Skip to content
This repository was archived by the owner on Jun 30, 2025. It is now read-only.

Commit 3d86e65

Browse files
authored
ci: update cra rules (#95)
1 parent ff486b3 commit 3d86e65

File tree

2 files changed

+2
-10
lines changed

2 files changed

+2
-10
lines changed

cra-tf-validate-ignore-rules.json

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,5 @@
11
{
22
"scc_rules": [
3-
{
4-
"scc_rule_id": "rule-9b2d8054-bc93-44fd-901b-91f677287e84",
5-
"description": "Check whether Databases for etcd network access is restricted to a specific IP range",
6-
"ignore_reason": "This module supports restricting network access using Context Based Restrictions (CBRs), however SCC does not yet support scanning for CBR rules, hence the goal currently fails. SCC CBR support is being tracked in AHA SCC-961",
7-
"is_valid": true
8-
},
93
{
104
"scc_rule_id": "rule-216e2449-27d7-4afc-929a-b66e196a9cf9",
115
"description": "Check whether Flow Logs for VPC are enabled",

modules/fscloud/README.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,11 +4,9 @@ This code is a version of the [parent root module](../../) that includes a defau
44

55
:exclamation: **Exception:** The Databases for etcd DB service is not yet Financial services validated. Therefore, the infrastructure that is deployed by this module is also not validated with the Framework for Financial Services. For more information, see the list of [Financial Services Validated services](https://cloud.ibm.com/docs/framework-financial-services?topic=framework-financial-services-vpc-architecture-about#financial-services-validated-services).
66

7-
The default values in this profile were scanned by [IBM Code Risk Analyzer (CRA)](https://cloud.ibm.com/docs/code-risk-analyzer-cli-plugin?topic=code-risk-analyzer-cli-plugin-cra-cli-plugin#terraform-command) for compliance with the IBM Cloud Framework for Financial Services profile that is specified by the IBM Security and Compliance Center. The scan passed for all applicable rules with one exception:
7+
The default values in this profile were scanned by [IBM Code Risk Analyzer (CRA)](https://cloud.ibm.com/docs/code-risk-analyzer-cli-plugin?topic=code-risk-analyzer-cli-plugin-cra-cli-plugin#terraform-command) for compliance with the IBM Cloud Framework for Financial Services profile that is specified by the IBM Security and Compliance Center.
88

9-
> rule-beb7b289-706b-4dc0-b01d-b1d15d4331e3: Check whether Databases for etcd network access is restricted to a specific IP range.
10-
11-
The IBM Cloud Framework for Financial Services mandates the application of an inbound network-based allowlist in front of the IBM Cloud Databases for (ICD) etcd instance. You can comply with this requirement by using the `cbr_rules` variable in the module, which can be used to create a narrow context-based restriction rule that is scoped to the etcd instance. CRA does not currently support checking for context-based restrictions, so you can ignore the failing rule after you set the context-based restriction.
9+
The IBM Cloud Framework for Financial Services mandates the application of an inbound network-based allowlist in front of the IBM Cloud Databases for (ICD) etcd instance. You can comply with this requirement by using the `cbr_rules` variable in the module, which can be used to create a narrow context-based restriction rule that is scoped to the etcd instance.
1210

1311
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
1412
### Requirements

0 commit comments

Comments
 (0)