github.com/khulnasoft-lab/defsec@v1.0.5-0.20230827010352-5e9f46893d95/rules/cloud/policies/aws/emr/enable_in_transit_encryption.tf.go (about) 1 package emr 2 3 var terraformEnableInTransitEncryptionGoodExamples = []string{ 4 ` 5 resource "aws_emr_security_configuration" "good_example" { 6 name = "emrsc_other" 7 8 configuration = <<EOF 9 { 10 "EncryptionConfiguration": { 11 "AtRestEncryptionConfiguration": { 12 "S3EncryptionConfiguration": { 13 "EncryptionMode": "SSE-S3" 14 }, 15 "LocalDiskEncryptionConfiguration": { 16 "EncryptionKeyProviderType": "AwsKms", 17 "AwsKmsKey": "arn:aws:kms:us-west-2:187416307283:alias/tf_emr_test_key" 18 } 19 }, 20 "EnableInTransitEncryption": true, 21 "EnableAtRestEncryption": true 22 } 23 } 24 EOF 25 }`, 26 } 27 28 var terraformEnableInTransitEncryptionBadExamples = []string{ 29 ` 30 resource "aws_emr_security_configuration" "bad_example" { 31 name = "emrsc_other" 32 33 configuration = <<EOF 34 { 35 "EncryptionConfiguration": { 36 "AtRestEncryptionConfiguration": { 37 "S3EncryptionConfiguration": { 38 "EncryptionMode": "SSE-S3" 39 }, 40 "LocalDiskEncryptionConfiguration": { 41 "EncryptionKeyProviderType": "AwsKms", 42 "AwsKmsKey": "arn:aws:kms:us-west-2:187416307283:alias/tf_emr_test_key" 43 } 44 }, 45 "EnableInTransitEncryption": false, 46 "EnableAtRestEncryption": false 47 } 48 } 49 EOF 50 }`, 51 } 52 53 var terraformEnableInTransitEncryptionLinks = []string{ 54 `https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/emr_security_configuration`, 55 } 56 57 var terraformEnableInTransitEncryptionRemediationMarkdown = ``