facebook pixelCodiga Analysis Terraform Rules, severity critical
BACK TO LIST

Terraform rules

Codiga Static Analysis engine checks all terraform code and surface security and safety issues as well as enforcement of best practices. No matter what cloud you use (AWS, GCP, Azure), Codiga got you covered and flags potential problems at every push and pull request.

CKV2_AWS_34

Security
Critical

AWS SSM Parameter should be Encrypted

Learn more

CKV_AZURE_117

Security
Critical

Ensure that AKS uses disk encryption set

CKV_GIT_4

Security
Critical

Ensure Secrets are encrypted

CKV_AZURE_135

Best practice
Critical

Ensure Application Gateway WAF prevents message lookup in Log4j2. See CVE-2021-44228 aka log4jshell

CKV2_AZURE_8

Security
Critical

Ensure the storage container storing the activity logs is not publicly accessible

CKV_AWS_250

Security
Critical

Ensure that RDS PostgreSQL instances use a non vulnerable version with the log_fdw extension

CKV_AWS_87

Security
Critical

Ensure Amazon Redshift clusters are not publicly accessible

CKV_AWS_96

Security
Critical

Ensure all data stored in Aurora is securely encrypted at rest

CKV_AZURE_1

Security
Critical

Ensure Azure Instance does not use basic authentication(Use SSH Key Instead)