typescript-cdk-allows-rds-db-security-group-for-inbound-access
- Enhanced to improve detection coverage by:
- Expanding detection patterns to cover all CDK import styles (direct, wildcard, namespace/barrel imports)
- Updating metadata (CWE, shortDescription, AWS documentation references) to make remediations more actionable
typescript-cdk-aurora-my-postgres-iam-auth
- Enhanced to improve detection coverage by:
- Broadening patterns to detect missing IAM authentication in Aurora MySQL/PostgreSQL clusters
- Adding CDK v2 support with updated construct patterns
- Updating rule metadata with latest AWS security best practices
- Improving detection accuracy with consolidated pattern matching
typescript-cdk-public-s3-bucket-access-configuration
- Enhanced to improve detection coverage by:
- Detecting public access configurations through bucket policies and ACLs
- Adding patterns for CDK v2 constructs and all import styles
- Updating remediation guidance with CloudFront OAC recommendations
- Improving metadata with comprehensive AWS security references
typescript-cdk-bucket-enforce-ssl
- Enhanced to improve detection coverage by:
- Detecting missing SSL/TLS enforcement in S3 bucket policies
- Adding CDK v2 pattern support for bucket policy statements
- Updating metadata with AWS security best practices for encryption in transit
typescript-cdk-sqs-queue-sse
- Enhanced to improve detection coverage by:
- Detecting missing server-side encryption configuration in SQS queues
- Reclassifying from SecurityRules to AwsBestPractice category
- Adding CDK v2 support with updated Queue construct patterns
- Expanding test coverage for explicit encryption declarations
- Updating rule description emphasizing IaC best practices
typescript-cdk-sqs-queue-ssl-requests-only
- Enhanced to improve detection coverage by:
- Detecting missing SSL-only access policies for SQS queues
- Adding patterns for queue policy statements requiring HTTPS
- Expanding test cases with various policy configurations
- Updating metadata with AWS security best practices
- Improving detection accuracy for CDK v2 constructs
typescript-cdk-s3-bucket-use-cloudfront-origin-access-control
- Enhanced to improve detection coverage by:
- Detecting S3 buckets not using CloudFront Origin Access Control (OAC)
- Adding CDK v2 patterns for CloudFront distributions and S3 origins
- Expanding test coverage with OAC vs OAI configurations
- Updating remediation guidance with migration steps from OAI to OAC
- Improving metadata with latest AWS CloudFront best practices
typescript-cdk-iam-no-managed-policies
- Enhanced to improve detection coverage by:
- Detecting usage of AWS managed policies in IAM roles/users/groups
- Adding patterns for all CDK import styles and v2 constructs
- Expanding test cases with various managed policy attachments
- Updating metadata with least privilege principle guidance
- Improving detection to catch inline and attached managed policies
typescript-cdk-public-s3-bucket
- Enhanced to improve detection coverage by:
- Detecting publicly accessible S3 buckets through various configurations
- Adding comprehensive patterns for
publicReadAccess and blockPublicAccess settings - Updating rule description with CloudFront OAC recommendations
- Improving metadata with AWS security best practices references
typescript-cdk-rds-missing-storage-encryption
- Enhanced to improve detection coverage by:
- Detecting RDS instances without storage encryption enabled
- Adding CDK v2 support for
DatabaseInstance and DatabaseCluster constructs - Expanding test cases covering all RDS engine types
- Updating metadata to reflect AWS encryption-by-default changes (Jan 2025)
- Improving detection patterns to reduce false positives
typescript-cdk-api-logging-disabled
- Enhanced to improve detection coverage by:
- Detecting API Gateway stages without CloudWatch logging enabled
- Adding patterns for REST API and HTTP API logging configurations
- Expanding test coverage with various logging level scenarios
- Updating metadata with AWS observability best practices
- Improving detection for CDK v2 API Gateway constructs
typescript-cdk-apigateway-missingreq-validation-enabled
- Enhanced to improve detection coverage by:
- Detecting API Gateway methods without request validation
- Adding patterns for request validator configurations
- Expanding test cases with body and parameter validation scenarios
- Updating metadata with API security best practices
- Improving detection accuracy for CDK v2 constructs
typescript-cdk-rds-deletion-protection-enabled
- Enhanced to improve detection coverage by:
- Detecting RDS instances without deletion protection enabled
- Adding CDK v2 support for
DatabaseInstance and DatabaseCluster - Expanding test coverage with various RDS configurations
- Updating metadata with data protection best practices
- Improving detection patterns for production workload scenarios
typescript-cdk-cloud-front-distribution-no-outdated-ssl
- Enhanced to improve detection coverage by:
- Detecting CloudFront distributions using outdated SSL/TLS protocols
- Consolidating patterns covering all CDK import styles (direct, wildcard, namespace/barrel)
- Updating metadata (CWE, shortDescription, AWS documentation references)
typescript-cdk-sns-topic-ssl-requests-only
- Enhanced to improve detection coverage by:
- Detecting SNS topics without SSL-only access policies
- Adding patterns for topic policy statements requiring HTTPS transport
- Expanding test cases with various policy configurations and CDK v2 constructs
- Updating metadata with AWS security best practices for encryption in transit
- Improving detection accuracy to reduce false negatives
typescript-cdk-kinesis-sse
- Enhanced to improve detection coverage by:
- Detecting Kinesis streams without server-side encryption enabled
- Adding CDK v2 support for Stream construct encryption configurations
- Expanding test coverage with KMS key and encryption type scenarios
- Updating metadata with AWS data protection best practices
- Improving detection patterns for explicit encryption declarations
typescript-cdk-cognito-user-pool-no-unauthenticated-logins
- Enhanced to improve detection coverage by:
- Detecting Cognito Identity Pools allowing unauthenticated access
- Expanding test coverage for
allowUnauthenticatedIdentities configurations - Improving rule documentation and categorization in registry
typescript-cdk-ec2-instance-detailed-monitoring-enabled
- Enhanced to improve detection coverage by:
- Detecting EC2 instances without detailed monitoring enabled
- Adding CDK v2 support for Instance construct monitoring configurations
- Expanding test cases with various monitoring settings
- Updating metadata with AWS observability best practices
- Improving detection patterns for production workload scenarios
typescript-cdk-dynamodb-table-encrypted
- Enhanced to improve detection coverage by:
- Detecting DynamoDB tables without encryption at rest
- Adding CDK v2 support for Table construct encryption configurations
- Expanding test coverage with KMS key and encryption type scenarios
- Updating metadata to reflect AWS encryption-by-default changes
- Improving detection patterns to reduce false positives
typescript-cdk-efs-encrypted
- Enhanced to improve detection coverage by:
- Detecting EFS file systems without encryption enabled
- Adding patterns for FileSystem construct encryption configurations
- Expanding test cases with KMS key scenarios
- Updating metadata with AWS data protection best practices
- Improving detection for CDK v2 constructs
typescript-cdk-redshift-cluster-encrypted
- Enhanced to improve detection coverage by:
- Detecting Redshift clusters without encryption enabled
- Adding CDK v2 support for Cluster construct encryption configurations
- Expanding test coverage with KMS key scenarios
- Updating metadata to reflect AWS encryption-by-default changes (Jan 2025)
- Improving detection patterns for production data warehouse scenarios