-
Notifications
You must be signed in to change notification settings - Fork 24
Expand file tree
/
Copy path.trivyignore.yaml
More file actions
27 lines (23 loc) · 1.16 KB
/
.trivyignore.yaml
File metadata and controls
27 lines (23 loc) · 1.16 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
# SPDX-FileCopyrightText: 2026 Intel Corporation
#
# SPDX-License-Identifier: Apache-2.0
misconfigurations:
- id: AVD-AWS-0053
paths:
- "pod-configs/module/load-balancer/main.tf"
- "pod-configs/module/application-load-balancer/main.tf"
statement: Load balancers use var.internal which is intentionally configurable. Public exposure is expected for external-facing orchestrator endpoints.
- id: AVD-AWS-0079
paths:
- "pod-configs/module/aurora/main.tf"
statement: Aurora RDS cluster already has storage_encrypted = true. Trivy flags missing KMS CMK, but AWS default encryption is sufficient.
- id: AVD-AWS-0132
paths:
- "pod-configs/buckets/main.tf"
- "pod-configs/module/ec2log/save-log.tf"
- "pod-configs/module/s3/main.tf"
statement: S3 CMK encryption - AWS default SSE-S3 encryption is enabled. Customer managed keys require additional KMS infrastructure.
- id: AVD-AWS-0039
paths:
- "pod-configs/module/eks/main.tf"
statement: "EKS secrets encryption requires a KMS key ARN. Cluster uses private endpoint with no public access. Secrets at rest are protected by EBS encryption at the node level."