Skip to main content

Terraform

In this section, you will find a list of the rules associated with the Terraform platform.

MethodSecurity Requirement
CHECK_REQUIRED_VERSION266. Disable insecure functionalities
EC2_DEFAULT_SEC_GROUP266. Disable insecure functionalities
EC2_NOT_TERMINATION_PROTEC186. Use the principle of least privilege
265. Restrict access to critical processes
EC2_TERMINATE_SHUTDOWN_BEHAVIOR266. Disable insecure functionalities
TFM_ADMIN_MANAGED_POLICIES095. Define users with privileges
096. Set user's required privileges
186. Use the principle of least privilege
TFM_ADMIN_POLICY095. Define users with privileges
096. Set user's required privileges
186. Use the principle of least privilege
TFM_ALLOWS_PRIV_ESCALATION_BY_ATTACH_POLICY035. Manage privilege modifications
TFM_ALLOWS_PRIV_ESCALATION_BY_POLICIES_VERSIONS035. Manage privilege modifications
TFM_ANYONE_ADMIN_PORTS255. Allow access only to the necessary ports
TFM_API_ALL_HTTP_METHODS_ENABLED266. Disable insecure functionalities
TFM_API_GATEWAY_LOGGING_DISABLED075. Record exceptional events in logs
079. Record exact occurrence time of events
376. Register severity level
TFM_AWS_ACL_BROAD_NETWORK_ACCESS255. Allow access only to the necessary ports
TFM_AWS_EBS_VOLUMES_UNENCRYPTED185. Encrypt sensitive information
300. Mask sensitive data
TFM_AWS_EC2_ALL_TRAFFIC255. Allow access only to the necessary ports
TFM_AWS_EC2_CFN_UNRESTR_IP_PROT255. Allow access only to the necessary ports
TFM_AWS_EC2_UNRESTRICTED_CIDRS255. Allow access only to the necessary ports
TFM_AWS_EFS_UNENCRYPTED185. Encrypt sensitive information
300. Mask sensitive data
TFM_AWS_ELB_LISTENER_ON_HTTP181. Transmit data using secure protocols
TFM_AWS_ELB_WITHOUT_SSLPOLICY148. Set minimum size of asymmetric encryption
149. Set minimum size of symmetric encryption
150. Set minimum size for hash functions
181. Transmit data using secure protocols
336. Disable insecure TLS versions
TFM_AWS_INSEC_PROTO148. Set minimum size of asymmetric encryption
149. Set minimum size of symmetric encryption
150. Set minimum size for hash functions
181. Transmit data using secure protocols
336. Disable insecure TLS versions
TFM_AWS_SEC_GROUP_USING_TCP181. Transmit data using secure protocols
TFM_AZURE_APP_LOG_DISABLED075. Record exceptional events in logs
376. Register severity level
377. Store logs based on valid regulation
378. Use of log management system
TFM_AZURE_CLIENT_CERT_ENABLED227. Display access notification
228. Authenticate using standard protocols
229. Request access credentials
231. Implement a biometric verification component
235. Define credential interface
264. Request authentication
323. Exclude unverifiable files
TFM_AZURE_INSEC_PROTO148. Set minimum size of asymmetric encryption
149. Set minimum size of symmetric encryption
150. Set minimum size for hash functions
181. Transmit data using secure protocols
336. Disable insecure TLS versions
TFM_AZURE_KEY_VAULT_NOT_RECOVER186. Use the principle of least privilege
265. Restrict access to critical processes
TFM_AZURE_KV_DANGER_BYPASS255. Allow access only to the necessary ports
TFM_AZURE_KV_DEFAULT_ACCESS255. Allow access only to the necessary ports
TFM_AZURE_KV_ONLY_ACCESS_HTTPS181. Transmit data using secure protocols
TFM_AZURE_KV_SECRET_NO_EXPIRATION130. Limit password lifespan
138. Define lifespan for temporary passwords
140. Define OTP lifespan
TFM_AZURE_LNX_VM_INSEC_AUTH030. Avoid object reutilization
228. Authenticate using standard protocols
319. Make authentication options equally secure
TFM_AZURE_SA_DEFAULT_ACCESS255. Allow access only to the necessary ports
TFM_AZURE_SA_INSEC_TRANSFER181. Transmit data using secure protocols
TFM_AZURE_SQL_LOG_RETENT075. Record exceptional events in logs
376. Register severity level
377. Store logs based on valid regulation
378. Use of log management system
TFM_AZURE_STORAGE_LOG_DISABLED075. Record exceptional events in logs
376. Register severity level
377. Store logs based on valid regulation
378. Use of log management system
TFM_AZURE_UNRESTRICTED_ACCESS255. Allow access only to the necessary ports
TFM_AZURE_VM_INSEC_AUTH030. Avoid object reutilization
228. Authenticate using standard protocols
319. Make authentication options equally secure
TFM_BUCKET_ALLOWS_PUBLIC095. Define users with privileges
096. Set user's required privileges
186. Use the principle of least privilege
TFM_BUCKET_POLICY_SEC_TRANSPORT181. Transmit data using secure protocols
TFM_CF_DISTR_LOG_DISABLED075. Record exceptional events in logs
376. Register severity level
377. Store logs based on valid regulation
378. Use of log management system
TFM_COGNITO_HAS_MFA_DISABLED229. Request access credentials
231. Implement a biometric verification component
264. Request authentication
319. Make authentication options equally secure
328. Request MFA for critical systems
TFM_CONTENT_HTTP181. Transmit data using secure protocols
TFM_CTRAIL_LOG_NOT_VALIDATED080. Prevent log modification
TFM_DB_NO_POINT_TIME_RECOVERY186. Use the principle of least privilege
265. Restrict access to critical processes
TFM_DYNAMO_NOT_DEL_PROTEC186. Use the principle of least privilege
265. Restrict access to critical processes
TFM_EBS_UNENCRYPTED_DEFAULT266. Disable insecure functionalities
TFM_EBS_UNENCRYPTED_VOLUMES266. Disable insecure functionalities
TFM_EC2_ASSOC_PUB_IP266. Disable insecure functionalities
TFM_EC2_NO_IAM266. Disable insecure functionalities
TFM_EC2_OPEN_ALL_PORTS_PUBLIC255. Allow access only to the necessary ports
TFM_EC2_SEC_GROUPS_RFC1918255. Allow access only to the necessary ports
TFM_EC2_UNENCRYPTED_BLOCK_DEVICES266. Disable insecure functionalities
TFM_EC2_UNRESTRICTED_DNS255. Allow access only to the necessary ports
TFM_EC2_UNRESTRICTED_FTP255. Allow access only to the necessary ports
TFM_EC2_UNRESTRICTED_PORTS255. Allow access only to the necessary ports
TFM_EKS_HAS_ENDPOINTS_PUBLICLY_ACCESSIBLE185. Encrypt sensitive information
265. Restrict access to critical processes
266. Disable insecure functionalities
TFM_ELASTICACHE_TRANSIT_ENCRYPTION_DISABLED185. Encrypt sensitive information
265. Restrict access to critical processes
266. Disable insecure functionalities
TFM_ELASTICACHE_USES_DEFAULT_PORT185. Encrypt sensitive information
265. Restrict access to critical processes
266. Disable insecure functionalities
TFM_ELB2_INSECURE_SEC_POLICY266. Disable insecure functionalities
TFM_ELB2_INSEC_PROTO181. Transmit data using secure protocols
TFM_ELB2_NOT_DELETION_PROTEC186. Use the principle of least privilege
265. Restrict access to critical processes
TFM_ELB_LOGGING_DISABLED075. Record exceptional events in logs
376. Register severity level
377. Store logs based on valid regulation
378. Use of log management system
TFM_HTTP_METHODS_ENABLED266. Disable insecure functionalities
TFM_IAM_EXCESSIVE_ROLE_POLICY095. Define users with privileges
096. Set user's required privileges
186. Use the principle of least privilege
TFM_IAM_FULL_ACCESS_SSM095. Define users with privileges
096. Set user's required privileges
186. Use the principle of least privilege
TFM_IAM_MISSING_SECURITY095. Define users with privileges
096. Set user's required privileges
186. Use the principle of least privilege
TFM_IAM_PERMISSIONS_POLICY_NOT_ACTION185. Encrypt sensitive information
265. Restrict access to critical processes
266. Disable insecure functionalities
TFM_IAM_PERMISSIONS_POLICY_NOT_RESOURCE185. Encrypt sensitive information
265. Restrict access to critical processes
266. Disable insecure functionalities
TFM_IAM_POLICY_APPLY_TO_USERS185. Encrypt sensitive information
265. Restrict access to critical processes
266. Disable insecure functionalities
TFM_IAM_TRUST_POLICY_NOT_ACTION185. Encrypt sensitive information
265. Restrict access to critical processes
266. Disable insecure functionalities
TFM_IAM_TRUST_POLICY_NOT_PRINCIPAL185. Encrypt sensitive information
265. Restrict access to critical processes
266. Disable insecure functionalities
TFM_IAM_TRUST_POLICY_WILDCARD_ACTION095. Define users with privileges
096. Set user's required privileges
186. Use the principle of least privilege
TFM_IAM_WILDCARD_WRITE095. Define users with privileges
096. Set user's required privileges
186. Use the principle of least privilege
TFM_INST_WITHOUT_PROFILE255. Allow access only to the necessary ports
TFM_KMS_KEY_ROTATION_DISABLED266. Disable insecure functionalities
TFM_KMS_MASTER_KEYS_EXPOSED095. Define users with privileges
096. Set user's required privileges
186. Use the principle of least privilege
TFM_NEGATIVE_STATEMENT095. Define users with privileges
096. Set user's required privileges
186. Use the principle of least privilege
TFM_PERMISSIVE_POLICY095. Define users with privileges
096. Set user's required privileges
186. Use the principle of least privilege
TFM_POLICY_SERVER_ENCRYP_DISABLED134. Store passwords with salt
135. Passwords with random salt
185. Encrypt sensitive information
227. Display access notification
229. Request access credentials
264. Request authentication
300. Mask sensitive data
TFM_PUBLIC_BUCKETS_ACL096. Set user's required privileges
176. Restrict system objects
264. Request authentication
320. Avoid client-side control enforcement
TFM_RDS_INSIDE_SUBNET255. Allow access only to the necessary ports
TFM_RDS_NOT_AUTO_BACKUPS186. Use the principle of least privilege
265. Restrict access to critical processes
TFM_RDS_NOT_USES_IAM_AUTHENTICATION185. Encrypt sensitive information
265. Restrict access to critical processes
266. Disable insecure functionalities
TFM_RDS_NO_DELETION_PROTEC186. Use the principle of least privilege
265. Restrict access to critical processes
TFM_RDS_PUB_ACCESSIBLE096. Set user's required privileges
176. Restrict system objects
265. Restrict access to critical processes
TFM_RDS_UNENCRYPTED_STORAGE134. Store passwords with salt
135. Passwords with random salt
185. Encrypt sensitive information
229. Request access credentials
264. Request authentication
300. Mask sensitive data
TFM_REDSHIFT_HAS_AUDIT_LOGS_DISABLED075. Record exceptional events in logs
376. Register severity level
377. Store logs based on valid regulation
378. Use of log management system
TFM_REDSHIFT_HAS_ENCRYPTION_DISABLED185. Encrypt sensitive information
300. Mask sensitive data
TFM_REDSHIFT_HAS_PUBLIC_CLUSTERS185. Encrypt sensitive information
265. Restrict access to critical processes
266. Disable insecure functionalities
TFM_REDSHIFT_HAS_USER_ACTIVITY_LOG_DISABLED075. Record exceptional events in logs
376. Register severity level
377. Store logs based on valid regulation
378. Use of log management system
TFM_REDSHIFT_NOT_REQUIRES_SSL185. Encrypt sensitive information
265. Restrict access to critical processes
266. Disable insecure functionalities
TFM_S3_BUCKETS_ALLOW_UNAUTHORIZED_PUBLIC_ACCESS096. Set user's required privileges
176. Restrict system objects
264. Request authentication
320. Avoid client-side control enforcement
TFM_S3_VERSIONING_DISABLED266. Disable insecure functionalities
TFM_SNS_HAS_SERVER_SIDE_ENCRYPTION_DISABLED185. Encrypt sensitive information
265. Restrict access to critical processes
266. Disable insecure functionalities
TFM_SQS_HAS_ENCRYPTION_DISABLED185. Encrypt sensitive information
265. Restrict access to critical processes
266. Disable insecure functionalities
TFM_SQS_IS_PUBLIC095. Define users with privileges
096. Set user's required privileges
186. Use the principle of least privilege
TFM_TRAILS_NOT_MULTIREGION075. Record exceptional events in logs
376. Register severity level
377. Store logs based on valid regulation
378. Use of log management system