https://docs.kics.io/develop/queries/terraform-queries/aws/4d46ff3b-7160-41d1-a310-71d6d370b08f/
EFS Volume With Disabled Transit Encryption
Query id: 4d46ff3b-7160-41d1-a310-71d6d370b08f
Query name: EFS Volume With Disabled Transit Encryption
Platform: Terraform
- The following kics.io rule incorrectly identifies that Fargate requires an EFS server, when it uses local encrypted storage. The rule does not look at the looks at the parent aws_ecs_task_definition for requires_compatibilities = ["FARGATE"].
Expected Behavior
kics.io should check the volume AND requires_compatibilities = ["FARGATE"] before flagging it as an issue
Actual Behavior
kics.io rule only checks for transit_encryption and efs_volume_configuration.
https://docs.kics.io/develop/queries/terraform-queries/aws/4d46ff3b-7160-41d1-a310-71d6d370b08f/
EFS Volume With Disabled Transit Encryption
Query id: 4d46ff3b-7160-41d1-a310-71d6d370b08f
Query name: EFS Volume With Disabled Transit Encryption
Platform: Terraform
Expected Behavior
kics.io should check the volume AND requires_compatibilities = ["FARGATE"] before flagging it as an issue
Actual Behavior
kics.io rule only checks for transit_encryption and efs_volume_configuration.