-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat(terraform): add CKV NCP rules about access control group outbound rule. #3624
Conversation
branch 'master' of https://github.com/init-cloud/checkov
Co-authored-by: Anton Grübel <[email protected]>
Co-authored-by: Anton Grübel <[email protected]>
Co-authored-by: Anton Grübel <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
nice work, left some comments
checkov/terraform/checks/resource/ncp/AccessControlGroupOutboundRule.py
Outdated
Show resolved
Hide resolved
checkov/terraform/checks/resource/ncp/AccessControlGroupOutboundRule.py
Outdated
Show resolved
Hide resolved
checkov/terraform/checks/resource/ncp/AccessControlGroupOutboundRule.py
Outdated
Show resolved
Hide resolved
tests/terraform/checks/resource/ncp/example_LBTargetGroupHTTPS/main.tf
Outdated
Show resolved
Hide resolved
…ndRule.py [22.10.12][fix]follow guidline Co-authored-by: Anton Grübel <[email protected]>
Co-authored-by: Anton Grübel <[email protected]>
it is not associated with ckv_ncp_3
Co-authored-by: Anton Grübel <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
thanks, looks great 🍻
checkov/terraform/checks/resource/ncp/AccessControlGroupOutboundRule.py
Outdated
Show resolved
Hide resolved
checkov/terraform/checks/resource/ncp/AccessControlGroupOutboundRule.py
Outdated
Show resolved
Hide resolved
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looking great!
Added a few suggestions
I adjust additional suggestion! |
…d rule. (bridgecrewio#3624) * [22.09.27][추가] CKV_NCP_1 * [22.09.27][추가] CKV_NCP_2 * Apply suggestions from code review Co-authored-by: Anton Grübel <[email protected]> * Apply suggestions from code review Co-authored-by: Anton Grübel <[email protected]> * Apply suggestions from code review Co-authored-by: Anton Grübel <[email protected]> * Create main.yml * [22.09.28][수정] Lint test * Delete main.yml * [22.09.29][수정]testcode 수정 * [22.09.29][수정] 테스트 코드 수정 * [22.09.29][수정] 테스트코드 수정 * [22.09.29][수정] add test resource for 'ncloud_access_control_group_rule' * [22.10.03][add]CKV_AWS_3 RULE * [22.10.04][add]CKV_NCP_4, CKV_NCP_5 RULE * [22.10.04][add] NCP ACG Inbound for port 22, 3389 * [22.10.04][add] NCP NACL for port 20, 21, 22, 3389 * [22.10.05][modify] LBSecureProtocols.py * [22.10.05][add] NCP ACGIngress & Egress Check * [22.10.06][add] NCP rules about ACG, LB, NACL, Encrpytion * [22.10.06][refactor] rename rules * [22.10.07][add] NCP NACLPortCheck * [22.10.08][refactor] modify rule id 77 to 14 * [22.10.09][refactor] modify branch for ncp tf3 * [22.10.09][fix] fix branch unmerged error * [22.10.09][fix] fix branch unmerged error * [22.10.11][refactor] fix lint * Update checkov/terraform/checks/resource/ncp/AccessControlGroupOutboundRule.py [22.10.12][fix]follow guidline Co-authored-by: Anton Grübel <[email protected]> * [22.10.12][fix] CKV_NCP_3 AccessControlGroupOutboundRule name Co-authored-by: Anton Grübel <[email protected]> * [22.10.12][delete]LBTargetGroupHTTPS test code it is not associated with ckv_ncp_3 * [22.10.12][fix] CKV_NCP_3 AccessControlGroupOutboundRule Co-authored-by: Anton Grübel <[email protected]> * [22.10.13][fix] fix undefined variable error * [22.10.03][add]CKV_AWS_3 RULE * [22.10.19][refactor] adjust ncp rule-3 Co-authored-by: pj991207 <[email protected]> Co-authored-by: Anton Grübel <[email protected]> Co-authored-by: taeng0204 <[email protected]> Co-authored-by: yudam <[email protected]>
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.
Description
Add terraform scan rules about provider Naver Cloud Platform.
CKV_NCP_3 is associated with Access Control Group Outbound Rule.
This rule suggests no access control groups allow outbound from 0.0.0.0:0 to port.
Description
Checklist: