You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Describe the issue
Cloudformation / I am trying to identify that all secret manager resources have an associated resource policy, but when using the forEach of cloudformation, although each resource has its policy associated with the check it is not possible to identify it, is there any support for foreach? , Thanks
Custom Rule:
metadata:
name: "Check that Secret has configured Resource Based policy"id: "CKV2_777"category: "GENERAL_SECURITY"definition:
and:
- cond_type: "filter"attribute: "resource_type"value:
- AWS::SecretsManager::Secretoperator: within
- cond_type: connectionoperator: existsresource_types:
- AWS::SecretsManager::Secretconnected_resource_types:
- AWS::SecretsManager::ResourcePolicy
Describe the issue
Cloudformation / I am trying to identify that all secret manager resources have an associated resource policy, but when using the forEach of cloudformation, although each resource has its policy associated with the check it is not possible to identify it, is there any support for foreach? , Thanks
Custom Rule:
Example Value
The text was updated successfully, but these errors were encountered: