Skip to content

Commit 78a06f5

Browse files
committed
Revert "more fixes"
This reverts commit db493de.
1 parent db493de commit 78a06f5

File tree

1 file changed

+13
-13
lines changed

1 file changed

+13
-13
lines changed

tests/common/test_platform_integration.py

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -62,12 +62,12 @@ def test_metadata_bc_key(self):
6262
metadata_integration.pre_scan()
6363
check_same_severity = tf_registry.get_check_by_id('CKV_AWS_15')
6464
check_different_severity = tf_registry.get_check_by_id('CKV_AWS_40')
65-
check_no_desc_title = tf_registry.get_check_by_id('CKV_AWS_53')
65+
check_no_desc_title = tf_registry.get_check_by_id('CKV_AWS_19')
6666

6767
self.assertEqual(check_same_severity.name, 'Ensure IAM password policy requires at least one uppercase letter')
6868
self.assertEqual(check_same_severity.severity, Severities[BcSeverities.MEDIUM])
6969
self.assertEqual(check_different_severity.severity, Severities[BcSeverities.CRITICAL])
70-
self.assertEqual(check_no_desc_title.severity, Severities[BcSeverities.MEDIUM])
70+
self.assertEqual(check_no_desc_title.severity, Severities[BcSeverities.HIGH])
7171

7272
def test_metadata_prisma_key(self):
7373
instance = BcPlatformIntegration()
@@ -78,11 +78,11 @@ def test_metadata_prisma_key(self):
7878
metadata_integration.pre_scan()
7979
check_same_severity = tf_registry.get_check_by_id('CKV_AWS_15')
8080
check_different_severity = tf_registry.get_check_by_id('CKV_AWS_40')
81-
check_no_desc_title = tf_registry.get_check_by_id('CKV_AWS_53')
81+
check_no_desc_title = tf_registry.get_check_by_id('CKV_AWS_19')
8282

8383
self.assertEqual(check_same_severity.name, 'AWS IAM password policy does not have an uppercase character')
8484
self.assertEqual(check_different_severity.name, 'AWS IAM policy attached to users')
85-
self.assertEqual(check_no_desc_title.name, 'Ensure S3 bucket has block public ACLS enabled')
85+
self.assertEqual(check_no_desc_title.name, 'Ensure all data stored in the S3 bucket is securely encrypted at rest')
8686
self.assertEqual(check_same_severity.severity, Severities[BcSeverities.MEDIUM])
8787
self.assertEqual(check_different_severity.severity, Severities[BcSeverities.HIGH])
8888
self.assertEqual(check_different_severity.severity, Severities[BcSeverities.HIGH])
@@ -129,19 +129,19 @@ def mock_customer_run_config():
129129
],
130130
"benchmarks": {}
131131
},
132-
"CKV_AWS_53": {
133-
"id": "BC_AWS_S3_19",
134-
"title": "Ensure S3 bucket has block public ACLS enabled",
135-
"guideline": "https://docs.bridgecrew.io/docs/bc_aws_s3_19",
136-
"severity": "MEDIUM",
132+
"CKV_AWS_19": {
133+
"id": "BC_AWS_S3_14",
134+
"title": "Ensure all data stored in the S3 bucket is securely encrypted at rest",
135+
"guideline": "https://docs.bridgecrew.io/docs/s3_14-data-encrypted-at-rest",
136+
"severity": "HIGH",
137137
"pcSeverity": None,
138138
"category": "Storage",
139-
"checkovId": "CKV_AWS_53",
140-
"constructiveTitle": "Ensure S3 bucket has block public ACLS enabled",
139+
"checkovId": "CKV_AWS_19",
140+
"constructiveTitle": "Ensure data stored in the S3 bucket is securely encrypted at rest",
141141
"descriptiveTitle": None,
142-
"pcPolicyId": "34064d53-1fd1-42e6-b075-45dce495caca",
142+
"pcPolicyId": "7913fcbf-b679-5aac-d979-1b6817becb22",
143143
"additionalPcPolicyIds": [
144-
"34064d53-1fd1-42e6-b075-45dce495caca"
144+
"7913fcbf-b679-5aac-d979-1b6817becb22"
145145
],
146146
"benchmarks": {}
147147
}

0 commit comments

Comments
 (0)