github.com/khulnasoft-lab/defsec@v1.0.5-0.20230827010352-5e9f46893d95/rules/cloud/policies/aws/ec2/enable_volume_encryption.go (about) 1 package ec2 2 3 import ( 4 "github.com/khulnasoft-lab/defsec/internal/rules" 5 "github.com/khulnasoft-lab/defsec/pkg/providers" 6 "github.com/khulnasoft-lab/defsec/pkg/scan" 7 "github.com/khulnasoft-lab/defsec/pkg/severity" 8 "github.com/khulnasoft-lab/defsec/pkg/state" 9 ) 10 11 var CheckEnableVolumeEncryption = rules.Register( 12 scan.Rule{ 13 AVDID: "AVD-AWS-0026", 14 Aliases: []string{"aws-ebs-enable-volume-encryption"}, 15 Provider: providers.AWSProvider, 16 Service: "ec2", 17 ShortCode: "enable-volume-encryption", 18 Summary: "EBS volumes must be encrypted", 19 Impact: "Unencrypted sensitive data is vulnerable to compromise.", 20 Resolution: "Enable encryption of EBS volumes", 21 Explanation: `By enabling encryption on EBS volumes you protect the volume, the disk I/O and any derived snapshots from compromise if intercepted.`, 22 Links: []string{"https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html"}, 23 Terraform: &scan.EngineMetadata{ 24 GoodExamples: terraformEnableVolumeEncryptionGoodExamples, 25 BadExamples: terraformEnableVolumeEncryptionBadExamples, 26 Links: terraformEnableVolumeEncryptionLinks, 27 RemediationMarkdown: terraformEnableVolumeEncryptionRemediationMarkdown, 28 }, 29 CloudFormation: &scan.EngineMetadata{ 30 GoodExamples: cloudFormationEnableVolumeEncryptionGoodExamples, 31 BadExamples: cloudFormationEnableVolumeEncryptionBadExamples, 32 Links: cloudFormationEnableVolumeEncryptionLinks, 33 RemediationMarkdown: cloudFormationEnableVolumeEncryptionRemediationMarkdown, 34 }, 35 Severity: severity.High, 36 }, 37 func(s *state.State) (results scan.Results) { 38 for _, volume := range s.AWS.EC2.Volumes { 39 if volume.Metadata.IsUnmanaged() { 40 continue 41 } 42 if volume.Encryption.Enabled.IsFalse() { 43 results.Add( 44 "EBS volume is not encrypted.", 45 volume.Encryption.Enabled, 46 ) 47 } else { 48 results.AddPassed(&volume) 49 } 50 } 51 return 52 }, 53 )