Skip to content

Commit

Permalink
update rules name conformity
Browse files Browse the repository at this point in the history
  • Loading branch information
aeppling committed Nov 2, 2023
1 parent 64bdd29 commit 56373d8
Show file tree
Hide file tree
Showing 10 changed files with 57 additions and 57 deletions.
20 changes: 10 additions & 10 deletions Kexa/rules/Deployement.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -46,7 +46,7 @@
- level: 3
min: 1
rules:
- name: "Git repo check"
- name: "git-is-repository-private"
description: "this rules is to check if git repo is private"
applied: true
level: 0
Expand All @@ -56,7 +56,7 @@
- property: private
condition: EQUAL
value: true
- name: "Git_branch_protect"
- name: "git-is-branch-protectec"
description: "this rules is to check if git branch is protected"
applied: true
level: 0
Expand All @@ -71,8 +71,8 @@
- property : name
condition : EQUAL
value : master
- name: "http request date in body"
description : "date check"
- name: "http-request-date-in-body"
description : "request date in body"
applied: true
level: 0
cloudProvider: http
Expand All @@ -83,8 +83,8 @@
- property : body.date
condition : EQUAL
value : null
- name: "http request certificate"
description : "certificate check"
- name: "http-request-certificate"
description : "check if certificate is present"
applied: true
level: 0
cloudProvider: http
Expand All @@ -97,8 +97,8 @@
condition : DATE_INF
value : 0 0 0 0 0 0
date: "MMM DD HH:mm:ss YYYY GMT"
- name: "http request header"
description : "header check"
- name: "http-request-header"
description : "http requested header"
applied: true
level: 0
cloudProvider: http
Expand All @@ -108,7 +108,7 @@
condition : INCLUDE
value : "application/json"
#change the namespace name to your namespace
- name: namespace-exist-api-4urcloud
- name: "namespace-exist-api-4urcloud"
description : "this rules is to check if namespace exist and notifiable if exist"
applied: true
level: 0
Expand All @@ -119,7 +119,7 @@
condition : DIFFERENT
value : 4urcloudwebsitepublic
#change the namespace name to your namespace
- name: all-pods-running-kexawebsite
- name: "all-pods-running-kexawebsite"
description : "this rules is to check if all pods are running for a namespace"
applied: true
level: 2
Expand Down
10 changes: 5 additions & 5 deletions Kexa/rules/Economy.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -50,7 +50,7 @@
- level: 3
min: 1
rules:
- name: VM-Reservation
- name: "check-vm-reservation"
description : "check if VM have a reservation"
applied: true
level: 0
Expand All @@ -60,7 +60,7 @@
- property: priority
condition: REGEX
value: (?i)reservation
- name: "azure-disk-orphan"
- name: "azure-is-disk-orphan"
description : "this rules is to check if disk is orphan"
applied: true
level: 1
Expand All @@ -70,7 +70,7 @@
- property : diskState
condition : DIFFERENT
value : Unattached
- name: aks-scaleSet
- name: "aks-has-scaleSet"
description : "check if aks have a scaleSet"
applied: true
level: 0
Expand All @@ -83,7 +83,7 @@
- property: scaleSetEvictionPolicy
condition: EQUAL
value: Delete
- name: "Orphan nsg"
- name: "azure-orphan-nsg"
description : "this rules is to check if nsg is orphan"
applied: true
level: 1
Expand All @@ -94,7 +94,7 @@
condition : COUNT_SUP_OR_EQUAL
value : 1
#AND no subnet
- name: "Orphan virtualNetwork"
- name: "is-virtual-network-orphan"
description : "this rules is to check if virtualNetwork is orphan"
applied: true
level: 1
Expand Down
16 changes: 8 additions & 8 deletions Kexa/rules/HTTPRules.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -50,8 +50,8 @@
- level: 3
min: 1
rules:
- name: "http request code"
description : "code check"
- name: "http-request-response-code"
description : "check for a specific response code"
applied: true
level: 0
cloudProvider: http
Expand All @@ -65,8 +65,8 @@
- property : code
condition : EQUAL
value : 201
- name: "http request date in body"
description : "date check"
- name: "http-request-date-in-body"
description : "check if date is in body"
applied: true
level: 0
cloudProvider: http
Expand All @@ -86,8 +86,8 @@
- property : code
condition : EQUAL
value : 201
- name: "http request certificate"
description : "certificate check"
- name: "http-request-certificate"
description : "request certificate"
applied: true
level: 0
cloudProvider: http
Expand All @@ -96,8 +96,8 @@
- property : certificate.issuer.CN
condition : EQUAL
value : "Kubernetes Ingress Controller Fake Certificate"
- name: "http request header"
description : "header check"
- name: "http-request-header"
description : "request header content"
applied: true
level: 0
cloudProvider: http
Expand Down
4 changes: 2 additions & 2 deletions Kexa/rules/OperationalExcellence.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -50,7 +50,7 @@
- level: 3
min: 1
rules:
- name: VirtualNetwork-subnet-count
- name: "azure-virtual-network-minimum-subnets"
description : "check if NSG have a minimum of subnets"
applied: true
level: 1
Expand All @@ -71,7 +71,7 @@
condition: DATE_INF
value: 0 0 0 0 0 2 0
date: "YYYY-MM-DDThh:mm:ss.SSSZ"
- name: "tagsvalue-check-for-expiration-date"
- name: "aws-tagsvalue-check-for-expiration-date"
description: "this rule is to check if tags contain an expiration date (separate with \"-\")"
applied: true
level: 1
Expand Down
2 changes: 1 addition & 1 deletion Kexa/rules/Performance.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -50,7 +50,7 @@
- level: 3
min: 1
rules:
- name: aks-scaleSet
- name: "aks-is-scaleset-down"
description : "check if aks have a scaleSet down"
applied: true
level: 0
Expand Down
12 changes: 6 additions & 6 deletions Kexa/rules/PostDeployement.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -46,8 +46,8 @@
- level: 3
min: 1
rules:
- name: "http request date in body"
description : "date check"
- name: "http-request-date-in-body"
description : "request date in body"
applied: true
level: 0
cloudProvider: http
Expand All @@ -58,8 +58,8 @@
- property : body.date
condition : EQUAL
value : null
- name: "http request certificate"
description : "certificate check"
- name: "http-request-certificate"
description : "request certificate"
applied: true
level: 0
cloudProvider: http
Expand All @@ -72,8 +72,8 @@
condition : DATE_INF
value : 0 0 0 0 0 0
date: "MMM DD HH:mm:ss YYYY GMT"
- name: "http request header"
description : "header check"
- name: "http-request-header"
description : "request header content"
applied: true
level: 0
cloudProvider: http
Expand Down
6 changes: 3 additions & 3 deletions Kexa/rules/PreDeployement.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -46,7 +46,7 @@
- level: 3
min: 1
rules:
- name: "Git repo check"
- name: "git-is-repository-private"
description: "this rules is to check if my git repo is private"
applied: true
level: 1
Expand All @@ -62,7 +62,7 @@
condition: EQUAL
#change the name with your repo name
value: 4urcloud/Kexa_website
- name: "Git_branch_protect"
- name: "git-is-branch-protected"
description: "this rules is to check if my git branch is protected"
applied: true
level: 1
Expand All @@ -81,7 +81,7 @@
- property : protected
condition : EQUAL
value : true
- name: alert-if-namespace-not-exist-api-4urcloud
- name: "kub-alert-if-namespace-not-exist"
description : "this rules is to check if namespace exist and notifiable if not"
applied: true
level: 0
Expand Down
6 changes: 3 additions & 3 deletions Kexa/rules/Security.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -50,7 +50,7 @@
- level: 3
min: 1
rules:
- name: NSG-subnet
- name: "azure-nsg-valid-subnet"
description : "check if NSG have a valid subnet"
applied: true
level: 1
Expand All @@ -60,7 +60,7 @@
- property: agentPoolProfiles
condition: COUNT
value: 2
- name: "Git repo check"
- name: "git-is-repository-private"
description: "this rules is to check if git repo is private"
applied: true
level: 0
Expand All @@ -70,7 +70,7 @@
- property: private
condition: EQUAL
value: true
- name: "Git_branch_protect"
- name: "git-is-branch-protected"
description: "this rules is to check if git branch is protected"
applied: true
level: 0
Expand Down
12 changes: 6 additions & 6 deletions Kexa/rules/driveRules.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -50,8 +50,8 @@
- level: 3
min: 1
rules:
- name: "check drive files name"
description : "check drive files name"
- name: "check-regex-drive-file-name"
description : "compare drive file name to regex for compliance"
applied: true
level: 0
cloudProvider: googleDrive
Expand All @@ -60,8 +60,8 @@
- property: name
condition: REGEX
value: /^(PUBLIC|PRIVATE)\s[A-Za-z]+/
- name: "check drive files stay private"
description : "check drive files name private"
- name: "is-drive-file-private"
description : "this rule is to check if drive files are private"
applied: true
level: 0
cloudProvider: googleDrive
Expand All @@ -75,8 +75,8 @@
- property : name
condition : REGEX
value : /PRIVATE\s[A-Za-z]+/
- name: "shared only by domaine"
description : "shared only by domaine"
- name: "is-file-shared-only-by-domaine"
description : "this rule is to check if a file is shared only by domain"
applied: true
level: 0
cloudProvider: googleDrive
Expand Down
Loading

0 comments on commit 56373d8

Please sign in to comment.