Skip to content

Cron Jobs

Cron Jobs #25

Triggered via schedule November 25, 2023 00:04
Status Failure
Total duration 30s
Artifacts

cron.yml

on: schedule
tfscan  /  checkov-action
20s
tfscan / checkov-action
Fit to window
Zoom out
Zoom in

Annotations

10 errors
tfscan / checkov-action: ecs_task_definitions.tf#L24
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
tfscan / checkov-action: ecs_task_definitions.tf#L20
CKV_AWS_338: "Ensure CloudWatch log groups retains logs for at least 1 year"
tfscan / checkov-action: ecs_task_definitions.tf#L20
CKV_AWS_158: "Ensure that CloudWatch Log Group is encrypted by KMS"
tfscan / checkov-action: ecs_task_definitions.tf#L20
CKV_AWS_66: "Ensure that CloudWatch Log Group specifies retention days"
tfscan / checkov-action: rds_cluster/main.tf#L6
CKV_AWS_327: "Ensure RDS Clusters are encrypted using KMS CMKs"
tfscan / checkov-action: rds_cluster/main.tf#L6
CKV_AWS_313: "Ensure RDS cluster configured to copy tags to snapshots"
tfscan / checkov-action: rds_cluster/main.tf#L6
CKV_AWS_162: "Ensure RDS cluster has IAM authentication enabled"
tfscan / checkov-action: rds_cluster/main.tf#L6
CKV_AWS_324: "Ensure that RDS Cluster log capture is enabled"
tfscan / checkov-action: rds_cluster/main.tf#L34
CKV_AWS_149: "Ensure that Secrets Manager secret is encrypted using KMS CMK"
tfscan / checkov-action: rds_cluster/main.tf#L46
CKV_AWS_149: "Ensure that Secrets Manager secret is encrypted using KMS CMK"