github.com/khulnasoft-lab/defsec@v1.0.5-0.20230827010352-5e9f46893d95/rules/cloud/policies/aws/cloudtrail/no_public_log_access.tf.go (about) 1 package cloudtrail 2 3 var terraformNoPublicLogAccessGoodExamples = []string{ 4 ` 5 resource "aws_cloudtrail" "good_example" { 6 is_multi_region_trail = true 7 s3_bucket_name = "abcdefgh" 8 9 event_selector { 10 read_write_type = "All" 11 include_management_events = true 12 13 data_resource { 14 type = "AWS::S3::Object" 15 values = ["${data.aws_s3_bucket.important-bucket.arn}/"] 16 } 17 } 18 } 19 20 resource "aws_s3_bucket" "good_example" { 21 bucket = "abcdefgh" 22 acl = "private" 23 } 24 `, 25 } 26 27 var terraformNoPublicLogAccessBadExamples = []string{ 28 ` 29 resource "aws_cloudtrail" "bad_example" { 30 s3_bucket_name = "abcdefgh" 31 event_selector { 32 read_write_type = "All" 33 include_management_events = true 34 35 data_resource { 36 type = "AWS::S3::Object" 37 values = ["${data.aws_s3_bucket.important-bucket.arn}/"] 38 } 39 } 40 } 41 42 resource "aws_s3_bucket" "good_example" { 43 bucket = "abcdefgh" 44 acl = "public-read" 45 } 46 `, 47 } 48 49 var terraformNoPublicLogAccessLinks = []string{ 50 `https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudtrail#is_multi_region_trail`, 51 } 52 53 var terraformNoPublicLogAccessRemediationMarkdown = ``