CtrlK
BlogDocsLog inGet started
Tessl Logo

pantheon-ai/terraform-toolkit

Complete terraform toolkit with generation and validation capabilities

93

Quality

93%

Does it follow best practices?

Impact

Pending

No eval scenarios have been run

SecuritybySnyk

Advisory

Suggest reviewing before use

Overview
Quality
Evals
Security
Files

task.mdvalidator/evals/scenario-1/

Document Security Findings for an Insecure Terraform Config

Problem/Feature Description

A security engineer at a fintech company is preparing a pre-deployment security review for a Terraform configuration that provisions AWS infrastructure. Checkov has already been run against the configuration and produced raw output, but the security engineer needs a properly structured findings report that can be handed off to the development team and used to track remediation.

The engineer needs you to take the raw Checkov output below and produce a properly formatted security findings document. Each finding should be documented clearly enough that a developer who has never used Checkov can understand what is wrong, where to find it, how severe it is, and exactly what change to make. The report should reference established best practices rather than just describing the raw tool output.

Output Specification

Produce a file called security_findings.md with one section per finding. Each finding should contain all information needed for a developer to understand and fix the issue.

Input Files

The following files are provided as inputs. Extract them before beginning.

=============== FILE: checkov_output.txt =============== Check: CKV_AWS_24: "Ensure no security groups allow ingress from 0.0.0.0:0 to port 22" FAILED for resource: aws_security_group.bastion File: /terraform/main.tf:12-45 Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-networking-policies/networking-1-port-security

Check: CKV_AWS_8: "Ensure all data stored in the Launch configuration EBS is securely encrypted" FAILED for resource: aws_launch_configuration.app File: /terraform/main.tf:50-70 Guide: https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/general-8

Check: CKV_AWS_20: "Ensure the S3 bucket has access control list (ACL) defined and is not public" FAILED for resource: aws_s3_bucket.uploads File: /terraform/storage.tf:5-15

Check: CKV_AWS_18: "Ensure the S3 bucket has access logging enabled" FAILED for resource: aws_s3_bucket.uploads File: /terraform/storage.tf:5-15

Check: CKV_AWS_53: "Ensure S3 bucket has block public ACLS enabled" FAILED for resource: aws_s3_bucket.uploads File: /terraform/storage.tf:5-15

Passed checks: 12, Failed checks: 5, Skipped checks: 0

=============== FILE: terraform/main.tf =============== resource "aws_security_group" "bastion" { name = "bastion-sg" description = "Bastion host security group" vpc_id = var.vpc_id

ingress { description = "SSH access" from_port = 22 to_port = 22 protocol = "tcp" cidr_blocks = ["0.0.0.0/0"] }

egress { from_port = 0 to_port = 0 protocol = "-1" cidr_blocks = ["0.0.0.0/0"] } }

resource "aws_launch_configuration" "app" { name_prefix = "app-" image_id = var.ami_id instance_type = "t3.medium"

root_block_device { volume_type = "gp2" volume_size = 20 }

lifecycle { create_before_destroy = true } }

=============== FILE: terraform/storage.tf =============== resource "aws_s3_bucket" "uploads" { bucket = "fintech-uploads-prod"

tags = { Environment = "production" } }

tile.json