Skip to content

Refactor working directory in tf-drift-detection.yaml #193

Refactor working directory in tf-drift-detection.yaml

Refactor working directory in tf-drift-detection.yaml #193

Triggered via push November 20, 2024 01:19
Status Success
Total duration 2m 19s
Billable time 4m
Artifacts
Deploy API
4s
Deploy API
notify-slack
9s
notify-slack
Fit to window
Zoom out
Zoom in

Annotations

10 errors
Sync Terraform: terraform/ecr.tf#L1
CKV_AWS_163: "Ensure ECR image scanning on push is enabled"
Sync Terraform: terraform/ecr.tf#L1
CKV_AWS_51: "Ensure ECR Image Tags are immutable"
Sync Terraform: terraform/ecr.tf#L1
CKV_AWS_136: "Ensure that ECR repositories are encrypted using KMS"
Sync Terraform: terraform/eks.tf#L5
CKV_AWS_37: "Ensure Amazon EKS control plane logging is enabled for all log types"
Sync Terraform: terraform/eks.tf#L5
CKV_AWS_38: "Ensure Amazon EKS public endpoint not accessible to 0.0.0.0/0"
Sync Terraform: terraform/eks.tf#L5
CKV_AWS_39: "Ensure Amazon EKS public endpoint disabled"
Sync Terraform: terraform/eks.tf#L5
CKV_AWS_58: "Ensure EKS Cluster has Secrets Encryption Enabled"
Sync Terraform: terraform/eks.tf#L68
CKV_AWS_79: "Ensure Instance Metadata Service Version 1 is not enabled"
Sync Terraform: terraform/sg.tf#L1
CKV_AWS_260: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 80"
Sync Terraform: terraform/sg.tf#L1
CKV_AWS_23: "Ensure every security group and rule has a description"