Skip to content

Commit

Permalink
update metadata.json across all files to include platform Checkmarx#1799
Browse files Browse the repository at this point in the history
  • Loading branch information
mcarvalhox authored Feb 5, 2021
1 parent 5295feb commit e333ff8
Show file tree
Hide file tree
Showing 789 changed files with 5,517 additions and 4,729 deletions.
Original file line number Diff line number Diff line change
@@ -1,8 +1,9 @@
{
"id": "83957b81-39c1-4191-8e12-671d2ce14354",
"queryName": "IAM Password Without Uppercase Letter",
"severity": "MEDIUM",
"category": "IAM",
"descriptionText": "Check if IAM account password has at least one uppercase letter",
"descriptionUrl": "https://docs.ansible.com/ansible/latest/collections/community/aws/iam_password_policy_module.html"
"id": "83957b81-39c1-4191-8e12-671d2ce14354",
"queryName": "IAM Password Without Uppercase Letter",
"severity": "MEDIUM",
"category": "IAM",
"descriptionText": "Check if IAM account password has at least one uppercase letter",
"descriptionUrl": "https://docs.ansible.com/ansible/latest/collections/community/aws/iam_password_policy_module.html",
"platform": "Ansible"
}
Original file line number Diff line number Diff line change
@@ -1,8 +1,9 @@
{
"id": "3f2cf811-88fa-4eda-be45-7a191a18aba9",
"queryName": "Incorrect password policy expiration",
"severity": "MEDIUM",
"category": "Identity and Access Management",
"descriptionText": "No password expiration policy",
"descriptionUrl": "https://docs.ansible.com/ansible/latest/collections/community/aws/iam_password_policy_module.html"
"id": "3f2cf811-88fa-4eda-be45-7a191a18aba9",
"queryName": "Incorrect password policy expiration",
"severity": "MEDIUM",
"category": "Identity and Access Management",
"descriptionText": "No password expiration policy",
"descriptionUrl": "https://docs.ansible.com/ansible/latest/collections/community/aws/iam_password_policy_module.html",
"platform": "Ansible"
}
Original file line number Diff line number Diff line change
@@ -1,9 +1,9 @@
{
"id": "8e3063f4-b511-45c3-b030-f3b0c9131951",
"queryName": "IAM Password Without Lowercase Letter",
"severity": "MEDIUM",
"category": "Identity and Access Management",
"descriptionText": "Check if IAM account password has at least one lowercase letter",
"descriptionUrl": "https://docs.ansible.com/ansible/latest/collections/community/aws/iam_password_policy_module.html"
"id": "8e3063f4-b511-45c3-b030-f3b0c9131951",
"queryName": "IAM Password Without Lowercase Letter",
"severity": "MEDIUM",
"category": "Identity and Access Management",
"descriptionText": "Check if IAM account password has at least one lowercase letter",
"descriptionUrl": "https://docs.ansible.com/ansible/latest/collections/community/aws/iam_password_policy_module.html",
"platform": "Ansible"
}

Original file line number Diff line number Diff line change
@@ -1,8 +1,9 @@
{
"id": "9cf25d62-0b96-42c8-b66d-998cd6ee5bb8",
"queryName": "IAM Password Without Numbers",
"severity": "MEDIUM",
"category": "Identity and Access Management",
"descriptionText": "Check if IAM account password has at least one number",
"descriptionUrl": "https://docs.ansible.com/ansible/latest/collections/community/aws/iam_password_policy_module.html"
"id": "9cf25d62-0b96-42c8-b66d-998cd6ee5bb8",
"queryName": "IAM Password Without Numbers",
"severity": "MEDIUM",
"category": "Identity and Access Management",
"descriptionText": "Check if IAM account password has at least one number",
"descriptionUrl": "https://docs.ansible.com/ansible/latest/collections/community/aws/iam_password_policy_module.html",
"platform": "Ansible"
}
Original file line number Diff line number Diff line change
@@ -1,8 +1,9 @@
{
"id": "eafe4bc3-1042-4f88-b988-1939e64bf060",
"queryName": "IAM policies attached to user",
"severity": "LOW",
"category": "Identity and Access Management",
"descriptionText": "IAM policies should be attached only to groups or roles",
"descriptionUrl": "https://docs.ansible.com/ansible/latest/collections/community/aws/iam_policy_module.html"
"id": "eafe4bc3-1042-4f88-b988-1939e64bf060",
"queryName": "IAM policies attached to user",
"severity": "LOW",
"category": "Identity and Access Management",
"descriptionText": "IAM policies should be attached only to groups or roles",
"descriptionUrl": "https://docs.ansible.com/ansible/latest/collections/community/aws/iam_policy_module.html",
"platform": "Ansible"
}
Original file line number Diff line number Diff line change
@@ -1,8 +1,9 @@
{
"id": "e401d614-8026-4f4b-9af9-75d1197461ba",
"queryName": "IAM Policies With Full Privileges",
"severity": "MEDIUM",
"category": "Identity and Access Management",
"descriptionText": "IAM policies that allow full administrative privileges (for all resources)",
"descriptionUrl": "https://docs.ansible.com/ansible/latest/collections/community/aws/iam_managed_policy_module.html"
"id": "e401d614-8026-4f4b-9af9-75d1197461ba",
"queryName": "IAM Policies With Full Privileges",
"severity": "MEDIUM",
"category": "Identity and Access Management",
"descriptionText": "IAM policies that allow full administrative privileges (for all resources)",
"descriptionUrl": "https://docs.ansible.com/ansible/latest/collections/community/aws/iam_managed_policy_module.html",
"platform": "Ansible"
}
Original file line number Diff line number Diff line change
@@ -1,8 +1,9 @@
{
"id": "babdedcf-d859-43da-9a7b-6d72e661a8fd",
"queryName": "IAM role allows all principals to assume",
"severity": "LOW",
"category": "Identity and Access Management",
"descriptionText": "IAM role allows all services or principals to assume it",
"descriptionUrl": "https://docs.ansible.com/ansible/latest/collections/community/aws/iam_managed_policy_module.html"
"id": "babdedcf-d859-43da-9a7b-6d72e661a8fd",
"queryName": "IAM role allows all principals to assume",
"severity": "LOW",
"category": "Identity and Access Management",
"descriptionText": "IAM role allows all services or principals to assume it",
"descriptionUrl": "https://docs.ansible.com/ansible/latest/collections/community/aws/iam_managed_policy_module.html",
"platform": "Ansible"
}
Original file line number Diff line number Diff line change
@@ -1,8 +1,9 @@
{
"id": "12a7a7ce-39d6-49dd-923d-aeb4564eb66c",
"queryName": "IAM role allows public assume",
"severity": "LOW",
"category": "Identity and Access Management",
"descriptionText": "IAM role allows All services or principals to assume it",
"descriptionUrl": "https://docs.ansible.com/ansible/latest/collections/community/aws/iam_managed_policy_module.html"
"id": "12a7a7ce-39d6-49dd-923d-aeb4564eb66c",
"queryName": "IAM role allows public assume",
"severity": "LOW",
"category": "Identity and Access Management",
"descriptionText": "IAM role allows All services or principals to assume it",
"descriptionUrl": "https://docs.ansible.com/ansible/latest/collections/community/aws/iam_managed_policy_module.html",
"platform": "Ansible"
}
Original file line number Diff line number Diff line change
@@ -1,8 +1,9 @@
{
"id": "ed9b3beb-92cf-44d9-a9d2-171eeba569d4",
"queryName": "SQS policy allows ALL (*) actions",
"severity": "MEDIUM",
"category": "Identity and Access Management",
"descriptionText": "SQS policy allows ALL (*) actions",
"descriptionUrl": "https://docs.ansible.com/ansible/latest/collections/community/aws/sqs_queue_module.html"
"id": "ed9b3beb-92cf-44d9-a9d2-171eeba569d4",
"queryName": "SQS policy allows ALL (*) actions",
"severity": "MEDIUM",
"category": "Identity and Access Management",
"descriptionText": "SQS policy allows ALL (*) actions",
"descriptionUrl": "https://docs.ansible.com/ansible/latest/collections/community/aws/sqs_queue_module.html",
"platform": "Ansible"
}
13 changes: 7 additions & 6 deletions assets/queries/ansible/aws/Unchangeable_password/metadata.json
Original file line number Diff line number Diff line change
@@ -1,8 +1,9 @@
{
"id": "e28ceb92-d588-4166-aac5-766c8f5b7472",
"queryName": "Unchangeable password",
"severity": "MEDIUM",
"category": "Identity and Access Management",
"descriptionText": "Unchangeable passwords in AWS password policy",
"descriptionUrl": "https://docs.ansible.com/ansible/latest/collections/community/aws/iam_password_policy_module.html"
"id": "e28ceb92-d588-4166-aac5-766c8f5b7472",
"queryName": "Unchangeable password",
"severity": "MEDIUM",
"category": "Identity and Access Management",
"descriptionText": "Unchangeable passwords in AWS password policy",
"descriptionUrl": "https://docs.ansible.com/ansible/latest/collections/community/aws/iam_password_policy_module.html",
"platform": "Ansible"
}
Original file line number Diff line number Diff line change
@@ -1,8 +1,9 @@
{
"id": "75480b31-f349-4b9a-861f-bce19588e674",
"queryName": "All Auth Users Get Read Access",
"severity": "HIGH",
"category": "Identity and Access Management",
"descriptionText": "Misconfigured S3 buckets can leak private information to the entire internet or allow unauthorized data tampering / deletion",
"descriptionUrl": "https://docs.ansible.com/ansible/latest/collections/amazon/aws/aws_s3_module.html#parameter-permission"
"id": "75480b31-f349-4b9a-861f-bce19588e674",
"queryName": "All Auth Users Get Read Access",
"severity": "HIGH",
"category": "Identity and Access Management",
"descriptionText": "Misconfigured S3 buckets can leak private information to the entire internet or allow unauthorized data tampering / deletion",
"descriptionUrl": "https://docs.ansible.com/ansible/latest/collections/amazon/aws/aws_s3_module.html#parameter-permission",
"platform": "Ansible"
}
Original file line number Diff line number Diff line change
@@ -1,8 +1,9 @@
{
"id": "a1ef9d2e-4163-40cb-bd92-04f0d602a15d",
"queryName": "All Users Group Gets Read Access",
"severity": "HIGH",
"category": "Identity and Access Management",
"descriptionText": "It's not recommended to allow read access for all user groups.",
"descriptionUrl": "https://docs.ansible.com/ansible/latest/collections/amazon/aws/aws_s3_module.html#parameter-permission"
"id": "a1ef9d2e-4163-40cb-bd92-04f0d602a15d",
"queryName": "All Users Group Gets Read Access",
"severity": "HIGH",
"category": "Identity and Access Management",
"descriptionText": "It's not recommended to allow read access for all user groups.",
"descriptionUrl": "https://docs.ansible.com/ansible/latest/collections/amazon/aws/aws_s3_module.html#parameter-permission",
"platform": "Ansible"
}
13 changes: 7 additions & 6 deletions assets/queries/ansible/aws/ami_not_encrypted/metadata.json
Original file line number Diff line number Diff line change
@@ -1,8 +1,9 @@
{
"id": "97707503-a22c-4cd7-b7c0-f088fa7cf830",
"queryName": "AMI Not Encrypted",
"severity": "HIGH",
"category": "Encryption & Key Management",
"descriptionText": "AWS AMI Encryption is not enabled",
"descriptionUrl": "https://docs.ansible.com/ansible/latest/collections/amazon/aws/ec2_ami_module.html"
"id": "97707503-a22c-4cd7-b7c0-f088fa7cf830",
"queryName": "AMI Not Encrypted",
"severity": "HIGH",
"category": "Encryption & Key Management",
"descriptionText": "AWS AMI Encryption is not enabled",
"descriptionUrl": "https://docs.ansible.com/ansible/latest/collections/amazon/aws/ec2_ami_module.html",
"platform": "Ansible"
}
Original file line number Diff line number Diff line change
@@ -1,8 +1,9 @@
{
"id": "a19b2942-142e-4e2b-93b7-6cf6a6c8d90f",
"queryName": "AMI Shared To Multiple Accounts",
"severity": "MEDIUM",
"category": "Network Security",
"descriptionText": "Limits access to AWS AMIs by checking if more than one account is using the same image",
"descriptionUrl": "https://docs.ansible.com/ansible/latest/collections/amazon/aws/ec2_ami_module.html"
"id": "a19b2942-142e-4e2b-93b7-6cf6a6c8d90f",
"queryName": "AMI Shared To Multiple Accounts",
"severity": "MEDIUM",
"category": "Network Security",
"descriptionText": "Limits access to AWS AMIs by checking if more than one account is using the same image",
"descriptionUrl": "https://docs.ansible.com/ansible/latest/collections/amazon/aws/ec2_ami_module.html",
"platform": "Ansible"
}
Original file line number Diff line number Diff line change
@@ -1,8 +1,9 @@
{
"id": "559439b2-3e9c-4739-ac46-17e3b24ec215",
"queryName": "API Gateway Endpoint Config is Private",
"severity": "MEDIUM",
"category": "Network Security",
"descriptionText": "Type of Endpoint Configuration is Private",
"descriptionUrl": "https://docs.ansible.com/ansible/latest/collections/community/aws/aws_api_gateway_module.html"
"id": "559439b2-3e9c-4739-ac46-17e3b24ec215",
"queryName": "API Gateway Endpoint Config is Private",
"severity": "MEDIUM",
"category": "Network Security",
"descriptionText": "Type of Endpoint Configuration is Private",
"descriptionUrl": "https://docs.ansible.com/ansible/latest/collections/community/aws/aws_api_gateway_module.html",
"platform": "Ansible"
}
Original file line number Diff line number Diff line change
@@ -1,8 +1,9 @@
{
"id": "5e92d816-2177-4083-85b4-f61b4f7176d9",
"queryName": "Public Lambda via API Gateway",
"severity": "MEDIUM",
"category": "Network Security",
"descriptionText": "Allowing to run lambda function using public API Gateway",
"descriptionUrl": "https://docs.ansible.com/ansible/2.4/lambda_policy_module.html"
"id": "5e92d816-2177-4083-85b4-f61b4f7176d9",
"queryName": "Public Lambda via API Gateway",
"severity": "MEDIUM",
"category": "Network Security",
"descriptionText": "Allowing to run lambda function using public API Gateway",
"descriptionUrl": "https://docs.ansible.com/ansible/2.4/lambda_policy_module.html",
"platform": "Ansible"
}
Original file line number Diff line number Diff line change
@@ -1,8 +1,9 @@
{
"id": "72a931c2-12f5-40d1-93cc-47bff2f7aa2a",
"queryName": "API Gateway without Cloudwatch Log",
"severity": "MEDIUM",
"category": "Logging",
"descriptionText": "AWS CloudWatch Logs for APIs is not enabled",
"descriptionUrl": "https://docs.ansible.com/ansible/latest/collections/community/aws/cloudwatchlogs_log_group_module.html#ansible-collections-community-aws-cloudwatchlogs-log-group-module"
"id": "72a931c2-12f5-40d1-93cc-47bff2f7aa2a",
"queryName": "API Gateway without Cloudwatch Log",
"severity": "MEDIUM",
"category": "Logging",
"descriptionText": "AWS CloudWatch Logs for APIs is not enabled",
"descriptionUrl": "https://docs.ansible.com/ansible/latest/collections/community/aws/cloudwatchlogs_log_group_module.html#ansible-collections-community-aws-cloudwatchlogs-log-group-module",
"platform": "Ansible"
}
Original file line number Diff line number Diff line change
@@ -1,8 +1,9 @@
{
"id": "b47b98ab-e481-4a82-8bb1-1ab39fd36e33",
"queryName": "API Gateway Without SSL Certificate",
"severity": "MEDIUM",
"category": "Network Security",
"descriptionText": "SSL Client Certificate should be enabled in aws_api_gateway",
"descriptionUrl": "https://docs.ansible.com/ansible/2.8/modules/aws_api_gateway_module.html"
"id": "b47b98ab-e481-4a82-8bb1-1ab39fd36e33",
"queryName": "API Gateway Without SSL Certificate",
"severity": "MEDIUM",
"category": "Network Security",
"descriptionText": "SSL Client Certificate should be enabled in aws_api_gateway",
"descriptionUrl": "https://docs.ansible.com/ansible/2.8/modules/aws_api_gateway_module.html",
"platform": "Ansible"
}
Original file line number Diff line number Diff line change
@@ -1,8 +1,9 @@
{
"id": "2059155b-27fd-441e-b616-6966c468561f",
"queryName": "API Gateway X-Ray Disabled",
"severity": "MEDIUM",
"category": "Network Security",
"descriptionText": "API Gateway should have X-Ray Tracing enabled",
"descriptionUrl": "https://docs.ansible.com/ansible/latest/collections/community/aws/aws_api_gateway_module.html#parameter-tracing_enabled"
"id": "2059155b-27fd-441e-b616-6966c468561f",
"queryName": "API Gateway X-Ray Disabled",
"severity": "MEDIUM",
"category": "Network Security",
"descriptionText": "API Gateway should have X-Ray Tracing enabled",
"descriptionUrl": "https://docs.ansible.com/ansible/latest/collections/community/aws/aws_api_gateway_module.html#parameter-tracing_enabled",
"platform": "Ansible"
}
Original file line number Diff line number Diff line change
@@ -1,8 +1,9 @@
{
"id": "eee107f9-b3d8-45d3-b9c6-43b5a7263ce1",
"queryName": "Authentication Without MFA",
"severity": "HIGH",
"category": "Identity and Access Management",
"descriptionText": "Users should authenticate with MFA (Multi-factor Authentication)",
"descriptionUrl": "https://docs.ansible.com/ansible/latest/collections/community/aws/iam_mfa_device_info_module.html"
"id": "eee107f9-b3d8-45d3-b9c6-43b5a7263ce1",
"queryName": "Authentication Without MFA",
"severity": "HIGH",
"category": "Identity and Access Management",
"descriptionText": "Users should authenticate with MFA (Multi-factor Authentication)",
"descriptionUrl": "https://docs.ansible.com/ansible/latest/collections/community/aws/iam_mfa_device_info_module.html",
"platform": "Ansible"
}
Original file line number Diff line number Diff line change
@@ -1,8 +1,9 @@
{
"id": "f81d63d2-c5d7-43a4-a5b5-66717a41c895",
"queryName": "ALB protocol is HTTP",
"severity": "HIGH",
"category": "Network Security",
"descriptionText": "AWS Application Load Balancer (alb) should not listen on HTTP",
"descriptionUrl": "https://docs.ansible.com/ansible/latest/collections/community/aws/elb_application_lb_module.html"
"id": "f81d63d2-c5d7-43a4-a5b5-66717a41c895",
"queryName": "ALB protocol is HTTP",
"severity": "HIGH",
"category": "Network Security",
"descriptionText": "AWS Application Load Balancer (alb) should not listen on HTTP",
"descriptionUrl": "https://docs.ansible.com/ansible/latest/collections/community/aws/elb_application_lb_module.html",
"platform": "Ansible"
}
Original file line number Diff line number Diff line change
@@ -1,8 +1,9 @@
{
"id": "7674a686-e4b1-4a95-83d4-1fd53c623d84",
"queryName": "AWS Config Rule For Encrypted Volumes Is Disabled",
"severity": "MEDIUM",
"category": "Encryption and Key Management",
"descriptionText": "Check if AWS config rules do not identify Encrypted Volumes as a source.",
"descriptionUrl": "https://docs.ansible.com/ansible/latest/collections/community/aws/aws_config_rule_module.html#parameter-source/identifier"
"id": "7674a686-e4b1-4a95-83d4-1fd53c623d84",
"queryName": "AWS Config Rule For Encrypted Volumes Is Disabled",
"severity": "MEDIUM",
"category": "Encryption and Key Management",
"descriptionText": "Check if AWS config rules do not identify Encrypted Volumes as a source.",
"descriptionUrl": "https://docs.ansible.com/ansible/latest/collections/community/aws/aws_config_rule_module.html#parameter-source/identifier",
"platform": "Ansible"
}
Original file line number Diff line number Diff line change
@@ -1,8 +1,9 @@
{
"id": "905f4741-f965-45c1-98db-f7a00a0e5c73",
"queryName": "SNS Topic is Publicly Accessible For Subscription",
"severity": "MEDIUM",
"category": "Network Security",
"descriptionText": "This query checks if SNS Topic is Accessible For Subscription",
"descriptionUrl": "https://docs.ansible.com/ansible/latest/collections/community/aws/sns_topic_module.html"
"id": "905f4741-f965-45c1-98db-f7a00a0e5c73",
"queryName": "SNS Topic is Publicly Accessible For Subscription",
"severity": "MEDIUM",
"category": "Network Security",
"descriptionText": "This query checks if SNS Topic is Accessible For Subscription",
"descriptionUrl": "https://docs.ansible.com/ansible/latest/collections/community/aws/sns_topic_module.html",
"platform": "Ansible"
}
Original file line number Diff line number Diff line change
@@ -1,8 +1,9 @@
{
"id": "6ad087d7-a509-4b20-b853-9ef6f5ebaa98",
"queryName": "CloudTrail Multi Region Disabled",
"severity": "MEDIUM",
"category": "Logging",
"descriptionText": "Check if MultiRegion is Enabled",
"descriptionUrl": "https://docs.ansible.com/ansible/latest/collections/community/aws/cloudtrail_module.html#parameter-is_multi_region_trail"
"id": "6ad087d7-a509-4b20-b853-9ef6f5ebaa98",
"queryName": "CloudTrail Multi Region Disabled",
"severity": "MEDIUM",
"category": "Logging",
"descriptionText": "Check if MultiRegion is Enabled",
"descriptionUrl": "https://docs.ansible.com/ansible/latest/collections/community/aws/cloudtrail_module.html#parameter-is_multi_region_trail",
"platform": "Ansible"
}
Loading

0 comments on commit e333ff8

Please sign in to comment.