You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
$ terrascan scan -i terraform -f ../../modules/aws/application/aws_db_instance_with_encryption.tf --scan-rules AWS.RDS.DataSecurity.High.0414
2022-02-02T11:18:32.879-0500 warn filters/filter-specs.go:75 Deprecation warning : Use 'id' (AC_AWS_0058) instead of 'reference_id' (AWS.RDS.DataSecurity.High.0414) to skip/scan rules
Violation Details -
Description : Ensure that your RDS database instances encrypt the underlying storage. Encrypted RDS instances use the industry standard AES-256 encryption algorithm to encrypt data on the server that hosts RDS DB instances. After data is encrypted, RDS handles authentication of access and descryption of data transparently with minimal impact on performance.
File : aws_db_instance_with_encryption.tf
Module Name : root
Line : 1
Severity : HIGH
The text was updated successfully, but these errors were encountered:
OSX
Description
AWS.RDS.DataSecurity.High.0414 / AC_AWS_0058 triggers a false positive when
storage_encrypted = true
andkms_key_id = null
.What I Did
The text was updated successfully, but these errors were encountered: