|
| 1 | +{ |
| 2 | + "scc_goals": [ |
| 3 | + { |
| 4 | + "scc_goal_id": "3000408", |
| 5 | + "description": "Check whether Flow Logs for VPC are enabled", |
| 6 | + "ignore_reason": "Tracking in https://github.ibm.com/GoldenEye/issues/issues/3645", |
| 7 | + "is_valid": true |
| 8 | + }, |
| 9 | + { |
| 10 | + "scc_goal_id": "3000902", |
| 11 | + "description:": "Check whether OpenShift clusters are accessible only by using private endpoints", |
| 12 | + "ignore_reason": "This is a valid issue - tracking in https://github.ibm.com/GoldenEye/issues/issues/174", |
| 13 | + "is_valid": true |
| 14 | + }, |
| 15 | + { |
| 16 | + "scc_goal_id": "3000258", |
| 17 | + "description": "Check whether Cloud Object Storage has at least # users with the IAM manager role", |
| 18 | + "ignore_reason": "Tracking in https://github.ibm.com/GoldenEye/issues/issues/3905", |
| 19 | + "is_valid": true |
| 20 | + }, |
| 21 | + { |
| 22 | + "scc_goal_id": "3000259", |
| 23 | + "description:": "Check whether Cloud Object Storage has at least # service IDs with the IAM manager role", |
| 24 | + "ignore_reason": "Tracking in https://github.ibm.com/GoldenEye/issues/issues/3905", |
| 25 | + "is_valid": true |
| 26 | + }, |
| 27 | + { |
| 28 | + "scc_goal_id": "3000266", |
| 29 | + "description": "Check whether Key Protect has at least # users with the IAM manager role", |
| 30 | + "ignore_reason": "Tracking in https://github.ibm.com/GoldenEye/issues/issues/3905", |
| 31 | + "is_valid": true |
| 32 | + }, |
| 33 | + { |
| 34 | + "scc_goal_id": "3000267", |
| 35 | + "description:": "Check whether Key Protect has at least # service IDs with the IAM manager role", |
| 36 | + "ignore_reason": "Tracking in https://github.ibm.com/GoldenEye/issues/issues/3905", |
| 37 | + "is_valid": true |
| 38 | + }, |
| 39 | + { |
| 40 | + "scc_goal_id": "3000402", |
| 41 | + "description": "Check whether Cloud Internet Services (CIS) has DDoS protection enabled", |
| 42 | + "ignore_reason": "Tracking in https://github.ibm.com/GoldenEye/issues/issues/3905", |
| 43 | + "is_valid": true |
| 44 | + }, |
| 45 | + { |
| 46 | + "scc_goal_id": "3000418", |
| 47 | + "description:": "Check whether account has at least one VPN or Direct Link configured", |
| 48 | + "ignore_reason": "Tracking in https://github.ibm.com/GoldenEye/issues/issues/3905", |
| 49 | + "is_valid": true |
| 50 | + }, |
| 51 | + { |
| 52 | + "scc_goal_id": "3000441", |
| 53 | + "description": "Check whether Virtual Private Cloud (VPC) network access control lists don't allow ingress from 0.0.0.0/0 to port 22", |
| 54 | + "ignore_reason": "This is a false alert. The way the subnets are arranged in the VPC ensures proper workload isolation. And it's not a violation of any NIST, SOC or other control. On the contrary, FedRAMP makes it clear that SG or ACLs are currently not seen as a security boundary, only subnets (https://www.fedramp.gov/assets/resources/documents/FedRAMP_subnets_white_paper.pdf)", |
| 55 | + "is_valid": false |
| 56 | + }, |
| 57 | + { |
| 58 | + "scc_goal_id": "3000442", |
| 59 | + "description:": "Check whether Virtual Private Cloud (VPC) network access control lists don't allow ingress from 0.0.0.0/0 to port 3389", |
| 60 | + "ignore_reason": "This is a false alert. The way the subnets are arranged in the VPC ensures proper workload isolation. And it's not a violation of any NIST, SOC or other control. On the contrary, FedRAMP makes it clear that SG or ACLs are currently not seen as a security boundary, only subnets (https://www.fedramp.gov/assets/resources/documents/FedRAMP_subnets_white_paper.pdf)", |
| 61 | + "is_valid": false |
| 62 | + }, |
| 63 | + { |
| 64 | + "scc_goal_id": "3000451", |
| 65 | + "description": "Check whether Virtual Private Cloud (VPC) network access control lists don't allow ingress from 0.0.0.0/0 to any port", |
| 66 | + "ignore_reason": "This is a false alert. The way the subnets are arranged in the VPC ensures proper workload isolation. And it's not a violation of any NIST, SOC or other control. On the contrary, FedRAMP makes it clear that SG or ACLs are currently not seen as a security boundary, only subnets (https://www.fedramp.gov/assets/resources/documents/FedRAMP_subnets_white_paper.pdf)", |
| 67 | + "is_valid": false |
| 68 | + }, |
| 69 | + { |
| 70 | + "scc_goal_id": "3000452", |
| 71 | + "description:": "Check whether Virtual Private Cloud (VPC) network access control lists don't allow egress from 0.0.0.0/0 to any port", |
| 72 | + "ignore_reason": "This is a false alert. The way the subnets are arranged in the VPC ensures proper workload isolation. And it's not a violation of any NIST, SOC or other control. On the contrary, FedRAMP makes it clear that SG or ACLs are currently not seen as a security boundary, only subnets (https://www.fedramp.gov/assets/resources/documents/FedRAMP_subnets_white_paper.pdf)", |
| 73 | + "is_valid": false |
| 74 | + }, |
| 75 | + { |
| 76 | + "scc_goal_id": "3000907", |
| 77 | + "description:": "Check whether OpenShift version is up-to-date", |
| 78 | + "ignore_reason": "Tracking in https://github.ibm.com/GoldenEye/issues/issues/4000", |
| 79 | + "is_valid": true |
| 80 | + } |
| 81 | + ] |
| 82 | +} |
0 commit comments