Remove unnecessary Checkov suppressions and document remaining ones with comprehensive security guidance #233
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Summary
This PR addresses the security suppressions review requested in the issue by systematically removing unnecessary Checkov suppressions and providing comprehensive documentation for the remaining ones. The changes improve the security posture while maintaining the template's evaluation-friendly design.
Changes Made
✅ Suppressions Removed (7 total)
main.network.tfas NSG associations are properly configured📝 Enhanced Documentation (29 remaining suppressions)
All remaining suppressions now include:
📋 New Security Documentation
Created
docs/security_considerations.mdwith:Results
Security Improvements
Example of Enhanced Documentation
Before:
# checkov:skip=CKV2_AZURE_22: Customer-managed keys should be added in production usage but are not included here for simplicity.After:
# checkov:skip=CKV2_AZURE_22: This template uses default encryption for evaluation purposes. For production, implement customer-managed encryption keys. See docs/security_considerations.md for hardening guidance.Categories of Remaining Suppressions
Validation
Security Considerations
The remaining suppressions are all justified by specific technical requirements:
For production deployments, the security considerations document provides detailed guidance on hardening each area.
Fixes #229.
Warning
Firewall rules blocked me from connecting to one or more addresses
I tried to connect to the following addresses, but was blocked by firewall rules:
api0.prismacloud.io/usr/bin/python3 /home/REDACTED/.local/bin/checkov -d ./infra --quiet --framework terraform -o sarif --output-file ./checkov-results.sarif --soft-fail(dns block)If you need me to access, download, or install something from one of these locations, you can either:
💬 Share your feedback on Copilot coding agent for the chance to win a $200 gift card! Click here to start the survey.