Skip to content

Instantly share code, notes, and snippets.

@mikegreen
Created August 20, 2020 18:44
Show Gist options
  • Save mikegreen/b98508973b21642b827e24b300d80b5e to your computer and use it in GitHub Desktop.
Save mikegreen/b98508973b21642b827e24b300d80b5e to your computer and use it in GitHub Desktop.
TFE Sentinel Policy Check Output sample
{
"data": {
"id": "polchk-K7hoj4fHrp17TZw9",
"type": "policy-checks",
"attributes": {
"result": {
"result": true,
"passed": 2,
"total-failed": 0,
"hard-failed": 0,
"soft-failed": 0,
"advisory-failed": 0,
"duration-ms": 0,
"sentinel": {
"schema-version": 1,
"data": {
"sentinel-basics": {
"can-override": false,
"error": null,
"policies": [
{
"allowed-failure": false,
"error": null,
"policy": "sentinel-basics/aws-cis-4.1-networking-deny-public-ssh-acl-rules",
"result": true,
"trace": {
"description": "",
"error": null,
"print": "CIS 4.1: Ensure no AWS security groups allow ingress from 0.0.0.0/0 to port 22\ndeny_all_open_protocol_security_group_rules: true\n",
"result": true,
"rules": {
"deny-all-open-protocol-security-group-rules": {
"ident": "deny_all_open_protocol_security_group_rules",
"root": {
"children": null,
"expression": "all protocol_security_group_rules as _, psgr {\n\tpsgr.change.after.cidr_blocks not contains \"0.0.0.0/0\"\n}",
"value": "true"
},
"string": "Rule \"deny_all_open_protocol_security_group_rules\" (byte offset 1985) = true\n"
},
"deny-all-open-protocol-security-groups": {
"ident": "deny_all_open_protocol_security_groups",
"root": {
"children": null,
"expression": "all protocol_security_groups as _, psg {\n\tall psg.change.after.ingress as _, ingress {\n\t\tingress.cidr_blocks not contains \"0.0.0.0/0\"\n\t}\n}",
"value": "true"
},
"string": "Rule \"deny_all_open_protocol_security_groups\" (byte offset 1790) = true\n"
},
"deny-public-ssh-security-group-rules": {
"ident": "deny_public_ssh_security_group_rules",
"root": {
"children": null,
"expression": "all ssh_security_group_rules as _, ssgr {\n\tssgr.change.after.cidr_blocks not contains \"0.0.0.0/0\"\n}",
"value": "true"
},
"string": "Rule \"deny_public_ssh_security_group_rules\" (byte offset 1638) = true\n"
},
"deny-public-ssh-security-groups": {
"ident": "deny_public_ssh_security_groups",
"root": {
"children": null,
"expression": "all ssh_security_groups as _, ssg {\n\tall ssg.change.after.ingress as _, ingress {\n\t\tingress.cidr_blocks not contains \"0.0.0.0/0\"\n\t}\n}",
"value": "true"
},
"string": "Rule \"deny_public_ssh_security_groups\" (byte offset 1455) = true\n"
},
"main": {
"ident": "main",
"root": {
"children": [
{
"children": [
{
"children": [
{
"children": [
{
"children": null,
"expression": "all ssh_security_groups as _, ssg {\n\tall ssg.change.after.ingress as _, ingress {\n\t\tingress.cidr_blocks not contains \"0.0.0.0/0\"\n\t}\n}",
"value": "true"
}
],
"expression": "deny_public_ssh_security_groups",
"value": "true"
},
{
"children": [
{
"children": null,
"expression": "all ssh_security_group_rules as _, ssgr {\n\tssgr.change.after.cidr_blocks not contains \"0.0.0.0/0\"\n}",
"value": "true"
}
],
"expression": "deny_public_ssh_security_group_rules",
"value": "true"
}
],
"expression": "deny_public_ssh_security_groups and deny_public_ssh_security_group_rules",
"value": "true"
},
{
"children": [
{
"children": null,
"expression": "all protocol_security_groups as _, psg {\n\tall psg.change.after.ingress as _, ingress {\n\t\tingress.cidr_blocks not contains \"0.0.0.0/0\"\n\t}\n}",
"value": "true"
}
],
"expression": "deny_all_open_protocol_security_groups",
"value": "true"
}
],
"expression": "deny_public_ssh_security_groups and deny_public_ssh_security_group_rules and deny_all_open_protocol_security_groups",
"value": "true"
},
{
"children": null,
"expression": "deny_all_open_protocol_security_group_rules",
"value": "true"
}
],
"expression": "deny_public_ssh_security_groups and deny_public_ssh_security_group_rules and deny_all_open_protocol_security_groups and deny_all_open_protocol_security_group_rules",
"value": "true"
},
"string": "Rule \"main\" (byte offset 2249) = true\n true (offset 2264): deny_public_ssh_security_groups and deny_public_ssh_security_group_rules and deny_all_open_protocol_security_groups\n true (offset 2264): deny_public_ssh_security_groups and deny_public_ssh_security_group_rules\n true (offset 2264): deny_public_ssh_security_groups\n true (offset 1497): all ssh_security_groups as _, ssg {\n\tall ssg.change.after.ingress as _, ingress {\n\t\tingress.cidr_blocks not contains \"0.0.0.0/0\"\n\t}\n}\n true (offset 2301): deny_public_ssh_security_group_rules\n true (offset 1685): all ssh_security_group_rules as _, ssgr {\n\tssgr.change.after.cidr_blocks not contains \"0.0.0.0/0\"\n}\n true (offset 2343): deny_all_open_protocol_security_groups\n true (offset 1839): all protocol_security_groups as _, psg {\n\tall psg.change.after.ingress as _, ingress {\n\t\tingress.cidr_blocks not contains \"0.0.0.0/0\"\n\t}\n}\n true (offset 2387): deny_all_open_protocol_security_group_rules\n"
}
}
}
},
{
"allowed-failure": false,
"error": null,
"policy": "sentinel-basics/enforce-mandatory-tags",
"result": true,
"trace": {
"description": "Modified from https://github.com/hashicorp/terraform-guides/blob/master/governance/third-generation/aws/enforce-mandatory-tags.sentinel\nThis policy uses the Sentinel tfplan/v2 import to require that\nall EC2 instances have all mandatory tags",
"error": null,
"print": "",
"result": true,
"rules": {
"main": {
"ident": "main",
"root": {
"children": null,
"expression": "validated is true",
"value": "true"
},
"string": "Rule \"main\" (byte offset 3661) = true\n"
}
}
}
}
],
"result": true
}
}
}
},
"status": "passed",
"status-timestamps": {
"passed-at": "2020-08-18T21:16:23+00:00",
"queued-at": "2020-08-18T21:16:21+00:00"
},
"permissions": {
"can-override": true
},
"actions": {
"is-overridable": false
},
"scope": "organization"
},
"links": {
"output": "/api/v2/policy-checks/polchk-K7hoj4fHrp17TZw9/output"
}
}
}
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment