Skip to content

Kics

Kics #129

Triggered via schedule November 27, 2023 00:56
Status Failure
Total duration 1m 27s
Artifacts

kics.yaml

on: schedule
Fit to window
Zoom out
Zoom in

Annotations

1 error and 10 warnings
Kics / Kics Scan
KICS scan failed with exit code 50
[HIGH] Cloud Storage Bucket Logging Not Enabled: bucket.tf#L67
Cloud storage bucket should have logging enabled
[HIGH] Cloud Storage Bucket Versioning Disabled: bucket.tf#L67
Cloud Storage Bucket should have versioning enabled
[HIGH] S3 Bucket Without Enabled MFA Delete: bucket.tf#L37
S3 bucket without MFA Delete Enabled. MFA delete cannot be enabled through Terraform, it can be done by adding a MFA device (https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_mfa_enable.html) and enabling versioning and MFA delete by using AWS CLI: 'aws s3api put-bucket-versioning --versioning-configuration=Status=Enabled,MFADelete=Enabled --bucket=<BUCKET_NAME> --mfa=<MFA_SERIAL_NUMBER>'. Please, also notice that MFA delete can not be used with lifecycle configurations
[MEDIUM] Project-wide SSH Keys Are Enabled In VM Instances: instance/main.tf#L22
VM Instance should block project-wide SSH keys
[MEDIUM] S3 Bucket Logging Disabled: bucket.tf#L28
Server Access Logging should be enabled on S3 Buckets so that all changes are logged and trackable
[MEDIUM] SNS Topic Not Encrypted: sns.tf#L20
SNS (Simple Notification Service) Topic should be encrypted
[MEDIUM] SNS Topic Not Encrypted: aws_budgets/sns.tf#L1
SNS (Simple Notification Service) Topic should be encrypted
[MEDIUM] SSO Permission With Inadequate User Session Duration: aws_sso.tf#L90
SSO permissions should be configured to limit user sessions to no longer than 1 hour. Allowing longer sessions can increase the risk of unauthorized access or session hijacking. This is a best practice for security and should be implemented in SSO permission settings.
[MEDIUM] SSO Permission With Inadequate User Session Duration: aws_sso.tf#L119
SSO permissions should be configured to limit user sessions to no longer than 1 hour. Allowing longer sessions can increase the risk of unauthorized access or session hijacking. This is a best practice for security and should be implemented in SSO permission settings.
[MEDIUM] SSO Permission With Inadequate User Session Duration: aws_sso.tf#L74
SSO permissions should be configured to limit user sessions to no longer than 1 hour. Allowing longer sessions can increase the risk of unauthorized access or session hijacking. This is a best practice for security and should be implemented in SSO permission settings.