CKV_AWS_174
Verify CloudFront Distribution Viewer Certificate is using TLS v1.2
Codiga Static Analysis engine checks all terraform code and surface security and safety issues as well as enforcement of best practices. No matter what cloud you use (AWS, GCP, Azure), Codiga got you covered and flags potential problems at every push and pull request.
Verify CloudFront Distribution Viewer Certificate is using TLS v1.2
Ensure S3 bucket Object is encrypted by KMS using a customer managed Key (CMK)
Ensure Elasticache replication group is encrypted by KMS using a customer managed Key (CMK)
Ensure that CodeBuild Project encryption is not disabled
Ensure CloudFront distribution has a strict security headers policy attached
Ensure Postgres RDS as aws_db_instance has Query Logging enabled
Ensure EBS Volume is encrypted by KMS using a customer managed Key (CMK)
Ensure Glue component has a security configuration associated
Ensure AppSync is protected by WAF
Ensure that PostgreSQL server enables geo-redundant backups
Ensure key vault key is backed by HSM
Ensure that Network Interfaces disable IP forwarding
Ensure GitHub repository has vulnerability alerts enabled
Ensure Azure linux scale set does not use basic authentication(Use SSH Key Instead)
Ensure RBAC is enabled on AKS clusters
Ensure that PostgreSQL server enables infrastructure encryption
Ensure 'Enforce SSL connection' is set to 'ENABLED' for PostgreSQL Database Server
Ensure 'Trusted Microsoft Services' is enabled for Storage Account access
Ensure that the expiration date is set on all keys
Ensure that PostgreSQL server disables public network access
Ensure that Virtual machine scale sets have encryption at host enabled
Ensure resource is encrypted by KMS using a customer managed Key
Ensure EFS is securely encrypted
Ensure that Azure Container group is deployed into virtual network.
Ensure that the Execution Role ARN and the Task Role ARN are different in ECS Task definitions
Ensure API Gateway caching is enabled
Ensure MSK Cluster logging is enabled
Ensure public API gateway are protected by AWS Web Application Firewall v2
Ensure RDS instances have backup policy
Ensure DB instance gets all minor upgrades automatically
AWS NAT Gateways should be utilized for the default route
Ensure all data stored in the Elasticsearch is encrypted with a CMK
Ensure that 'Public access level' is set to Private for blob containers
Ensure secrets have an expiration date set
Ensure no security groups allow ingress from 0.0.0.0:0 to port 80
Ensure EBS default encryption is enabled
Ensure Amazon RDS clusters and instances have AWS IAM authentication enabled
Ensure Azure Data factory public network access is disabled
Ensure App Service Authentication is set on Azure App Service
Ensure that 'Auditing' Retention is 'greater than 90 days' for SQL servers
Ensure that 'Secure transfer required' is set to 'Enabled'
Ensure Storage logging is enabled for Queue service for read, write and delete requests
Ensure the key vault is recoverable
Ensure that function apps enables Authentication
Ensure secure transfer required is enabled
Ensure FTP deployments are disabled
Ensure storage for critical data are encrypted with Customer Managed Key
Ensure HTTP HTTPS Target group defines Healthcheck