We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
I have a terraform code, creating an AWS Cloudfront resource, configured as this:
resource "aws_cloudfront_distribution" "foo" { ... viewer_certificate { cloudfront_default_certificate = false acm_certificate_arn = var.my_certificate minimum_protocol_version = "TLSv1.2_2019" ssl_support_method = "sni-only" } ... }
Terrascan is not happy:
Violation Details - Description : Secure ciphers are not used in CloudFront distribution File : ../../front/cdn.tf Line : 6 Severity : HIGH
I think this should not be raised.
By reading the definition of this rule here: https://github.com/accurics/terrascan/blob/585edcc99942032e8f0ae8f280fcbea1a6aac0ab/pkg/runtime/testdata/testpolicies/aws_cloudfront_distribution/cloudfrontNoSecureCiphers.rego
I can see it's expected to have minimum_protocol_version strictly equal to TLSv1.2 or TLSv1.1.
To me this should be more something like minimum_protocol_version should start with TLSv1.2 or TLSv1.1.
See https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/secure-connections-supported-viewer-protocols-ciphers.html#secure-connections-supported-ciphers for the supported list.
If the issue is confirmed, I would be happy to contribute.
Adrien
The text was updated successfully, but these errors were encountered:
@frediana yes you are absolutely right. Please, go ahead and submit your contribution. Thanks
Sorry, something went wrong.
gaurav-gogia
harkirat22
Successfully merging a pull request may close this issue.
Description
I have a terraform code, creating an AWS Cloudfront resource, configured as this:
What I Did
Terrascan is not happy:
I think this should not be raised.
By reading the definition of this rule here: https://github.com/accurics/terrascan/blob/585edcc99942032e8f0ae8f280fcbea1a6aac0ab/pkg/runtime/testdata/testpolicies/aws_cloudfront_distribution/cloudfrontNoSecureCiphers.rego
I can see it's expected to have minimum_protocol_version strictly equal to TLSv1.2 or TLSv1.1.
To me this should be more something like minimum_protocol_version should start with TLSv1.2 or TLSv1.1.
See https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/secure-connections-supported-viewer-protocols-ciphers.html#secure-connections-supported-ciphers for the supported list.
If the issue is confirmed, I would be happy to contribute.
Adrien
The text was updated successfully, but these errors were encountered: