You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
CloudWatch Log Group Without KMS, Severity: MEDIUM, Results: 1Description: AWS CloudWatch Log groups should be encrypted using KMSPlatform: TerraformLearn more about this vulnerability: https://docs.kics.io/latest/queries/terraform-queries/aws/0afbcfe9-d341-4b92-a64c-7e6de0543879 [1]: tfplan.json:8 007: { 008: "address": "aws_cloudwatch_log_group.log", 009: "mode": "managed",Results Summary:CRITICAL: 0HIGH: 0MEDIUM: 1LOW: 0INFO: 4TOTAL: 5
kms_key_id
is referencing from the resource.tf
file instead of the plan file.Expected Behavior
Actual Behavior
Steps to Reproduce the Problem
tfplan.json
docker run --rm -v $PWD:/path -w /path -t checkmarx/kics scan -p tfplan.json --disable-secrets --cloud-provider aws
To generate the
tfplan.json
again:tf
code.terraform init
terraform plan -out=tfplan
terraform show -json tfplan > tfplan.json
Specifications
tfplan.json
The text was updated successfully, but these errors were encountered: