Replies: 2 comments
-
@simar7 The source of the check is |
Beta Was this translation helpful? Give feedback.
0 replies
-
@obounaim AVD is a site that aggregates findings from all of Aqua products, including Trivy, and other products. as @nikpivkin pointed out this isn't within the featureset of trivy. In the future we have plans to make this differentiation clearer in the website. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Description
I would like to report an issue with Trivy not detecting a specific misconfiguration related to AWS OpenSearch encryption in Terraform Code. According to the Aqua Security Vulnerability Database (AVD), the following misconfiguration should be detected:
Desired Behavior
Trivy should be able to detect when AWS OpenSearch encryption at-rest is not enabled when scanning Terraform code.
Actual Behavior
Currently, when scanning our Terraform code with Trivy, the tool does not flag this misconfiguration, even though it is present.
Reproduction Steps
1. Scan Terraform code that creates an OpenSearch domain without encryption at rest setting present. Using this cmd `trivy config .` 2. Observe that the misconfiguration is not detected.
Target
Filesystem
Scanner
Misconfiguration
Output Format
None
Mode
Standalone
Debug Output
Operating System
Linux/MacOs
Version
Checklist
trivy clean --all
Beta Was this translation helpful? Give feedback.
All reactions