Documentation ¶
Index ¶
Constants ¶
This section is empty.
Variables ¶
View Source
var CheckEnableAtRestEncryption = rules.Register( scan2.Rule{ AVDID: "AVD-AWS-0137", Provider: providers2.AWSProvider, Service: "emr", ShortCode: "enable-at-rest-encryption", Summary: "Enable at-rest encryption for EMR clusters.", Impact: "At-rest data in the EMR cluster could be compromised if accessed.", Resolution: "Enable at-rest encryption for EMR cluster", Explanation: `Data stored within an EMR cluster should be encrypted to ensure sensitive data is kept private.`, Links: []string{ "https://docs.aws.amazon.com/config/latest/developerguide/operational-best-practices-for-nist_800-171.html", }, Terraform: &scan2.EngineMetadata{ GoodExamples: terraformEnableAtRestEncryptionGoodExamples, BadExamples: terraformEnableAtRestEncryptionBadExamples, Links: terraformEnableAtRestEncryptionLinks, RemediationMarkdown: terraformEnableAtRestEncryptionRemediationMarkdown, }, Severity: severity2.High, }, func(s *state2.State) (results scan2.Results) { for _, conf := range s.AWS.EMR.SecurityConfiguration { vars, err := readVarsFromConfigurationAtRest(conf.Configuration.Value()) if err != nil { continue } if !vars.EncryptionConfiguration.EnableAtRestEncryption { results.Add( "EMR cluster does not have at-rest encryption enabled.", conf.Configuration, ) } else { results.AddPassed(&conf) } } return }, )
View Source
var CheckEnableInTransitEncryption = rules.Register( scan2.Rule{ AVDID: "AVD-AWS-0138", Provider: providers2.AWSProvider, Service: "emr", ShortCode: "enable-in-transit-encryption", Summary: "Enable in-transit encryption for EMR clusters.", Impact: "In-transit data in the EMR cluster could be compromised if accessed.", Resolution: "Enable in-transit encryption for EMR cluster", Explanation: `Data stored within an EMR cluster should be encrypted to ensure sensitive data is kept private.`, Links: []string{ "https://docs.aws.amazon.com/config/latest/developerguide/operational-best-practices-for-nist_800-171.html", }, Terraform: &scan2.EngineMetadata{ GoodExamples: terraformEnableInTransitEncryptionGoodExamples, BadExamples: terraformEnableInTransitEncryptionBadExamples, Links: terraformEnableInTransitEncryptionLinks, RemediationMarkdown: terraformEnableInTransitEncryptionRemediationMarkdown, }, Severity: severity2.High, }, func(s *state2.State) (results scan2.Results) { for _, conf := range s.AWS.EMR.SecurityConfiguration { vars, err := readVarsFromConfigurationInTransit(conf.Configuration.Value()) if err != nil { continue } if !vars.EncryptionConfiguration.EnableInTransitEncryption { results.Add( "EMR cluster does not have in-transit encryption enabled.", conf.Configuration, ) } else { results.AddPassed(&conf) } } return }, )
View Source
var CheckEnableLocalDiskEncryption = rules.Register( scan2.Rule{ AVDID: "AVD-AWS-0139", Provider: providers2.AWSProvider, Service: "emr", ShortCode: "enable-local-disk-encryption", Summary: "Enable local-disk encryption for EMR clusters.", Impact: "Local-disk data in the EMR cluster could be compromised if accessed.", Resolution: "Enable local-disk encryption for EMR cluster", Explanation: `Data stored within an EMR instances should be encrypted to ensure sensitive data is kept private.`, Links: []string{ "https://docs.aws.amazon.com/config/latest/developerguide/operational-best-practices-for-nist_800-171.html", }, Terraform: &scan2.EngineMetadata{ GoodExamples: terraformEnableLocalDiskEncryptionGoodExamples, BadExamples: terraformEnableLocalDiskEncryptionBadExamples, Links: terraformEnableLocalDiskEncryptionLinks, RemediationMarkdown: terraformEnableLocalDiskEncryptionRemediationMarkdown, }, Severity: severity2.High, }, func(s *state2.State) (results scan2.Results) { for _, conf := range s.AWS.EMR.SecurityConfiguration { vars, err := readVarsFromConfigurationLocalDisk(conf.Configuration.Value()) if err != nil { continue } if vars.EncryptionConfiguration.AtRestEncryptionConfiguration.LocalDiskEncryptionConfiguration.EncryptionKeyProviderType == "" { results.Add( "EMR cluster does not have local-disk encryption enabled.", conf.Configuration, ) } else { results.AddPassed(&conf) } } return }, )
Functions ¶
This section is empty.
Types ¶
This section is empty.
Click to show internal directories.
Click to hide internal directories.