CKV2_AWS_34
Security
Critical
AWS SSM Parameter should be Encrypted
Codiga Static Analysis engine checks all terraform code and surface security and safety issues as well as enforcement of best practices. No matter what cloud you use (AWS, GCP, Azure), Codiga got you covered and flags potential problems at every push and pull request.
AWS SSM Parameter should be Encrypted
Ensure that AKS uses disk encryption set
Ensure Secrets are encrypted
Ensure the storage container storing the activity logs is not publicly accessible
Ensure that RDS PostgreSQL instances use a non vulnerable version with the log_fdw extension
Ensure Amazon Redshift clusters are not publicly accessible
Ensure all data stored in Aurora is securely encrypted at rest
Ensure Azure Instance does not use basic authentication(Use SSH Key Instead)