github.com/khulnasoft-lab/defsec@v1.0.5-0.20230827010352-5e9f46893d95/rules/cloud/policies/aws/ec2/add_description_to_security_group_rule.go (about) 1 package ec2 2 3 import ( 4 "github.com/khulnasoft-lab/defsec/internal/rules" 5 "github.com/khulnasoft-lab/defsec/pkg/providers" 6 "github.com/khulnasoft-lab/defsec/pkg/scan" 7 "github.com/khulnasoft-lab/defsec/pkg/severity" 8 "github.com/khulnasoft-lab/defsec/pkg/state" 9 ) 10 11 var CheckAddDescriptionToSecurityGroupRule = rules.Register( 12 scan.Rule{ 13 AVDID: "AVD-AWS-0124", 14 Aliases: []string{"aws-vpc-add-description-to-security-group-rule"}, 15 Provider: providers.AWSProvider, 16 Service: "ec2", 17 ShortCode: "add-description-to-security-group-rule", 18 Summary: "Missing description for security group rule.", 19 Impact: "Descriptions provide context for the firewall rule reasons", 20 Resolution: "Add descriptions for all security groups rules", 21 Explanation: `Security group rules should include a description for auditing purposes. 22 23 Simplifies auditing, debugging, and managing security groups.`, 24 Links: []string{ 25 "https://www.cloudconformity.com/knowledge-base/aws/EC2/security-group-rules-description.html", 26 }, 27 Terraform: &scan.EngineMetadata{ 28 GoodExamples: terraformAddDescriptionToSecurityGroupRuleGoodExamples, 29 BadExamples: terraformAddDescriptionToSecurityGroupRuleBadExamples, 30 Links: terraformAddDescriptionToSecurityGroupRuleLinks, 31 RemediationMarkdown: terraformAddDescriptionToSecurityGroupRuleRemediationMarkdown, 32 }, 33 CloudFormation: &scan.EngineMetadata{ 34 GoodExamples: cloudFormationAddDescriptionToSecurityGroupRuleGoodExamples, 35 BadExamples: cloudFormationAddDescriptionToSecurityGroupRuleBadExamples, 36 Links: cloudFormationAddDescriptionToSecurityGroupRuleLinks, 37 RemediationMarkdown: cloudFormationAddDescriptionToSecurityGroupRuleRemediationMarkdown, 38 }, 39 Severity: severity.Low, 40 }, 41 func(s *state.State) (results scan.Results) { 42 for _, group := range s.AWS.EC2.SecurityGroups { 43 for _, rule := range append(group.EgressRules, group.IngressRules...) { 44 if rule.Description.IsEmpty() { 45 results.Add( 46 "Security group rule does not have a description.", 47 rule.Description, 48 ) 49 } else { 50 results.AddPassed(&rule) 51 } 52 } 53 54 } 55 return 56 }, 57 )