Skip to content

Gomboc Fix for #11 - aws/terraform/s3-default#12

Open
gomboc-community-dev[bot] wants to merge 2 commits intojacobgombocai-patch-2from
jacobgombocai-patch-2-remediated-f4d3fb7f-437f-432a-a52f-a7f805d10d7e-1914
Open

Gomboc Fix for #11 - aws/terraform/s3-default#12
gomboc-community-dev[bot] wants to merge 2 commits intojacobgombocai-patch-2from
jacobgombocai-patch-2-remediated-f4d3fb7f-437f-432a-a52f-a7f805d10d7e-1914

Conversation

@gomboc-community-dev
Copy link

This fix was produced in response to #11 on the following target:

Repository Branch Directory
Gomboc-AI/rattleback jacobgombocai-patch-2 aws/terraform/s3-default
Rules with observations 2
Affected resources 1
Resource types 1
Code fixes 2
Files modified 1
Recommendation Resources Observations
Prevent Public Access via Explicit Setting 1 1
Data Versioning 1 1

These recommendations come from the following benchmarks

Benchmark
Gomboc Best Practices CIS Critical Security Controls v8.1 (AWS)
CIS Critical Security Controls v8.1

@gomboc-community-dev gomboc-community-dev bot requested a review from a team as a code owner June 11, 2025 19:34
source = "files/test.txt"
}
resource "aws_s3_bucket_public_access_block" "my_aws_s3_bucket_public_access_block_aws_s3_bucket_uut" {
bucket = aws_s3_bucket.uut.id
Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

  • l.60 Recommended applying Prevent Public Access via Explicit Setting:
    • Gomboc Best Practices CIS Critical Security Controls v8.1 (AWS)
    • CIS Critical Security Controls v8.1

Leave feedback (ref: eca41f266f751ed349458c3cd334235d59dd7f457f0ccd4f199c2530a081a704)

Copy link
Author

@gomboc-community-dev gomboc-community-dev bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Reviewed by Gomboc - No findings

}
resource "aws_s3_bucket_public_access_block" "my_aws_s3_bucket_public_access_block_aws_s3_bucket_uut" {
bucket = aws_s3_bucket.uut.id
ignore_public_acls = true
Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

  • l.61 Recommended applying Prevent Public Access via Explicit Setting:
    • Gomboc Best Practices CIS Critical Security Controls v8.1 (AWS)
    • CIS Critical Security Controls v8.1

Leave feedback (ref: eca41f266f751ed349458c3cd334235d59dd7f457f0ccd4f199c2530a081a704)

ignore_public_acls = true
}
resource "aws_s3_bucket_versioning" "my_aws_s3_bucket_versioning_aws_s3_bucket_uut" {
bucket = aws_s3_bucket.uut.id
Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

  • l.64 Recommended applying Data Versioning:
    • Gomboc Best Practices CIS Critical Security Controls v8.1 (AWS)

Leave feedback (ref: 4a929e622cad2d797ae13276acd699f65ca334eae2c9d1f86e9dfb81ac55ad46)

resource "aws_s3_bucket_versioning" "my_aws_s3_bucket_versioning_aws_s3_bucket_uut" {
bucket = aws_s3_bucket.uut.id
versioning_configuration {
status = "Enabled"
Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

  • l.66 Recommended applying Data Versioning:
    • Gomboc Best Practices CIS Critical Security Controls v8.1 (AWS)

Leave feedback (ref: 4a929e622cad2d797ae13276acd699f65ca334eae2c9d1f86e9dfb81ac55ad46)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants