From e72ac4b72ab1898b7bfb032940165b69e974fe91 Mon Sep 17 00:00:00 2001 From: misterpantz Date: Tue, 5 Nov 2024 13:43:51 -0800 Subject: [PATCH] undo one change --- docs/platform/infra/supply/cicd/aws-codebuild.bak | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/platform/infra/supply/cicd/aws-codebuild.bak b/docs/platform/infra/supply/cicd/aws-codebuild.bak index f90a93949..3dfab6e64 100644 --- a/docs/platform/infra/supply/cicd/aws-codebuild.bak +++ b/docs/platform/infra/supply/cicd/aws-codebuild.bak @@ -67,6 +67,6 @@ You can see the vulnerability report as part of the CI/CD job. Also, it is easy to see the result in your Mondoo Console: -![See report in Mondoo Console](/img/platform/infra/aws/mondoo-cicd-awscodebuild-result-spaces.png) +![See report in Mondoo Console](/img/platform/infra/aws/mondoo-cicd-awscodebuild-result-dashboard.png) Note: We prefer to store the agent credentials as secrets. By default, AWS CodeBuild supports retrieving values for environment variables via plaintext and AWS Parameter Store. It also allows the use of AWS Secrets Manager to pass secrets via [AWS Parameter Store into the pipeline](https://docs.aws.amazon.com/systems-manager/latest/userguide/integration-ps-secretsmanager.html). Please be aware that AWS Secrets Manager comes with an additional cost per secret.