fix: Allow ping
endpoint to be reached (#38)
#115
Annotations
10 warnings
Run KICS scan:
clickhouse/dns.tf#L1
Check if CloudWatch logging is disabled for Route53 hosted zones
|
Run KICS scan:
clickhouse/ebs.tf#L18
EBS volumes should be encrypted
|
Run KICS scan:
clickhouse/ebs.tf#L1
EBS volumes should be encrypted
|
Run KICS scan:
clickhouse/s3.tf#L205
Server Access Logging should be enabled on S3 Buckets so that all changes are logged and trackable
|
Run KICS scan:
clickhouse/certificates.tf#L29
AWS Secretmanager should use AWS KMS customer master key (CMK) to encrypt the secret values in the versions stored in the secret
|
Run KICS scan:
clickhouse/users.tf#L14
AWS Secretmanager should use AWS KMS customer master key (CMK) to encrypt the secret values in the versions stored in the secret
|
Run KICS scan:
clickhouse/certificates.tf#L117
AWS Secretmanager should use AWS KMS customer master key (CMK) to encrypt the secret values in the versions stored in the secret
|
Run KICS scan:
clickhouse/main.tf#L1
VPC Subnet should not assign public IP
|
Run KICS scan:
clickhouse/nlb.tf#L9
Application Load Balancer should have deletion protection enabled
|
Run KICS scan:
clickhouse/cloudwatch.tf#L1
IAM Access Analyzer should be enabled and configured to continuously monitor resource permissions
|
Loading