github.com/khulnasoft-lab/defsec@v1.0.5-0.20230827010352-5e9f46893d95/rules/cloud/policies/aws/ec2/enable_volume_encryption.go (about)

     1  package ec2
     2  
     3  import (
     4  	"github.com/khulnasoft-lab/defsec/internal/rules"
     5  	"github.com/khulnasoft-lab/defsec/pkg/providers"
     6  	"github.com/khulnasoft-lab/defsec/pkg/scan"
     7  	"github.com/khulnasoft-lab/defsec/pkg/severity"
     8  	"github.com/khulnasoft-lab/defsec/pkg/state"
     9  )
    10  
    11  var CheckEnableVolumeEncryption = rules.Register(
    12  	scan.Rule{
    13  		AVDID:       "AVD-AWS-0026",
    14  		Aliases:     []string{"aws-ebs-enable-volume-encryption"},
    15  		Provider:    providers.AWSProvider,
    16  		Service:     "ec2",
    17  		ShortCode:   "enable-volume-encryption",
    18  		Summary:     "EBS volumes must be encrypted",
    19  		Impact:      "Unencrypted sensitive data is vulnerable to compromise.",
    20  		Resolution:  "Enable encryption of EBS volumes",
    21  		Explanation: `By enabling encryption on EBS volumes you protect the volume, the disk I/O and any derived snapshots from compromise if intercepted.`,
    22  		Links:       []string{"https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html"},
    23  		Terraform: &scan.EngineMetadata{
    24  			GoodExamples:        terraformEnableVolumeEncryptionGoodExamples,
    25  			BadExamples:         terraformEnableVolumeEncryptionBadExamples,
    26  			Links:               terraformEnableVolumeEncryptionLinks,
    27  			RemediationMarkdown: terraformEnableVolumeEncryptionRemediationMarkdown,
    28  		},
    29  		CloudFormation: &scan.EngineMetadata{
    30  			GoodExamples:        cloudFormationEnableVolumeEncryptionGoodExamples,
    31  			BadExamples:         cloudFormationEnableVolumeEncryptionBadExamples,
    32  			Links:               cloudFormationEnableVolumeEncryptionLinks,
    33  			RemediationMarkdown: cloudFormationEnableVolumeEncryptionRemediationMarkdown,
    34  		},
    35  		Severity: severity.High,
    36  	},
    37  	func(s *state.State) (results scan.Results) {
    38  		for _, volume := range s.AWS.EC2.Volumes {
    39  			if volume.Metadata.IsUnmanaged() {
    40  				continue
    41  			}
    42  			if volume.Encryption.Enabled.IsFalse() {
    43  				results.Add(
    44  					"EBS volume is not encrypted.",
    45  					volume.Encryption.Enabled,
    46  				)
    47  			} else {
    48  				results.AddPassed(&volume)
    49  			}
    50  		}
    51  		return
    52  	},
    53  )