You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Feb 21, 2025. It is now read-only.
Copy file name to clipboardExpand all lines: terraform/aws/TFSEC.md
+2
Original file line number
Diff line number
Diff line change
@@ -9,4 +9,6 @@ We use GitHub Actions and [tfsec](https://github.com/aquasecurity/tfsec) to chec
9
9
| modules/vpc/main.tf | aws-ec2-no-public-egress-sgr | Your port is egressing data to the internet | By default worker nodes can access `0.0.0.0/0`. |
10
10
| modules/vpc/main.tf | aws-ec2-require-vpc-flow-logs-for-all-vpcs | Without VPC flow logs, you risk not having enough information about network traffic flow to investigate incidents or identify security issues | By default it's disabled, it's possible to override using `var.enable_vpc_log`|
11
11
| modules/s3/main.tf | aws-s3-enable-bucket-logging | There is no way to determine the access to this bucket | By default it's disabled since only the app is allowed to access this bucket, it's possible to override using `var.enable_log_bucket`|
12
+
| modules/s3/main.tf | aws-s3-enable-versioning | Impossible to restore deleted files | By default it's disabled since we don't want to store historical data, it's possible to override using `var.enable_bucket_versioning`|
13
+
| modules/s3_role/main.tf | aws-iam-no-policy-wildcards | False-positive warning by tfsec | Ignore it, since it's a recommended way to define ARN policy for a bucket |
12
14
| modules/load-balancer-controller/main.tf | aws-iam-no-policy-wildcards | Load balancer controller has increased access to AWS resources | By default it's disabled since we could not predict resources ARNs at this stage |
| <aname="input_aws_auth_accounts"></a> [aws\_auth\_accounts](#input\_aws\_auth\_accounts)| List of account maps to add to the aws-auth configmap |`list(any)`|`[]`| no |
54
+
| <aname="input_aws_auth_roles"></a> [aws\_auth\_roles](#input\_aws\_auth\_roles)| List of role maps to add to the aws-auth configmap |`list(any)`|`[]`| no |
55
+
| <aname="input_aws_auth_users"></a> [aws\_auth\_users](#input\_aws\_auth\_users)| List of user maps to add to the aws-auth configmap |`list(any)`|`[]`| no |
52
56
| <aname="input_cluster_endpoint_public_access_cidrs"></a> [cluster\_endpoint\_public\_access\_cidrs](#input\_cluster\_endpoint\_public\_access\_cidrs)| List of CIDR blocks which can access the Amazon EKS public API server endpoint |`list(string)`| <pre>[<br> "0.0.0.0/0"<br>]</pre> | no |
53
57
| <aname="input_create_acm_certificate"></a> [create\_acm\_certificate](#input\_create\_acm\_certificate)| Whether to create acm certificate or use existing |`bool`|`false`| no |
54
58
| <aname="input_create_r53_zone"></a> [create\_r53\_zone](#input\_create\_r53\_zone)| Create R53 zone for main public domain |`bool`|`false`| no |
@@ -86,6 +90,7 @@
86
90
| <aname="input_postgresql_tls_key_file"></a> [postgresql\_tls\_key\_file](#input\_postgresql\_tls\_key\_file)| n/a |`string`|`null`| no |
87
91
| <aname="input_postgresql_type"></a> [postgresql\_type](#input\_postgresql\_type)| Postgresql type |`string`|`"internal"`| no |
88
92
| <aname="input_postgresql_username"></a> [postgresql\_username](#input\_postgresql\_username)| Postgresql username |`string`|`"labelstudio"`| no |
93
+
| <aname="input_predefined_s3_bucket"></a> [predefined\_s3\_bucket](#input\_predefined\_s3\_bucket)| Predefined S3 Bucket | <pre>object(<br> {<br> name : string<br> region : string<br> folder : string<br> kms_arn : string<br> }<br> )</pre> |`null`| no |
| <aname="input_private_cidr_block"></a> [private\_cidr\_block](#input\_private\_cidr\_block)| List of private subnet cidr blocks |`list(string)`| <pre>[<br> "10.0.1.0/24",<br> "10.0.2.0/24",<br> "10.0.3.0/24"<br>]</pre> | no |
91
96
| <aname="input_public_cidr_block"></a> [public\_cidr\_block](#input\_public\_cidr\_block)| List of public subnet cidr blocks |`list(string)`| <pre>[<br> "10.0.101.0/24",<br> "10.0.102.0/24",<br> "10.0.103.0/24"<br>]</pre> | no |
| <aname="input_aws_auth_accounts"></a> [aws\_auth\_accounts](#input\_aws\_auth\_accounts)| List of account maps to add to the aws-auth configmap |`list(any)`|`[]`| no |
45
+
| <aname="input_aws_auth_roles"></a> [aws\_auth\_roles](#input\_aws\_auth\_roles)| List of role maps to add to the aws-auth configmap |`list(any)`|`[]`| no |
46
+
| <aname="input_aws_auth_users"></a> [aws\_auth\_users](#input\_aws\_auth\_users)| List of user maps to add to the aws-auth configmap |`list(any)`|`[]`| no |
45
47
| <aname="input_capacity_type"></a> [capacity\_type](#input\_capacity\_type)| Type of capacity associated with the EKS Node Group |`string`|`"ON_DEMAND"`| no |
46
48
| <aname="input_cluster_endpoint_private_access"></a> [cluster\_endpoint\_private\_access](#input\_cluster\_endpoint\_private\_access)| Indicates whether or not the Amazon EKS private API server endpoint is enabled |`bool`|`true`| no |
47
49
| <aname="input_cluster_endpoint_public_access"></a> [cluster\_endpoint\_public\_access](#input\_cluster\_endpoint\_public\_access)| Indicates whether or not the Amazon EKS public API server endpoint is enabled |`bool`|`true`| no |
@@ -57,8 +59,6 @@ No requirements.
57
59
| <aname="input_min_size"></a> [min\_size](#input\_min\_size)| Minimum number of the instances in autoscaling group |`number`| n/a | yes |
58
60
| <aname="input_monitoring_namespace"></a> [monitoring\_namespace](#input\_monitoring\_namespace)| Namespace for monitoring |`string`|`"monitoring"`| no |
59
61
| <aname="input_name"></a> [name](#input\_name)| Name is the prefix to use for resources that needs to be created |`string`| n/a | yes |
0 commit comments