You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When creating S3 buckets via terraform, terraform-compliance should be able to identify if the bucket have policy enabled to "Block new public ACLs and uploading public objects"
new step needed for s3
The text was updated successfully, but these errors were encountered:
The scenario can be handled by a test similar as shown below ;
Scenario Outline: AWS Credentials should not be hardcodedGiven I have aws_s3_bucket_public_access_block resource configured
Then it must contain <key>And its value must not match the "true" regex
Examples:
| key | | block_public_acls | | block_public_policy | | ignore_public_acls | | restrict_public_buckets |
When creating S3 buckets via terraform, terraform-compliance should be able to identify if the bucket have policy enabled to "Block new public ACLs and uploading public objects"
new step needed for s3
The text was updated successfully, but these errors were encountered: