws_security_group.vpc-web File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v6-Input-Variables-Assign-with-tfvars-var-file/c3-security-groups.tf:22-49 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80.html 22 | resource "aws_security_group" "vpc-web" { 23 | name = "vpc-web" 24 | description = "Dev VPC Web" 25 | 26 | ingress { 27 | description = "Allow Port 80" 28 | from_port = 80 29 | to_port = 80 30 | protocol = "tcp" 31 | cidr_blocks = ["0.0.0.0/0"] 32 | } 33 | 34 | ingress { 35 | description = "Allow Port 443" 36 | from_port = 443 37 | to_port = 443 38 | protocol = "tcp" 39 | cidr_blocks = ["0.0.0.0/0"] 40 | } 41 | 42 | egress { 43 | description = "Allow all IP and Ports outbound" 44 | from_port = 0 45 | to_port = 0 46 | protocol = "-1" 47 | cidr_blocks = ["0.0.0.0/0"] 48 | } 49 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v6-Input-Variables-Assign-with-tfvars-var-file/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v6-Input-Variables-Assign-with-tfvars-var-file/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v6-Input-Variables-Assign-with-tfvars-var-file/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v6-Input-Variables-Assign-with-tfvars-var-file/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22" FAILED for resource: aws_security_group.vpc-ssh File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v7-Input-Variables-Assign-with-auto-tfvars/c3-security-groups.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-1-port-security.html 2 | resource "aws_security_group" "vpc-ssh" { 3 | name = "vpc-ssh" 4 | description = "Dev VPC SSH" 5 | ingress { 6 | description = "Allow Port 22" 7 | from_port = 22 8 | to_port = 22 9 | protocol = "tcp" 10 | cidr_blocks = ["0.0.0.0/0"] 11 | } 12 | egress { 13 | description = "Allow all IP and Ports outbound" 14 | from_port = 0 15 | to_port = 0 16 | protocol = "-1" 17 | cidr_blocks = ["0.0.0.0/0"] 18 | } 19 | } Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80" FAILED for resource: aws_security_group.vpc-web File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v7-Input-Variables-Assign-with-auto-tfvars/c3-security-groups.tf:22-49 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80.html 22 | resource "aws_security_group" "vpc-web" { 23 | name = "vpc-web" 24 | description = "Dev VPC Web" 25 | 26 | ingress { 27 | description = "Allow Port 80" 28 | from_port = 80 29 | to_port = 80 30 | protocol = "tcp" 31 | cidr_blocks = ["0.0.0.0/0"] 32 | } 33 | 34 | ingress { 35 | description = "Allow Port 443" 36 | from_port = 443 37 | to_port = 443 38 | protocol = "tcp" 39 | cidr_blocks = ["0.0.0.0/0"] 40 | } 41 | 42 | egress { 43 | description = "Allow all IP and Ports outbound" 44 | from_port = 0 45 | to_port = 0 46 | protocol = "-1" 47 | cidr_blocks = ["0.0.0.0/0"] 48 | } 49 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v7-Input-Variables-Assign-with-auto-tfvars/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v7-Input-Variables-Assign-with-auto-tfvars/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v7-Input-Variables-Assign-with-auto-tfvars/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v7-Input-Variables-Assign-with-auto-tfvars/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22" FAILED for resource: aws_security_group.vpc-ssh File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v8-01-Input-Variables-Lists/c3-security-groups.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-1-port-security.html 2 | resource "aws_security_group" "vpc-ssh" { 3 | name = "vpc-ssh" 4 | description = "Dev VPC SSH" 5 | ingress { 6 | description = "Allow Port 22" 7 | from_port = 22 8 | to_port = 22 9 | protocol = "tcp" 10 | cidr_blocks = ["0.0.0.0/0"] 11 | } 12 | egress { 13 | description = "Allow all IP and Ports outbound" 14 | from_port = 0 15 | to_port = 0 16 | protocol = "-1" 17 | cidr_blocks = ["0.0.0.0/0"] 18 | } 19 | } Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80" FAILED for resource: aws_security_group.vpc-web File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v8-01-Input-Variables-Lists/c3-security-groups.tf:22-49 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80.html 22 | resource "aws_security_group" "vpc-web" { 23 | name = "vpc-web" 24 | description = "Dev VPC Web" 25 | 26 | ingress { 27 | description = "Allow Port 80" 28 | from_port = 80 29 | to_port = 80 30 | protocol = "tcp" 31 | cidr_blocks = ["0.0.0.0/0"] 32 | } 33 | 34 | ingress { 35 | description = "Allow Port 443" 36 | from_port = 443 37 | to_port = 443 38 | protocol = "tcp" 39 | cidr_blocks = ["0.0.0.0/0"] 40 | } 41 | 42 | egress { 43 | description = "Allow all IP and Ports outbound" 44 | from_port = 0 45 | to_port = 0 46 | protocol = "-1" 47 | cidr_blocks = ["0.0.0.0/0"] 48 | } 49 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v8-01-Input-Variables-Lists/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type[0] 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v8-01-Input-Variables-Lists/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type[0] 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v8-01-Input-Variables-Lists/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type[0] 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v8-01-Input-Variables-Lists/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type[0] 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.my-ec2-vm[1] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v8-01-Input-Variables-Lists/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type[0] 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.my-ec2-vm[1] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v8-01-Input-Variables-Lists/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type[0] 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.my-ec2-vm[1] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v8-01-Input-Variables-Lists/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type[0] 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.my-ec2-vm[1] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v8-01-Input-Variables-Lists/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type[0] 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22" FAILED for resource: aws_security_group.vpc-ssh File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v8-02-Input-Variables-Maps/c3-security-groups.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-1-port-security.html 2 | resource "aws_security_group" "vpc-ssh" { 3 | name = "vpc-ssh" 4 | description = "Dev VPC SSH" 5 | ingress { 6 | description = "Allow Port 22" 7 | from_port = 22 8 | to_port = 22 9 | protocol = "tcp" 10 | cidr_blocks = ["0.0.0.0/0"] 11 | } 12 | egress { 13 | description = "Allow all IP and Ports outbound" 14 | from_port = 0 15 | to_port = 0 16 | protocol = "-1" 17 | cidr_blocks = ["0.0.0.0/0"] 18 | } 19 | } Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80" FAILED for resource: aws_security_group.vpc-web File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v8-02-Input-Variables-Maps/c3-security-groups.tf:22-49 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80.html 22 | resource "aws_security_group" "vpc-web" { 23 | name = "vpc-web" 24 | description = "Dev VPC Web" 25 | 26 | ingress { 27 | description = "Allow Port 80" 28 | from_port = 80 29 | to_port = 80 30 | protocol = "tcp" 31 | cidr_blocks = ["0.0.0.0/0"] 32 | } 33 | 34 | ingress { 35 | description = "Allow Port 443" 36 | from_port = 443 37 | to_port = 443 38 | protocol = "tcp" 39 | cidr_blocks = ["0.0.0.0/0"] 40 | } 41 | 42 | egress { 43 | description = "Allow all IP and Ports outbound" 44 | from_port = 0 45 | to_port = 0 46 | protocol = "-1" 47 | cidr_blocks = ["0.0.0.0/0"] 48 | } 49 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v8-02-Input-Variables-Maps/c4-ec2-instance.tf:2-18 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | #instance_type = var.ec2_instance_type[0] 5 | instance_type = var.ec2_instance_type_map["big-apps"] 6 | key_name = "terraform-key" 7 | count = var.ec2_instance_count 8 | user_data = <<-EOF 9 | #!/bin/bash 10 | sudo yum update -y 11 | sudo yum install httpd -y 12 | sudo systemctl enable httpd 13 | sudo systemctl start httpd 14 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 15 | EOF 16 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 17 | tags = var.ec2_instance_tags 18 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v8-02-Input-Variables-Maps/c4-ec2-instance.tf:2-18 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | #instance_type = var.ec2_instance_type[0] 5 | instance_type = var.ec2_instance_type_map["big-apps"] 6 | key_name = "terraform-key" 7 | count = var.ec2_instance_count 8 | user_data = <<-EOF 9 | #!/bin/bash 10 | sudo yum update -y 11 | sudo yum install httpd -y 12 | sudo systemctl enable httpd 13 | sudo systemctl start httpd 14 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 15 | EOF 16 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 17 | tags = var.ec2_instance_tags 18 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v8-02-Input-Variables-Maps/c4-ec2-instance.tf:2-18 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | #instance_type = var.ec2_instance_type[0] 5 | instance_type = var.ec2_instance_type_map["big-apps"] 6 | key_name = "terraform-key" 7 | count = var.ec2_instance_count 8 | user_data = <<-EOF 9 | #!/bin/bash 10 | sudo yum update -y 11 | sudo yum install httpd -y 12 | sudo systemctl enable httpd 13 | sudo systemctl start httpd 14 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 15 | EOF 16 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 17 | tags = var.ec2_instance_tags 18 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v8-02-Input-Variables-Maps/c4-ec2-instance.tf:2-18 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | #instance_type = var.ec2_instance_type[0] 5 | instance_type = var.ec2_instance_type_map["big-apps"] 6 | key_name = "terraform-key" 7 | count = var.ec2_instance_count 8 | user_data = <<-EOF 9 | #!/bin/bash 10 | sudo yum update -y 11 | sudo yum install httpd -y 12 | sudo systemctl enable httpd 13 | sudo systemctl start httpd 14 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 15 | EOF 16 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 17 | tags = var.ec2_instance_tags 18 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.my-ec2-vm[1] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v8-02-Input-Variables-Maps/c4-ec2-instance.tf:2-18 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | #instance_type = var.ec2_instance_type[0] 5 | instance_type = var.ec2_instance_type_map["big-apps"] 6 | key_name = "terraform-key" 7 | count = var.ec2_instance_count 8 | user_data = <<-EOF 9 | #!/bin/bash 10 | sudo yum update -y 11 | sudo yum install httpd -y 12 | sudo systemctl enable httpd 13 | sudo systemctl start httpd 14 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 15 | EOF 16 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 17 | tags = var.ec2_instance_tags 18 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.my-ec2-vm[1] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v8-02-Input-Variables-Maps/c4-ec2-instance.tf:2-18 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | #instance_type = var.ec2_instance_type[0] 5 | instance_type = var.ec2_instance_type_map["big-apps"] 6 | key_name = "terraform-key" 7 | count = var.ec2_instance_count 8 | user_data = <<-EOF 9 | #!/bin/bash 10 | sudo yum update -y 11 | sudo yum install httpd -y 12 | sudo systemctl enable httpd 13 | sudo systemctl start httpd 14 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 15 | EOF 16 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 17 | tags = var.ec2_instance_tags 18 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.my-ec2-vm[1] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v8-02-Input-Variables-Maps/c4-ec2-instance.tf:2-18 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | #instance_type = var.ec2_instance_type[0] 5 | instance_type = var.ec2_instance_type_map["big-apps"] 6 | key_name = "terraform-key" 7 | count = var.ec2_instance_count 8 | user_data = <<-EOF 9 | #!/bin/bash 10 | sudo yum update -y 11 | sudo yum install httpd -y 12 | sudo systemctl enable httpd 13 | sudo systemctl start httpd 14 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 15 | EOF 16 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 17 | tags = var.ec2_instance_tags 18 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.my-ec2-vm[1] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v8-02-Input-Variables-Maps/c4-ec2-instance.tf:2-18 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | #instance_type = var.ec2_instance_type[0] 5 | instance_type = var.ec2_instance_type_map["big-apps"] 6 | key_name = "terraform-key" 7 | count = var.ec2_instance_count 8 | user_data = <<-EOF 9 | #!/bin/bash 10 | sudo yum update -y 11 | sudo yum install httpd -y 12 | sudo systemctl enable httpd 13 | sudo systemctl start httpd 14 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 15 | EOF 16 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 17 | tags = var.ec2_instance_tags 18 | } Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22" FAILED for resource: aws_security_group.vpc-ssh File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v9-Input-Variables-Validation-Rules/c3-security-groups.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-1-port-security.html 2 | resource "aws_security_group" "vpc-ssh" { 3 | name = "vpc-ssh" 4 | description = "Dev VPC SSH" 5 | ingress { 6 | description = "Allow Port 22" 7 | from_port = 22 8 | to_port = 22 9 | protocol = "tcp" 10 | cidr_blocks = ["0.0.0.0/0"] 11 | } 12 | egress { 13 | description = "Allow all IP and Ports outbound" 14 | from_port = 0 15 | to_port = 0 16 | protocol = "-1" 17 | cidr_blocks = ["0.0.0.0/0"] 18 | } 19 | } Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80" FAILED for resource: aws_security_group.vpc-web File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v9-Input-Variables-Validation-Rules/c3-security-groups.tf:22-49 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80.html 22 | resource "aws_security_group" "vpc-web" { 23 | name = "vpc-web" 24 | description = "Dev VPC Web" 25 | 26 | ingress { 27 | description = "Allow Port 80" 28 | from_port = 80 29 | to_port = 80 30 | protocol = "tcp" 31 | cidr_blocks = ["0.0.0.0/0"] 32 | } 33 | 34 | ingress { 35 | description = "Allow Port 443" 36 | from_port = 443 37 | to_port = 443 38 | protocol = "tcp" 39 | cidr_blocks = ["0.0.0.0/0"] 40 | } 41 | 42 | egress { 43 | description = "Allow all IP and Ports outbound" 44 | from_port = 0 45 | to_port = 0 46 | protocol = "-1" 47 | cidr_blocks = ["0.0.0.0/0"] 48 | } 49 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v9-Input-Variables-Validation-Rules/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v9-Input-Variables-Validation-Rules/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v9-Input-Variables-Validation-Rules/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v9-Input-Variables-Validation-Rules/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22" FAILED for resource: aws_security_group.vpc-ssh File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v1-Input-Variables-Basic/c3-security-groups.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-1-port-security.html 2 | resource "aws_security_group" "vpc-ssh" { 3 | name = "vpc-ssh" 4 | description = "Dev VPC SSH" 5 | ingress { 6 | description = "Allow Port 22" 7 | from_port = 22 8 | to_port = 22 9 | protocol = "tcp" 10 | cidr_blocks = ["0.0.0.0/0"] 11 | } 12 | egress { 13 | description = "Allow all IP and Ports outbound" 14 | from_port = 0 15 | to_port = 0 16 | protocol = "-1" 17 | cidr_blocks = ["0.0.0.0/0"] 18 | } 19 | } Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80" FAILED for resource: aws_security_group.vpc-web File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v1-Input-Variables-Basic/c3-security-groups.tf:22-49 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80.html 22 | resource "aws_security_group" "vpc-web" { 23 | name = "vpc-web" 24 | description = "Dev VPC Web" 25 | 26 | ingress { 27 | description = "Allow Port 80" 28 | from_port = 80 29 | to_port = 80 30 | protocol = "tcp" 31 | cidr_blocks = ["0.0.0.0/0"] 32 | } 33 | 34 | ingress { 35 | description = "Allow Port 443" 36 | from_port = 443 37 | to_port = 443 38 | protocol = "tcp" 39 | cidr_blocks = ["0.0.0.0/0"] 40 | } 41 | 42 | egress { 43 | description = "Allow all IP and Ports outbound" 44 | from_port = 0 45 | to_port = 0 46 | protocol = "-1" 47 | cidr_blocks = ["0.0.0.0/0"] 48 | } 49 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v1-Input-Variables-Basic/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = "t3.micro" 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v1-Input-Variables-Basic/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = "t3.micro" 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v1-Input-Variables-Basic/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = "t3.micro" 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v1-Input-Variables-Basic/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = "t3.micro" 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_293: "Ensure that AWS database instances have deletion protection enabled" FAILED for resource: aws_db_instance.db1 File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v10-Sensitive-Input-Variables/c3-rds-db.tf:3-11 3 | resource "aws_db_instance" "db1" { 4 | allocated_storage = 5 5 | engine = "mysql" 6 | instance_class = "db.t2.micro" 7 | name = "mydb1" 8 | username = var.db_username 9 | password = var.db_password 10 | skip_final_snapshot = true 11 | } Check: CKV_AWS_129: "Ensure that respective logs of Amazon Relational Database Service (Amazon RDS) are enabled" FAILED for resource: aws_db_instance.db1 File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v10-Sensitive-Input-Variables/c3-rds-db.tf:3-11 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-that-respective-logs-of-amazon-relational-database-service-amazon-rds-are-enabled.html 3 | resource "aws_db_instance" "db1" { 4 | allocated_storage = 5 5 | engine = "mysql" 6 | instance_class = "db.t2.micro" 7 | name = "mydb1" 8 | username = var.db_username 9 | password = var.db_password 10 | skip_final_snapshot = true 11 | } Check: CKV_AWS_161: "Ensure RDS database has IAM authentication enabled" FAILED for resource: aws_db_instance.db1 File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v10-Sensitive-Input-Variables/c3-rds-db.tf:3-11 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-rds-database-has-iam-authentication-enabled.html 3 | resource "aws_db_instance" "db1" { 4 | allocated_storage = 5 5 | engine = "mysql" 6 | instance_class = "db.t2.micro" 7 | name = "mydb1" 8 | username = var.db_username 9 | password = var.db_password 10 | skip_final_snapshot = true 11 | } Check: CKV_AWS_226: "Ensure DB instance gets all minor upgrades automatically" FAILED for resource: aws_db_instance.db1 File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v10-Sensitive-Input-Variables/c3-rds-db.tf:3-11 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-aws-db-instance-gets-all-minor-upgrades-automatically.html 3 | resource "aws_db_instance" "db1" { 4 | allocated_storage = 5 5 | engine = "mysql" 6 | instance_class = "db.t2.micro" 7 | name = "mydb1" 8 | username = var.db_username 9 | password = var.db_password 10 | skip_final_snapshot = true 11 | } Check: CKV_AWS_118: "Ensure that enhanced monitoring is enabled for Amazon RDS instances" FAILED for resource: aws_db_instance.db1 File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v10-Sensitive-Input-Variables/c3-rds-db.tf:3-11 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-enhanced-monitoring-is-enabled-for-amazon-rds-instances.html 3 | resource "aws_db_instance" "db1" { 4 | allocated_storage = 5 5 | engine = "mysql" 6 | instance_class = "db.t2.micro" 7 | name = "mydb1" 8 | username = var.db_username 9 | password = var.db_password 10 | skip_final_snapshot = true 11 | } Check: CKV_AWS_354: "Ensure RDS Performance Insights are encrypted using KMS CMKs" FAILED for resource: aws_db_instance.db1 File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v10-Sensitive-Input-Variables/c3-rds-db.tf:3-11 3 | resource "aws_db_instance" "db1" { 4 | allocated_storage = 5 5 | engine = "mysql" 6 | instance_class = "db.t2.micro" 7 | name = "mydb1" 8 | username = var.db_username 9 | password = var.db_password 10 | skip_final_snapshot = true 11 | } Check: CKV_AWS_353: "Ensure that RDS instances have performance insights enabled" FAILED for resource: aws_db_instance.db1 File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v10-Sensitive-Input-Variables/c3-rds-db.tf:3-11 3 | resource "aws_db_instance" "db1" { 4 | allocated_storage = 5 5 | engine = "mysql" 6 | instance_class = "db.t2.micro" 7 | name = "mydb1" 8 | username = var.db_username 9 | password = var.db_password 10 | skip_final_snapshot = true 11 | } Check: CKV_AWS_16: "Ensure all data stored in the RDS is securely encrypted at rest" FAILED for resource: aws_db_instance.db1 File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v10-Sensitive-Input-Variables/c3-rds-db.tf:3-11 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-4.html 3 | resource "aws_db_instance" "db1" { 4 | allocated_storage = 5 5 | engine = "mysql" 6 | instance_class = "db.t2.micro" 7 | name = "mydb1" 8 | username = var.db_username 9 | password = var.db_password 10 | skip_final_snapshot = true 11 | } Check: CKV_AWS_157: "Ensure that RDS instances have Multi-AZ enabled" FAILED for resource: aws_db_instance.db1 File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v10-Sensitive-Input-Variables/c3-rds-db.tf:3-11 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-73.html 3 | resource "aws_db_instance" "db1" { 4 | allocated_storage = 5 5 | engine = "mysql" 6 | instance_class = "db.t2.micro" 7 | name = "mydb1" 8 | username = var.db_username 9 | password = var.db_password 10 | skip_final_snapshot = true 11 | } Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22" FAILED for resource: aws_security_group.vpc-ssh File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v11-File-Function/c3-security-groups.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-1-port-security.html 2 | resource "aws_security_group" "vpc-ssh" { 3 | name = "vpc-ssh" 4 | description = "Dev VPC SSH" 5 | ingress { 6 | description = "Allow Port 22" 7 | from_port = 22 8 | to_port = 22 9 | protocol = "tcp" 10 | cidr_blocks = ["0.0.0.0/0"] 11 | } 12 | egress { 13 | description = "Allow all IP and Ports outbound" 14 | from_port = 0 15 | to_port = 0 16 | protocol = "-1" 17 | cidr_blocks = ["0.0.0.0/0"] 18 | } 19 | } Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80" FAILED for resource: aws_security_group.vpc-web File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v11-File-Function/c3-security-groups.tf:22-49 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80.html 22 | resource "aws_security_group" "vpc-web" { 23 | name = "vpc-web" 24 | description = "Dev VPC Web" 25 | 26 | ingress { 27 | description = "Allow Port 80" 28 | from_port = 80 29 | to_port = 80 30 | protocol = "tcp" 31 | cidr_blocks = ["0.0.0.0/0"] 32 | } 33 | 34 | ingress { 35 | description = "Allow Port 443" 36 | from_port = 443 37 | to_port = 443 38 | protocol = "tcp" 39 | cidr_blocks = ["0.0.0.0/0"] 40 | } 41 | 42 | egress { 43 | description = "Allow all IP and Ports outbound" 44 | from_port = 0 45 | to_port = 0 46 | protocol = "-1" 47 | cidr_blocks = ["0.0.0.0/0"] 48 | } 49 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v11-File-Function/c4-ec2-instance.tf:2-22 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = file("apache-install.sh") 8 | /* 9 | user_data = <<-EOF 10 | #!/bin/bash 11 | sudo yum update -y 12 | sudo yum install httpd -y 13 | sudo systemctl enable httpd 14 | sudo systemctl start httpd 15 | echo "
    Welcome to StackSimplify ! AWS Infra created using Terraform
    " > /var/www/html/index.html 16 | EOF 17 | */ 18 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 19 | tags = { 20 | "Name" = "web" 21 | } 22 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v11-File-Function/c4-ec2-instance.tf:2-22 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = file("apache-install.sh") 8 | /* 9 | user_data = <<-EOF 10 | #!/bin/bash 11 | sudo yum update -y 12 | sudo yum install httpd -y 13 | sudo systemctl enable httpd 14 | sudo systemctl start httpd 15 | echo "
    Welcome to StackSimplify ! AWS Infra created using Terraform
    " > /var/www/html/index.html 16 | EOF 17 | */ 18 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 19 | tags = { 20 | "Name" = "web" 21 | } 22 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v11-File-Function/c4-ec2-instance.tf:2-22 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = file("apache-install.sh") 8 | /* 9 | user_data = <<-EOF 10 | #!/bin/bash 11 | sudo yum update -y 12 | sudo yum install httpd -y 13 | sudo systemctl enable httpd 14 | sudo systemctl start httpd 15 | echo "
    Welcome to StackSimplify ! AWS Infra created using Terraform
    " > /var/www/html/index.html 16 | EOF 17 | */ 18 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 19 | tags = { 20 | "Name" = "web" 21 | } 22 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v11-File-Function/c4-ec2-instance.tf:2-22 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = file("apache-install.sh") 8 | /* 9 | user_data = <<-EOF 10 | #!/bin/bash 11 | sudo yum update -y 12 | sudo yum install httpd -y 13 | sudo systemctl enable httpd 14 | sudo systemctl start httpd 15 | echo "
    Welcome to StackSimplify ! AWS Infra created using Terraform
    " > /var/www/html/index.html 16 | EOF 17 | */ 18 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 19 | tags = { 20 | "Name" = "web" 21 | } 22 | } Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22" FAILED for resource: aws_security_group.vpc-ssh File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v2-Input-Variables-Assign-when-prompted/c3-security-groups.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-1-port-security.html 2 | resource "aws_security_group" "vpc-ssh" { 3 | name = "vpc-ssh" 4 | description = "Dev VPC SSH" 5 | ingress { 6 | description = "Allow Port 22" 7 | from_port = 22 8 | to_port = 22 9 | protocol = "tcp" 10 | cidr_blocks = ["0.0.0.0/0"] 11 | } 12 | egress { 13 | description = "Allow all IP and Ports outbound" 14 | from_port = 0 15 | to_port = 0 16 | protocol = "-1" 17 | cidr_blocks = ["0.0.0.0/0"] 18 | } 19 | } Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80" FAILED for resource: aws_security_group.vpc-web File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v2-Input-Variables-Assign-when-prompted/c3-security-groups.tf:22-49 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80.html 22 | resource "aws_security_group" "vpc-web" { 23 | name = "vpc-web" 24 | description = "Dev VPC Web" 25 | 26 | ingress { 27 | description = "Allow Port 80" 28 | from_port = 80 29 | to_port = 80 30 | protocol = "tcp" 31 | cidr_blocks = ["0.0.0.0/0"] 32 | } 33 | 34 | ingress { 35 | description = "Allow Port 443" 36 | from_port = 443 37 | to_port = 443 38 | protocol = "tcp" 39 | cidr_blocks = ["0.0.0.0/0"] 40 | } 41 | 42 | egress { 43 | description = "Allow all IP and Ports outbound" 44 | from_port = 0 45 | to_port = 0 46 | protocol = "-1" 47 | cidr_blocks = ["0.0.0.0/0"] 48 | } 49 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v2-Input-Variables-Assign-when-prompted/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v2-Input-Variables-Assign-when-prompted/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v2-Input-Variables-Assign-when-prompted/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v2-Input-Variables-Assign-when-prompted/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22" FAILED for resource: aws_security_group.vpc-ssh File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v3-Input-Variables-Override-default-with-cli-var/c3-security-groups.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-1-port-security.html 2 | resource "aws_security_group" "vpc-ssh" { 3 | name = "vpc-ssh" 4 | description = "Dev VPC SSH" 5 | ingress { 6 | description = "Allow Port 22" 7 | from_port = 22 8 | to_port = 22 9 | protocol = "tcp" 10 | cidr_blocks = ["0.0.0.0/0"] 11 | } 12 | egress { 13 | description = "Allow all IP and Ports outbound" 14 | from_port = 0 15 | to_port = 0 16 | protocol = "-1" 17 | cidr_blocks = ["0.0.0.0/0"] 18 | } 19 | } Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80" FAILED for resource: aws_security_group.vpc-web File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v3-Input-Variables-Override-default-with-cli-var/c3-security-groups.tf:22-49 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80.html 22 | resource "aws_security_group" "vpc-web" { 23 | name = "vpc-web" 24 | description = "Dev VPC Web" 25 | 26 | ingress { 27 | description = "Allow Port 80" 28 | from_port = 80 29 | to_port = 80 30 | protocol = "tcp" 31 | cidr_blocks = ["0.0.0.0/0"] 32 | } 33 | 34 | ingress { 35 | description = "Allow Port 443" 36 | from_port = 443 37 | to_port = 443 38 | protocol = "tcp" 39 | cidr_blocks = ["0.0.0.0/0"] 40 | } 41 | 42 | egress { 43 | description = "Allow all IP and Ports outbound" 44 | from_port = 0 45 | to_port = 0 46 | protocol = "-1" 47 | cidr_blocks = ["0.0.0.0/0"] 48 | } 49 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v3-Input-Variables-Override-default-with-cli-var/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v3-Input-Variables-Override-default-with-cli-var/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v3-Input-Variables-Override-default-with-cli-var/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v3-Input-Variables-Override-default-with-cli-var/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.my-ec2-vm[1] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v3-Input-Variables-Override-default-with-cli-var/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.my-ec2-vm[1] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v3-Input-Variables-Override-default-with-cli-var/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.my-ec2-vm[1] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v3-Input-Variables-Override-default-with-cli-var/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.my-ec2-vm[1] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v3-Input-Variables-Override-default-with-cli-var/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22" FAILED for resource: aws_security_group.vpc-ssh File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v4-Input-Variables-Override-with-Environment-Variables/c3-security-groups.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-1-port-security.html 2 | resource "aws_security_group" "vpc-ssh" { 3 | name = "vpc-ssh" 4 | description = "Dev VPC SSH" 5 | ingress { 6 | description = "Allow Port 22" 7 | from_port = 22 8 | to_port = 22 9 | protocol = "tcp" 10 | cidr_blocks = ["0.0.0.0/0"] 11 | } 12 | egress { 13 | description = "Allow all IP and Ports outbound" 14 | from_port = 0 15 | to_port = 0 16 | protocol = "-1" 17 | cidr_blocks = ["0.0.0.0/0"] 18 | } 19 | } Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80" FAILED for resource: aws_security_group.vpc-web File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v4-Input-Variables-Override-with-Environment-Variables/c3-security-groups.tf:22-49 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80.html 22 | resource "aws_security_group" "vpc-web" { 23 | name = "vpc-web" 24 | description = "Dev VPC Web" 25 | 26 | ingress { 27 | description = "Allow Port 80" 28 | from_port = 80 29 | to_port = 80 30 | protocol = "tcp" 31 | cidr_blocks = ["0.0.0.0/0"] 32 | } 33 | 34 | ingress { 35 | description = "Allow Port 443" 36 | from_port = 443 37 | to_port = 443 38 | protocol = "tcp" 39 | cidr_blocks = ["0.0.0.0/0"] 40 | } 41 | 42 | egress { 43 | description = "Allow all IP and Ports outbound" 44 | from_port = 0 45 | to_port = 0 46 | protocol = "-1" 47 | cidr_blocks = ["0.0.0.0/0"] 48 | } 49 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v4-Input-Variables-Override-with-Environment-Variables/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v4-Input-Variables-Override-with-Environment-Variables/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v4-Input-Variables-Override-with-Environment-Variables/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v4-Input-Variables-Override-with-Environment-Variables/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.my-ec2-vm[1] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v4-Input-Variables-Override-with-Environment-Variables/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.my-ec2-vm[1] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v4-Input-Variables-Override-with-Environment-Variables/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.my-ec2-vm[1] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v4-Input-Variables-Override-with-Environment-Variables/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.my-ec2-vm[1] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v4-Input-Variables-Override-with-Environment-Variables/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22" FAILED for resource: aws_security_group.vpc-ssh File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v5-Input-Variables-Assign-with-terraform-tfvars/c3-security-groups.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-1-port-security.html 2 | resource "aws_security_group" "vpc-ssh" { 3 | name = "vpc-ssh" 4 | description = "Dev VPC SSH" 5 | ingress { 6 | description = "Allow Port 22" 7 | from_port = 22 8 | to_port = 22 9 | protocol = "tcp" 10 | cidr_blocks = ["0.0.0.0/0"] 11 | } 12 | egress { 13 | description = "Allow all IP and Ports outbound" 14 | from_port = 0 15 | to_port = 0 16 | protocol = "-1" 17 | cidr_blocks = ["0.0.0.0/0"] 18 | } 19 | } Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80" FAILED for resource: aws_security_group.vpc-web File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v5-Input-Variables-Assign-with-terraform-tfvars/c3-security-groups.tf:22-49 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80.html 22 | resource "aws_security_group" "vpc-web" { 23 | name = "vpc-web" 24 | description = "Dev VPC Web" 25 | 26 | ingress { 27 | description = "Allow Port 80" 28 | from_port = 80 29 | to_port = 80 30 | protocol = "tcp" 31 | cidr_blocks = ["0.0.0.0/0"] 32 | } 33 | 34 | ingress { 35 | description = "Allow Port 443" 36 | from_port = 443 37 | to_port = 443 38 | protocol = "tcp" 39 | cidr_blocks = ["0.0.0.0/0"] 40 | } 41 | 42 | egress { 43 | description = "Allow all IP and Ports outbound" 44 | from_port = 0 45 | to_port = 0 46 | protocol = "-1" 47 | cidr_blocks = ["0.0.0.0/0"] 48 | } 49 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v5-Input-Variables-Assign-with-terraform-tfvars/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v5-Input-Variables-Assign-with-terraform-tfvars/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v5-Input-Variables-Assign-with-terraform-tfvars/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v5-Input-Variables-Assign-with-terraform-tfvars/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22" FAILED for resource: aws_security_group.vpc-ssh File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v6-Input-Variables-Assign-with-tfvars-var-file/c3-security-groups.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-1-port-security.html 2 | resource "aws_security_group" "vpc-ssh" { 3 | name = "vpc-ssh" 4 | description = "Dev VPC SSH" 5 | ingress { 6 | description = "Allow Port 22" 7 | from_port = 22 8 | to_port = 22 9 | protocol = "tcp" 10 | cidr_blocks = ["0.0.0.0/0"] 11 | } 12 | egress { 13 | description = "Allow all IP and Ports outbound" 14 | from_port = 0 15 | to_port = 0 16 | protocol = "-1" 17 | cidr_blocks = ["0.0.0.0/0"] 18 | } 19 | } Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80" FAILED for resource: aws_security_group.vpc-web File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v6-Input-Variables-Assign-with-tfvars-var-file/c3-security-groups.tf:22-49 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80.html 22 | resource "aws_security_group" "vpc-web" { 23 | name = "vpc-web" 24 | description = "Dev VPC Web" 25 | 26 | ingress { 27 | description = "Allow Port 80" 28 | from_port = 80 29 | to_port = 80 30 | protocol = "tcp" 31 | cidr_blocks = ["0.0.0.0/0"] 32 | } 33 | 34 | ingress { 35 | description = "Allow Port 443" 36 | from_port = 443 37 | to_port = 443 38 | protocol = "tcp" 39 | cidr_blocks = ["0.0.0.0/0"] 40 | } 41 | 42 | egress { 43 | description = "Allow all IP and Ports outbound" 44 | from_port = 0 45 | to_port = 0 46 | protocol = "-1" 47 | cidr_blocks = ["0.0.0.0/0"] 48 | } 49 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v6-Input-Variables-Assign-with-tfvars-var-file/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v6-Input-Variables-Assign-with-tfvars-var-file/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v6-Input-Variables-Assign-with-tfvars-var-file/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v6-Input-Variables-Assign-with-tfvars-var-file/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22" FAILED for resource: aws_security_group.vpc-ssh File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v7-Input-Variables-Assign-with-auto-tfvars/c3-security-groups.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-1-port-security.html 2 | resource "aws_security_group" "vpc-ssh" { 3 | name = "vpc-ssh" 4 | description = "Dev VPC SSH" 5 | ingress { 6 | description = "Allow Port 22" 7 | from_port = 22 8 | to_port = 22 9 | protocol = "tcp" 10 | cidr_blocks = ["0.0.0.0/0"] 11 | } 12 | egress { 13 | description = "Allow all IP and Ports outbound" 14 | from_port = 0 15 | to_port = 0 16 | protocol = "-1" 17 | cidr_blocks = ["0.0.0.0/0"] 18 | } 19 | } Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80" FAILED for resource: aws_security_group.vpc-web File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v7-Input-Variables-Assign-with-auto-tfvars/c3-security-groups.tf:22-49 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80.html 22 | resource "aws_security_group" "vpc-web" { 23 | name = "vpc-web" 24 | description = "Dev VPC Web" 25 | 26 | ingress { 27 | description = "Allow Port 80" 28 | from_port = 80 29 | to_port = 80 30 | protocol = "tcp" 31 | cidr_blocks = ["0.0.0.0/0"] 32 | } 33 | 34 | ingress { 35 | description = "Allow Port 443" 36 | from_port = 443 37 | to_port = 443 38 | protocol = "tcp" 39 | cidr_blocks = ["0.0.0.0/0"] 40 | } 41 | 42 | egress { 43 | description = "Allow all IP and Ports outbound" 44 | from_port = 0 45 | to_port = 0 46 | protocol = "-1" 47 | cidr_blocks = ["0.0.0.0/0"] 48 | } 49 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v7-Input-Variables-Assign-with-auto-tfvars/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v7-Input-Variables-Assign-with-auto-tfvars/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v7-Input-Variables-Assign-with-auto-tfvars/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v7-Input-Variables-Assign-with-auto-tfvars/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22" FAILED for resource: aws_security_group.vpc-ssh File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v8-01-Input-Variables-Lists/c3-security-groups.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-1-port-security.html 2 | resource "aws_security_group" "vpc-ssh" { 3 | name = "vpc-ssh" 4 | description = "Dev VPC SSH" 5 | ingress { 6 | description = "Allow Port 22" 7 | from_port = 22 8 | to_port = 22 9 | protocol = "tcp" 10 | cidr_blocks = ["0.0.0.0/0"] 11 | } 12 | egress { 13 | description = "Allow all IP and Ports outbound" 14 | from_port = 0 15 | to_port = 0 16 | protocol = "-1" 17 | cidr_blocks = ["0.0.0.0/0"] 18 | } 19 | } Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80" FAILED for resource: aws_security_group.vpc-web File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v8-01-Input-Variables-Lists/c3-security-groups.tf:22-49 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80.html 22 | resource "aws_security_group" "vpc-web" { 23 | name = "vpc-web" 24 | description = "Dev VPC Web" 25 | 26 | ingress { 27 | description = "Allow Port 80" 28 | from_port = 80 29 | to_port = 80 30 | protocol = "tcp" 31 | cidr_blocks = ["0.0.0.0/0"] 32 | } 33 | 34 | ingress { 35 | description = "Allow Port 443" 36 | from_port = 443 37 | to_port = 443 38 | protocol = "tcp" 39 | cidr_blocks = ["0.0.0.0/0"] 40 | } 41 | 42 | egress { 43 | description = "Allow all IP and Ports outbound" 44 | from_port = 0 45 | to_port = 0 46 | protocol = "-1" 47 | cidr_blocks = ["0.0.0.0/0"] 48 | } 49 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v8-01-Input-Variables-Lists/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type[0] 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v8-01-Input-Variables-Lists/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type[0] 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v8-01-Input-Variables-Lists/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type[0] 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v8-01-Input-Variables-Lists/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type[0] 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.my-ec2-vm[1] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v8-01-Input-Variables-Lists/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type[0] 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.my-ec2-vm[1] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v8-01-Input-Variables-Lists/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type[0] 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.my-ec2-vm[1] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v8-01-Input-Variables-Lists/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type[0] 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.my-ec2-vm[1] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v8-01-Input-Variables-Lists/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type[0] 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22" FAILED for resource: aws_security_group.vpc-ssh File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v8-02-Input-Variables-Maps/c3-security-groups.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-1-port-security.html 2 | resource "aws_security_group" "vpc-ssh" { 3 | name = "vpc-ssh" 4 | description = "Dev VPC SSH" 5 | ingress { 6 | description = "Allow Port 22" 7 | from_port = 22 8 | to_port = 22 9 | protocol = "tcp" 10 | cidr_blocks = ["0.0.0.0/0"] 11 | } 12 | egress { 13 | description = "Allow all IP and Ports outbound" 14 | from_port = 0 15 | to_port = 0 16 | protocol = "-1" 17 | cidr_blocks = ["0.0.0.0/0"] 18 | } 19 | } Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80" FAILED for resource: aws_security_group.vpc-web File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v8-02-Input-Variables-Maps/c3-security-groups.tf:22-49 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80.html 22 | resource "aws_security_group" "vpc-web" { 23 | name = "vpc-web" 24 | description = "Dev VPC Web" 25 | 26 | ingress { 27 | description = "Allow Port 80" 28 | from_port = 80 29 | to_port = 80 30 | protocol = "tcp" 31 | cidr_blocks = ["0.0.0.0/0"] 32 | } 33 | 34 | ingress { 35 | description = "Allow Port 443" 36 | from_port = 443 37 | to_port = 443 38 | protocol = "tcp" 39 | cidr_blocks = ["0.0.0.0/0"] 40 | } 41 | 42 | egress { 43 | description = "Allow all IP and Ports outbound" 44 | from_port = 0 45 | to_port = 0 46 | protocol = "-1" 47 | cidr_blocks = ["0.0.0.0/0"] 48 | } 49 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v8-02-Input-Variables-Maps/c4-ec2-instance.tf:2-18 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | #instance_type = var.ec2_instance_type[0] 5 | instance_type = var.ec2_instance_type_map["big-apps"] 6 | key_name = "terraform-key" 7 | count = var.ec2_instance_count 8 | user_data = <<-EOF 9 | #!/bin/bash 10 | sudo yum update -y 11 | sudo yum install httpd -y 12 | sudo systemctl enable httpd 13 | sudo systemctl start httpd 14 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 15 | EOF 16 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 17 | tags = var.ec2_instance_tags 18 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v8-02-Input-Variables-Maps/c4-ec2-instance.tf:2-18 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | #instance_type = var.ec2_instance_type[0] 5 | instance_type = var.ec2_instance_type_map["big-apps"] 6 | key_name = "terraform-key" 7 | count = var.ec2_instance_count 8 | user_data = <<-EOF 9 | #!/bin/bash 10 | sudo yum update -y 11 | sudo yum install httpd -y 12 | sudo systemctl enable httpd 13 | sudo systemctl start httpd 14 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 15 | EOF 16 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 17 | tags = var.ec2_instance_tags 18 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v8-02-Input-Variables-Maps/c4-ec2-instance.tf:2-18 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | #instance_type = var.ec2_instance_type[0] 5 | instance_type = var.ec2_instance_type_map["big-apps"] 6 | key_name = "terraform-key" 7 | count = var.ec2_instance_count 8 | user_data = <<-EOF 9 | #!/bin/bash 10 | sudo yum update -y 11 | sudo yum install httpd -y 12 | sudo systemctl enable httpd 13 | sudo systemctl start httpd 14 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 15 | EOF 16 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 17 | tags = var.ec2_instance_tags 18 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v8-02-Input-Variables-Maps/c4-ec2-instance.tf:2-18 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | #instance_type = var.ec2_instance_type[0] 5 | instance_type = var.ec2_instance_type_map["big-apps"] 6 | key_name = "terraform-key" 7 | count = var.ec2_instance_count 8 | user_data = <<-EOF 9 | #!/bin/bash 10 | sudo yum update -y 11 | sudo yum install httpd -y 12 | sudo systemctl enable httpd 13 | sudo systemctl start httpd 14 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 15 | EOF 16 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 17 | tags = var.ec2_instance_tags 18 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.my-ec2-vm[1] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v8-02-Input-Variables-Maps/c4-ec2-instance.tf:2-18 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | #instance_type = var.ec2_instance_type[0] 5 | instance_type = var.ec2_instance_type_map["big-apps"] 6 | key_name = "terraform-key" 7 | count = var.ec2_instance_count 8 | user_data = <<-EOF 9 | #!/bin/bash 10 | sudo yum update -y 11 | sudo yum install httpd -y 12 | sudo systemctl enable httpd 13 | sudo systemctl start httpd 14 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 15 | EOF 16 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 17 | tags = var.ec2_instance_tags 18 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.my-ec2-vm[1] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v8-02-Input-Variables-Maps/c4-ec2-instance.tf:2-18 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | #instance_type = var.ec2_instance_type[0] 5 | instance_type = var.ec2_instance_type_map["big-apps"] 6 | key_name = "terraform-key" 7 | count = var.ec2_instance_count 8 | user_data = <<-EOF 9 | #!/bin/bash 10 | sudo yum update -y 11 | sudo yum install httpd -y 12 | sudo systemctl enable httpd 13 | sudo systemctl start httpd 14 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 15 | EOF 16 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 17 | tags = var.ec2_instance_tags 18 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.my-ec2-vm[1] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v8-02-Input-Variables-Maps/c4-ec2-instance.tf:2-18 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | #instance_type = var.ec2_instance_type[0] 5 | instance_type = var.ec2_instance_type_map["big-apps"] 6 | key_name = "terraform-key" 7 | count = var.ec2_instance_count 8 | user_data = <<-EOF 9 | #!/bin/bash 10 | sudo yum update -y 11 | sudo yum install httpd -y 12 | sudo systemctl enable httpd 13 | sudo systemctl start httpd 14 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 15 | EOF 16 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 17 | tags = var.ec2_instance_tags 18 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.my-ec2-vm[1] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v8-02-Input-Variables-Maps/c4-ec2-instance.tf:2-18 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | #instance_type = var.ec2_instance_type[0] 5 | instance_type = var.ec2_instance_type_map["big-apps"] 6 | key_name = "terraform-key" 7 | count = var.ec2_instance_count 8 | user_data = <<-EOF 9 | #!/bin/bash 10 | sudo yum update -y 11 | sudo yum install httpd -y 12 | sudo systemctl enable httpd 13 | sudo systemctl start httpd 14 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 15 | EOF 16 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 17 | tags = var.ec2_instance_tags 18 | } Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22" FAILED for resource: aws_security_group.vpc-ssh File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v9-Input-Variables-Validation-Rules/c3-security-groups.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-1-port-security.html 2 | resource "aws_security_group" "vpc-ssh" { 3 | name = "vpc-ssh" 4 | description = "Dev VPC SSH" 5 | ingress { 6 | description = "Allow Port 22" 7 | from_port = 22 8 | to_port = 22 9 | protocol = "tcp" 10 | cidr_blocks = ["0.0.0.0/0"] 11 | } 12 | egress { 13 | description = "Allow all IP and Ports outbound" 14 | from_port = 0 15 | to_port = 0 16 | protocol = "-1" 17 | cidr_blocks = ["0.0.0.0/0"] 18 | } 19 | } Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80" FAILED for resource: aws_security_group.vpc-web File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v9-Input-Variables-Validation-Rules/c3-security-groups.tf:22-49 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80.html 22 | resource "aws_security_group" "vpc-web" { 23 | name = "vpc-web" 24 | description = "Dev VPC Web" 25 | 26 | ingress { 27 | description = "Allow Port 80" 28 | from_port = 80 29 | to_port = 80 30 | protocol = "tcp" 31 | cidr_blocks = ["0.0.0.0/0"] 32 | } 33 | 34 | ingress { 35 | description = "Allow Port 443" 36 | from_port = 443 37 | to_port = 443 38 | protocol = "tcp" 39 | cidr_blocks = ["0.0.0.0/0"] 40 | } 41 | 42 | egress { 43 | description = "Allow all IP and Ports outbound" 44 | from_port = 0 45 | to_port = 0 46 | protocol = "-1" 47 | cidr_blocks = ["0.0.0.0/0"] 48 | } 49 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v9-Input-Variables-Validation-Rules/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v9-Input-Variables-Validation-Rules/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v9-Input-Variables-Validation-Rules/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v9-Input-Variables-Validation-Rules/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22" FAILED for resource: aws_security_group.vpc-ssh File: /05-Terraform-Variables/05-02-Terraform-Output-Values/terraform-manifests-oldv1/c3-security-groups.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-1-port-security.html 2 | resource "aws_security_group" "vpc-ssh" { 3 | name = "vpc-ssh" 4 | description = "Dev VPC SSH" 5 | ingress { 6 | description = "Allow Port 22" 7 | from_port = 22 8 | to_port = 22 9 | protocol = "tcp" 10 | cidr_blocks = ["0.0.0.0/0"] 11 | } 12 | egress { 13 | description = "Allow all IP and Ports outbound" 14 | from_port = 0 15 | to_port = 0 16 | protocol = "-1" 17 | cidr_blocks = ["0.0.0.0/0"] 18 | } 19 | } Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80" FAILED for resource: aws_security_group.vpc-web File: /05-Terraform-Variables/05-02-Terraform-Output-Values/terraform-manifests-oldv1/c3-security-groups.tf:22-49 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80.html 22 | resource "aws_security_group" "vpc-web" { 23 | name = "vpc-web" 24 | description = "Dev VPC Web" 25 | 26 | ingress { 27 | description = "Allow Port 80" 28 | from_port = 80 29 | to_port = 80 30 | protocol = "tcp" 31 | cidr_blocks = ["0.0.0.0/0"] 32 | } 33 | 34 | ingress { 35 | description = "Allow Port 443" 36 | from_port = 443 37 | to_port = 443 38 | protocol = "tcp" 39 | cidr_blocks = ["0.0.0.0/0"] 40 | } 41 | 42 | egress { 43 | description = "Allow all IP and Ports outbound" 44 | from_port = 0 45 | to_port = 0 46 | protocol = "-1" 47 | cidr_blocks = ["0.0.0.0/0"] 48 | } 49 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.my-ec2-vm File: /05-Terraform-Variables/05-02-Terraform-Output-Values/terraform-manifests-oldv1/c4-ec2-instance.tf:2-21 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | user_data = file("apache-install.sh") 7 | /* 8 | user_data = <<-EOF 9 | #!/bin/bash 10 | sudo yum update -y 11 | sudo yum install httpd -y 12 | sudo systemctl enable httpd 13 | sudo systemctl start httpd 14 | echo "
    Welcome to StackSimplify ! AWS Infra created using Terraform
    " > /var/www/html/index.html 15 | EOF 16 | */ 17 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 18 | tags = { 19 | "Name" = "web" 20 | } 21 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.my-ec2-vm File: /05-Terraform-Variables/05-02-Terraform-Output-Values/terraform-manifests-oldv1/c4-ec2-instance.tf:2-21 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | user_data = file("apache-install.sh") 7 | /* 8 | user_data = <<-EOF 9 | #!/bin/bash 10 | sudo yum update -y 11 | sudo yum install httpd -y 12 | sudo systemctl enable httpd 13 | sudo systemctl start httpd 14 | echo "
    Welcome to StackSimplify ! AWS Infra created using Terraform
    " > /var/www/html/index.html 15 | EOF 16 | */ 17 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 18 | tags = { 19 | "Name" = "web" 20 | } 21 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.my-ec2-vm File: /05-Terraform-Variables/05-02-Terraform-Output-Values/terraform-manifests-oldv1/c4-ec2-instance.tf:2-21 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | user_data = file("apache-install.sh") 7 | /* 8 | user_data = <<-EOF 9 | #!/bin/bash 10 | sudo yum update -y 11 | sudo yum install httpd -y 12 | sudo systemctl enable httpd 13 | sudo systemctl start httpd 14 | echo "
    Welcome to StackSimplify ! AWS Infra created using Terraform
    " > /var/www/html/index.html 15 | EOF 16 | */ 17 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 18 | tags = { 19 | "Name" = "web" 20 | } 21 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.my-ec2-vm File: /05-Terraform-Variables/05-02-Terraform-Output-Values/terraform-manifests-oldv1/c4-ec2-instance.tf:2-21 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | user_data = file("apache-install.sh") 7 | /* 8 | user_data = <<-EOF 9 | #!/bin/bash 10 | sudo yum update -y 11 | sudo yum install httpd -y 12 | sudo systemctl enable httpd 13 | sudo systemctl start httpd 14 | echo "
    Welcome to StackSimplify ! AWS Infra created using Terraform
    " > /var/www/html/index.html 15 | EOF 16 | */ 17 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 18 | tags = { 19 | "Name" = "web" 20 | } 21 | } Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22" FAILED for resource: aws_security_group.vpc-ssh File: /05-Terraform-Variables/05-02-Terraform-Output-Values/terraform-manifests/c3-security-groups.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-1-port-security.html 2 | resource "aws_security_group" "vpc-ssh" { 3 | name = "vpc-ssh" 4 | description = "Dev VPC SSH" 5 | ingress { 6 | description = "Allow Port 22" 7 | from_port = 22 8 | to_port = 22 9 | protocol = "tcp" 10 | cidr_blocks = ["0.0.0.0/0"] 11 | } 12 | egress { 13 | description = "Allow all IP and Ports outbound" 14 | from_port = 0 15 | to_port = 0 16 | protocol = "-1" 17 | cidr_blocks = ["0.0.0.0/0"] 18 | } 19 | } Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80" FAILED for resource: aws_security_group.vpc-web File: /05-Terraform-Variables/05-02-Terraform-Output-Values/terraform-manifests/c3-security-groups.tf:22-49 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80.html 22 | resource "aws_security_group" "vpc-web" { 23 | name = "vpc-web" 24 | description = "Dev VPC Web" 25 | 26 | ingress { 27 | description = "Allow Port 80" 28 | from_port = 80 29 | to_port = 80 30 | protocol = "tcp" 31 | cidr_blocks = ["0.0.0.0/0"] 32 | } 33 | 34 | ingress { 35 | description = "Allow Port 443" 36 | from_port = 443 37 | to_port = 443 38 | protocol = "tcp" 39 | cidr_blocks = ["0.0.0.0/0"] 40 | } 41 | 42 | egress { 43 | description = "Allow all IP and Ports outbound" 44 | from_port = 0 45 | to_port = 0 46 | protocol = "-1" 47 | cidr_blocks = ["0.0.0.0/0"] 48 | } 49 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.my-ec2-vm File: /05-Terraform-Variables/05-02-Terraform-Output-Values/terraform-manifests/c4-ec2-instance.tf:2-21 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | user_data = file("apache-install.sh") 7 | /* 8 | user_data = <<-EOF 9 | #!/bin/bash 10 | sudo yum update -y 11 | sudo yum install httpd -y 12 | sudo systemctl enable httpd 13 | sudo systemctl start httpd 14 | echo "
    Welcome to StackSimplify ! AWS Infra created using Terraform
    " > /var/www/html/index.html 15 | EOF 16 | */ 17 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 18 | tags = { 19 | "Name" = "web" 20 | } 21 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.my-ec2-vm File: /05-Terraform-Variables/05-02-Terraform-Output-Values/terraform-manifests/c4-ec2-instance.tf:2-21 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | user_data = file("apache-install.sh") 7 | /* 8 | user_data = <<-EOF 9 | #!/bin/bash 10 | sudo yum update -y 11 | sudo yum install httpd -y 12 | sudo systemctl enable httpd 13 | sudo systemctl start httpd 14 | echo "
    Welcome to StackSimplify ! AWS Infra created using Terraform
    " > /var/www/html/index.html 15 | EOF 16 | */ 17 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 18 | tags = { 19 | "Name" = "web" 20 | } 21 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.my-ec2-vm File: /05-Terraform-Variables/05-02-Terraform-Output-Values/terraform-manifests/c4-ec2-instance.tf:2-21 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | user_data = file("apache-install.sh") 7 | /* 8 | user_data = <<-EOF 9 | #!/bin/bash 10 | sudo yum update -y 11 | sudo yum install httpd -y 12 | sudo systemctl enable httpd 13 | sudo systemctl start httpd 14 | echo "
    Welcome to StackSimplify ! AWS Infra created using Terraform
    " > /var/www/html/index.html 15 | EOF 16 | */ 17 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 18 | tags = { 19 | "Name" = "web" 20 | } 21 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.my-ec2-vm File: /05-Terraform-Variables/05-02-Terraform-Output-Values/terraform-manifests/c4-ec2-instance.tf:2-21 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | user_data = file("apache-install.sh") 7 | /* 8 | user_data = <<-EOF 9 | #!/bin/bash 10 | sudo yum update -y 11 | sudo yum install httpd -y 12 | sudo systemctl enable httpd 13 | sudo systemctl start httpd 14 | echo "
    Welcome to StackSimplify ! AWS Infra created using Terraform
    " > /var/www/html/index.html 15 | EOF 16 | */ 17 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 18 | tags = { 19 | "Name" = "web" 20 | } 21 | } Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22" FAILED for resource: aws_security_group.vpc-ssh File: /06-Terraform-Datasources/terraform-manifests-oldv1/c3-security-groups.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-1-port-security.html 2 | resource "aws_security_group" "vpc-ssh" { 3 | name = "vpc-ssh" 4 | description = "Dev VPC SSH" 5 | ingress { 6 | description = "Allow Port 22" 7 | from_port = 22 8 | to_port = 22 9 | protocol = "tcp" 10 | cidr_blocks = ["0.0.0.0/0"] 11 | } 12 | egress { 13 | description = "Allow all ip and ports outboun" 14 | from_port = 0 15 | to_port = 0 16 | protocol = "-1" 17 | cidr_blocks = ["0.0.0.0/0"] 18 | } 19 | } Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80" FAILED for resource: aws_security_group.vpc-web File: /06-Terraform-Datasources/terraform-manifests-oldv1/c3-security-groups.tf:22-49 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80.html 22 | resource "aws_security_group" "vpc-web" { 23 | name = "vpc-web" 24 | description = "Dev VPC web" 25 | ingress { 26 | description = "Allow Port 80" 27 | from_port = 80 28 | to_port = 80 29 | protocol = "tcp" 30 | cidr_blocks = ["0.0.0.0/0"] 31 | } 32 | 33 | ingress { 34 | description = "Allow Port 443" 35 | from_port = 443 36 | to_port = 443 37 | protocol = "tcp" 38 | cidr_blocks = ["0.0.0.0/0"] 39 | } 40 | 41 | egress { 42 | description = "Allow all ip and ports outbound" 43 | from_port = 0 44 | to_port = 0 45 | protocol = "-1" 46 | cidr_blocks = ["0.0.0.0/0"] 47 | } 48 | 49 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.my-ec2-vm File: /06-Terraform-Datasources/terraform-manifests-oldv1/c4-ec2-instance.tf:2-11 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | user_data = file("apache-install.sh") 7 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 8 | tags = { 9 | "Name" = "amz-linux-vm" 10 | } 11 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.my-ec2-vm File: /06-Terraform-Datasources/terraform-manifests-oldv1/c4-ec2-instance.tf:2-11 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | user_data = file("apache-install.sh") 7 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 8 | tags = { 9 | "Name" = "amz-linux-vm" 10 | } 11 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.my-ec2-vm File: /06-Terraform-Datasources/terraform-manifests-oldv1/c4-ec2-instance.tf:2-11 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | user_data = file("apache-install.sh") 7 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 8 | tags = { 9 | "Name" = "amz-linux-vm" 10 | } 11 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.my-ec2-vm File: /06-Terraform-Datasources/terraform-manifests-oldv1/c4-ec2-instance.tf:2-11 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | user_data = file("apache-install.sh") 7 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 8 | tags = { 9 | "Name" = "amz-linux-vm" 10 | } 11 | } Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22" FAILED for resource: aws_security_group.vpc-ssh File: /06-Terraform-Datasources/terraform-manifests/c3-security-groups.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-1-port-security.html 2 | resource "aws_security_group" "vpc-ssh" { 3 | name = "vpc-ssh" 4 | description = "Dev VPC SSH" 5 | ingress { 6 | description = "Allow Port 22" 7 | from_port = 22 8 | to_port = 22 9 | protocol = "tcp" 10 | cidr_blocks = ["0.0.0.0/0"] 11 | } 12 | egress { 13 | description = "Allow all ip and ports outboun" 14 | from_port = 0 15 | to_port = 0 16 | protocol = "-1" 17 | cidr_blocks = ["0.0.0.0/0"] 18 | } 19 | } Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80" FAILED for resource: aws_security_group.vpc-web File: /06-Terraform-Datasources/terraform-manifests/c3-security-groups.tf:22-49 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80.html 22 | resource "aws_security_group" "vpc-web" { 23 | name = "vpc-web" 24 | description = "Dev VPC web" 25 | ingress { 26 | description = "Allow Port 80" 27 | from_port = 80 28 | to_port = 80 29 | protocol = "tcp" 30 | cidr_blocks = ["0.0.0.0/0"] 31 | } 32 | 33 | ingress { 34 | description = "Allow Port 443" 35 | from_port = 443 36 | to_port = 443 37 | protocol = "tcp" 38 | cidr_blocks = ["0.0.0.0/0"] 39 | } 40 | 41 | egress { 42 | description = "Allow all ip and ports outbound" 43 | from_port = 0 44 | to_port = 0 45 | protocol = "-1" 46 | cidr_blocks = ["0.0.0.0/0"] 47 | } 48 | 49 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.my-ec2-vm File: /06-Terraform-Datasources/terraform-manifests/c4-ec2-instance.tf:2-11 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | user_data = file("apache-install.sh") 7 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 8 | tags = { 9 | "Name" = "amz-linux-vm" 10 | } 11 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.my-ec2-vm File: /06-Terraform-Datasources/terraform-manifests/c4-ec2-instance.tf:2-11 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | user_data = file("apache-install.sh") 7 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 8 | tags = { 9 | "Name" = "amz-linux-vm" 10 | } 11 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.my-ec2-vm File: /06-Terraform-Datasources/terraform-manifests/c4-ec2-instance.tf:2-11 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | user_data = file("apache-install.sh") 7 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 8 | tags = { 9 | "Name" = "amz-linux-vm" 10 | } 11 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.my-ec2-vm File: /06-Terraform-Datasources/terraform-manifests/c4-ec2-instance.tf:2-11 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | user_data = file("apache-install.sh") 7 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 8 | tags = { 9 | "Name" = "amz-linux-vm" 10 | } 11 | } Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22" FAILED for resource: aws_security_group.vpc-ssh File: /07-Terraform-State/07-01-Terraform-Remote-State-Storage-and-Locking/terraform-manifests-oldv1/c3-security-groups.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-1-port-security.html 2 | resource "aws_security_group" "vpc-ssh" { 3 | name = "vpc-ssh" 4 | description = "Dev VPC SSH" 5 | ingress { 6 | description = "Allow Port 22" 7 | from_port = 22 8 | to_port = 22 9 | protocol = "tcp" 10 | cidr_blocks = ["0.0.0.0/0"] 11 | } 12 | egress { 13 | description = "Allow all ip and ports outboun" 14 | from_port = 0 15 | to_port = 0 16 | protocol = "-1" 17 | cidr_blocks = ["0.0.0.0/0"] 18 | } 19 | } Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80" FAILED for resource: aws_security_group.vpc-web File: /07-Terraform-State/07-01-Terraform-Remote-State-Storage-and-Locking/terraform-manifests-oldv1/c3-security-groups.tf:22-49 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80.html 22 | resource "aws_security_group" "vpc-web" { 23 | name = "vpc-web" 24 | description = "Dev VPC web" 25 | ingress { 26 | description = "Allow Port 80" 27 | from_port = 80 28 | to_port = 80 29 | protocol = "tcp" 30 | cidr_blocks = ["0.0.0.0/0"] 31 | } 32 | 33 | ingress { 34 | description = "Allow Port 443" 35 | from_port = 443 36 | to_port = 443 37 | protocol = "tcp" 38 | cidr_blocks = ["0.0.0.0/0"] 39 | } 40 | 41 | egress { 42 | description = "Allow all ip and ports outbound" 43 | from_port = 0 44 | to_port = 0 45 | protocol = "-1" 46 | cidr_blocks = ["0.0.0.0/0"] 47 | } 48 | 49 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.my-ec2-vm File: /07-Terraform-State/07-01-Terraform-Remote-State-Storage-and-Locking/terraform-manifests-oldv1/c4-ec2-instance.tf:2-11 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | user_data = file("apache-install.sh") 7 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 8 | tags = { 9 | "Name" = "amz-linux-vm" 10 | } 11 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.my-ec2-vm File: /07-Terraform-State/07-01-Terraform-Remote-State-Storage-and-Locking/terraform-manifests-oldv1/c4-ec2-instance.tf:2-11 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | user_data = file("apache-install.sh") 7 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 8 | tags = { 9 | "Name" = "amz-linux-vm" 10 | } 11 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.my-ec2-vm File: /07-Terraform-State/07-01-Terraform-Remote-State-Storage-and-Locking/terraform-manifests-oldv1/c4-ec2-instance.tf:2-11 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | user_data = file("apache-install.sh") 7 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 8 | tags = { 9 | "Name" = "amz-linux-vm" 10 | } 11 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.my-ec2-vm File: /07-Terraform-State/07-01-Terraform-Remote-State-Storage-and-Locking/terraform-manifests-oldv1/c4-ec2-instance.tf:2-11 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | user_data = file("apache-install.sh") 7 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 8 | tags = { 9 | "Name" = "amz-linux-vm" 10 | } 11 | } Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22" FAILED for resource: aws_security_group.vpc-ssh File: /07-Terraform-State/07-01-Terraform-Remote-State-Storage-and-Locking/terraform-manifests/c3-security-groups.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-1-port-security.html 2 | resource "aws_security_group" "vpc-ssh" { 3 | name = "vpc-ssh" 4 | description = "Dev VPC SSH" 5 | ingress { 6 | description = "Allow Port 22" 7 | from_port = 22 8 | to_port = 22 9 | protocol = "tcp" 10 | cidr_blocks = ["0.0.0.0/0"] 11 | } 12 | egress { 13 | description = "Allow all ip and ports outboun" 14 | from_port = 0 15 | to_port = 0 16 | protocol = "-1" 17 | cidr_blocks = ["0.0.0.0/0"] 18 | } 19 | } Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80" FAILED for resource: aws_security_group.vpc-web File: /07-Terraform-State/07-01-Terraform-Remote-State-Storage-and-Locking/terraform-manifests/c3-security-groups.tf:22-49 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80.html 22 | resource "aws_security_group" "vpc-web" { 23 | name = "vpc-web" 24 | description = "Dev VPC web" 25 | ingress { 26 | description = "Allow Port 80" 27 | from_port = 80 28 | to_port = 80 29 | protocol = "tcp" 30 | cidr_blocks = ["0.0.0.0/0"] 31 | } 32 | 33 | ingress { 34 | description = "Allow Port 443" 35 | from_port = 443 36 | to_port = 443 37 | protocol = "tcp" 38 | cidr_blocks = ["0.0.0.0/0"] 39 | } 40 | 41 | egress { 42 | description = "Allow all ip and ports outbound" 43 | from_port = 0 44 | to_port = 0 45 | protocol = "-1" 46 | cidr_blocks = ["0.0.0.0/0"] 47 | } 48 | 49 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.my-ec2-vm File: /07-Terraform-State/07-01-Terraform-Remote-State-Storage-and-Locking/terraform-manifests/c4-ec2-instance.tf:2-11 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | user_data = file("apache-install.sh") 7 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 8 | tags = { 9 | "Name" = "amz-linux-vm" 10 | } 11 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.my-ec2-vm File: /07-Terraform-State/07-01-Terraform-Remote-State-Storage-and-Locking/terraform-manifests/c4-ec2-instance.tf:2-11 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | user_data = file("apache-install.sh") 7 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 8 | tags = { 9 | "Name" = "amz-linux-vm" 10 | } 11 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.my-ec2-vm File: /07-Terraform-State/07-01-Terraform-Remote-State-Storage-and-Locking/terraform-manifests/c4-ec2-instance.tf:2-11 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | user_data = file("apache-install.sh") 7 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 8 | tags = { 9 | "Name" = "amz-linux-vm" 10 | } 11 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.my-ec2-vm File: /07-Terraform-State/07-01-Terraform-Remote-State-Storage-and-Locking/terraform-manifests/c4-ec2-instance.tf:2-11 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | user_data = file("apache-install.sh") 7 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 8 | tags = { 9 | "Name" = "amz-linux-vm" 10 | } 11 | } Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22" FAILED for resource: aws_security_group.vpc-ssh File: /07-Terraform-State/07-02-Terraform-State-Commands/terraform-manifests-oldv1/c3-security-groups.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-1-port-security.html 2 | resource "aws_security_group" "vpc-ssh" { 3 | name = "vpc-ssh" 4 | description = "Dev VPC SSH" 5 | ingress { 6 | description = "Allow Port 22" 7 | from_port = 22 8 | to_port = 22 9 | protocol = "tcp" 10 | cidr_blocks = ["0.0.0.0/0"] 11 | } 12 | egress { 13 | description = "Allow all ip and ports outboun" 14 | from_port = 0 15 | to_port = 0 16 | protocol = "-1" 17 | cidr_blocks = ["0.0.0.0/0"] 18 | } 19 | } Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80" FAILED for resource: aws_security_group.vpc-web File: /07-Terraform-State/07-02-Terraform-State-Commands/terraform-manifests-oldv1/c3-security-groups.tf:22-58 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80.html 22 | resource "aws_security_group" "vpc-web" { 23 | name = "vpc-web" 24 | description = "Dev VPC web" 25 | ingress { 26 | description = "Allow Port 80" 27 | from_port = 80 28 | to_port = 80 29 | protocol = "tcp" 30 | cidr_blocks = ["0.0.0.0/0"] 31 | } 32 | /* 33 | # Enable during Step-08 34 | ingress { 35 | description = "Allow Port 8080" 36 | from_port = 8080 37 | to_port = 8080 38 | protocol = "tcp" 39 | cidr_blocks = ["0.0.0.0/0"] 40 | } 41 | */ 42 | ingress { 43 | description = "Allow Port 443" 44 | from_port = 443 45 | to_port = 443 46 | protocol = "tcp" 47 | cidr_blocks = ["0.0.0.0/0"] 48 | } 49 | 50 | egress { 51 | description = "Allow all ip and ports outbound" 52 | from_port = 0 53 | to_port = 0 54 | protocol = "-1" 55 | cidr_blocks = ["0.0.0.0/0"] 56 | } 57 | 58 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.my-ec2-vm File: /07-Terraform-State/07-02-Terraform-State-Commands/terraform-manifests-oldv1/c4-ec2-instance.tf:2-14 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | #instance_type = "t2.micro" 6 | key_name = "terraform-key" 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "amz-linux-vm" 11 | #"demotag" = "refreshtest" # Enable during Step-04-05 12 | #"target" = "Target-Test-1" # Enable during step-08 13 | } 14 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.my-ec2-vm File: /07-Terraform-State/07-02-Terraform-State-Commands/terraform-manifests-oldv1/c4-ec2-instance.tf:2-14 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | #instance_type = "t2.micro" 6 | key_name = "terraform-key" 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "amz-linux-vm" 11 | #"demotag" = "refreshtest" # Enable during Step-04-05 12 | #"target" = "Target-Test-1" # Enable during step-08 13 | } 14 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.my-ec2-vm File: /07-Terraform-State/07-02-Terraform-State-Commands/terraform-manifests-oldv1/c4-ec2-instance.tf:2-14 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | #instance_type = "t2.micro" 6 | key_name = "terraform-key" 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "amz-linux-vm" 11 | #"demotag" = "refreshtest" # Enable during Step-04-05 12 | #"target" = "Target-Test-1" # Enable during step-08 13 | } 14 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.my-ec2-vm File: /07-Terraform-State/07-02-Terraform-State-Commands/terraform-manifests-oldv1/c4-ec2-instance.tf:2-14 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | #instance_type = "t2.micro" 6 | key_name = "terraform-key" 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "amz-linux-vm" 11 | #"demotag" = "refreshtest" # Enable during Step-04-05 12 | #"target" = "Target-Test-1" # Enable during step-08 13 | } 14 | } Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22" FAILED for resource: aws_security_group.vpc-ssh File: /07-Terraform-State/07-02-Terraform-State-Commands/terraform-manifests/c3-security-groups.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-1-port-security.html 2 | resource "aws_security_group" "vpc-ssh" { 3 | name = "vpc-ssh" 4 | description = "Dev VPC SSH" 5 | ingress { 6 | description = "Allow Port 22" 7 | from_port = 22 8 | to_port = 22 9 | protocol = "tcp" 10 | cidr_blocks = ["0.0.0.0/0"] 11 | } 12 | egress { 13 | description = "Allow all ip and ports outboun" 14 | from_port = 0 15 | to_port = 0 16 | protocol = "-1" 17 | cidr_blocks = ["0.0.0.0/0"] 18 | } 19 | } Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80" FAILED for resource: aws_security_group.vpc-web File: /07-Terraform-State/07-02-Terraform-State-Commands/terraform-manifests/c3-security-groups.tf:22-58 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80.html 22 | resource "aws_security_group" "vpc-web" { 23 | name = "vpc-web" 24 | description = "Dev VPC web" 25 | ingress { 26 | description = "Allow Port 80" 27 | from_port = 80 28 | to_port = 80 29 | protocol = "tcp" 30 | cidr_blocks = ["0.0.0.0/0"] 31 | } 32 | /* 33 | # Enable during Step-08 34 | ingress { 35 | description = "Allow Port 8080" 36 | from_port = 8080 37 | to_port = 8080 38 | protocol = "tcp" 39 | cidr_blocks = ["0.0.0.0/0"] 40 | } 41 | */ 42 | ingress { 43 | description = "Allow Port 443" 44 | from_port = 443 45 | to_port = 443 46 | protocol = "tcp" 47 | cidr_blocks = ["0.0.0.0/0"] 48 | } 49 | 50 | egress { 51 | description = "Allow all ip and ports outbound" 52 | from_port = 0 53 | to_port = 0 54 | protocol = "-1" 55 | cidr_blocks = ["0.0.0.0/0"] 56 | } 57 | 58 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.my-ec2-vm File: /07-Terraform-State/07-02-Terraform-State-Commands/terraform-manifests/c4-ec2-instance.tf:2-14 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | #instance_type = "t2.micro" 6 | key_name = "terraform-key" 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "amz-linux-vm" 11 | #"demotag" = "refreshtest" # Enable during Step-04-05 12 | #"target" = "Target-Test-1" # Enable during step-08 13 | } 14 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.my-ec2-vm File: /07-Terraform-State/07-02-Terraform-State-Commands/terraform-manifests/c4-ec2-instance.tf:2-14 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | #instance_type = "t2.micro" 6 | key_name = "terraform-key" 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "amz-linux-vm" 11 | #"demotag" = "refreshtest" # Enable during Step-04-05 12 | #"target" = "Target-Test-1" # Enable during step-08 13 | } 14 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.my-ec2-vm File: /07-Terraform-State/07-02-Terraform-State-Commands/terraform-manifests/c4-ec2-instance.tf:2-14 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | #instance_type = "t2.micro" 6 | key_name = "terraform-key" 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "amz-linux-vm" 11 | #"demotag" = "refreshtest" # Enable during Step-04-05 12 | #"target" = "Target-Test-1" # Enable during step-08 13 | } 14 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.my-ec2-vm File: /07-Terraform-State/07-02-Terraform-State-Commands/terraform-manifests/c4-ec2-instance.tf:2-14 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | #instance_type = "t2.micro" 6 | key_name = "terraform-key" 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "amz-linux-vm" 11 | #"demotag" = "refreshtest" # Enable during Step-04-05 12 | #"target" = "Target-Test-1" # Enable during step-08 13 | } 14 | } Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22" FAILED for resource: aws_security_group.vpc-ssh File: /08-Terraform-Workspaces/Oldv1-backup/v1-local-backend/c3-security-groups.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-1-port-security.html 2 | resource "aws_security_group" "vpc-ssh" { 3 | name = "vpc-ssh-${terraform.workspace}" 4 | description = "Dev VPC SSH" 5 | ingress { 6 | description = "Allow Port 22" 7 | from_port = 22 8 | to_port = 22 9 | protocol = "tcp" 10 | cidr_blocks = ["0.0.0.0/0"] 11 | } 12 | egress { 13 | description = "Allow all ip and ports outboun" 14 | from_port = 0 15 | to_port = 0 16 | protocol = "-1" 17 | cidr_blocks = ["0.0.0.0/0"] 18 | } 19 | } Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80" FAILED for resource: aws_security_group.vpc-web File: /08-Terraform-Workspaces/Oldv1-backup/v1-local-backend/c3-security-groups.tf:22-49 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80.html 22 | resource "aws_security_group" "vpc-web" { 23 | name = "vpc-web-${terraform.workspace}" 24 | description = "Dev VPC web" 25 | ingress { 26 | description = "Allow Port 80" 27 | from_port = 80 28 | to_port = 80 29 | protocol = "tcp" 30 | cidr_blocks = ["0.0.0.0/0"] 31 | } 32 | 33 | ingress { 34 | description = "Allow Port 443" 35 | from_port = 443 36 | to_port = 443 37 | protocol = "tcp" 38 | cidr_blocks = ["0.0.0.0/0"] 39 | } 40 | 41 | egress { 42 | description = "Allow all ip and ports outbound" 43 | from_port = 0 44 | to_port = 0 45 | protocol = "-1" 46 | cidr_blocks = ["0.0.0.0/0"] 47 | } 48 | 49 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.my-ec2-vm File: /08-Terraform-Workspaces/Oldv1-backup/v1-local-backend/c4-ec2-instance.tf:2-12 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | count = terraform.workspace == "default" ? 2 : 1 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "vm-${terraform.workspace}-${count.index}" 11 | } 12 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.my-ec2-vm File: /08-Terraform-Workspaces/Oldv1-backup/v1-local-backend/c4-ec2-instance.tf:2-12 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | count = terraform.workspace == "default" ? 2 : 1 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "vm-${terraform.workspace}-${count.index}" 11 | } 12 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.my-ec2-vm File: /08-Terraform-Workspaces/Oldv1-backup/v1-local-backend/c4-ec2-instance.tf:2-12 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | count = terraform.workspace == "default" ? 2 : 1 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "vm-${terraform.workspace}-${count.index}" 11 | } 12 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.my-ec2-vm File: /08-Terraform-Workspaces/Oldv1-backup/v1-local-backend/c4-ec2-instance.tf:2-12 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | count = terraform.workspace == "default" ? 2 : 1 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "vm-${terraform.workspace}-${count.index}" 11 | } 12 | } Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22" FAILED for resource: aws_security_group.vpc-ssh File: /08-Terraform-Workspaces/Oldv1-backup/v2-remote-backend/c3-security-groups.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-1-port-security.html 2 | resource "aws_security_group" "vpc-ssh" { 3 | name = "vpc-ssh-${terraform.workspace}" 4 | description = "Dev VPC SSH" 5 | ingress { 6 | description = "Allow Port 22" 7 | from_port = 22 8 | to_port = 22 9 | protocol = "tcp" 10 | cidr_blocks = ["0.0.0.0/0"] 11 | } 12 | egress { 13 | description = "Allow all ip and ports outboun" 14 | from_port = 0 15 | to_port = 0 16 | protocol = "-1" 17 | cidr_blocks = ["0.0.0.0/0"] 18 | } 19 | } Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80" FAILED for resource: aws_security_group.vpc-web File: /08-Terraform-Workspaces/Oldv1-backup/v2-remote-backend/c3-security-groups.tf:22-49 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80.html 22 | resource "aws_security_group" "vpc-web" { 23 | name = "vpc-web-${terraform.workspace}" 24 | description = "Dev VPC web" 25 | ingress { 26 | description = "Allow Port 80" 27 | from_port = 80 28 | to_port = 80 29 | protocol = "tcp" 30 | cidr_blocks = ["0.0.0.0/0"] 31 | } 32 | 33 | ingress { 34 | description = "Allow Port 443" 35 | from_port = 443 36 | to_port = 443 37 | protocol = "tcp" 38 | cidr_blocks = ["0.0.0.0/0"] 39 | } 40 | 41 | egress { 42 | description = "Allow all ip and ports outbound" 43 | from_port = 0 44 | to_port = 0 45 | protocol = "-1" 46 | cidr_blocks = ["0.0.0.0/0"] 47 | } 48 | 49 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.my-ec2-vm File: /08-Terraform-Workspaces/Oldv1-backup/v2-remote-backend/c4-ec2-instance.tf:2-12 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | count = terraform.workspace == "default" ? 2 : 1 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "vm-${terraform.workspace}-${count.index}" 11 | } 12 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.my-ec2-vm File: /08-Terraform-Workspaces/Oldv1-backup/v2-remote-backend/c4-ec2-instance.tf:2-12 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | count = terraform.workspace == "default" ? 2 : 1 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "vm-${terraform.workspace}-${count.index}" 11 | } 12 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.my-ec2-vm File: /08-Terraform-Workspaces/Oldv1-backup/v2-remote-backend/c4-ec2-instance.tf:2-12 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | count = terraform.workspace == "default" ? 2 : 1 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "vm-${terraform.workspace}-${count.index}" 11 | } 12 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.my-ec2-vm File: /08-Terraform-Workspaces/Oldv1-backup/v2-remote-backend/c4-ec2-instance.tf:2-12 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | count = terraform.workspace == "default" ? 2 : 1 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "vm-${terraform.workspace}-${count.index}" 11 | } 12 | } Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22" FAILED for resource: aws_security_group.vpc-ssh File: /08-Terraform-Workspaces/v1-local-backend/c3-security-groups.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-1-port-security.html 2 | resource "aws_security_group" "vpc-ssh" { 3 | name = "vpc-ssh-${terraform.workspace}" 4 | description = "Dev VPC SSH" 5 | ingress { 6 | description = "Allow Port 22" 7 | from_port = 22 8 | to_port = 22 9 | protocol = "tcp" 10 | cidr_blocks = ["0.0.0.0/0"] 11 | } 12 | egress { 13 | description = "Allow all ip and ports outboun" 14 | from_port = 0 15 | to_port = 0 16 | protocol = "-1" 17 | cidr_blocks = ["0.0.0.0/0"] 18 | } 19 | } Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80" FAILED for resource: aws_security_group.vpc-web File: /08-Terraform-Workspaces/v1-local-backend/c3-security-groups.tf:22-49 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80.html 22 | resource "aws_security_group" "vpc-web" { 23 | name = "vpc-web-${terraform.workspace}" 24 | description = "Dev VPC web" 25 | ingress { 26 | description = "Allow Port 80" 27 | from_port = 80 28 | to_port = 80 29 | protocol = "tcp" 30 | cidr_blocks = ["0.0.0.0/0"] 31 | } 32 | 33 | ingress { 34 | description = "Allow Port 443" 35 | from_port = 443 36 | to_port = 443 37 | protocol = "tcp" 38 | cidr_blocks = ["0.0.0.0/0"] 39 | } 40 | 41 | egress { 42 | description = "Allow all ip and ports outbound" 43 | from_port = 0 44 | to_port = 0 45 | protocol = "-1" 46 | cidr_blocks = ["0.0.0.0/0"] 47 | } 48 | 49 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.my-ec2-vm File: /08-Terraform-Workspaces/v1-local-backend/c4-ec2-instance.tf:2-12 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | count = terraform.workspace == "default" ? 2 : 1 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "vm-${terraform.workspace}-${count.index}" 11 | } 12 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.my-ec2-vm File: /08-Terraform-Workspaces/v1-local-backend/c4-ec2-instance.tf:2-12 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | count = terraform.workspace == "default" ? 2 : 1 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "vm-${terraform.workspace}-${count.index}" 11 | } 12 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.my-ec2-vm File: /08-Terraform-Workspaces/v1-local-backend/c4-ec2-instance.tf:2-12 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | count = terraform.workspace == "default" ? 2 : 1 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "vm-${terraform.workspace}-${count.index}" 11 | } 12 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.my-ec2-vm File: /08-Terraform-Workspaces/v1-local-backend/c4-ec2-instance.tf:2-12 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | count = terraform.workspace == "default" ? 2 : 1 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "vm-${terraform.workspace}-${count.index}" 11 | } 12 | } Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22" FAILED for resource: aws_security_group.vpc-ssh File: /08-Terraform-Workspaces/v2-remote-backend/c3-security-groups.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-1-port-security.html 2 | resource "aws_security_group" "vpc-ssh" { 3 | name = "vpc-ssh-${terraform.workspace}" 4 | description = "Dev VPC SSH" 5 | ingress { 6 | description = "Allow Port 22" 7 | from_port = 22 8 | to_port = 22 9 | protocol = "tcp" 10 | cidr_blocks = ["0.0.0.0/0"] 11 | } 12 | egress { 13 | description = "Allow all ip and ports outboun" 14 | from_port = 0 15 | to_port = 0 16 | protocol = "-1" 17 | cidr_blocks = ["0.0.0.0/0"] 18 | } 19 | } Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80" FAILED for resource: aws_security_group.vpc-web File: /08-Terraform-Workspaces/v2-remote-backend/c3-security-groups.tf:22-49 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80.html 22 | resource "aws_security_group" "vpc-web" { 23 | name = "vpc-web-${terraform.workspace}" 24 | description = "Dev VPC web" 25 | ingress { 26 | description = "Allow Port 80" 27 | from_port = 80 28 | to_port = 80 29 | protocol = "tcp" 30 | cidr_blocks = ["0.0.0.0/0"] 31 | } 32 | 33 | ingress { 34 | description = "Allow Port 443" 35 | from_port = 443 36 | to_port = 443 37 | protocol = "tcp" 38 | cidr_blocks = ["0.0.0.0/0"] 39 | } 40 | 41 | egress { 42 | description = "Allow all ip and ports outbound" 43 | from_port = 0 44 | to_port = 0 45 | protocol = "-1" 46 | cidr_blocks = ["0.0.0.0/0"] 47 | } 48 | 49 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.my-ec2-vm File: /08-Terraform-Workspaces/v2-remote-backend/c4-ec2-instance.tf:2-12 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | count = terraform.workspace == "default" ? 2 : 1 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "vm-${terraform.workspace}-${count.index}" 11 | } 12 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.my-ec2-vm File: /08-Terraform-Workspaces/v2-remote-backend/c4-ec2-instance.tf:2-12 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | count = terraform.workspace == "default" ? 2 : 1 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "vm-${terraform.workspace}-${count.index}" 11 | } 12 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.my-ec2-vm File: /08-Terraform-Workspaces/v2-remote-backend/c4-ec2-instance.tf:2-12 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | count = terraform.workspace == "default" ? 2 : 1 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "vm-${terraform.workspace}-${count.index}" 11 | } 12 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.my-ec2-vm File: /08-Terraform-Workspaces/v2-remote-backend/c4-ec2-instance.tf:2-12 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | count = terraform.workspace == "default" ? 2 : 1 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "vm-${terraform.workspace}-${count.index}" 11 | } 12 | } Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22" FAILED for resource: aws_security_group.vpc-ssh File: /09-Terraform-Provisioners/09-01-File-Provisioner/terraform-manifests-oldv1/c3-security-groups.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-1-port-security.html 2 | resource "aws_security_group" "vpc-ssh" { 3 | name = "vpc-ssh-${terraform.workspace}" 4 | description = "Dev VPC SSH" 5 | ingress { 6 | description = "Allow Port 22" 7 | from_port = 22 8 | to_port = 22 9 | protocol = "tcp" 10 | cidr_blocks = ["0.0.0.0/0"] 11 | } 12 | egress { 13 | description = "Allow all ip and ports outboun" 14 | from_port = 0 15 | to_port = 0 16 | protocol = "-1" 17 | cidr_blocks = ["0.0.0.0/0"] 18 | } 19 | } Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80" FAILED for resource: aws_security_group.vpc-web File: /09-Terraform-Provisioners/09-01-File-Provisioner/terraform-manifests-oldv1/c3-security-groups.tf:22-49 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80.html 22 | resource "aws_security_group" "vpc-web" { 23 | name = "vpc-web-${terraform.workspace}" 24 | description = "Dev VPC web" 25 | ingress { 26 | description = "Allow Port 80" 27 | from_port = 80 28 | to_port = 80 29 | protocol = "tcp" 30 | cidr_blocks = ["0.0.0.0/0"] 31 | } 32 | 33 | ingress { 34 | description = "Allow Port 443" 35 | from_port = 443 36 | to_port = 443 37 | protocol = "tcp" 38 | cidr_blocks = ["0.0.0.0/0"] 39 | } 40 | 41 | egress { 42 | description = "Allow all ip and ports outbound" 43 | from_port = 0 44 | to_port = 0 45 | protocol = "-1" 46 | cidr_blocks = ["0.0.0.0/0"] 47 | } 48 | 49 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.my-ec2-vm File: /09-Terraform-Provisioners/09-01-File-Provisioner/terraform-manifests-oldv1/c4-ec2-instance.tf:2-57 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html Code lines for this resource are too many. Please use IDE of your choice to review the file. Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.my-ec2-vm File: /09-Terraform-Provisioners/09-01-File-Provisioner/terraform-manifests-oldv1/c4-ec2-instance.tf:2-57 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html Code lines for this resource are too many. Please use IDE of your choice to review the file. Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.my-ec2-vm File: /09-Terraform-Provisioners/09-01-File-Provisioner/terraform-manifests-oldv1/c4-ec2-instance.tf:2-57 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html Code lines for this resource are too many. Please use IDE of your choice to review the file. Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.my-ec2-vm File: /09-Terraform-Provisioners/09-01-File-Provisioner/terraform-manifests-oldv1/c4-ec2-instance.tf:2-57 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html Code lines for this resource are too many. Please use IDE of your choice to review the file. Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22" FAILED for resource: aws_security_group.vpc-ssh File: /09-Terraform-Provisioners/09-01-File-Provisioner/terraform-manifests/c3-security-groups.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-1-port-security.html 2 | resource "aws_security_group" "vpc-ssh" { 3 | name = "vpc-ssh-${terraform.workspace}" 4 | description = "Dev VPC SSH" 5 | ingress { 6 | description = "Allow Port 22" 7 | from_port = 22 8 | to_port = 22 9 | protocol = "tcp" 10 | cidr_blocks = ["0.0.0.0/0"] 11 | } 12 | egress { 13 | description = "Allow all ip and ports outboun" 14 | from_port = 0 15 | to_port = 0 16 | protocol = "-1" 17 | cidr_blocks = ["0.0.0.0/0"] 18 | } 19 | } Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80" FAILED for resource: aws_security_group.vpc-web File: /09-Terraform-Provisioners/09-01-File-Provisioner/terraform-manifests/c3-security-groups.tf:22-49 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80.html 22 | resource "aws_security_group" "vpc-web" { 23 | name = "vpc-web-${terraform.workspace}" 24 | description = "Dev VPC web" 25 | ingress { 26 | description = "Allow Port 80" 27 | from_port = 80 28 | to_port = 80 29 | protocol = "tcp" 30 | cidr_blocks = ["0.0.0.0/0"] 31 | } 32 | 33 | ingress { 34 | description = "Allow Port 443" 35 | from_port = 443 36 | to_port = 443 37 | protocol = "tcp" 38 | cidr_blocks = ["0.0.0.0/0"] 39 | } 40 | 41 | egress { 42 | description = "Allow all ip and ports outbound" 43 | from_port = 0 44 | to_port = 0 45 | protocol = "-1" 46 | cidr_blocks = ["0.0.0.0/0"] 47 | } 48 | 49 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.my-ec2-vm File: /09-Terraform-Provisioners/09-01-File-Provisioner/terraform-manifests/c4-ec2-instance.tf:2-57 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html Code lines for this resource are too many. Please use IDE of your choice to review the file. Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.my-ec2-vm File: /09-Terraform-Provisioners/09-01-File-Provisioner/terraform-manifests/c4-ec2-instance.tf:2-57 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html Code lines for this resource are too many. Please use IDE of your choice to review the file. Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.my-ec2-vm File: /09-Terraform-Provisioners/09-01-File-Provisioner/terraform-manifests/c4-ec2-instance.tf:2-57 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html Code lines for this resource are too many. Please use IDE of your choice to review the file. Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.my-ec2-vm File: /09-Terraform-Provisioners/09-01-File-Provisioner/terraform-manifests/c4-ec2-instance.tf:2-57 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html Code lines for this resource are too many. Please use IDE of your choice to review the file. Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22" FAILED for resource: aws_security_group.vpc-ssh File: /09-Terraform-Provisioners/09-02-remote-exec-provisioner/terraform-manifests-oldv1/c3-security-groups.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-1-port-security.html 2 | resource "aws_security_group" "vpc-ssh" { 3 | name = "vpc-ssh-${terraform.workspace}" 4 | description = "Dev VPC SSH" 5 | ingress { 6 | description = "Allow Port 22" 7 | from_port = 22 8 | to_port = 22 9 | protocol = "tcp" 10 | cidr_blocks = ["0.0.0.0/0"] 11 | } 12 | egress { 13 | description = "Allow all ip and ports outboun" 14 | from_port = 0 15 | to_port = 0 16 | protocol = "-1" 17 | cidr_blocks = ["0.0.0.0/0"] 18 | } 19 | } Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80" FAILED for resource: aws_security_group.vpc-web File: /09-Terraform-Provisioners/09-02-remote-exec-provisioner/terraform-manifests-oldv1/c3-security-groups.tf:22-49 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80.html 22 | resource "aws_security_group" "vpc-web" { 23 | name = "vpc-web-${terraform.workspace}" 24 | description = "Dev VPC web" 25 | ingress { 26 | description = "Allow Port 80" 27 | from_port = 80 28 | to_port = 80 29 | protocol = "tcp" 30 | cidr_blocks = ["0.0.0.0/0"] 31 | } 32 | 33 | ingress { 34 | description = "Allow Port 443" 35 | from_port = 443 36 | to_port = 443 37 | protocol = "tcp" 38 | cidr_blocks = ["0.0.0.0/0"] 39 | } 40 | 41 | egress { 42 | description = "Allow all ip and ports outbound" 43 | from_port = 0 44 | to_port = 0 45 | protocol = "-1" 46 | cidr_blocks = ["0.0.0.0/0"] 47 | } 48 | 49 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.my-ec2-vm File: /09-Terraform-Provisioners/09-02-remote-exec-provisioner/terraform-manifests-oldv1/c4-ec2-instance.tf:2-37 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | #count = terraform.workspace == "default" ? 1 : 1 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "vm-${terraform.workspace}-0" 11 | } 12 | 13 | # Connection Block for Provisioners to connect to EC2 Instance 14 | connection { 15 | type = "ssh" 16 | host = self.public_ip # Understand what is "self" 17 | user = "ec2-user" 18 | password = "" 19 | private_key = file("private-key/terraform-key.pem") 20 | } 21 | 22 | # Copies the file-copy.html file to /tmp/file-copy.html 23 | provisioner "file" { 24 | source = "apps/file-copy.html" 25 | destination = "/tmp/file-copy.html" 26 | } 27 | 28 | # Copies the file to Apache Webserver /var/www/html directory 29 | provisioner "remote-exec" { 30 | inline = [ 31 | "sleep 120", # Will sleep for 120 seconds to ensure Apache webserver is provisioned using user_data 32 | "sudo cp /tmp/file-copy.html /var/www/html" 33 | ] 34 | } 35 | 36 | 37 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.my-ec2-vm File: /09-Terraform-Provisioners/09-02-remote-exec-provisioner/terraform-manifests-oldv1/c4-ec2-instance.tf:2-37 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | #count = terraform.workspace == "default" ? 1 : 1 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "vm-${terraform.workspace}-0" 11 | } 12 | 13 | # Connection Block for Provisioners to connect to EC2 Instance 14 | connection { 15 | type = "ssh" 16 | host = self.public_ip # Understand what is "self" 17 | user = "ec2-user" 18 | password = "" 19 | private_key = file("private-key/terraform-key.pem") 20 | } 21 | 22 | # Copies the file-copy.html file to /tmp/file-copy.html 23 | provisioner "file" { 24 | source = "apps/file-copy.html" 25 | destination = "/tmp/file-copy.html" 26 | } 27 | 28 | # Copies the file to Apache Webserver /var/www/html directory 29 | provisioner "remote-exec" { 30 | inline = [ 31 | "sleep 120", # Will sleep for 120 seconds to ensure Apache webserver is provisioned using user_data 32 | "sudo cp /tmp/file-copy.html /var/www/html" 33 | ] 34 | } 35 | 36 | 37 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.my-ec2-vm File: /09-Terraform-Provisioners/09-02-remote-exec-provisioner/terraform-manifests-oldv1/c4-ec2-instance.tf:2-37 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | #count = terraform.workspace == "default" ? 1 : 1 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "vm-${terraform.workspace}-0" 11 | } 12 | 13 | # Connection Block for Provisioners to connect to EC2 Instance 14 | connection { 15 | type = "ssh" 16 | host = self.public_ip # Understand what is "self" 17 | user = "ec2-user" 18 | password = "" 19 | private_key = file("private-key/terraform-key.pem") 20 | } 21 | 22 | # Copies the file-copy.html file to /tmp/file-copy.html 23 | provisioner "file" { 24 | source = "apps/file-copy.html" 25 | destination = "/tmp/file-copy.html" 26 | } 27 | 28 | # Copies the file to Apache Webserver /var/www/html directory 29 | provisioner "remote-exec" { 30 | inline = [ 31 | "sleep 120", # Will sleep for 120 seconds to ensure Apache webserver is provisioned using user_data 32 | "sudo cp /tmp/file-copy.html /var/www/html" 33 | ] 34 | } 35 | 36 | 37 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.my-ec2-vm File: /09-Terraform-Provisioners/09-02-remote-exec-provisioner/terraform-manifests-oldv1/c4-ec2-instance.tf:2-37 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | #count = terraform.workspace == "default" ? 1 : 1 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "vm-${terraform.workspace}-0" 11 | } 12 | 13 | # Connection Block for Provisioners to connect to EC2 Instance 14 | connection { 15 | type = "ssh" 16 | host = self.public_ip # Understand what is "self" 17 | user = "ec2-user" 18 | password = "" 19 | private_key = file("private-key/terraform-key.pem") 20 | } 21 | 22 | # Copies the file-copy.html file to /tmp/file-copy.html 23 | provisioner "file" { 24 | source = "apps/file-copy.html" 25 | destination = "/tmp/file-copy.html" 26 | } 27 | 28 | # Copies the file to Apache Webserver /var/www/html directory 29 | provisioner "remote-exec" { 30 | inline = [ 31 | "sleep 120", # Will sleep for 120 seconds to ensure Apache webserver is provisioned using user_data 32 | "sudo cp /tmp/file-copy.html /var/www/html" 33 | ] 34 | } 35 | 36 | 37 | } Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22" FAILED for resource: aws_security_group.vpc-ssh File: /09-Terraform-Provisioners/09-02-remote-exec-provisioner/terraform-manifests/c3-security-groups.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-1-port-security.html 2 | resource "aws_security_group" "vpc-ssh" { 3 | name = "vpc-ssh-${terraform.workspace}" 4 | description = "Dev VPC SSH" 5 | ingress { 6 | description = "Allow Port 22" 7 | from_port = 22 8 | to_port = 22 9 | protocol = "tcp" 10 | cidr_blocks = ["0.0.0.0/0"] 11 | } 12 | egress { 13 | description = "Allow all ip and ports outboun" 14 | from_port = 0 15 | to_port = 0 16 | protocol = "-1" 17 | cidr_blocks = ["0.0.0.0/0"] 18 | } 19 | } Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80" FAILED for resource: aws_security_group.vpc-web File: /09-Terraform-Provisioners/09-02-remote-exec-provisioner/terraform-manifests/c3-security-groups.tf:22-49 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80.html 22 | resource "aws_security_group" "vpc-web" { 23 | name = "vpc-web-${terraform.workspace}" 24 | description = "Dev VPC web" 25 | ingress { 26 | description = "Allow Port 80" 27 | from_port = 80 28 | to_port = 80 29 | protocol = "tcp" 30 | cidr_blocks = ["0.0.0.0/0"] 31 | } 32 | 33 | ingress { 34 | description = "Allow Port 443" 35 | from_port = 443 36 | to_port = 443 37 | protocol = "tcp" 38 | cidr_blocks = ["0.0.0.0/0"] 39 | } 40 | 41 | egress { 42 | description = "Allow all ip and ports outbound" 43 | from_port = 0 44 | to_port = 0 45 | protocol = "-1" 46 | cidr_blocks = ["0.0.0.0/0"] 47 | } 48 | 49 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.my-ec2-vm File: /09-Terraform-Provisioners/09-02-remote-exec-provisioner/terraform-manifests/c4-ec2-instance.tf:2-37 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | #count = terraform.workspace == "default" ? 1 : 1 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "vm-${terraform.workspace}-0" 11 | } 12 | 13 | # Connection Block for Provisioners to connect to EC2 Instance 14 | connection { 15 | type = "ssh" 16 | host = self.public_ip # Understand what is "self" 17 | user = "ec2-user" 18 | password = "" 19 | private_key = file("private-key/terraform-key.pem") 20 | } 21 | 22 | # Copies the file-copy.html file to /tmp/file-copy.html 23 | provisioner "file" { 24 | source = "apps/file-copy.html" 25 | destination = "/tmp/file-copy.html" 26 | } 27 | 28 | # Copies the file to Apache Webserver /var/www/html directory 29 | provisioner "remote-exec" { 30 | inline = [ 31 | "sleep 120", # Will sleep for 120 seconds to ensure Apache webserver is provisioned using user_data 32 | "sudo cp /tmp/file-copy.html /var/www/html" 33 | ] 34 | } 35 | 36 | 37 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.my-ec2-vm File: /09-Terraform-Provisioners/09-02-remote-exec-provisioner/terraform-manifests/c4-ec2-instance.tf:2-37 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | #count = terraform.workspace == "default" ? 1 : 1 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "vm-${terraform.workspace}-0" 11 | } 12 | 13 | # Connection Block for Provisioners to connect to EC2 Instance 14 | connection { 15 | type = "ssh" 16 | host = self.public_ip # Understand what is "self" 17 | user = "ec2-user" 18 | password = "" 19 | private_key = file("private-key/terraform-key.pem") 20 | } 21 | 22 | # Copies the file-copy.html file to /tmp/file-copy.html 23 | provisioner "file" { 24 | source = "apps/file-copy.html" 25 | destination = "/tmp/file-copy.html" 26 | } 27 | 28 | # Copies the file to Apache Webserver /var/www/html directory 29 | provisioner "remote-exec" { 30 | inline = [ 31 | "sleep 120", # Will sleep for 120 seconds to ensure Apache webserver is provisioned using user_data 32 | "sudo cp /tmp/file-copy.html /var/www/html" 33 | ] 34 | } 35 | 36 | 37 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.my-ec2-vm File: /09-Terraform-Provisioners/09-02-remote-exec-provisioner/terraform-manifests/c4-ec2-instance.tf:2-37 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | #count = terraform.workspace == "default" ? 1 : 1 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "vm-${terraform.workspace}-0" 11 | } 12 | 13 | # Connection Block for Provisioners to connect to EC2 Instance 14 | connection { 15 | type = "ssh" 16 | host = self.public_ip # Understand what is "self" 17 | user = "ec2-user" 18 | password = "" 19 | private_key = file("private-key/terraform-key.pem") 20 | } 21 | 22 | # Copies the file-copy.html file to /tmp/file-copy.html 23 | provisioner "file" { 24 | source = "apps/file-copy.html" 25 | destination = "/tmp/file-copy.html" 26 | } 27 | 28 | # Copies the file to Apache Webserver /var/www/html directory 29 | provisioner "remote-exec" { 30 | inline = [ 31 | "sleep 120", # Will sleep for 120 seconds to ensure Apache webserver is provisioned using user_data 32 | "sudo cp /tmp/file-copy.html /var/www/html" 33 | ] 34 | } 35 | 36 | 37 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.my-ec2-vm File: /09-Terraform-Provisioners/09-02-remote-exec-provisioner/terraform-manifests/c4-ec2-instance.tf:2-37 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | #count = terraform.workspace == "default" ? 1 : 1 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "vm-${terraform.workspace}-0" 11 | } 12 | 13 | # Connection Block for Provisioners to connect to EC2 Instance 14 | connection { 15 | type = "ssh" 16 | host = self.public_ip # Understand what is "self" 17 | user = "ec2-user" 18 | password = "" 19 | private_key = file("private-key/terraform-key.pem") 20 | } 21 | 22 | # Copies the file-copy.html file to /tmp/file-copy.html 23 | provisioner "file" { 24 | source = "apps/file-copy.html" 25 | destination = "/tmp/file-copy.html" 26 | } 27 | 28 | # Copies the file to Apache Webserver /var/www/html directory 29 | provisioner "remote-exec" { 30 | inline = [ 31 | "sleep 120", # Will sleep for 120 seconds to ensure Apache webserver is provisioned using user_data 32 | "sudo cp /tmp/file-copy.html /var/www/html" 33 | ] 34 | } 35 | 36 | 37 | } Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22" FAILED for resource: aws_security_group.vpc-ssh File: /09-Terraform-Provisioners/09-03-local-exec-provisioner/terraform-manifests-oldv1/c3-security-groups.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-1-port-security.html 2 | resource "aws_security_group" "vpc-ssh" { 3 | name = "vpc-ssh-${terraform.workspace}" 4 | description = "Dev VPC SSH" 5 | ingress { 6 | description = "Allow Port 22" 7 | from_port = 22 8 | to_port = 22 9 | protocol = "tcp" 10 | cidr_blocks = ["0.0.0.0/0"] 11 | } 12 | egress { 13 | description = "Allow all ip and ports outboun" 14 | from_port = 0 15 | to_port = 0 16 | protocol = "-1" 17 | cidr_blocks = ["0.0.0.0/0"] 18 | } 19 | } Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80" FAILED for resource: aws_security_group.vpc-web File: /09-Terraform-Provisioners/09-03-local-exec-provisioner/terraform-manifests-oldv1/c3-security-groups.tf:22-49 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80.html 22 | resource "aws_security_group" "vpc-web" { 23 | name = "vpc-web-${terraform.workspace}" 24 | description = "Dev VPC web" 25 | ingress { 26 | description = "Allow Port 80" 27 | from_port = 80 28 | to_port = 80 29 | protocol = "tcp" 30 | cidr_blocks = ["0.0.0.0/0"] 31 | } 32 | 33 | ingress { 34 | description = "Allow Port 443" 35 | from_port = 443 36 | to_port = 443 37 | protocol = "tcp" 38 | cidr_blocks = ["0.0.0.0/0"] 39 | } 40 | 41 | egress { 42 | description = "Allow all ip and ports outbound" 43 | from_port = 0 44 | to_port = 0 45 | protocol = "-1" 46 | cidr_blocks = ["0.0.0.0/0"] 47 | } 48 | 49 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.my-ec2-vm File: /09-Terraform-Provisioners/09-03-local-exec-provisioner/terraform-manifests-oldv1/c4-ec2-instance.tf:2-27 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | #count = terraform.workspace == "default" ? 1 : 1 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "vm-${terraform.workspace}-0" 11 | } 12 | 13 | # local-exec provisioner (Creation-Time Provisioner - Triggered during Create Resource) 14 | provisioner "local-exec" { 15 | command = "echo ${aws_instance.my-ec2-vm.private_ip} >> creation-time-private-ip.txt" 16 | working_dir = "local-exec-output-files/" 17 | #on_failure = continue 18 | } 19 | 20 | # local-exec provisioner - (Destroy-Time Provisioner - Triggered during Destroy Resource) 21 | provisioner "local-exec" { 22 | when = destroy 23 | command = "echo Destroy-time provisioner Instanace Destroyed at `date` >> destroy-time.txt" 24 | working_dir = "local-exec-output-files/" 25 | } 26 | 27 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.my-ec2-vm File: /09-Terraform-Provisioners/09-03-local-exec-provisioner/terraform-manifests-oldv1/c4-ec2-instance.tf:2-27 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | #count = terraform.workspace == "default" ? 1 : 1 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "vm-${terraform.workspace}-0" 11 | } 12 | 13 | # local-exec provisioner (Creation-Time Provisioner - Triggered during Create Resource) 14 | provisioner "local-exec" { 15 | command = "echo ${aws_instance.my-ec2-vm.private_ip} >> creation-time-private-ip.txt" 16 | working_dir = "local-exec-output-files/" 17 | #on_failure = continue 18 | } 19 | 20 | # local-exec provisioner - (Destroy-Time Provisioner - Triggered during Destroy Resource) 21 | provisioner "local-exec" { 22 | when = destroy 23 | command = "echo Destroy-time provisioner Instanace Destroyed at `date` >> destroy-time.txt" 24 | working_dir = "local-exec-output-files/" 25 | } 26 | 27 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.my-ec2-vm File: /09-Terraform-Provisioners/09-03-local-exec-provisioner/terraform-manifests-oldv1/c4-ec2-instance.tf:2-27 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | #count = terraform.workspace == "default" ? 1 : 1 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "vm-${terraform.workspace}-0" 11 | } 12 | 13 | # local-exec provisioner (Creation-Time Provisioner - Triggered during Create Resource) 14 | provisioner "local-exec" { 15 | command = "echo ${aws_instance.my-ec2-vm.private_ip} >> creation-time-private-ip.txt" 16 | working_dir = "local-exec-output-files/" 17 | #on_failure = continue 18 | } 19 | 20 | # local-exec provisioner - (Destroy-Time Provisioner - Triggered during Destroy Resource) 21 | provisioner "local-exec" { 22 | when = destroy 23 | command = "echo Destroy-time provisioner Instanace Destroyed at `date` >> destroy-time.txt" 24 | working_dir = "local-exec-output-files/" 25 | } 26 | 27 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.my-ec2-vm File: /09-Terraform-Provisioners/09-03-local-exec-provisioner/terraform-manifests-oldv1/c4-ec2-instance.tf:2-27 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | #count = terraform.workspace == "default" ? 1 : 1 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "vm-${terraform.workspace}-0" 11 | } 12 | 13 | # local-exec provisioner (Creation-Time Provisioner - Triggered during Create Resource) 14 | provisioner "local-exec" { 15 | command = "echo ${aws_instance.my-ec2-vm.private_ip} >> creation-time-private-ip.txt" 16 | working_dir = "local-exec-output-files/" 17 | #on_failure = continue 18 | } 19 | 20 | # local-exec provisioner - (Destroy-Time Provisioner - Triggered during Destroy Resource) 21 | provisioner "local-exec" { 22 | when = destroy 23 | command = "echo Destroy-time provisioner Instanace Destroyed at `date` >> destroy-time.txt" 24 | working_dir = "local-exec-output-files/" 25 | } 26 | 27 | } Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22" FAILED for resource: aws_security_group.vpc-ssh File: /09-Terraform-Provisioners/09-03-local-exec-provisioner/terraform-manifests/c3-security-groups.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-1-port-security.html 2 | resource "aws_security_group" "vpc-ssh" { 3 | name = "vpc-ssh-${terraform.workspace}" 4 | description = "Dev VPC SSH" 5 | ingress { 6 | description = "Allow Port 22" 7 | from_port = 22 8 | to_port = 22 9 | protocol = "tcp" 10 | cidr_blocks = ["0.0.0.0/0"] 11 | } 12 | egress { 13 | description = "Allow all ip and ports outboun" 14 | from_port = 0 15 | to_port = 0 16 | protocol = "-1" 17 | cidr_blocks = ["0.0.0.0/0"] 18 | } 19 | } Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80" FAILED for resource: aws_security_group.vpc-web File: /09-Terraform-Provisioners/09-03-local-exec-provisioner/terraform-manifests/c3-security-groups.tf:22-49 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80.html 22 | resource "aws_security_group" "vpc-web" { 23 | name = "vpc-web-${terraform.workspace}" 24 | description = "Dev VPC web" 25 | ingress { 26 | description = "Allow Port 80" 27 | from_port = 80 28 | to_port = 80 29 | protocol = "tcp" 30 | cidr_blocks = ["0.0.0.0/0"] 31 | } 32 | 33 | ingress { 34 | description = "Allow Port 443" 35 | from_port = 443 36 | to_port = 443 37 | protocol = "tcp" 38 | cidr_blocks = ["0.0.0.0/0"] 39 | } 40 | 41 | egress { 42 | description = "Allow all ip and ports outbound" 43 | from_port = 0 44 | to_port = 0 45 | protocol = "-1" 46 | cidr_blocks = ["0.0.0.0/0"] 47 | } 48 | 49 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.my-ec2-vm File: /09-Terraform-Provisioners/09-03-local-exec-provisioner/terraform-manifests/c4-ec2-instance.tf:2-27 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | #count = terraform.workspace == "default" ? 1 : 1 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "vm-${terraform.workspace}-0" 11 | } 12 | 13 | # local-exec provisioner (Creation-Time Provisioner - Triggered during Create Resource) 14 | provisioner "local-exec" { 15 | command = "echo ${aws_instance.my-ec2-vm.private_ip} >> creation-time-private-ip.txt" 16 | working_dir = "local-exec-output-files/" 17 | #on_failure = continue 18 | } 19 | 20 | # local-exec provisioner - (Destroy-Time Provisioner - Triggered during Destroy Resource) 21 | provisioner "local-exec" { 22 | when = destroy 23 | command = "echo Destroy-time provisioner Instanace Destroyed at `date` >> destroy-time.txt" 24 | working_dir = "local-exec-output-files/" 25 | } 26 | 27 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.my-ec2-vm File: /09-Terraform-Provisioners/09-03-local-exec-provisioner/terraform-manifests/c4-ec2-instance.tf:2-27 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | #count = terraform.workspace == "default" ? 1 : 1 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "vm-${terraform.workspace}-0" 11 | } 12 | 13 | # local-exec provisioner (Creation-Time Provisioner - Triggered during Create Resource) 14 | provisioner "local-exec" { 15 | command = "echo ${aws_instance.my-ec2-vm.private_ip} >> creation-time-private-ip.txt" 16 | working_dir = "local-exec-output-files/" 17 | #on_failure = continue 18 | } 19 | 20 | # local-exec provisioner - (Destroy-Time Provisioner - Triggered during Destroy Resource) 21 | provisioner "local-exec" { 22 | when = destroy 23 | command = "echo Destroy-time provisioner Instanace Destroyed at `date` >> destroy-time.txt" 24 | working_dir = "local-exec-output-files/" 25 | } 26 | 27 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.my-ec2-vm File: /09-Terraform-Provisioners/09-03-local-exec-provisioner/terraform-manifests/c4-ec2-instance.tf:2-27 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | #count = terraform.workspace == "default" ? 1 : 1 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "vm-${terraform.workspace}-0" 11 | } 12 | 13 | # local-exec provisioner (Creation-Time Provisioner - Triggered during Create Resource) 14 | provisioner "local-exec" { 15 | command = "echo ${aws_instance.my-ec2-vm.private_ip} >> creation-time-private-ip.txt" 16 | working_dir = "local-exec-output-files/" 17 | #on_failure = continue 18 | } 19 | 20 | # local-exec provisioner - (Destroy-Time Provisioner - Triggered during Destroy Resource) 21 | provisioner "local-exec" { 22 | when = destroy 23 | command = "echo Destroy-time provisioner Instanace Destroyed at `date` >> destroy-time.txt" 24 | working_dir = "local-exec-output-files/" 25 | } 26 | 27 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.my-ec2-vm File: /09-Terraform-Provisioners/09-03-local-exec-provisioner/terraform-manifests/c4-ec2-instance.tf:2-27 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | #count = terraform.workspace == "default" ? 1 : 1 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "vm-${terraform.workspace}-0" 11 | } 12 | 13 | # local-exec provisioner (Creation-Time Provisioner - Triggered during Create Resource) 14 | provisioner "local-exec" { 15 | command = "echo ${aws_instance.my-ec2-vm.private_ip} >> creation-time-private-ip.txt" 16 | working_dir = "local-exec-output-files/" 17 | #on_failure = continue 18 | } 19 | 20 | # local-exec provisioner - (Destroy-Time Provisioner - Triggered during Destroy Resource) 21 | provisioner "local-exec" { 22 | when = destroy 23 | command = "echo Destroy-time provisioner Instanace Destroyed at `date` >> destroy-time.txt" 24 | working_dir = "local-exec-output-files/" 25 | } 26 | 27 | } Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22" FAILED for resource: aws_security_group.vpc-ssh File: /09-Terraform-Provisioners/09-04-Null-Resource/terraform-manifests-oldv1/c3-security-groups.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-1-port-security.html 2 | resource "aws_security_group" "vpc-ssh" { 3 | name = "vpc-ssh-${terraform.workspace}" 4 | description = "Dev VPC SSH" 5 | ingress { 6 | description = "Allow Port 22" 7 | from_port = 22 8 | to_port = 22 9 | protocol = "tcp" 10 | cidr_blocks = ["0.0.0.0/0"] 11 | } 12 | egress { 13 | description = "Allow all ip and ports outboun" 14 | from_port = 0 15 | to_port = 0 16 | protocol = "-1" 17 | cidr_blocks = ["0.0.0.0/0"] 18 | } 19 | } Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80" FAILED for resource: aws_security_group.vpc-web File: /09-Terraform-Provisioners/09-04-Null-Resource/terraform-manifests-oldv1/c3-security-groups.tf:22-49 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80.html 22 | resource "aws_security_group" "vpc-web" { 23 | name = "vpc-web-${terraform.workspace}" 24 | description = "Dev VPC web" 25 | ingress { 26 | description = "Allow Port 80" 27 | from_port = 80 28 | to_port = 80 29 | protocol = "tcp" 30 | cidr_blocks = ["0.0.0.0/0"] 31 | } 32 | 33 | ingress { 34 | description = "Allow Port 443" 35 | from_port = 443 36 | to_port = 443 37 | protocol = "tcp" 38 | cidr_blocks = ["0.0.0.0/0"] 39 | } 40 | 41 | egress { 42 | description = "Allow all ip and ports outbound" 43 | from_port = 0 44 | to_port = 0 45 | protocol = "-1" 46 | cidr_blocks = ["0.0.0.0/0"] 47 | } 48 | 49 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.my-ec2-vm File: /09-Terraform-Provisioners/09-04-Null-Resource/terraform-manifests-oldv1/c4-ec2-instance.tf:2-12 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | #count = terraform.workspace == "default" ? 1 : 1 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "vm-${terraform.workspace}-0" 11 | } 12 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.my-ec2-vm File: /09-Terraform-Provisioners/09-04-Null-Resource/terraform-manifests-oldv1/c4-ec2-instance.tf:2-12 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | #count = terraform.workspace == "default" ? 1 : 1 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "vm-${terraform.workspace}-0" 11 | } 12 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.my-ec2-vm File: /09-Terraform-Provisioners/09-04-Null-Resource/terraform-manifests-oldv1/c4-ec2-instance.tf:2-12 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | #count = terraform.workspace == "default" ? 1 : 1 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "vm-${terraform.workspace}-0" 11 | } 12 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.my-ec2-vm File: /09-Terraform-Provisioners/09-04-Null-Resource/terraform-manifests-oldv1/c4-ec2-instance.tf:2-12 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | #count = terraform.workspace == "default" ? 1 : 1 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "vm-${terraform.workspace}-0" 11 | } 12 | } Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22" FAILED for resource: aws_security_group.vpc-ssh File: /09-Terraform-Provisioners/09-04-Null-Resource/terraform-manifests/c3-security-groups.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/networking-1-port-security.html 2 | resource "aws_security_group" "vpc-ssh" { 3 | name = "vpc-ssh-${terraform.workspace}" 4 | description = "Dev VPC SSH" 5 | ingress { 6 | description = "Allow Port 22" 7 | from_port = 22 8 | to_port = 22 9 | protocol = "tcp" 10 | cidr_blocks = ["0.0.0.0/0"] 11 | } 12 | egress { 13 | description = "Allow all ip and ports outboun" 14 | from_port = 0 15 | to_port = 0 16 | protocol = "-1" 17 | cidr_blocks = ["0.0.0.0/0"] 18 | } 19 | } Check: CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80" FAILED for resource: aws_security_group.vpc-web File: /09-Terraform-Provisioners/09-04-Null-Resource/terraform-manifests/c3-security-groups.tf:22-49 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-networking-policies/ensure-aws-security-groups-do-not-allow-ingress-from-00000-to-port-80.html 22 | resource "aws_security_group" "vpc-web" { 23 | name = "vpc-web-${terraform.workspace}" 24 | description = "Dev VPC web" 25 | ingress { 26 | description = "Allow Port 80" 27 | from_port = 80 28 | to_port = 80 29 | protocol = "tcp" 30 | cidr_blocks = ["0.0.0.0/0"] 31 | } 32 | 33 | ingress { 34 | description = "Allow Port 443" 35 | from_port = 443 36 | to_port = 443 37 | protocol = "tcp" 38 | cidr_blocks = ["0.0.0.0/0"] 39 | } 40 | 41 | egress { 42 | description = "Allow all ip and ports outbound" 43 | from_port = 0 44 | to_port = 0 45 | protocol = "-1" 46 | cidr_blocks = ["0.0.0.0/0"] 47 | } 48 | 49 | } Check: CKV_AWS_126: "Ensure that detailed monitoring is enabled for EC2 instances" FAILED for resource: aws_instance.my-ec2-vm File: /09-Terraform-Provisioners/09-04-Null-Resource/terraform-manifests/c4-ec2-instance.tf:2-12 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-logging-policies/ensure-that-detailed-monitoring-is-enabled-for-ec2-instances.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | #count = terraform.workspace == "default" ? 1 : 1 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "vm-${terraform.workspace}-0" 11 | } 12 | } Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration or instance Elastic Blocks Store is securely encrypted" FAILED for resource: aws_instance.my-ec2-vm File: /09-Terraform-Provisioners/09-04-Null-Resource/terraform-manifests/c4-ec2-instance.tf:2-12 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/general-13.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | #count = terraform.workspace == "default" ? 1 : 1 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "vm-${terraform.workspace}-0" 11 | } 12 | } Check: CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled" FAILED for resource: aws_instance.my-ec2-vm File: /09-Terraform-Provisioners/09-04-Null-Resource/terraform-manifests/c4-ec2-instance.tf:2-12 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/bc-aws-general-31.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | #count = terraform.workspace == "default" ? 1 : 1 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "vm-${terraform.workspace}-0" 11 | } 12 | } Check: CKV_AWS_135: "Ensure that EC2 is EBS optimized" FAILED for resource: aws_instance.my-ec2-vm File: /09-Terraform-Provisioners/09-04-Null-Resource/terraform-manifests/c4-ec2-instance.tf:2-12 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-general-policies/ensure-that-ec2-is-ebs-optimized.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | #count = terraform.workspace == "default" ? 1 : 1 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "vm-${terraform.workspace}-0" 11 | } 12 | } Check: CKV_AWS_70: "Ensure S3 bucket does not allow an action with any Principal" FAILED for resource: aws_s3_bucket.s3_bucket File: /10-Terraform-Modules/10-02-Terraform-Build-a-Module/Oldv1- backup/v2-host-static-website-on-s3-using-terraform-manifests/main.tf:2-29 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/s3-policies/bc-aws-s3-23.html 2 | resource "aws_s3_bucket" "s3_bucket" { 3 | bucket = var.bucket_name 4 | acl = "public-read" 5 | policy = <Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region" > /var/www/html/index.html 16 | EOF 17 | tags = { 18 | "Name" = "myec2vm" 19 | } 20 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm File: /04-Terraform-Resources/04-02-Meta-Argument-depends_on/terraform-manifests/c3-ec2-instance.tf:2-20 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | key_name = "terraform-key" 6 | subnet_id = aws_subnet.vpc-dev-public-subnet-1.id 7 | vpc_security_group_ids = [aws_security_group.dev-vpc-sg.id] 8 | #user_data = file("apache-install.sh") 9 | user_data = <<-EOF 10 | #!/bin/bash 11 | sudo yum update -y 12 | sudo yum install httpd -y 13 | sudo systemctl enable httpd 14 | sudo systemctl start httpd 15 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 16 | EOF 17 | tags = { 18 | "Name" = "myec2vm" 19 | } 20 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.web[0] File: /04-Terraform-Resources/04-03-Meta-Argument-count/terraform-manifests-oldv1/c2-ec2-instance.tf:2-10 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | count = 5 6 | tags = { 7 | "Name" = "web" 8 | #"Name" = "web-${count.index}" 9 | } 10 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.web[0] File: /04-Terraform-Resources/04-03-Meta-Argument-count/terraform-manifests/c2-ec2-instance.tf:2-10 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | count = 5 6 | tags = { 7 | "Name" = "web" 8 | #"Name" = "web-${count.index}" 9 | } 10 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.web File: /04-Terraform-Resources/04-05-Meta-Argument-lifecycle/oldv1-backup/v1-create_before_destroy/c2-ec2-instance.tf:2-15 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-0915bcb5fa77e4892" # Amazon Linux 4 | instance_type = "t2.micro" 5 | availability_zone = "us-east-1a" 6 | #availability_zone = "us-east-1b" 7 | tags = { 8 | "Name" = "web-1" 9 | } 10 | /* 11 | lifecycle { 12 | create_before_destroy = true 13 | } 14 | */ 15 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.web File: /04-Terraform-Resources/04-05-Meta-Argument-lifecycle/oldv1-backup/v2-prevent_destroy/c2-ec2-instance.tf:2-11 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-0915bcb5fa77e4892" # Amazon Linux 4 | instance_type = "t2.micro" 5 | tags = { 6 | "Name" = "web-2" 7 | } 8 | lifecycle { 9 | prevent_destroy = true # Default is false 10 | } 11 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.web File: /04-Terraform-Resources/04-05-Meta-Argument-lifecycle/oldv1-backup/v3-ignore_changes/c2-ec2-instance.tf:2-16 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-0915bcb5fa77e4892" # Amazon Linux 4 | instance_type = "t2.micro" 5 | tags = { 6 | "Name" = "web-3" 7 | } 8 | /* 9 | lifecycle { 10 | ignore_changes = [ 11 | # Ignore changes to tags, e.g. because a management agent 12 | # updates these based on some ruleset managed elsewhere. 13 | tags, 14 | ] 15 | }*/ 16 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.web File: /04-Terraform-Resources/04-05-Meta-Argument-lifecycle/v1-create_before_destroy/c2-ec2-instance.tf:2-15 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-0915bcb5fa77e4892" # Amazon Linux 4 | instance_type = "t2.micro" 5 | availability_zone = "us-east-1a" 6 | #availability_zone = "us-east-1b" 7 | tags = { 8 | "Name" = "web-1" 9 | } 10 | /* 11 | lifecycle { 12 | create_before_destroy = true 13 | } 14 | */ 15 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.web File: /04-Terraform-Resources/04-05-Meta-Argument-lifecycle/v2-prevent_destroy/c2-ec2-instance.tf:2-11 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-0915bcb5fa77e4892" # Amazon Linux 4 | instance_type = "t2.micro" 5 | tags = { 6 | "Name" = "web-2" 7 | } 8 | lifecycle { 9 | prevent_destroy = true # Default is false 10 | } 11 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.web File: /04-Terraform-Resources/04-05-Meta-Argument-lifecycle/v3-ignore_changes/c2-ec2-instance.tf:2-16 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-0915bcb5fa77e4892" # Amazon Linux 4 | instance_type = "t2.micro" 5 | tags = { 6 | "Name" = "web-3" 7 | } 8 | /* 9 | lifecycle { 10 | ignore_changes = [ 11 | # Ignore changes to tags, e.g. because a management agent 12 | # updates these based on some ruleset managed elsewhere. 13 | tags, 14 | ] 15 | }*/ 16 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v1-Input-Variables-Basic/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = "t3.micro" 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v11-File-Function/c4-ec2-instance.tf:2-22 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = file("apache-install.sh") 8 | /* 9 | user_data = <<-EOF 10 | #!/bin/bash 11 | sudo yum update -y 12 | sudo yum install httpd -y 13 | sudo systemctl enable httpd 14 | sudo systemctl start httpd 15 | echo "
    Welcome to StackSimplify ! AWS Infra created using Terraform
    " > /var/www/html/index.html 16 | EOF 17 | */ 18 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 19 | tags = { 20 | "Name" = "web" 21 | } 22 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v2-Input-Variables-Assign-when-prompted/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v3-Input-Variables-Override-default-with-cli-var/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v4-Input-Variables-Override-with-Environment-Variables/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v5-Input-Variables-Assign-with-terraform-tfvars/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v6-Input-Variables-Assign-with-tfvars-var-file/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v7-Input-Variables-Assign-with-auto-tfvars/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v8-01-Input-Variables-Lists/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type[0] 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v8-02-Input-Variables-Maps/c4-ec2-instance.tf:2-18 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | #instance_type = var.ec2_instance_type[0] 5 | instance_type = var.ec2_instance_type_map["big-apps"] 6 | key_name = "terraform-key" 7 | count = var.ec2_instance_count 8 | user_data = <<-EOF 9 | #!/bin/bash 10 | sudo yum update -y 11 | sudo yum install httpd -y 12 | sudo systemctl enable httpd 13 | sudo systemctl start httpd 14 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 15 | EOF 16 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 17 | tags = var.ec2_instance_tags 18 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v9-Input-Variables-Validation-Rules/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v1-Input-Variables-Basic/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = "t3.micro" 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v11-File-Function/c4-ec2-instance.tf:2-22 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = file("apache-install.sh") 8 | /* 9 | user_data = <<-EOF 10 | #!/bin/bash 11 | sudo yum update -y 12 | sudo yum install httpd -y 13 | sudo systemctl enable httpd 14 | sudo systemctl start httpd 15 | echo "
    Welcome to StackSimplify ! AWS Infra created using Terraform
    " > /var/www/html/index.html 16 | EOF 17 | */ 18 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 19 | tags = { 20 | "Name" = "web" 21 | } 22 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v2-Input-Variables-Assign-when-prompted/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v3-Input-Variables-Override-default-with-cli-var/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v4-Input-Variables-Override-with-Environment-Variables/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v5-Input-Variables-Assign-with-terraform-tfvars/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v6-Input-Variables-Assign-with-tfvars-var-file/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v7-Input-Variables-Assign-with-auto-tfvars/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v8-01-Input-Variables-Lists/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type[0] 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v8-02-Input-Variables-Maps/c4-ec2-instance.tf:2-18 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | #instance_type = var.ec2_instance_type[0] 5 | instance_type = var.ec2_instance_type_map["big-apps"] 6 | key_name = "terraform-key" 7 | count = var.ec2_instance_count 8 | user_data = <<-EOF 9 | #!/bin/bash 10 | sudo yum update -y 11 | sudo yum install httpd -y 12 | sudo systemctl enable httpd 13 | sudo systemctl start httpd 14 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 15 | EOF 16 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 17 | tags = var.ec2_instance_tags 18 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm[0] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v9-Input-Variables-Validation-Rules/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm File: /05-Terraform-Variables/05-02-Terraform-Output-Values/terraform-manifests-oldv1/c4-ec2-instance.tf:2-21 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | user_data = file("apache-install.sh") 7 | /* 8 | user_data = <<-EOF 9 | #!/bin/bash 10 | sudo yum update -y 11 | sudo yum install httpd -y 12 | sudo systemctl enable httpd 13 | sudo systemctl start httpd 14 | echo "
    Welcome to StackSimplify ! AWS Infra created using Terraform
    " > /var/www/html/index.html 15 | EOF 16 | */ 17 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 18 | tags = { 19 | "Name" = "web" 20 | } 21 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm File: /05-Terraform-Variables/05-02-Terraform-Output-Values/terraform-manifests/c4-ec2-instance.tf:2-21 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | user_data = file("apache-install.sh") 7 | /* 8 | user_data = <<-EOF 9 | #!/bin/bash 10 | sudo yum update -y 11 | sudo yum install httpd -y 12 | sudo systemctl enable httpd 13 | sudo systemctl start httpd 14 | echo "
    Welcome to StackSimplify ! AWS Infra created using Terraform
    " > /var/www/html/index.html 15 | EOF 16 | */ 17 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 18 | tags = { 19 | "Name" = "web" 20 | } 21 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm File: /06-Terraform-Datasources/terraform-manifests-oldv1/c4-ec2-instance.tf:2-11 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | user_data = file("apache-install.sh") 7 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 8 | tags = { 9 | "Name" = "amz-linux-vm" 10 | } 11 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm File: /06-Terraform-Datasources/terraform-manifests/c4-ec2-instance.tf:2-11 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | user_data = file("apache-install.sh") 7 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 8 | tags = { 9 | "Name" = "amz-linux-vm" 10 | } 11 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm File: /07-Terraform-State/07-01-Terraform-Remote-State-Storage-and-Locking/terraform-manifests-oldv1/c4-ec2-instance.tf:2-11 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | user_data = file("apache-install.sh") 7 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 8 | tags = { 9 | "Name" = "amz-linux-vm" 10 | } 11 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm File: /07-Terraform-State/07-01-Terraform-Remote-State-Storage-and-Locking/terraform-manifests/c4-ec2-instance.tf:2-11 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | user_data = file("apache-install.sh") 7 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 8 | tags = { 9 | "Name" = "amz-linux-vm" 10 | } 11 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm File: /07-Terraform-State/07-02-Terraform-State-Commands/terraform-manifests-oldv1/c4-ec2-instance.tf:2-14 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | #instance_type = "t2.micro" 6 | key_name = "terraform-key" 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "amz-linux-vm" 11 | #"demotag" = "refreshtest" # Enable during Step-04-05 12 | #"target" = "Target-Test-1" # Enable during step-08 13 | } 14 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm File: /07-Terraform-State/07-02-Terraform-State-Commands/terraform-manifests/c4-ec2-instance.tf:2-14 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | #instance_type = "t2.micro" 6 | key_name = "terraform-key" 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "amz-linux-vm" 11 | #"demotag" = "refreshtest" # Enable during Step-04-05 12 | #"target" = "Target-Test-1" # Enable during step-08 13 | } 14 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm File: /08-Terraform-Workspaces/Oldv1-backup/v1-local-backend/c4-ec2-instance.tf:2-12 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | count = terraform.workspace == "default" ? 2 : 1 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "vm-${terraform.workspace}-${count.index}" 11 | } 12 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm File: /08-Terraform-Workspaces/Oldv1-backup/v2-remote-backend/c4-ec2-instance.tf:2-12 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | count = terraform.workspace == "default" ? 2 : 1 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "vm-${terraform.workspace}-${count.index}" 11 | } 12 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm File: /08-Terraform-Workspaces/v1-local-backend/c4-ec2-instance.tf:2-12 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | count = terraform.workspace == "default" ? 2 : 1 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "vm-${terraform.workspace}-${count.index}" 11 | } 12 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm File: /08-Terraform-Workspaces/v2-remote-backend/c4-ec2-instance.tf:2-12 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | count = terraform.workspace == "default" ? 2 : 1 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "vm-${terraform.workspace}-${count.index}" 11 | } 12 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm File: /09-Terraform-Provisioners/09-01-File-Provisioner/terraform-manifests-oldv1/c4-ec2-instance.tf:2-57 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html Code lines for this resource are too many. Please use IDE of your choice to review the file. Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm File: /09-Terraform-Provisioners/09-01-File-Provisioner/terraform-manifests/c4-ec2-instance.tf:2-57 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html Code lines for this resource are too many. Please use IDE of your choice to review the file. Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm File: /09-Terraform-Provisioners/09-02-remote-exec-provisioner/terraform-manifests-oldv1/c4-ec2-instance.tf:2-37 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | #count = terraform.workspace == "default" ? 1 : 1 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "vm-${terraform.workspace}-0" 11 | } 12 | 13 | # Connection Block for Provisioners to connect to EC2 Instance 14 | connection { 15 | type = "ssh" 16 | host = self.public_ip # Understand what is "self" 17 | user = "ec2-user" 18 | password = "" 19 | private_key = file("private-key/terraform-key.pem") 20 | } 21 | 22 | # Copies the file-copy.html file to /tmp/file-copy.html 23 | provisioner "file" { 24 | source = "apps/file-copy.html" 25 | destination = "/tmp/file-copy.html" 26 | } 27 | 28 | # Copies the file to Apache Webserver /var/www/html directory 29 | provisioner "remote-exec" { 30 | inline = [ 31 | "sleep 120", # Will sleep for 120 seconds to ensure Apache webserver is provisioned using user_data 32 | "sudo cp /tmp/file-copy.html /var/www/html" 33 | ] 34 | } 35 | 36 | 37 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm File: /09-Terraform-Provisioners/09-02-remote-exec-provisioner/terraform-manifests/c4-ec2-instance.tf:2-37 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | #count = terraform.workspace == "default" ? 1 : 1 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "vm-${terraform.workspace}-0" 11 | } 12 | 13 | # Connection Block for Provisioners to connect to EC2 Instance 14 | connection { 15 | type = "ssh" 16 | host = self.public_ip # Understand what is "self" 17 | user = "ec2-user" 18 | password = "" 19 | private_key = file("private-key/terraform-key.pem") 20 | } 21 | 22 | # Copies the file-copy.html file to /tmp/file-copy.html 23 | provisioner "file" { 24 | source = "apps/file-copy.html" 25 | destination = "/tmp/file-copy.html" 26 | } 27 | 28 | # Copies the file to Apache Webserver /var/www/html directory 29 | provisioner "remote-exec" { 30 | inline = [ 31 | "sleep 120", # Will sleep for 120 seconds to ensure Apache webserver is provisioned using user_data 32 | "sudo cp /tmp/file-copy.html /var/www/html" 33 | ] 34 | } 35 | 36 | 37 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm File: /09-Terraform-Provisioners/09-03-local-exec-provisioner/terraform-manifests-oldv1/c4-ec2-instance.tf:2-27 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | #count = terraform.workspace == "default" ? 1 : 1 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "vm-${terraform.workspace}-0" 11 | } 12 | 13 | # local-exec provisioner (Creation-Time Provisioner - Triggered during Create Resource) 14 | provisioner "local-exec" { 15 | command = "echo ${aws_instance.my-ec2-vm.private_ip} >> creation-time-private-ip.txt" 16 | working_dir = "local-exec-output-files/" 17 | #on_failure = continue 18 | } 19 | 20 | # local-exec provisioner - (Destroy-Time Provisioner - Triggered during Destroy Resource) 21 | provisioner "local-exec" { 22 | when = destroy 23 | command = "echo Destroy-time provisioner Instanace Destroyed at `date` >> destroy-time.txt" 24 | working_dir = "local-exec-output-files/" 25 | } 26 | 27 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm File: /09-Terraform-Provisioners/09-03-local-exec-provisioner/terraform-manifests/c4-ec2-instance.tf:2-27 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | #count = terraform.workspace == "default" ? 1 : 1 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "vm-${terraform.workspace}-0" 11 | } 12 | 13 | # local-exec provisioner (Creation-Time Provisioner - Triggered during Create Resource) 14 | provisioner "local-exec" { 15 | command = "echo ${aws_instance.my-ec2-vm.private_ip} >> creation-time-private-ip.txt" 16 | working_dir = "local-exec-output-files/" 17 | #on_failure = continue 18 | } 19 | 20 | # local-exec provisioner - (Destroy-Time Provisioner - Triggered during Destroy Resource) 21 | provisioner "local-exec" { 22 | when = destroy 23 | command = "echo Destroy-time provisioner Instanace Destroyed at `date` >> destroy-time.txt" 24 | working_dir = "local-exec-output-files/" 25 | } 26 | 27 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm File: /09-Terraform-Provisioners/09-04-Null-Resource/terraform-manifests-oldv1/c4-ec2-instance.tf:2-12 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | #count = terraform.workspace == "default" ? 1 : 1 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "vm-${terraform.workspace}-0" 11 | } 12 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm File: /09-Terraform-Provisioners/09-04-Null-Resource/terraform-manifests/c4-ec2-instance.tf:2-12 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | #count = terraform.workspace == "default" ? 1 : 1 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "vm-${terraform.workspace}-0" 11 | } 12 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm[0] File: /11-Terraform-Cloud-and-Enterprise-Capabilities/11-01-Terraform-Cloud-Github-Integration/terraform-manifests-oldv1/c4-ec2-instance.tf:2-12 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | count = 1 6 | key_name = "terraform-key" 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "Terraform-Cloud-${count.index}" 11 | } 12 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm[0] File: /11-Terraform-Cloud-and-Enterprise-Capabilities/11-01-Terraform-Cloud-Github-Integration/terraform-manifests/c4-ec2-instance.tf:2-12 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | count = 1 6 | key_name = "terraform-key" 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "Terraform-Cloud-${count.index}" 11 | } 12 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm[0] File: /11-Terraform-Cloud-and-Enterprise-Capabilities/11-04-Migrate-State-to-Terraform-Cloud/terraform-manifests-oldv1/c4-ec2-instance.tf:2-12 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | count = 1 6 | #key_name = "terraform-key" 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "Terraform-Cloud-${count.index}" 11 | } 12 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm[0] File: /11-Terraform-Cloud-and-Enterprise-Capabilities/11-04-Migrate-State-to-Terraform-Cloud/terraform-manifests/c4-ec2-instance.tf:2-12 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | count = 1 6 | #key_name = "terraform-key" 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "Terraform-Cloud-${count.index}" 11 | } 12 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm[0] File: /12-Terraform-Cloud-and-Sentinel/12-02-Control-Costs-with-Sentinel-Policies/terraform-manifests-oldv1/c4-ec2-instance.tf:2-12 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | count = 1 6 | key_name = "terraform-key" 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "Terraform-Cloud-${count.index}" 11 | } 12 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm[0] File: /12-Terraform-Cloud-and-Sentinel/12-02-Control-Costs-with-Sentinel-Policies/terraform-manifests/c4-ec2-instance.tf:2-12 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | count = 1 6 | key_name = "terraform-key" 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "Terraform-Cloud-${count.index}" 11 | } 12 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.myec2vm File: /13-Terraform-State-Import/Oldv1-backup/v1-ec2-instance/c2-ec2-instance.tf:2-14 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "myec2vm" { 3 | 4 | /* 5 | ami = "ami-038f1ca1bd58a5790" 6 | #instance_type = "t2.micro" 7 | instance_type = "t2.small" # Enabling it as part of Step-06 8 | availability_zone = "us-east-1e" 9 | key_name = "terraform-key" 10 | tags = { 11 | "Name" = "State-Import-Demo" 12 | } 13 | */ 14 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.myec2vm File: /13-Terraform-State-Import/v1-ec2-instance/c2-ec2-instance.tf:2-14 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "myec2vm" { 3 | 4 | /* 5 | ami = "ami-038f1ca1bd58a5790" 6 | #instance_type = "t2.micro" 7 | instance_type = "t2.small" # Enabling it as part of Step-06 8 | availability_zone = "us-east-1e" 9 | key_name = "terraform-key" 10 | tags = { 11 | "Name" = "State-Import-Demo" 12 | } 13 | */ 14 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm[0] File: /14-Terraform-Graph/terraform-manifests-oldv1/c4-ec2-instance.tf:2-12 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | count = 1 6 | key_name = "terraform-key" 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "Terraform-Cloud-${count.index}" 11 | } 12 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm[0] File: /14-Terraform-Graph/terraform-manifests/c4-ec2-instance.tf:2-12 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | count = 1 6 | key_name = "terraform-key" 7 | user_data = file("apache-install.sh") 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "Terraform-Cloud-${count.index}" 11 | } 12 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm File: /15-Terraform-Expressions/15-01-Terraform-Functions/terraform-manifests-oldv1/c4-ec2-instance.tf:2-12 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | #user_data = file("apache-install.sh") 7 | user_data = templatefile("user_data.tmpl", {package_name = var.package_name}) 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "TF-Functions-Demo-1" 11 | } 12 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm File: /15-Terraform-Expressions/15-01-Terraform-Functions/terraform-manifests/c4-ec2-instance.tf:2-12 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | #user_data = file("apache-install.sh") 7 | user_data = templatefile("user_data.tmpl", {package_name = var.package_name}) 8 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 9 | tags = { 10 | "Name" = "TF-Functions-Demo-1" 11 | } 12 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm[0] File: /15-Terraform-Expressions/15-02-Terraform-Dynamic-Expressions/terraform-manifests-oldv1/c4-ec2-instance.tf:19-29 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 19 | resource "aws_instance" "my-ec2-vm" { 20 | ami = data.aws_ami.amzlinux.id 21 | instance_type = var.instance_type 22 | key_name = "terraform-key" 23 | user_data = file("apache-install.sh") 24 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 25 | # Dynamic Expressions 26 | count = (var.high_availability == true ? 2 : 1) 27 | tags = local.common_tags 28 | availability_zone = var.availability_zones[count.index] 29 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm[0] File: /15-Terraform-Expressions/15-02-Terraform-Dynamic-Expressions/terraform-manifests/c4-ec2-instance.tf:19-29 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 19 | resource "aws_instance" "my-ec2-vm" { 20 | ami = data.aws_ami.amzlinux.id 21 | instance_type = var.instance_type 22 | key_name = "terraform-key" 23 | user_data = file("apache-install.sh") 24 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 25 | # Dynamic Expressions 26 | count = (var.high_availability == true ? 2 : 1) 27 | tags = local.common_tags 28 | availability_zone = var.availability_zones[count.index] 29 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm File: /16-Terraform-Debug/terraform-manifests-oldv1/c4-ec2-instance.tf:2-11 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | user_data = file("apache-install.sh") 7 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 8 | tags = { 9 | "Name" = "amz-linux-vm" 10 | } 11 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm File: /16-Terraform-Debug/terraform-manifests/c4-ec2-instance.tf:2-11 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = data.aws_ami.amzlinux.id 4 | instance_type = var.instance_type 5 | key_name = "terraform-key" 6 | user_data = file("apache-install.sh") 7 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 8 | tags = { 9 | "Name" = "amz-linux-vm" 10 | } 11 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.web[1] File: /04-Terraform-Resources/04-03-Meta-Argument-count/terraform-manifests-oldv1/c2-ec2-instance.tf:2-10 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | count = 5 6 | tags = { 7 | "Name" = "web" 8 | #"Name" = "web-${count.index}" 9 | } 10 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.web[2] File: /04-Terraform-Resources/04-03-Meta-Argument-count/terraform-manifests-oldv1/c2-ec2-instance.tf:2-10 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | count = 5 6 | tags = { 7 | "Name" = "web" 8 | #"Name" = "web-${count.index}" 9 | } 10 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.web[3] File: /04-Terraform-Resources/04-03-Meta-Argument-count/terraform-manifests-oldv1/c2-ec2-instance.tf:2-10 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | count = 5 6 | tags = { 7 | "Name" = "web" 8 | #"Name" = "web-${count.index}" 9 | } 10 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.web[4] File: /04-Terraform-Resources/04-03-Meta-Argument-count/terraform-manifests-oldv1/c2-ec2-instance.tf:2-10 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | count = 5 6 | tags = { 7 | "Name" = "web" 8 | #"Name" = "web-${count.index}" 9 | } 10 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.web[1] File: /04-Terraform-Resources/04-03-Meta-Argument-count/terraform-manifests/c2-ec2-instance.tf:2-10 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | count = 5 6 | tags = { 7 | "Name" = "web" 8 | #"Name" = "web-${count.index}" 9 | } 10 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.web[2] File: /04-Terraform-Resources/04-03-Meta-Argument-count/terraform-manifests/c2-ec2-instance.tf:2-10 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | count = 5 6 | tags = { 7 | "Name" = "web" 8 | #"Name" = "web-${count.index}" 9 | } 10 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.web[3] File: /04-Terraform-Resources/04-03-Meta-Argument-count/terraform-manifests/c2-ec2-instance.tf:2-10 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | count = 5 6 | tags = { 7 | "Name" = "web" 8 | #"Name" = "web-${count.index}" 9 | } 10 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.web[4] File: /04-Terraform-Resources/04-03-Meta-Argument-count/terraform-manifests/c2-ec2-instance.tf:2-10 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "web" { 3 | ami = "ami-047a51fa27710816e" # Amazon Linux 4 | instance_type = "t2.micro" 5 | count = 5 6 | tags = { 7 | "Name" = "web" 8 | #"Name" = "web-${count.index}" 9 | } 10 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm[1] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v3-Input-Variables-Override-default-with-cli-var/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm[1] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v4-Input-Variables-Override-with-Environment-Variables/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm[1] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v8-01-Input-Variables-Lists/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type[0] 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm[1] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/Oldv1-backup/v8-02-Input-Variables-Maps/c4-ec2-instance.tf:2-18 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | #instance_type = var.ec2_instance_type[0] 5 | instance_type = var.ec2_instance_type_map["big-apps"] 6 | key_name = "terraform-key" 7 | count = var.ec2_instance_count 8 | user_data = <<-EOF 9 | #!/bin/bash 10 | sudo yum update -y 11 | sudo yum install httpd -y 12 | sudo systemctl enable httpd 13 | sudo systemctl start httpd 14 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 15 | EOF 16 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 17 | tags = var.ec2_instance_tags 18 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm[1] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v3-Input-Variables-Override-default-with-cli-var/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm[1] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v4-Input-Variables-Override-with-Environment-Variables/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm[1] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v8-01-Input-Variables-Lists/c4-ec2-instance.tf:2-19 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | instance_type = var.ec2_instance_type[0] 5 | key_name = "terraform-key" 6 | count = var.ec2_instance_count 7 | user_data = <<-EOF 8 | #!/bin/bash 9 | sudo yum update -y 10 | sudo yum install httpd -y 11 | sudo systemctl enable httpd 12 | sudo systemctl start httpd 13 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 14 | EOF 15 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 16 | tags = { 17 | "Name" = "myec2vm" 18 | } 19 | } Check: CKV2_AWS_41: "Ensure an IAM role is attached to EC2 instance" FAILED for resource: aws_instance.my-ec2-vm[1] File: /05-Terraform-Variables/05-01-Terraform-Input-Variables/v8-02-Input-Variables-Maps/c4-ec2-instance.tf:2-18 Guide: https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/prisma-cloud-code-security-policy-reference/aws-policies/aws-iam-policies/ensure-an-iam-role-is-attached-to-ec2-instance.html 2 | resource "aws_instance" "my-ec2-vm" { 3 | ami = var.ec2_ami_id 4 | #instance_type = var.ec2_instance_type[0] 5 | instance_type = var.ec2_instance_type_map["big-apps"] 6 | key_name = "terraform-key" 7 | count = var.ec2_instance_count 8 | user_data = <<-EOF 9 | #!/bin/bash 10 | sudo yum update -y 11 | sudo yum install httpd -y 12 | sudo systemctl enable httpd 13 | sudo systemctl start httpd 14 | echo "

    Welcome to StackSimplify ! AWS Infra created using Terraform in us-east-1 Region

    " > /var/www/html/index.html 15 | EOF 16 | vpc_security_group_ids = [aws_security_group.vpc-ssh.id, aws_security_group.vpc-web.id] 17 | tags = var.ec2_instance_tags 18 | }

    Linting

    This repository failed the Experience Builder Terraform Module's Linting validation. This means that a linting tool was not found to be implemented in any of the CICD tool configuration files in the repository.

    There is an opportunity to: