feat(misconf): Improve AVD-AWS-0126 behavior when cloudfront_default_certificate is set to true #5197
Labels
kind/feature
Categorizes issue or PR as related to a new feature.
scan/misconfiguration
Issues relating to misconfiguration scanning
Discussed in #5192
Originally posted by obounaim September 14, 2023
Description
The Trivy IaC scanner reports a HIGH severity finding suggesting my AWS CloudFront distribution allows unencrypted communications due to outdated SSL policies when using the default CloudFront SSL/TLS certificate.
Desired Behavior
According to the terraform documentation when the
cloudfront_default_certificate
is set to true, the argument minimum_protocol_version is not supportedActual Behavior
The title of the finding is "HIGH: Distribution allows unencrypted communications" However the links and code snippet are referring to CloudFront distribution uses outdated SSL/TLS protocols
Reproduction Steps
Target
AWS
Scanner
Misconfiguration
Output Format
None
Mode
None
Debug Output
Operating System
Linux
Version
Checklist
trivy image --reset
The text was updated successfully, but these errors were encountered: