github.com/khulnasoft-lab/defsec@v1.0.5-0.20230827010352-5e9f46893d95/rules/cloud/policies/nifcloud/computing/add_security_group_to_instance.go (about) 1 package computing 2 3 import ( 4 "github.com/khulnasoft-lab/defsec/internal/rules" 5 "github.com/khulnasoft-lab/defsec/pkg/providers" 6 "github.com/khulnasoft-lab/defsec/pkg/scan" 7 "github.com/khulnasoft-lab/defsec/pkg/severity" 8 "github.com/khulnasoft-lab/defsec/pkg/state" 9 ) 10 11 var CheckAddSecurityGroupToInstance = rules.Register( 12 scan.Rule{ 13 AVDID: "AVD-NIF-0004", 14 Aliases: []string{"nifcloud-computing-add-security-group-to-instance"}, 15 Provider: providers.NifcloudProvider, 16 Service: "computing", 17 ShortCode: "add-security-group-to-instance", 18 Summary: "Missing security group for instance.", 19 Impact: "A security group controls the traffic that is allowed to reach and leave the resources that it is associated with.", 20 Resolution: "Add security group for all instances", 21 Explanation: "Need to add a security group to your instance.", 22 Links: []string{ 23 "https://pfs.nifcloud.com/help/server/change_fw.htm", 24 }, 25 Terraform: &scan.EngineMetadata{ 26 GoodExamples: terraformAddSecurityGroupToInstanceGoodExamples, 27 BadExamples: terraformAddSecurityGroupToInstanceBadExamples, 28 Links: terraformAddSecurityGroupToInstanceLinks, 29 RemediationMarkdown: terraformAddSecurityGroupToInstanceRemediationMarkdown, 30 }, 31 Severity: severity.Critical, 32 }, 33 func(s *state.State) (results scan.Results) { 34 for _, instance := range s.Nifcloud.Computing.Instances { 35 if instance.Metadata.IsUnmanaged() { 36 continue 37 } 38 if instance.SecurityGroup.IsEmpty() { 39 results.Add( 40 "Instance does not have a securiy group.", 41 instance.SecurityGroup, 42 ) 43 } else { 44 results.AddPassed(&instance) 45 } 46 } 47 return 48 }, 49 )