Documentation ¶
Index ¶
Constants ¶
This section is empty.
Variables ¶
View Source
var CheckEnableAtRestEncryption = rules.Register( scan2.Rule{ AVDID: "AVD-AWS-0037", Provider: providers2.AWSProvider, Service: "efs", ShortCode: "enable-at-rest-encryption", Summary: "EFS Encryption has not been enabled", Impact: "Data can be read from the EFS if compromised", Resolution: "Enable encryption for EFS", Explanation: `If your organization is subject to corporate or regulatory policies that require encryption of data and metadata at rest, we recommend creating a file system that is encrypted at rest, and mounting your file system using encryption of data in transit.`, Links: []string{ "https://docs.aws.amazon.com/efs/latest/ug/encryption.html", }, Terraform: &scan2.EngineMetadata{ GoodExamples: terraformEnableAtRestEncryptionGoodExamples, BadExamples: terraformEnableAtRestEncryptionBadExamples, Links: terraformEnableAtRestEncryptionLinks, RemediationMarkdown: terraformEnableAtRestEncryptionRemediationMarkdown, }, CloudFormation: &scan2.EngineMetadata{ GoodExamples: cloudFormationEnableAtRestEncryptionGoodExamples, BadExamples: cloudFormationEnableAtRestEncryptionBadExamples, Links: cloudFormationEnableAtRestEncryptionLinks, RemediationMarkdown: cloudFormationEnableAtRestEncryptionRemediationMarkdown, }, Severity: severity2.High, }, func(s *state2.State) (results scan2.Results) { for _, fs := range s.AWS.EFS.FileSystems { if fs.Encrypted.IsFalse() { results.Add( "File system is not encrypted.", fs.Encrypted, ) } else { results.AddPassed(&fs) } } return }, )
Functions ¶
This section is empty.
Types ¶
This section is empty.
Click to show internal directories.
Click to hide internal directories.