How to use the checkov.terraform.models.enums.CheckCategories.NETWORKING function in checkov

To help you get started, we’ve selected a few checkov examples, based on popular ways it is used in public projects.

Secure your code as it's written. Use Snyk Code to scan source code in minutes - no build needed - and fix issues immediately.

github bridgecrewio / checkov / checkov / terraform / checks / resource / aws / SecurityGroupUnrestrictedIngress3389.py View on Github external
def __init__(self):
        name = "Ensure no security groups allow ingress from 0.0.0.0:0 to port %d" % PORT
        id = "CKV_AWS_25"
        supported_resources = ['aws_security_group']
        categories = [CheckCategories.NETWORKING]
        super().__init__(name=name, id=id, categories=categories, supported_resources=supported_resources)
github bridgecrewio / checkov / checkov / terraform / checks / resource / aws / SecurityGroupRuleDescription.py View on Github external
def __init__(self):
        name = "Ensure every security groups rule has a description"
        id = "CKV_AWS_23"
        supported_resource = ['aws_security_group', 'aws_security_group_rule', 'aws_db_security_group',
                              'aws_elasticache_security_group', 'aws_redshift_security_group']
        categories = [CheckCategories.NETWORKING]
        super().__init__(name=name, id=id, categories=categories, supported_resources=supported_resource)
github bridgecrewio / checkov / checkov / terraform / checks / resource / gcp / GoogleComputeFirewallUnrestrictedIngress3389.py View on Github external
def __init__(self):
        name = "Ensure Google compute firewall ingress does not allow unrestricted rdp access"
        id = "CKV_GCP_3"
        supported_resources = ['google_compute_firewall']
        categories = [CheckCategories.NETWORKING]
        super().__init__(name=name, id=id, categories=categories, supported_resources=supported_resources)
github bridgecrewio / checkov / checkov / terraform / checks / resource / aws / RDSPubliclyAccessible.py View on Github external
def __init__(self):
        name = "Ensure all data stored in the RDS bucket is not public accessible"
        id = "CKV_AWS_17"
        supported_resources = ['aws_db_instance','aws_rds_cluster_instance']
        categories = [CheckCategories.NETWORKING]
        super().__init__(name=name, id=id, categories=categories, supported_resources=supported_resources)
github bridgecrewio / checkov / checkov / terraform / checks / resource / gcp / GoogleContainerClusterDisableLegacyAuth.py View on Github external
def __init__(self):
        name = "Ensure Legacy Authorization is set to Disabled on Kubernetes Engine Clusters"
        id = "CKV_GCP_7"
        supported_resources = ['google_container_cluster']
        categories = [CheckCategories.NETWORKING]
        super().__init__(name=name, id=id, categories=categories, supported_resources=supported_resources)
github bridgecrewio / checkov / checkov / terraform / checks / resource / gcp / GoogleComputeFirewallUnrestrictedIngress22.py View on Github external
def __init__(self):
        name = "Ensure Google compute firewall ingress does not allow unrestricted ssh access"
        id = "CKV_GCP_2"
        supported_resources = ['google_compute_firewall']
        categories = [CheckCategories.NETWORKING]
        super().__init__(name=name, id=id, categories=categories, supported_resources=supported_resources)
github bridgecrewio / checkov / checkov / terraform / checks / resource / aws / SecurityGroupUnrestrictedIngress22.py View on Github external
def __init__(self):
        name = "Ensure no security groups allow ingress from 0.0.0.0:0 to port %d" % PORT
        id = "CKV_AWS_24"
        supported_resources = ['aws_security_group']
        categories = [CheckCategories.NETWORKING]
        super().__init__(name=name, id=id, categories=categories, supported_resources=supported_resources)

checkov

Infrastructure as code static analysis

Apache-2.0
Latest version published 4 days ago

Package Health Score

97 / 100
Full package analysis