The detection with weak evidence: AVD-AWS-0132 AWS > S3 > Encryption Customer Key #8556
Closed
yukihiko-shinoda
started this conversation in
Documentation
Replies: 1 comment
-
hello @yukihiko-shinoda - I think you've pointed it out correctly as to why KMS keys require rotation. Trivy's checks are also part of the commercial product and are also used in environments where regulations and compliance might be stricter than OSS. Please feel free to submit a PR to improve the docs if you still don't see it fit. Thank you. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Description
I can't understand why Trivy detects AVD-AWS-0132 as severity: HIGH.
Is Trivy's missconfiguration designing and focusing in not science and security but business and contractual risk?
AWS insists that AWS managed key is safe enough and use customer key if your business or contract rule requests:
Why rotate KMS keys? | Rotate AWS KMS keys - AWS Key Management Service
Link
Suggestions
At least, I don't want to prepare for a threat that is unknown even whether it exists.
Load balancer is exposed to the internet. - tfsec
Beta Was this translation helpful? Give feedback.
All reactions