You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* feat: add trivy scan to plan to staging
* fix(networking): terraform aws vpc module should not allow using all ports
* fix: bump locations_api module from v1.0.1 to v1.0.2
* fix(networking): terraform aws vpc module should not allow nacls rules to allow using all ports
* fix: added trivy ignore
* fix: s3 bucket kms encrypted + adding logs
* fix: s3 bucket kms encrypted + adding logs
* fix(database): trivy finding rds should always be encrypted for all envs
* fix(dataabse): restrict outbound traffic to private subnets
* fix: encryption on s3_image_moderatora quarantine bucket
* fix: added trivyignore rule
* fix: added trivyignore rules to allow public ingress
* fix: tls policy version and drop invaid headers
* fix: added trivyignore rule
* feat: trivy image scan docker image used by ecs
* feat: trivy docker image scan to not fail but report in findings in comment
* chore: bump infra-s3-image-moderator to v1.1.1
* fix: provide cidr block in security group not subnet ids
* fix: aws kms alias for frontend layer
* fix: frontend s3 cmk static web app bucket github action for spa
* fix: s3 cmk policy frontend to allow cluodfront to decrypt objects
* fix: s3 bucket for access logs to be encrypted
# AVD-AWS-0105: Network ACL rule allows ingress from public internet. This is required for public-facing web applications to allow HTTP/HTTPS traffic from any IP. We acknowledge this as an accepted risk for our use case
2
+
3
+
AVD-AWS-0105
4
+
5
+
# ECS tasks require egress to 0.0.0.0/0 to reach the internet via NAT Gateway
6
+
7
+
AVD-AWS-0104
8
+
9
+
# ALB requires public ingress for HTTPS web access. This is an accepted risk for a public-facing web application.
10
+
AVD-AWS-0107
11
+
12
+
# ALB is intentionally public to serve internet traffic for the web application.
0 commit comments