@@ -62,12 +62,12 @@ def test_metadata_bc_key(self):
62
62
metadata_integration .pre_scan ()
63
63
check_same_severity = tf_registry .get_check_by_id ('CKV_AWS_15' )
64
64
check_different_severity = tf_registry .get_check_by_id ('CKV_AWS_40' )
65
- check_no_desc_title = tf_registry .get_check_by_id ('CKV_AWS_53 ' )
65
+ check_no_desc_title = tf_registry .get_check_by_id ('CKV_AWS_19 ' )
66
66
67
67
self .assertEqual (check_same_severity .name , 'Ensure IAM password policy requires at least one uppercase letter' )
68
68
self .assertEqual (check_same_severity .severity , Severities [BcSeverities .MEDIUM ])
69
69
self .assertEqual (check_different_severity .severity , Severities [BcSeverities .CRITICAL ])
70
- self .assertEqual (check_no_desc_title .severity , Severities [BcSeverities .MEDIUM ])
70
+ self .assertEqual (check_no_desc_title .severity , Severities [BcSeverities .HIGH ])
71
71
72
72
def test_metadata_prisma_key (self ):
73
73
instance = BcPlatformIntegration ()
@@ -78,11 +78,11 @@ def test_metadata_prisma_key(self):
78
78
metadata_integration .pre_scan ()
79
79
check_same_severity = tf_registry .get_check_by_id ('CKV_AWS_15' )
80
80
check_different_severity = tf_registry .get_check_by_id ('CKV_AWS_40' )
81
- check_no_desc_title = tf_registry .get_check_by_id ('CKV_AWS_53 ' )
81
+ check_no_desc_title = tf_registry .get_check_by_id ('CKV_AWS_19 ' )
82
82
83
83
self .assertEqual (check_same_severity .name , 'AWS IAM password policy does not have an uppercase character' )
84
84
self .assertEqual (check_different_severity .name , 'AWS IAM policy attached to users' )
85
- self .assertEqual (check_no_desc_title .name , 'Ensure S3 bucket has block public ACLS enabled ' )
85
+ self .assertEqual (check_no_desc_title .name , 'Ensure all data stored in the S3 bucket is securely encrypted at rest ' )
86
86
self .assertEqual (check_same_severity .severity , Severities [BcSeverities .MEDIUM ])
87
87
self .assertEqual (check_different_severity .severity , Severities [BcSeverities .HIGH ])
88
88
self .assertEqual (check_different_severity .severity , Severities [BcSeverities .HIGH ])
@@ -129,19 +129,19 @@ def mock_customer_run_config():
129
129
],
130
130
"benchmarks" : {}
131
131
},
132
- "CKV_AWS_53 " : {
133
- "id" : "BC_AWS_S3_19 " ,
134
- "title" : "Ensure S3 bucket has block public ACLS enabled " ,
135
- "guideline" : "https://docs.bridgecrew.io/docs/bc_aws_s3_19 " ,
136
- "severity" : "MEDIUM " ,
132
+ "CKV_AWS_19 " : {
133
+ "id" : "BC_AWS_S3_14 " ,
134
+ "title" : "Ensure all data stored in the S3 bucket is securely encrypted at rest " ,
135
+ "guideline" : "https://docs.bridgecrew.io/docs/s3_14-data-encrypted-at-rest " ,
136
+ "severity" : "HIGH " ,
137
137
"pcSeverity" : None ,
138
138
"category" : "Storage" ,
139
- "checkovId" : "CKV_AWS_53 " ,
140
- "constructiveTitle" : "Ensure S3 bucket has block public ACLS enabled " ,
139
+ "checkovId" : "CKV_AWS_19 " ,
140
+ "constructiveTitle" : "Ensure data stored in the S3 bucket is securely encrypted at rest " ,
141
141
"descriptiveTitle" : None ,
142
- "pcPolicyId" : "34064d53-1fd1-42e6-b075-45dce495caca " ,
142
+ "pcPolicyId" : "7913fcbf-b679-5aac-d979-1b6817becb22 " ,
143
143
"additionalPcPolicyIds" : [
144
- "34064d53-1fd1-42e6-b075-45dce495caca "
144
+ "7913fcbf-b679-5aac-d979-1b6817becb22 "
145
145
],
146
146
"benchmarks" : {}
147
147
}
0 commit comments