Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

ci(deps): bump peter-evans/create-pull-request from 4 to 5 #6278

Closed
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
49 commits
Select commit Hold shift + click to select a range
86fcd60
Removing CIS descriptions related topics inside KICS repository
gabriel-cx Apr 14, 2023
89cb45d
comment for now the code that triggers the CIS descriptions request
gabriel-cx Apr 14, 2023
8f39b23
Removing CIS clarification from LICENSE
gabriel-cx Apr 17, 2023
538b3fd
update
gabriel-cx Apr 20, 2023
0154090
remove cis certifications info from documentation
gabriel-cx Apr 20, 2023
4bd81c9
Revert "remove cis certifications info from documentation"
gabriel-cx Apr 21, 2023
47cf07d
Revert "Revert "remove cis certifications info from documentation""
gabriel-cx Apr 21, 2023
37612b4
update certifications to previous certifications
gabriel-cx Apr 21, 2023
2a39181
removing 'partner' line
gabriel-cx Apr 21, 2023
ed9050c
Removing CIS code: Initial commit
gabriel-cx Apr 24, 2023
e45be94
CIS code removal: flags and naming
gabriel-cx Apr 24, 2023
ad9d9de
tests update
gabriel-cx Apr 26, 2023
489d274
Removing CIS code: Initial commit
gabriel-cx Apr 24, 2023
522ca69
CIS code removal: flags and naming
gabriel-cx Apr 24, 2023
669da2b
tests update
gabriel-cx Apr 26, 2023
d11c0b8
remove/rename description requests
cxMiguelSilva Apr 26, 2023
1832760
update reporting formats and test
cxMiguelSilva Apr 26, 2023
cb6e3c8
solve rebase conflicts
cxMiguelSilva Apr 26, 2023
545584b
fix e2e tests
cxMiguelSilva Apr 26, 2023
c1f8b6a
change e2e 31
cxMiguelSilva Apr 26, 2023
7098b3d
rename test to new cont
cxMiguelSilva Apr 26, 2023
7715c25
change package from descriptions to metrics
cxMiguelSilva Apr 27, 2023
75d6481
rename metrics flag
cxMiguelSilva Apr 27, 2023
9986655
update metrics in docs
cxMiguelSilva Apr 27, 2023
c72729a
update metrics in docs
cxMiguelSilva Apr 27, 2023
f44bacf
rollback flag name change
cxMiguelSilva Apr 27, 2023
33c7218
update disable metrics flag
cxMiguelSilva Apr 27, 2023
3430815
update log message
cxMiguelSilva Apr 27, 2023
9fd64ae
1.7.0 version info added
gabriel-cx Apr 27, 2023
f775ca5
REMOVE CIS REFERENCES
cxMiguelSilva Apr 28, 2023
4442985
REMOVE CIS REFERENCES
cxMiguelSilva Apr 28, 2023
d3b41a6
Merge branch 'remove_cis_related_code' of https://github.com/Checkmar…
cxMiguelSilva Apr 28, 2023
e6221e0
change metrics to telemetry
cxMiguelSilva Apr 28, 2023
0e64ea4
update flags.md
cxMiguelSilva Apr 28, 2023
837891e
update missing description
cxMiguelSilva Apr 28, 2023
ebc1ab8
Merge pull request #6322 from Checkmarx/feat/rename_metrics_flag
cxMiguelSilva Apr 28, 2023
98b7d8c
Merge branch 'remove_cis_descriptions_items' into remove_cis_related_…
cxMiguelSilva Apr 28, 2023
0ba3111
change package name from metrics to telemetry
cxMiguelSilva Apr 28, 2023
4c63caf
Merge pull request #6315 from Checkmarx/remove_cis_related_code
gabriel-cx Apr 28, 2023
63d266c
keeping previous lines flag
gabriel-cx Apr 28, 2023
c8344e7
add telemetry link
gabriel-cx Apr 28, 2023
45fddbe
comments for Codacy
gabriel-cx Apr 28, 2023
aee3465
fix linter errors
cxMiguelSilva Apr 28, 2023
264bb4f
fix unit tests
cxMiguelSilva Apr 28, 2023
4b1e2eb
Merge branch 'remove_cis_descriptions_items' into remove_cis_related_…
cxMiguelSilva Apr 28, 2023
25d8612
Merge pull request #6328 from Checkmarx/remove_cis_related_code
cxMiguelSilva Apr 28, 2023
a0b8595
fix e2e scan help order
cxMiguelSilva Apr 28, 2023
e41cc8a
Merge pull request #6301 from Checkmarx/remove_cis_descriptions_items
gabriel-cx Apr 28, 2023
1a6f754
ci(deps): bump peter-evans/create-pull-request from 4 to 5
dependabot[bot] Apr 28, 2023
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion .github/workflows/alert-update-terraform-modules.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ jobs:
-c assets/libraries/common.json \
-u https://registry.terraform.io/v1/modules
- name: Create Pull Request
uses: peter-evans/create-pull-request@v4
uses: peter-evans/create-pull-request@v5
with:
title: "feat(queries): update terraform registry data on commons.json"
token: ${{ secrets.KICS_BOT_PAT }}
Expand Down
2 changes: 1 addition & 1 deletion .github/workflows/go-ci-integration.yml
Original file line number Diff line number Diff line change
Expand Up @@ -52,7 +52,7 @@ jobs:
docker run -v ${PWD}/assets/queries:/path \
kics:${{ github.sha }} scan \
--silent \
--disable-full-descriptions \
--disable-telemetry \
--ignore-on-exit "results" \
--log-level DEBUG \
--log-path "/path/info.log" \
Expand Down
2 changes: 1 addition & 1 deletion .github/workflows/go-generate-antlr-parser.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ jobs:
run: |
docker run --rm -u $(id -u ${USER}):$(id -g ${USER}) -v $(pwd)/pkg/parser/jsonfilter:/work -it antlr4-generator:dev
- name: Create Pull Request
uses: peter-evans/create-pull-request@v4
uses: peter-evans/create-pull-request@v5
with:
title: "chore(parser): updating AWS jsonfilter ANTLR generated parser"
token: ${{ secrets.KICS_BOT_PAT }}
Expand Down
2 changes: 1 addition & 1 deletion .github/workflows/prepare-release.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@ jobs:
sed -E -i "s/(<p.*>)[0-9]{4}\.[0-9]{2}\.[0-9]{2}<p>/\1${{ steps.cdate.outputs.date }}<p>/" docs/index.md
sed -E -i "s/(<a.*href=\"https:\/\/github.com\/Checkmarx\/kics\/releases\/download\/).*(\/kics_).*(_[a-z]+_.*>)/\1v${{ github.event.inputs.version }}\2${{ github.event.inputs.version }}\3/g" docs/index.md
- name: Create pull request
uses: peter-evans/create-pull-request@v4
uses: peter-evans/create-pull-request@v5
with:
title: "docs: preparing for release ${{ github.event.inputs.version }}"
token: ${{ secrets.KICS_BOT_PAT }}
Expand Down
2 changes: 1 addition & 1 deletion .github/workflows/release-apispec.yml
Original file line number Diff line number Diff line change
Expand Up @@ -182,7 +182,7 @@ jobs:
pip install csvtomd
csvtomd docs/docker/apispec.csv > docs/docker/apispec.md
- name: Create Pull Request
uses: peter-evans/create-pull-request@v4
uses: peter-evans/create-pull-request@v5
with:
title: "docs(kicsbot): update images digest"
token: ${{ secrets.KICS_BOT_PAT }}
Expand Down
2 changes: 1 addition & 1 deletion .github/workflows/release-dkr-image.yml
Original file line number Diff line number Diff line change
Expand Up @@ -120,7 +120,7 @@ jobs:
pip install csvtomd
csvtomd docs/docker/digests.csv > docs/docker/digests.md
- name: Create Pull Request
uses: peter-evans/create-pull-request@v4
uses: peter-evans/create-pull-request@v5
with:
title: "docs(kicsbot): update images digest"
token: ${{ secrets.KICS_BOT_PAT }}
Expand Down
2 changes: 1 addition & 1 deletion .github/workflows/release-docker-github-actions.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -64,7 +64,7 @@ jobs:
pip install csvtomd
csvtomd docs/docker/digests.csv > docs/docker/digests.md
- name: Create Pull Request
uses: peter-evans/create-pull-request@v4
uses: peter-evans/create-pull-request@v5
with:
title: "docs(kicsbot): update images digest"
token: ${{ secrets.KICS_BOT_PAT }}
Expand Down
2 changes: 1 addition & 1 deletion .github/workflows/release-nightly.yml
Original file line number Diff line number Diff line change
Expand Up @@ -219,7 +219,7 @@ jobs:
pip install csvtomd
csvtomd docs/docker/nightly.csv > docs/docker/nightly.md
- name: Create Pull Request
uses: peter-evans/create-pull-request@v4
uses: peter-evans/create-pull-request@v5
with:
title: "docs(kicsbot): update images digest"
token: ${{ secrets.KICS_BOT_PAT }}
Expand Down
2 changes: 1 addition & 1 deletion .github/workflows/update-docs-queries.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -31,7 +31,7 @@ jobs:
-f md \
-t .github/scripts/docs-generator/templates
- name: Create Pull Request
uses: peter-evans/create-pull-request@v4
uses: peter-evans/create-pull-request@v5
with:
title: "docs(queries): update queries catalog"
token: ${{ secrets.KICS_BOT_PAT }}
Expand Down
2 changes: 1 addition & 1 deletion .github/workflows/update-install-script.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -50,7 +50,7 @@ jobs:
- name: Update install.sh
run: ./.bin/godownloader --repo Checkmarx/kics <(echo ${{ steps.outputs.filter.goreleaser }}) > install.sh
- name: Create Pull Request
uses: peter-evans/create-pull-request@v4
uses: peter-evans/create-pull-request@v5
with:
title: "chore(install): update install script"
token: ${{ secrets.KICS_BOT_PAT }}
Expand Down
2 changes: 1 addition & 1 deletion .github/workflows/update_software_versions.yml
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ jobs:
*.json
- name: Create pull request
if: steps.verify-changed-files.outputs.files_changed == 'true'
uses: peter-evans/create-pull-request@v4
uses: peter-evans/create-pull-request@v5
with:
title: "bump: updating software versions"
token: ${{ secrets.KICS_BOT_PAT }}
Expand Down
12 changes: 1 addition & 11 deletions LICENSE
Original file line number Diff line number Diff line change
Expand Up @@ -198,14 +198,4 @@
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.

It is clarified that the Apache License 2.0 shall not apply to any content
generated by KICS which is marked as being “Proprietary to CIS” (the “CIS
Proprietary Content”). The CIS Proprietary Content is exclusively owned by
the Center for Internet Security, Inc. and you are granted a limited,
non-exclusively, non-transferable, non-sublicensable license to view the
CIS Proprietary Content in connection with your use of KICS. You may not,
and may not permit others to modify, create derivative works of, reproduce,
publish, distribute, transfer, publicly display, resell, rent, lease,
sublicense, loan, or lend the CIS Proprietary Content to any third party.
limitations under the License.
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
"queryName": "Restart Policy On Failure Not Set To 5",
"severity": "MEDIUM",
"category": "Build Process",
"descriptionText": "Attribute 'restart:on-failure' should be set to 5. Restart policies in general should be used, and 5 retries is the recommended by CIS.",
"descriptionText": "Attribute 'restart:on-failure' should be set to 5. Restart policies in general should be used.",
"descriptionUrl": "https://docs.docker.com/config/containers/start-containers-automatically/#use-a-restart-policy",
"platform": "DockerCompose",
"descriptionID": "d21fff2e"
Expand Down
Original file line number Diff line number Diff line change
@@ -1,24 +1,24 @@
resource "aws_cloudwatch_log_metric_filter" "CIS_AWS_Config_Change_Metric_Filter" {
name = "CIS-AWSConfigChanges"
resource "aws_cloudwatch_log_metric_filter" "AWS_Config_Change_Metric_Filter" {
name = "AWSConfigChanges"
pattern = "{ ($.eventSource = \"config.amazonaws.com\") && (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) }"
log_group_name = aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup.name
log_group_name = aws_cloudwatch_log_group.CloudWatch_LogsGroup.name

metric_transformation {
name = "CIS-AWSConfigChanges"
namespace = "CIS_Metric_Alarm_Namespace"
name = "AWSConfigChanges"
namespace = "Metric_Alarm_Namespace"
value = "1"
}
}
resource "aws_cloudwatch_metric_alarm" "CIS_AWS_Config_Change_CW_Alarm" {
alarm_name = "CIS-3.9-AWSConfigChanges"
resource "aws_cloudwatch_metric_alarm" "AWS_Config_Change_CW_Alarm" {
alarm_name = "AWSConfigChanges"
comparison_operator = "GreaterThanOrEqualToThreshold"
evaluation_periods = "1"
metric_name = aws_cloudwatch_log_metric_filter.CIS_AWS_Config_Change_Metric_Filter.id
namespace = "CIS_Metric_Alarm_Namespace"
metric_name = aws_cloudwatch_log_metric_filter.AWS_Config_Change_Metric_Filter.id
namespace = "Metric_Alarm_Namespace"
period = "300"
statistic = "Sum"
threshold = "1"
alarm_description = "Monitoring changes to AWS Config configuration will help ensure sustained visibility of configuration items within the AWS account."
alarm_actions = [aws_sns_topic.CIS_Alerts_SNS_Topic.arn]
alarm_actions = [aws_sns_topic.Alerts_SNS_Topic.arn]
insufficient_data_actions = []
}
Original file line number Diff line number Diff line change
@@ -1,24 +1,24 @@
resource "aws_cloudwatch_log_metric_filter" "CIS_AWS_Config_Change_Metric_Filter" {
name = "CIS-AWSConfigChanges"
resource "aws_cloudwatch_log_metric_filter" "AWS_Config_Change_Metric_Filter" {
name = "AWSConfigChanges"
pattern = "{ ($.eventSource = \"config.amazonaws.com\") && (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) }"
log_group_name = aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup.name
log_group_name = aws_cloudwatch_log_group.CloudWatch_LogsGroup.name

metric_transformation {
name = "CIS-AWSConfigChanges"
namespace = "CIS_Metric_Alarm_Namespace"
name = "AWSConfigChanges"
namespace = "Metric_Alarm_Namespace"
value = "1"
}
}
resource "aws_cloudwatch_metric_alarm" "CIS_AWS_Config_Change_CW_Alarm" {
alarm_name = "CIS-3.9-AWSConfigChanges"
resource "aws_cloudwatch_metric_alarm" "AWS_Config_Change_CW_Alarm" {
alarm_name = "AWSConfigChanges"
comparison_operator = "GreaterThanOrEqualToThreshold"
evaluation_periods = "1"
metric_name = "XXXX NOT YOUR FILTER XXXX"
namespace = "CIS_Metric_Alarm_Namespace"
namespace = "Metric_Alarm_Namespace"
period = "300"
statistic = "Sum"
threshold = "1"
alarm_description = "Monitoring changes to AWS Config configuration will help ensure sustained visibility of configuration items within the AWS account."
alarm_actions = [aws_sns_topic.CIS_Alerts_SNS_Topic.arn]
alarm_actions = [aws_sns_topic.Alerts_SNS_Topic.arn]
insufficient_data_actions = []
}
Original file line number Diff line number Diff line change
@@ -1,25 +1,25 @@
resource "aws_cloudwatch_log_metric_filter" "cis_no_mfa_console_signin_metric_filter" {
name = "CIS-ConsoleSigninWithoutMFA"
resource "aws_cloudwatch_log_metric_filter" "no_mfa_console_signin_metric_filter" {
name = "ConsoleSigninWithoutMFA"
pattern = "{ ($.eventName = \"ConsoleLogin\") && ($.additionalEventData.MFAUsed != \"Yes\") }"
log_group_name = aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup.name
log_group_name = aws_cloudwatch_log_group.CloudWatch_LogsGroup.name

metric_transformation {
name = "CIS-ConsoleSigninWithoutMFA"
namespace = "CIS_Metric_Alarm_Namespace"
name = "ConsoleSigninWithoutMFA"
namespace = "Metric_Alarm_Namespace"
value = "1"
}
}

resource "aws_cloudwatch_metric_alarm" "cis_no_mfa_console_signin_cw_alarm" {
alarm_name = "CIS-3.2-ConsoleSigninWithoutMFA"
resource "aws_cloudwatch_metric_alarm" "no_mfa_console_signin_cw_alarm" {
alarm_name = "ConsoleSigninWithoutMFA"
comparison_operator = "GreaterThanOrEqualToThreshold"
evaluation_periods = "1"
metric_name = aws_cloudwatch_log_metric_filter.cis_no_mfa_console_signin_metric_filter.id
namespace = "CIS_Metric_Alarm_Namespace"
metric_name = aws_cloudwatch_log_metric_filter.no_mfa_console_signin_metric_filter.id
namespace = "Metric_Alarm_Namespace"
period = "300"
statistic = "Sum"
threshold = "1"
alarm_description = "Monitoring for single-factor console logins will increase visibility into accounts that are not protected by MFA."
alarm_actions = [aws_sns_topic.CIS_Alerts_SNS_Topic.arn]
alarm_actions = [aws_sns_topic.Alerts_SNS_Topic.arn]
insufficient_data_actions = []
}
Original file line number Diff line number Diff line change
@@ -1,24 +1,24 @@
resource "aws_cloudwatch_log_metric_filter" "CIS_AWS_Config_Change_Metric_Filter" {
name = "CIS-AWSConfigChanges"
resource "aws_cloudwatch_log_metric_filter" "AWS_Config_Change_Metric_Filter" {
name = "AWSConfigChanges"
pattern = "{ ($.eventSource = \"config.amazonaws.com\") && (($.eventName=StopConfigurationRecorder)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) }"
log_group_name = aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup.name
log_group_name = aws_cloudwatch_log_group.CloudWatch_LogsGroup.name

metric_transformation {
name = "CIS-AWSConfigChanges"
namespace = "CIS_Metric_Alarm_Namespace"
name = "AWSConfigChanges"
namespace = "Metric_Alarm_Namespace"
value = "1"
}
}
resource "aws_cloudwatch_metric_alarm" "CIS_AWS_Config_Change_CW_Alarm" {
alarm_name = "CIS-3.9-AWSConfigChanges"
resource "aws_cloudwatch_metric_alarm" "AWS_Config_Change_CW_Alarm" {
alarm_name = "AWSConfigChanges"
comparison_operator = "GreaterThanOrEqualToThreshold"
evaluation_periods = "1"
metric_name = "XXXX NOT YOUR FILTER XXXX"
namespace = "CIS_Metric_Alarm_Namespace"
namespace = "Metric_Alarm_Namespace"
period = "300"
statistic = "Sum"
threshold = "1"
alarm_description = "Monitoring changes to AWS Config configuration will help ensure sustained visibility of configuration items within the AWS account."
alarm_actions = [aws_sns_topic.CIS_Alerts_SNS_Topic.arn]
alarm_actions = [aws_sns_topic.Alerts_SNS_Topic.arn]
insufficient_data_actions = []
}
Original file line number Diff line number Diff line change
@@ -1,24 +1,24 @@
resource "aws_cloudwatch_log_metric_filter" "CIS_AWS_Config_Change_Metric_Filter" {
name = "CIS-AWSConfigChanges"
resource "aws_cloudwatch_log_metric_filter" "AWS_Config_Change_Metric_Filter" {
name = "AWSConfigChanges"
pattern = "{ ($.eventSource = \"config.amazonaws.com\") || (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) }"
log_group_name = aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup.name
log_group_name = aws_cloudwatch_log_group.CloudWatch_LogsGroup.name

metric_transformation {
name = "CIS-AWSConfigChanges"
namespace = "CIS_Metric_Alarm_Namespace"
name = "AWSConfigChanges"
namespace = "Metric_Alarm_Namespace"
value = "1"
}
}
resource "aws_cloudwatch_metric_alarm" "CIS_AWS_Config_Change_CW_Alarm" {
alarm_name = "CIS-3.9-AWSConfigChanges"
resource "aws_cloudwatch_metric_alarm" "AWS_Config_Change_CW_Alarm" {
alarm_name = "AWSConfigChanges"
comparison_operator = "GreaterThanOrEqualToThreshold"
evaluation_periods = "1"
metric_name = "XXXX NOT YOUR FILTER XXXX"
namespace = "CIS_Metric_Alarm_Namespace"
namespace = "Metric_Alarm_Namespace"
period = "300"
statistic = "Sum"
threshold = "1"
alarm_description = "Monitoring changes to AWS Config configuration will help ensure sustained visibility of configuration items within the AWS account."
alarm_actions = [aws_sns_topic.CIS_Alerts_SNS_Topic.arn]
alarm_actions = [aws_sns_topic.Alerts_SNS_Topic.arn]
insufficient_data_actions = []
}
Original file line number Diff line number Diff line change
Expand Up @@ -2,35 +2,35 @@ provider "aws" {
region = "us-east-2"
}

resource "aws_cloudwatch_log_group" "CIS_CloudWatch_LogsGroup" {
name = "CIS_CloudWatch_LogsGroup"
resource "aws_cloudwatch_log_group" "CloudWatch_LogsGroup" {
name = "CloudWatch_LogsGroup"
}

resource "aws_sns_topic" "cis_alerts_sns_topic" {
name = "cis-alerts-sns-topic"
resource "aws_sns_topic" "alerts_sns_topic" {
name = "alerts-sns-topic"
}

resource "aws_cloudwatch_metric_alarm" "cis_aws_organizations" {
alarm_name = "CIS-4.15-AWS-Organizations"
resource "aws_cloudwatch_metric_alarm" "aws_organizations" {
alarm_name = "AWS-Organizations"
comparison_operator = "GreaterThanOrEqualToThreshold"
evaluation_periods = "1"
metric_name = aws_cloudwatch_log_metric_filter.cis_aws_organizations.id
namespace = "CIS_Metric_Alarm_Namespace"
metric_name = aws_cloudwatch_log_metric_filter.aws_organizations.id
namespace = "Metric_Alarm_Namespace"
period = "300"
statistic = "Sum"
threshold = "1"
alarm_actions = [aws_sns_topic.cis_alerts_sns_topic.arn]
alarm_actions = [aws_sns_topic.alerts_sns_topic.arn]
insufficient_data_actions = []
}

resource "aws_cloudwatch_log_metric_filter" "cis_aws_organizations" {
name = "CIS-4.15-AWS-Organizations"
resource "aws_cloudwatch_log_metric_filter" "aws_organizations" {
name = "AWS-Organizations"
pattern = "{ ($.eventSource = \"organizations.amazonaws.com\") && (($.eventName = AcceptHandshake) || ($.eventName = AttachPolicy) || ($.eventName = CreateAccount) || ($.eventName = PutBucketLifecycle) || ($.eventName = CreateOrganizationalUnit) || ($.eventName = CreatePolicy) || ($.eventName = DeclineHandshake) || ($.eventName = DeleteOrganization) || ($.eventName = DeleteOrganizationalUnit) || ($.eventName = DeletePolicy) || ($.eventName = DetachPolicy) || ($.eventName = DisablePolicyType) || ($.eventName = EnablePolicyType) || ($.eventName = InviteAccountToOrganization) || ($.eventName = LeaveOrganization) || ($.eventName = MoveAccount) || ($.eventName = RemoveAccountFromOrganization) || ($.eventName = UpdatePolicy) || ($.eventName = UpdateOrganizationalUni)) }"
log_group_name = aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup.name
log_group_name = aws_cloudwatch_log_group.CloudWatch_LogsGroup.name

metric_transformation {
name = "CIS-4.15-AWS-Organizations"
namespace = "CIS_Metric_Alarm_Namespace"
name = "AWS-Organizations"
namespace = "Metric_Alarm_Namespace"
value = "1"
}
}
Loading