Skip to content

Conversation

pankajgoyal2
Copy link
Contributor

Description

Please include a summary of the changes and the related issue. List any dependencies that are required for this change.

Fixes # (issue)

Any Newly Introduced Dependencies

Please describe any newly introduced 3rd party dependencies in this change. List their name, license information and how they are used in the project.

How Has This Been Tested?

Please describe the tests that you ran to verify your changes. Provide instructions so we can reproduce. Please also list any relevant details for your test configuration

Checklist:

  • I agree to use the APACHE-2.0 license for my code changes
  • I have not introduced any 3rd party dependency changes
  • I have performed a self-review of my code

Comment on lines +78 to +88
resource "aws_kms_key" "vault" {
description = "Vault unseal key for ${var.cluster_name}"
deletion_window_in_days = 10

tags = {
Name = "vault-kms-unseal-${var.cluster_name}"
Cluster = var.cluster_name
Purpose = "vault-unseal"
Application = "vault"
}
}

Check warning

Code scanning / Trivy

A KMS key is not configured to auto-rotate. Medium

Artifact: pod-configs/module/kms/main.tf
Type: terraform
Vulnerability AVD-AWS-0065
Severity: MEDIUM
Message: Key does not have rotation enabled.
Link: AVD-AWS-0065
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant