fix(misconf): Update Cloudtrail adapter for getting default encryption policy #6326
Labels
kind/feature
Categorizes issue or PR as related to a new feature.
scan/misconfiguration
Issues relating to misconfiguration scanning
Milestone
Discussed in #6320
Originally posted by evankanderson March 13, 2024
Question
AVD-AWS-0015 suggests that "Cloudtrail should be encrypted at rest to secure access to sensitive trail data", and cites the AWS CloudTrail documentation for SSE-KMS.
According to that page:
To my ears, it sounds like I can use either SSE-S3 or SSE-KMS to achieve encryption-at-rest of CloudTrail data. However, if I omit the
kms_key_id
parameter from my terraform, I get a critical warning from the Trivy action:Now, I can definitely set up and manage an SSE-KMS key, but I'm wondering whether the AVD-AWS-0015 recommendation dates from before the rollout of SSE-S3 encryption for CloudTrail.
Target
AWS
Scanner
Misconfiguration
Output Format
Table
Mode
Standalone
Operating System
GitHub Actions
Version
The text was updated successfully, but these errors were encountered: