Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

added policy to check enable-at_rest_encryption for elasticache #1082

Open
wants to merge 7 commits into
base: master
Choose a base branch
from
13 changes: 13 additions & 0 deletions avd_docs/aws/elasticache/AVD-AWS-0197/docs.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,13 @@

Ensure that your Amazon ElastiCache Redis clusters are encrypted to increase data security.

### Impact
<!-- Add Impact here -->

<!-- DO NOT CHANGE -->
{{ remediationActions }}

### Links
- https://docs.aws.amazon.com/AmazonElastiCache/latest/red-ug/at-rest-encryption.html


2 changes: 1 addition & 1 deletion avd_docs/kubernetes/general/AVD-KSV-01010/docs.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
Storing sensitive content such as usernames and email addresses in configMaps is unsafe

### Impact
Unsafe storage of sensitive content in configMaps could lead to the information being compromised.
<!-- Add Impact here -->
SanaaYousaf marked this conversation as resolved.
Show resolved Hide resolved

<!-- DO NOT CHANGE -->
{{ remediationActions }}
Expand Down
2 changes: 1 addition & 1 deletion avd_docs/kubernetes/general/AVD-KSV-0107/docs.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@

apiVersion and kind has been deprecated
apiVersion '' and kind '' has been deprecated on: '' and planned for removal on:''
SanaaYousaf marked this conversation as resolved.
Show resolved Hide resolved

### Impact
<!-- Add Impact here -->
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,25 @@
# METADATA
# title: "ElastiCache Redis Cluster Encryption At-Rest"
# description: "Ensure that your Amazon ElastiCache Redis clusters are encrypted to increase data security."
# scope: package
# schemas:
# - input: schema.input
# related_resources:
# - https://docs.aws.amazon.com/AmazonElastiCache/latest/red-ug/at-rest-encryption.html
# custom:
# avd_id: AVD-AWS-0197
# provider: aws
# service: elasticache
# severity: HIGH
# short_code: enable-at-rest-encryption
# recommended_action: "Enable encryption for ElastiCache cluster data-at-rest"
# input:
# selector:
# - type: cloud
package builtin.aws.elasticache.aws0197

deny[res] {
group := input.aws.elasticache.replicationgroups[_]
not group.atrestencryptionenabled.value
res := result.new("Replication group does not have at-rest encryption enabled.", group.atrestencryptionenabled)
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,11 @@
package builtin.aws.elasticache.aws0197

test_detects_when_disabled {
r := deny with input as {"aws": {"elasticache": {"replicationgroups": [{"atrestencryptionenabled": {"value": false}}]}}}
count(r) == 1
}

test_when_enabled {
r := deny with input as {"aws": {"elasticache": {"replicationgroups": [{"atrestencryptionenabled": {"value": true}}]}}}
count(r) == 0
}