chore: switch to ID from AVDID in internal and user-facing fields (#9655)

Signed-off-by: nikpivkin <nikita.pivkin@smartforce.io>
This commit is contained in:
Nikita Pivkin
2026-01-13 13:58:01 +06:00
committed by GitHub
parent 6462dc8a58
commit f0e23ead66
11 changed files with 46 additions and 50 deletions

View File

@@ -161,7 +161,7 @@
},
{
"Type": "Terraform Security Check",
"ID": "s3-bucket-logging",
"ID": "AVD-AWS-0089",
"AVDID": "AVD-AWS-0089",
"Title": "S3 Bucket Logging",
"Description": "Ensures S3 bucket logging is enabled for S3 buckets",
@@ -170,11 +170,11 @@
"Query": "data.builtin.aws.s3.aws0089.deny",
"Resolution": "Add a logging block to the resource to enable access logging",
"Severity": "LOW",
"PrimaryURL": "https://avd.aquasec.com/misconfig/s3-bucket-logging",
"PrimaryURL": "https://avd.aquasec.com/misconfig/avd-aws-0089",
"References": [
"https://docs.aws.amazon.com/AmazonS3/latest/userguide/ServerLogs.html",
"https://docs.aws.amazon.com/AmazonS3/latest/userguide/enable-server-access-logging.html",
"https://avd.aquasec.com/misconfig/s3-bucket-logging"
"https://avd.aquasec.com/misconfig/avd-aws-0089"
],
"Status": "FAIL",
"CauseMetadata": {

View File

@@ -169,7 +169,7 @@
},
{
"Type": "Terraform Security Check",
"ID": "s3-bucket-logging",
"ID": "AVD-AWS-0089",
"AVDID": "AVD-AWS-0089",
"Title": "S3 Bucket Logging",
"Description": "Ensures S3 bucket logging is enabled for S3 buckets",
@@ -178,11 +178,11 @@
"Query": "data.builtin.aws.s3.aws0089.deny",
"Resolution": "Add a logging block to the resource to enable access logging",
"Severity": "LOW",
"PrimaryURL": "https://avd.aquasec.com/misconfig/s3-bucket-logging",
"PrimaryURL": "https://avd.aquasec.com/misconfig/avd-aws-0089",
"References": [
"https://docs.aws.amazon.com/AmazonS3/latest/userguide/ServerLogs.html",
"https://docs.aws.amazon.com/AmazonS3/latest/userguide/enable-server-access-logging.html",
"https://avd.aquasec.com/misconfig/s3-bucket-logging"
"https://avd.aquasec.com/misconfig/avd-aws-0089"
],
"Status": "FAIL",
"CauseMetadata": {

View File

@@ -161,7 +161,7 @@
},
{
"Type": "Terraform Security Check",
"ID": "s3-bucket-logging",
"ID": "AVD-AWS-0089",
"AVDID": "AVD-AWS-0089",
"Title": "S3 Bucket Logging",
"Description": "Ensures S3 bucket logging is enabled for S3 buckets",
@@ -170,11 +170,11 @@
"Query": "data.builtin.aws.s3.aws0089.deny",
"Resolution": "Add a logging block to the resource to enable access logging",
"Severity": "LOW",
"PrimaryURL": "https://avd.aquasec.com/misconfig/s3-bucket-logging",
"PrimaryURL": "https://avd.aquasec.com/misconfig/avd-aws-0089",
"References": [
"https://docs.aws.amazon.com/AmazonS3/latest/userguide/ServerLogs.html",
"https://docs.aws.amazon.com/AmazonS3/latest/userguide/enable-server-access-logging.html",
"https://avd.aquasec.com/misconfig/s3-bucket-logging"
"https://avd.aquasec.com/misconfig/avd-aws-0089"
],
"Status": "FAIL",
"CauseMetadata": {

View File

@@ -25,7 +25,7 @@
"Misconfigurations": [
{
"Type": "Terraform Security Check",
"ID": "aws-vpc-no-public-egress-sgr",
"ID": "AVD-AWS-0104",
"AVDID": "AVD-AWS-0104",
"Title": "A security group rule should not allow unrestricted egress to any IP address.",
"Description": "Opening up ports to connect out to the public internet is generally to be avoided. You should restrict access to IP addresses or ranges that are explicitly required where possible.\n",
@@ -34,10 +34,10 @@
"Query": "data.builtin.aws.ec2.aws0104.deny",
"Resolution": "Set a more restrictive cidr range",
"Severity": "CRITICAL",
"PrimaryURL": "https://avd.aquasec.com/misconfig/aws-vpc-no-public-egress-sgr",
"PrimaryURL": "https://avd.aquasec.com/misconfig/avd-aws-0104",
"References": [
"https://docs.aws.amazon.com/whitepapers/latest/building-scalable-secure-multi-vpc-network-infrastructure/centralized-egress-to-internet.html",
"https://avd.aquasec.com/misconfig/aws-vpc-no-public-egress-sgr"
"https://avd.aquasec.com/misconfig/avd-aws-0104"
],
"Status": "FAIL",
"CauseMetadata": {
@@ -124,7 +124,7 @@
},
{
"Type": "Terraform Security Check",
"ID": "aws-vpc-add-description-to-security-group-rule",
"ID": "AVD-AWS-0124",
"AVDID": "AVD-AWS-0124",
"Title": "Missing description for security group rule.",
"Description": "Security group rules should include a description for auditing purposes.\n\nSimplifies auditing, debugging, and managing security groups.\n",
@@ -133,10 +133,10 @@
"Query": "data.builtin.aws.ec2.aws0124.deny",
"Resolution": "Add descriptions for all security groups rules",
"Severity": "LOW",
"PrimaryURL": "https://avd.aquasec.com/misconfig/aws-vpc-add-description-to-security-group-rule",
"PrimaryURL": "https://avd.aquasec.com/misconfig/avd-aws-0124",
"References": [
"https://www.cloudconformity.com/knowledge-base/aws/EC2/security-group-rules-description.html",
"https://avd.aquasec.com/misconfig/aws-vpc-add-description-to-security-group-rule"
"https://avd.aquasec.com/misconfig/avd-aws-0124"
],
"Status": "FAIL",
"CauseMetadata": {

View File

@@ -161,7 +161,7 @@
},
{
"Type": "Terraform Security Check",
"ID": "s3-bucket-logging",
"ID": "AVD-AWS-0089",
"AVDID": "AVD-AWS-0089",
"Title": "S3 Bucket Logging",
"Description": "Ensures S3 bucket logging is enabled for S3 buckets",
@@ -170,11 +170,11 @@
"Query": "data.builtin.aws.s3.aws0089.deny",
"Resolution": "Add a logging block to the resource to enable access logging",
"Severity": "LOW",
"PrimaryURL": "https://avd.aquasec.com/misconfig/s3-bucket-logging",
"PrimaryURL": "https://avd.aquasec.com/misconfig/avd-aws-0089",
"References": [
"https://docs.aws.amazon.com/AmazonS3/latest/userguide/ServerLogs.html",
"https://docs.aws.amazon.com/AmazonS3/latest/userguide/enable-server-access-logging.html",
"https://avd.aquasec.com/misconfig/s3-bucket-logging"
"https://avd.aquasec.com/misconfig/avd-aws-0089"
],
"Status": "FAIL",
"CauseMetadata": {