Infrastructure Drift Detection #234
infrastructure-drift-detection.yml
on: schedule
Security Compliance Check
30s
Cost Analysis
11s
Backup Verification
6s
Disaster Recovery Test
0s
Matrix: Detect Infrastructure Drift
Annotations
16 errors and 3 warnings
Backup Verification
Process completed with exit code 2.
|
Cost Analysis
Process completed with exit code 1.
|
Security Compliance Check
Resource not accessible by integration
|
Security Compliance Check
CodeQL Action major versions v1 and v2 have been deprecated. Please update all occurrences of the CodeQL Action in your workflow files to v3. For more information, see https://github.blog/changelog/2025-01-10-code-scanning-codeql-action-v2-is-now-deprecated/
|
Security Compliance Check
CKV_AWS_382: "Ensure no security groups allow egress from 0.0.0.0:0 to port -1"
|
Security Compliance Check
CKV_AWS_23: "Ensure every security group and rule has a description"
|
Security Compliance Check
CKV_AWS_338: "Ensure CloudWatch log groups retains logs for at least 1 year"
|
Security Compliance Check
CKV_AWS_158: "Ensure that CloudWatch Log Group is encrypted by KMS"
|
Security Compliance Check
CKV_AWS_39: "Ensure Amazon EKS public endpoint disabled"
|
Security Compliance Check
CKV_AWS_38: "Ensure Amazon EKS public endpoint not accessible to 0.0.0.0/0"
|
Security Compliance Check
CKV_AWS_337: "Ensure SSM parameters are using KMS CMK"
|
Security Compliance Check
CKV_AWS_337: "Ensure SSM parameters are using KMS CMK"
|
Security Compliance Check
CKV_AWS_338: "Ensure CloudWatch log groups retains logs for at least 1 year"
|
Security Compliance Check
CKV_AWS_158: "Ensure that CloudWatch Log Group is encrypted by KMS"
|
Detect Infrastructure Drift
Process completed with exit code 1.
|
Detect Infrastructure Drift
Terraform exited with code 1.
|
Security Compliance Check
Resource not accessible by integration
|
Security Compliance Check
Resource not accessible by integration
|
Security Compliance Check
Resource not accessible by integration
|