File tree Expand file tree Collapse file tree 2 files changed +5
-1
lines changed Expand file tree Collapse file tree 2 files changed +5
-1
lines changed Original file line number Diff line number Diff line change @@ -2,6 +2,8 @@ provider "aws" {
22 region = var. region
33}
44
5+ # S3 access controls, policies and logging should be created as seperate terraform resources
6+ # tfsec:ignore:aws-s3-block-public-acls tfsec:ignore:aws-s3-block-public-policy tfsec:ignore:aws-s3-enable-bucket-encryption tfsec:ignore:aws-s3-encryption-customer-key tfsec:ignore:aws-s3-ignore-public-acls tfsec:ignore:aws-s3-no-public-buckets tfsec:ignore:aws-s3-enable-bucket-logging tfsec:ignore:aws-s3-enable-versioning tfsec:ignore:aws-s3-specify-public-access-block
57resource "aws_s3_bucket" "default" {
68 count = module. this . enabled ? 1 : 0
79
Original file line number Diff line number Diff line change @@ -141,6 +141,8 @@ data "aws_iam_policy_document" "prevent_unencrypted_uploads" {
141141 }
142142}
143143
144+ # S3 access controls, policies and logging are defined as seperate terraform resources below
145+ # tfsec:ignore:aws-s3-block-public-acls tfsec:ignore:aws-s3-block-public-policy tfsec:ignore:aws-s3-enable-bucket-encryption tfsec:ignore:aws-s3-encryption-customer-key tfsec:ignore:aws-s3-ignore-public-acls tfsec:ignore:aws-s3-no-public-buckets tfsec:ignore:aws-s3-enable-bucket-logging tfsec:ignore:aws-s3-enable-versioning tfsec:ignore:aws-s3-specify-public-access-block
144146resource "aws_s3_bucket" "default" {
145147 count = local. bucket_enabled ? 1 : 0
146148
@@ -241,7 +243,7 @@ resource "aws_dynamodb_table" "with_server_side_encryption" {
241243 # https://www.terraform.io/docs/backends/types/s3.html#dynamodb_table
242244 hash_key = " LockID"
243245
244- server_side_encryption {
246+ server_side_encryption { # tfsec:ignore:aws-dynamodb-table-customer-key
245247 enabled = true
246248 }
247249
You can’t perform that action at this time.
0 commit comments