id string | provider string | resource_type string | address string | actions list | env string | plan_after dict | plan_before null | text string | labels list | severity string | explanation string | source string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
azure:azurerm_storage_account:module.demo.azurerm_storage_account.0 | azure | azurerm_storage_account | module.demo.azurerm_storage_account.0 | [
"create"
] | prod | {
"example": true,
"env": "prod",
"allow_public": true,
"logging": null,
"wildcard": null,
"rotation_enabled": null
} | null | provider=azure type=azurerm_storage_account address=module.demo.azurerm_storage_account.0 actions=['create'] env=prod after={"allow_public": true, "env": "prod", "example": true} | [
"public_object_storage"
] | high | Public access setting detected for object storage. | synthetic |
aws:aws_security_group:module.demo.aws_security_group.1 | aws | aws_security_group | module.demo.aws_security_group.1 | [
"create"
] | prod | {
"example": true,
"env": "prod",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
} | null | provider=aws type=aws_security_group address=module.demo.aws_security_group.1 actions=['create'] env=prod after={"env": "prod", "example": true} | [
"no_mfa_or_strong_auth"
] | low | Synthetic example. | synthetic |
azure:azurerm_monitor_diagnostic_setting:module.demo.azurerm_monitor_diagnostic_setting.2 | azure | azurerm_monitor_diagnostic_setting | module.demo.azurerm_monitor_diagnostic_setting.2 | [
"create"
] | dev | {
"example": true,
"env": "dev",
"allow_public": null,
"logging": false,
"wildcard": null,
"rotation_enabled": null
} | null | provider=azure type=azurerm_monitor_diagnostic_setting address=module.demo.azurerm_monitor_diagnostic_setting.2 actions=['create'] env=dev after={"env": "dev", "example": true, "logging": false} | [
"missing_audit_logging"
] | medium | Centralized audit logging not configured. | synthetic |
aws:aws_iam_policy:module.demo.aws_iam_policy.3 | aws | aws_iam_policy | module.demo.aws_iam_policy.3 | [
"create"
] | prod | {
"example": true,
"env": "prod",
"allow_public": null,
"logging": null,
"wildcard": true,
"rotation_enabled": null
} | null | provider=aws type=aws_iam_policy address=module.demo.aws_iam_policy.3 actions=['create'] env=prod after={"env": "prod", "example": true, "wildcard": true} | [
"wildcard_identity_permissions"
] | high | Broad identity permission pattern detected. | synthetic |
azure:azurerm_role_assignment:module.demo.azurerm_role_assignment.4 | azure | azurerm_role_assignment | module.demo.azurerm_role_assignment.4 | [
"create",
"update"
] | dev | {
"example": true,
"env": "dev",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
} | null | provider=azure type=azurerm_role_assignment address=module.demo.azurerm_role_assignment.4 actions=['create', 'update'] env=dev after={"env": "dev", "example": true} | [
"excessive_data_exposure"
] | medium | Synthetic example. | synthetic |
aws:aws_security_group:module.demo.aws_security_group.5 | aws | aws_security_group | module.demo.aws_security_group.5 | [
"create",
"update"
] | staging | {
"example": true,
"env": "staging",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
} | null | provider=aws type=aws_security_group address=module.demo.aws_security_group.5 actions=['create', 'update'] env=staging after={"env": "staging", "example": true} | [
"missing_encryption_at_rest"
] | low | Synthetic example. | synthetic |
aws:aws_kms_key:module.demo.aws_kms_key.6 | aws | aws_kms_key | module.demo.aws_kms_key.6 | [
"create"
] | dev | {
"example": true,
"env": "dev",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": false
} | null | provider=aws type=aws_kms_key address=module.demo.aws_kms_key.6 actions=['create'] env=dev after={"env": "dev", "example": true, "rotation_enabled": false} | [
"missing_key_rotation"
] | medium | Key rotation appears disabled/missing. | synthetic |
gcp:google_kms_crypto_key:module.demo.google_kms_crypto_key.7 | gcp | google_kms_crypto_key | module.demo.google_kms_crypto_key.7 | [
"delete"
] | dev | {
"example": true,
"env": "dev",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
} | null | provider=gcp type=google_kms_crypto_key address=module.demo.google_kms_crypto_key.7 actions=['delete'] env=dev after={"env": "dev", "example": true} | [
"no_mfa_or_strong_auth"
] | low | Synthetic example. | synthetic |
gcp:google_storage_bucket_iam_member:module.demo.google_storage_bucket_iam_member.8 | gcp | google_storage_bucket_iam_member | module.demo.google_storage_bucket_iam_member.8 | [
"delete"
] | prod | {
"example": true,
"env": "prod",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
} | null | provider=gcp type=google_storage_bucket_iam_member address=module.demo.google_storage_bucket_iam_member.8 actions=['delete'] env=prod after={"env": "prod", "example": true} | [
"unknown_or_custom_risk"
] | low | Synthetic example. | synthetic |
azure:azurerm_storage_account:module.demo.azurerm_storage_account.9 | azure | azurerm_storage_account | module.demo.azurerm_storage_account.9 | [
"create"
] | prod | {
"example": true,
"env": "prod",
"allow_public": true,
"logging": null,
"wildcard": null,
"rotation_enabled": null
} | null | provider=azure type=azurerm_storage_account address=module.demo.azurerm_storage_account.9 actions=['create'] env=prod after={"allow_public": true, "env": "prod", "example": true} | [
"public_object_storage"
] | high | Public access setting detected for object storage. | synthetic |
gcp:google_storage_bucket_iam_member:module.demo.google_storage_bucket_iam_member.10 | gcp | google_storage_bucket_iam_member | module.demo.google_storage_bucket_iam_member.10 | [
"update"
] | dev | {
"example": true,
"env": "dev",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
} | null | provider=gcp type=google_storage_bucket_iam_member address=module.demo.google_storage_bucket_iam_member.10 actions=['update'] env=dev after={"env": "dev", "example": true} | [
"weak_network_segmentation"
] | medium | Synthetic example. | synthetic |
gcp:google_kms_crypto_key:module.demo.google_kms_crypto_key.11 | gcp | google_kms_crypto_key | module.demo.google_kms_crypto_key.11 | [
"update"
] | staging | {
"example": true,
"env": "staging",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": false
} | null | provider=gcp type=google_kms_crypto_key address=module.demo.google_kms_crypto_key.11 actions=['update'] env=staging after={"env": "staging", "example": true, "rotation_enabled": false} | [
"missing_key_rotation"
] | medium | Key rotation appears disabled/missing. | synthetic |
azure:azurerm_key_vault_key:module.demo.azurerm_key_vault_key.12 | azure | azurerm_key_vault_key | module.demo.azurerm_key_vault_key.12 | [
"create"
] | prod | {
"example": true,
"env": "prod",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
} | null | provider=azure type=azurerm_key_vault_key address=module.demo.azurerm_key_vault_key.12 actions=['create'] env=prod after={"env": "prod", "example": true} | [
"no_mfa_or_strong_auth"
] | low | Synthetic example. | synthetic |
aws:aws_cloudtrail:module.demo.aws_cloudtrail.13 | aws | aws_cloudtrail | module.demo.aws_cloudtrail.13 | [
"create",
"update"
] | staging | {
"example": true,
"env": "staging",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
} | null | provider=aws type=aws_cloudtrail address=module.demo.aws_cloudtrail.13 actions=['create', 'update'] env=staging after={"env": "staging", "example": true} | [
"no_mfa_or_strong_auth"
] | low | Synthetic example. | synthetic |
azure:azurerm_key_vault_key:module.demo.azurerm_key_vault_key.14 | azure | azurerm_key_vault_key | module.demo.azurerm_key_vault_key.14 | [
"create"
] | dev | {
"example": true,
"env": "dev",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
} | null | provider=azure type=azurerm_key_vault_key address=module.demo.azurerm_key_vault_key.14 actions=['create'] env=dev after={"env": "dev", "example": true} | [
"missing_audit_logging"
] | medium | Synthetic example. | synthetic |
gcp:google_storage_bucket_iam_member:module.demo.google_storage_bucket_iam_member.15 | gcp | google_storage_bucket_iam_member | module.demo.google_storage_bucket_iam_member.15 | [
"update"
] | prod | {
"example": true,
"env": "prod",
"allow_public": null,
"logging": null,
"wildcard": true,
"rotation_enabled": null
} | null | provider=gcp type=google_storage_bucket_iam_member address=module.demo.google_storage_bucket_iam_member.15 actions=['update'] env=prod after={"env": "prod", "example": true, "wildcard": true} | [
"wildcard_identity_permissions"
] | high | Broad identity permission pattern detected. | synthetic |
azure:azurerm_monitor_diagnostic_setting:module.demo.azurerm_monitor_diagnostic_setting.16 | azure | azurerm_monitor_diagnostic_setting | module.demo.azurerm_monitor_diagnostic_setting.16 | [
"create",
"update"
] | prod | {
"example": true,
"env": "prod",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
} | null | provider=azure type=azurerm_monitor_diagnostic_setting address=module.demo.azurerm_monitor_diagnostic_setting.16 actions=['create', 'update'] env=prod after={"env": "prod", "example": true} | [
"missing_encryption_at_rest"
] | low | Synthetic example. | synthetic |
aws:aws_iam_policy:module.demo.aws_iam_policy.17 | aws | aws_iam_policy | module.demo.aws_iam_policy.17 | [
"delete"
] | prod | {
"example": true,
"env": "prod",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
} | null | provider=aws type=aws_iam_policy address=module.demo.aws_iam_policy.17 actions=['delete'] env=prod after={"env": "prod", "example": true} | [
"unknown_or_custom_risk"
] | medium | Synthetic example. | synthetic |
gcp:google_compute_firewall:module.demo.google_compute_firewall.18 | gcp | google_compute_firewall | module.demo.google_compute_firewall.18 | [
"update"
] | prod | {
"example": true,
"env": "prod",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
} | null | provider=gcp type=google_compute_firewall address=module.demo.google_compute_firewall.18 actions=['update'] env=prod after={"env": "prod", "example": true} | [
"excessive_data_exposure"
] | low | Synthetic example. | synthetic |
aws:aws_s3_bucket_public_access_block:module.demo.aws_s3_bucket_public_access_block.19 | aws | aws_s3_bucket_public_access_block | module.demo.aws_s3_bucket_public_access_block.19 | [
"update"
] | prod | {
"example": true,
"env": "prod",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
} | null | provider=aws type=aws_s3_bucket_public_access_block address=module.demo.aws_s3_bucket_public_access_block.19 actions=['update'] env=prod after={"env": "prod", "example": true} | [
"wildcard_identity_permissions"
] | medium | Synthetic example. | synthetic |
azure:azurerm_storage_account:module.demo.azurerm_storage_account.20 | azure | azurerm_storage_account | module.demo.azurerm_storage_account.20 | [
"create",
"update"
] | staging | {
"example": true,
"env": "staging",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
} | null | provider=azure type=azurerm_storage_account address=module.demo.azurerm_storage_account.20 actions=['create', 'update'] env=staging after={"env": "staging", "example": true} | [
"unknown_or_custom_risk"
] | medium | Synthetic example. | synthetic |
azure:azurerm_key_vault_key:module.demo.azurerm_key_vault_key.21 | azure | azurerm_key_vault_key | module.demo.azurerm_key_vault_key.21 | [
"create"
] | prod | {
"example": true,
"env": "prod",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
} | null | provider=azure type=azurerm_key_vault_key address=module.demo.azurerm_key_vault_key.21 actions=['create'] env=prod after={"env": "prod", "example": true} | [
"no_mfa_or_strong_auth"
] | medium | Synthetic example. | synthetic |
azure:azurerm_key_vault_key:module.demo.azurerm_key_vault_key.22 | azure | azurerm_key_vault_key | module.demo.azurerm_key_vault_key.22 | [
"create"
] | staging | {
"example": true,
"env": "staging",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
} | null | provider=azure type=azurerm_key_vault_key address=module.demo.azurerm_key_vault_key.22 actions=['create'] env=staging after={"env": "staging", "example": true} | [
"excessive_data_exposure"
] | low | Synthetic example. | synthetic |
azure:azurerm_key_vault_key:module.demo.azurerm_key_vault_key.23 | azure | azurerm_key_vault_key | module.demo.azurerm_key_vault_key.23 | [
"update"
] | prod | {
"example": true,
"env": "prod",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
} | null | provider=azure type=azurerm_key_vault_key address=module.demo.azurerm_key_vault_key.23 actions=['update'] env=prod after={"env": "prod", "example": true} | [
"missing_encryption_at_rest"
] | low | Synthetic example. | synthetic |
aws:aws_kms_key:module.demo.aws_kms_key.24 | aws | aws_kms_key | module.demo.aws_kms_key.24 | [
"update"
] | prod | {
"example": true,
"env": "prod",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
} | null | provider=aws type=aws_kms_key address=module.demo.aws_kms_key.24 actions=['update'] env=prod after={"env": "prod", "example": true} | [
"no_mfa_or_strong_auth"
] | low | Synthetic example. | synthetic |
azure:azurerm_key_vault_key:module.demo.azurerm_key_vault_key.25 | azure | azurerm_key_vault_key | module.demo.azurerm_key_vault_key.25 | [
"create",
"update"
] | dev | {
"example": true,
"env": "dev",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": false
} | null | provider=azure type=azurerm_key_vault_key address=module.demo.azurerm_key_vault_key.25 actions=['create', 'update'] env=dev after={"env": "dev", "example": true, "rotation_enabled": false} | [
"missing_key_rotation"
] | medium | Key rotation appears disabled/missing. | synthetic |
gcp:google_kms_crypto_key:module.demo.google_kms_crypto_key.26 | gcp | google_kms_crypto_key | module.demo.google_kms_crypto_key.26 | [
"update"
] | dev | {
"example": true,
"env": "dev",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": false
} | null | provider=gcp type=google_kms_crypto_key address=module.demo.google_kms_crypto_key.26 actions=['update'] env=dev after={"env": "dev", "example": true, "rotation_enabled": false} | [
"missing_key_rotation"
] | medium | Key rotation appears disabled/missing. | synthetic |
azure:azurerm_storage_account:module.demo.azurerm_storage_account.27 | azure | azurerm_storage_account | module.demo.azurerm_storage_account.27 | [
"create"
] | prod | {
"example": true,
"env": "prod",
"allow_public": true,
"logging": null,
"wildcard": null,
"rotation_enabled": null
} | null | provider=azure type=azurerm_storage_account address=module.demo.azurerm_storage_account.27 actions=['create'] env=prod after={"allow_public": true, "env": "prod", "example": true} | [
"public_object_storage"
] | high | Public access setting detected for object storage. | synthetic |
aws:aws_iam_policy:module.demo.aws_iam_policy.28 | aws | aws_iam_policy | module.demo.aws_iam_policy.28 | [
"update"
] | dev | {
"example": true,
"env": "dev",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
} | null | provider=aws type=aws_iam_policy address=module.demo.aws_iam_policy.28 actions=['update'] env=dev after={"env": "dev", "example": true} | [
"excessive_data_exposure"
] | low | Synthetic example. | synthetic |
gcp:google_project_iam_audit_config:module.demo.google_project_iam_audit_config.29 | gcp | google_project_iam_audit_config | module.demo.google_project_iam_audit_config.29 | [
"create",
"update"
] | dev | {
"example": true,
"env": "dev",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
} | null | provider=gcp type=google_project_iam_audit_config address=module.demo.google_project_iam_audit_config.29 actions=['create', 'update'] env=dev after={"env": "dev", "example": true} | [
"missing_key_rotation"
] | medium | Synthetic example. | synthetic |
gcp:google_kms_crypto_key:module.demo.google_kms_crypto_key.30 | gcp | google_kms_crypto_key | module.demo.google_kms_crypto_key.30 | [
"create",
"update"
] | prod | {
"example": true,
"env": "prod",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
} | null | provider=gcp type=google_kms_crypto_key address=module.demo.google_kms_crypto_key.30 actions=['create', 'update'] env=prod after={"env": "prod", "example": true} | [
"missing_key_rotation"
] | low | Synthetic example. | synthetic |
aws:aws_kms_key:module.demo.aws_kms_key.31 | aws | aws_kms_key | module.demo.aws_kms_key.31 | [
"create"
] | prod | {
"example": true,
"env": "prod",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
} | null | provider=aws type=aws_kms_key address=module.demo.aws_kms_key.31 actions=['create'] env=prod after={"env": "prod", "example": true} | [
"unknown_or_custom_risk"
] | low | Synthetic example. | synthetic |
aws:aws_s3_bucket_public_access_block:module.demo.aws_s3_bucket_public_access_block.32 | aws | aws_s3_bucket_public_access_block | module.demo.aws_s3_bucket_public_access_block.32 | [
"create"
] | dev | {
"example": true,
"env": "dev",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
} | null | provider=aws type=aws_s3_bucket_public_access_block address=module.demo.aws_s3_bucket_public_access_block.32 actions=['create'] env=dev after={"env": "dev", "example": true} | [
"public_ingress"
] | low | Synthetic example. | synthetic |
gcp:google_storage_bucket_iam_member:module.demo.google_storage_bucket_iam_member.33 | gcp | google_storage_bucket_iam_member | module.demo.google_storage_bucket_iam_member.33 | [
"update"
] | staging | {
"example": true,
"env": "staging",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
} | null | provider=gcp type=google_storage_bucket_iam_member address=module.demo.google_storage_bucket_iam_member.33 actions=['update'] env=staging after={"env": "staging", "example": true} | [
"excessive_data_exposure"
] | low | Synthetic example. | synthetic |
azure:azurerm_network_security_group:module.demo.azurerm_network_security_group.34 | azure | azurerm_network_security_group | module.demo.azurerm_network_security_group.34 | [
"create",
"update"
] | dev | {
"example": true,
"env": "dev",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
} | null | provider=azure type=azurerm_network_security_group address=module.demo.azurerm_network_security_group.34 actions=['create', 'update'] env=dev after={"env": "dev", "example": true} | [
"excessive_data_exposure"
] | medium | Synthetic example. | synthetic |
aws:aws_s3_bucket_public_access_block:module.demo.aws_s3_bucket_public_access_block.35 | aws | aws_s3_bucket_public_access_block | module.demo.aws_s3_bucket_public_access_block.35 | [
"create"
] | prod | {
"example": true,
"env": "prod",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
} | null | provider=aws type=aws_s3_bucket_public_access_block address=module.demo.aws_s3_bucket_public_access_block.35 actions=['create'] env=prod after={"env": "prod", "example": true} | [
"weak_network_segmentation"
] | medium | Synthetic example. | synthetic |
gcp:google_project_iam_binding:module.demo.google_project_iam_binding.36 | gcp | google_project_iam_binding | module.demo.google_project_iam_binding.36 | [
"create",
"update"
] | prod | {
"example": true,
"env": "prod",
"allow_public": null,
"logging": null,
"wildcard": true,
"rotation_enabled": null
} | null | provider=gcp type=google_project_iam_binding address=module.demo.google_project_iam_binding.36 actions=['create', 'update'] env=prod after={"env": "prod", "example": true, "wildcard": true} | [
"wildcard_identity_permissions"
] | high | Broad identity permission pattern detected. | synthetic |
azure:azurerm_storage_account:module.demo.azurerm_storage_account.37 | azure | azurerm_storage_account | module.demo.azurerm_storage_account.37 | [
"create"
] | staging | {
"example": true,
"env": "staging",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
} | null | provider=azure type=azurerm_storage_account address=module.demo.azurerm_storage_account.37 actions=['create'] env=staging after={"env": "staging", "example": true} | [
"missing_audit_logging"
] | low | Synthetic example. | synthetic |
aws:aws_security_group:module.demo.aws_security_group.38 | aws | aws_security_group | module.demo.aws_security_group.38 | [
"update"
] | prod | {
"example": true,
"env": "prod",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
} | null | provider=aws type=aws_security_group address=module.demo.aws_security_group.38 actions=['update'] env=prod after={"env": "prod", "example": true} | [
"excessive_data_exposure"
] | low | Synthetic example. | synthetic |
gcp:google_compute_firewall:module.demo.google_compute_firewall.39 | gcp | google_compute_firewall | module.demo.google_compute_firewall.39 | [
"delete"
] | staging | {
"example": true,
"env": "staging",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
} | null | provider=gcp type=google_compute_firewall address=module.demo.google_compute_firewall.39 actions=['delete'] env=staging after={"env": "staging", "example": true} | [
"missing_key_rotation"
] | low | Synthetic example. | synthetic |
gcp:google_project_iam_audit_config:module.demo.google_project_iam_audit_config.40 | gcp | google_project_iam_audit_config | module.demo.google_project_iam_audit_config.40 | [
"create"
] | dev | {
"example": true,
"env": "dev",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
} | null | provider=gcp type=google_project_iam_audit_config address=module.demo.google_project_iam_audit_config.40 actions=['create'] env=dev after={"env": "dev", "example": true} | [
"no_mfa_or_strong_auth"
] | low | Synthetic example. | synthetic |
aws:aws_security_group:module.demo.aws_security_group.41 | aws | aws_security_group | module.demo.aws_security_group.41 | [
"update"
] | staging | {
"example": true,
"env": "staging",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
} | null | provider=aws type=aws_security_group address=module.demo.aws_security_group.41 actions=['update'] env=staging after={"env": "staging", "example": true} | [
"excessive_data_exposure"
] | medium | Synthetic example. | synthetic |
aws:aws_cloudtrail:module.demo.aws_cloudtrail.42 | aws | aws_cloudtrail | module.demo.aws_cloudtrail.42 | [
"create"
] | dev | {
"example": true,
"env": "dev",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
} | null | provider=aws type=aws_cloudtrail address=module.demo.aws_cloudtrail.42 actions=['create'] env=dev after={"env": "dev", "example": true} | [
"weak_network_segmentation"
] | medium | Synthetic example. | synthetic |
gcp:google_kms_crypto_key:module.demo.google_kms_crypto_key.43 | gcp | google_kms_crypto_key | module.demo.google_kms_crypto_key.43 | [
"create",
"update"
] | prod | {
"example": true,
"env": "prod",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
} | null | provider=gcp type=google_kms_crypto_key address=module.demo.google_kms_crypto_key.43 actions=['create', 'update'] env=prod after={"env": "prod", "example": true} | [
"no_mfa_or_strong_auth"
] | medium | Synthetic example. | synthetic |
aws:aws_security_group:module.demo.aws_security_group.44 | aws | aws_security_group | module.demo.aws_security_group.44 | [
"delete"
] | dev | {
"example": true,
"env": "dev",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
} | null | provider=aws type=aws_security_group address=module.demo.aws_security_group.44 actions=['delete'] env=dev after={"env": "dev", "example": true} | [
"public_object_storage"
] | low | Synthetic example. | synthetic |
azure:azurerm_key_vault_key:module.demo.azurerm_key_vault_key.45 | azure | azurerm_key_vault_key | module.demo.azurerm_key_vault_key.45 | [
"create"
] | dev | {
"example": true,
"env": "dev",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
} | null | provider=azure type=azurerm_key_vault_key address=module.demo.azurerm_key_vault_key.45 actions=['create'] env=dev after={"env": "dev", "example": true} | [
"no_mfa_or_strong_auth"
] | low | Synthetic example. | synthetic |
aws:aws_iam_policy:module.demo.aws_iam_policy.46 | aws | aws_iam_policy | module.demo.aws_iam_policy.46 | [
"create"
] | dev | {
"example": true,
"env": "dev",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
} | null | provider=aws type=aws_iam_policy address=module.demo.aws_iam_policy.46 actions=['create'] env=dev after={"env": "dev", "example": true} | [
"public_ingress"
] | low | Synthetic example. | synthetic |
azure:azurerm_network_security_group:module.demo.azurerm_network_security_group.47 | azure | azurerm_network_security_group | module.demo.azurerm_network_security_group.47 | [
"create",
"update"
] | dev | {
"example": true,
"env": "dev",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
} | null | provider=azure type=azurerm_network_security_group address=module.demo.azurerm_network_security_group.47 actions=['create', 'update'] env=dev after={"env": "dev", "example": true} | [
"unknown_or_custom_risk"
] | low | Synthetic example. | synthetic |
azure:azurerm_role_assignment:module.demo.azurerm_role_assignment.48 | azure | azurerm_role_assignment | module.demo.azurerm_role_assignment.48 | [
"create"
] | prod | {
"example": true,
"env": "prod",
"allow_public": null,
"logging": null,
"wildcard": true,
"rotation_enabled": null
} | null | provider=azure type=azurerm_role_assignment address=module.demo.azurerm_role_assignment.48 actions=['create'] env=prod after={"env": "prod", "example": true, "wildcard": true} | [
"wildcard_identity_permissions"
] | high | Broad identity permission pattern detected. | synthetic |
azure:azurerm_role_assignment:module.demo.azurerm_role_assignment.49 | azure | azurerm_role_assignment | module.demo.azurerm_role_assignment.49 | [
"delete"
] | staging | {
"example": true,
"env": "staging",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
} | null | provider=azure type=azurerm_role_assignment address=module.demo.azurerm_role_assignment.49 actions=['delete'] env=staging after={"env": "staging", "example": true} | [
"missing_key_rotation"
] | medium | Synthetic example. | synthetic |
aws:aws_kms_key:module.demo.aws_kms_key.50 | aws | aws_kms_key | module.demo.aws_kms_key.50 | [
"create",
"update"
] | dev | {
"example": true,
"env": "dev",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
} | null | provider=aws type=aws_kms_key address=module.demo.aws_kms_key.50 actions=['create', 'update'] env=dev after={"env": "dev", "example": true} | [
"missing_encryption_at_rest"
] | medium | Synthetic example. | synthetic |
gcp:google_storage_bucket_iam_member:module.demo.google_storage_bucket_iam_member.51 | gcp | google_storage_bucket_iam_member | module.demo.google_storage_bucket_iam_member.51 | [
"create"
] | staging | {
"example": true,
"env": "staging",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
} | null | provider=gcp type=google_storage_bucket_iam_member address=module.demo.google_storage_bucket_iam_member.51 actions=['create'] env=staging after={"env": "staging", "example": true} | [
"unknown_or_custom_risk"
] | low | Synthetic example. | synthetic |
aws:aws_iam_policy:module.demo.aws_iam_policy.52 | aws | aws_iam_policy | module.demo.aws_iam_policy.52 | [
"update"
] | prod | {
"example": true,
"env": "prod",
"allow_public": null,
"logging": null,
"wildcard": true,
"rotation_enabled": null
} | null | provider=aws type=aws_iam_policy address=module.demo.aws_iam_policy.52 actions=['update'] env=prod after={"env": "prod", "example": true, "wildcard": true} | [
"wildcard_identity_permissions"
] | high | Broad identity permission pattern detected. | synthetic |
gcp:google_storage_bucket_iam_member:module.demo.google_storage_bucket_iam_member.53 | gcp | google_storage_bucket_iam_member | module.demo.google_storage_bucket_iam_member.53 | [
"update"
] | staging | {
"example": true,
"env": "staging",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
} | null | provider=gcp type=google_storage_bucket_iam_member address=module.demo.google_storage_bucket_iam_member.53 actions=['update'] env=staging after={"env": "staging", "example": true} | [
"missing_encryption_at_rest"
] | low | Synthetic example. | synthetic |
gcp:google_project_iam_audit_config:module.demo.google_project_iam_audit_config.54 | gcp | google_project_iam_audit_config | module.demo.google_project_iam_audit_config.54 | [
"delete"
] | prod | {
"example": true,
"env": "prod",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
} | null | provider=gcp type=google_project_iam_audit_config address=module.demo.google_project_iam_audit_config.54 actions=['delete'] env=prod after={"env": "prod", "example": true} | [
"no_mfa_or_strong_auth"
] | low | Synthetic example. | synthetic |
azure:azurerm_role_assignment:module.demo.azurerm_role_assignment.55 | azure | azurerm_role_assignment | module.demo.azurerm_role_assignment.55 | [
"delete"
] | prod | {
"example": true,
"env": "prod",
"allow_public": null,
"logging": null,
"wildcard": true,
"rotation_enabled": null
} | null | provider=azure type=azurerm_role_assignment address=module.demo.azurerm_role_assignment.55 actions=['delete'] env=prod after={"env": "prod", "example": true, "wildcard": true} | [
"wildcard_identity_permissions"
] | high | Broad identity permission pattern detected. | synthetic |
aws:aws_kms_key:module.demo.aws_kms_key.56 | aws | aws_kms_key | module.demo.aws_kms_key.56 | [
"create"
] | dev | {
"example": true,
"env": "dev",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
} | null | provider=aws type=aws_kms_key address=module.demo.aws_kms_key.56 actions=['create'] env=dev after={"env": "dev", "example": true} | [
"wildcard_identity_permissions"
] | medium | Synthetic example. | synthetic |
gcp:google_project_iam_audit_config:module.demo.google_project_iam_audit_config.57 | gcp | google_project_iam_audit_config | module.demo.google_project_iam_audit_config.57 | [
"update"
] | prod | {
"example": true,
"env": "prod",
"allow_public": null,
"logging": null,
"wildcard": true,
"rotation_enabled": null
} | null | provider=gcp type=google_project_iam_audit_config address=module.demo.google_project_iam_audit_config.57 actions=['update'] env=prod after={"env": "prod", "example": true, "wildcard": true} | [
"wildcard_identity_permissions"
] | high | Broad identity permission pattern detected. | synthetic |
gcp:google_project_iam_audit_config:module.demo.google_project_iam_audit_config.58 | gcp | google_project_iam_audit_config | module.demo.google_project_iam_audit_config.58 | [
"create",
"update"
] | staging | {
"example": true,
"env": "staging",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
} | null | provider=gcp type=google_project_iam_audit_config address=module.demo.google_project_iam_audit_config.58 actions=['create', 'update'] env=staging after={"env": "staging", "example": true} | [
"public_object_storage"
] | low | Synthetic example. | synthetic |
azure:azurerm_monitor_diagnostic_setting:module.demo.azurerm_monitor_diagnostic_setting.59 | azure | azurerm_monitor_diagnostic_setting | module.demo.azurerm_monitor_diagnostic_setting.59 | [
"delete"
] | dev | {
"example": true,
"env": "dev",
"allow_public": null,
"logging": false,
"wildcard": null,
"rotation_enabled": null
} | null | provider=azure type=azurerm_monitor_diagnostic_setting address=module.demo.azurerm_monitor_diagnostic_setting.59 actions=['delete'] env=dev after={"env": "dev", "example": true, "logging": false} | [
"missing_audit_logging"
] | medium | Centralized audit logging not configured. | synthetic |
Terraform Plan Risk Labels (Multi‑Cloud)
A dataset of Terraform plan JSON resource changes labeled with security/compliance risk categories (multi‑label) across AWS / GCP / Azure.
What it’s for
- CI/CD pre-merge “risk scanning” of infrastructure changes
- Fine-tuning / training a small classifier to predict risk labels from plan snippets
- Bootstrapping deterministic OPA/Conftest policy packs (labels can be derived from policy denies)
Files
train.jsonl,validation.jsonl,test.jsonllabel_map.json(authoritative label list)tools/scripts to build your own dataset from realterraform show -jsonplans
Label taxonomy (v1)
public_object_storage, public_ingress, wildcard_identity_permissions, missing_key_rotation, missing_encryption_at_rest, missing_audit_logging, weak_network_segmentation, excessive_data_exposure, no_mfa_or_strong_auth, unknown_or_custom_risk
Schema (per row)
text: normalized text representation used for baseline modelsplan_after/plan_before: structured objects (subset of plan JSON)labels: list of risk labels (multi-label)severity:low | medium | highexplanation: short human-readable reasonsource:syntheticorreal
Quick usage
from datasets import load_dataset
ds = load_dataset("bharathja/tfplan-risk-labels-multicloud", data_files={
"train":"train.jsonl",
"validation":"validation.jsonl",
"test":"test.jsonl"
})
print(ds["train"][0]["labels"])
print(ds["train"][0]["text"][:250])
How to build your own from real plans (recommended)
- Export Terraform plan JSON:
terraform plan -out tfplan.bin
terraform show -json tfplan.bin > tfplan.json
- Convert to per-resource rows:
python tools/prepare_dataset.py --tfplan tfplan.json --out rows.jsonl --env prod
- Run Conftest and label using deny messages:
conftest test tfplan.json --policy policy --output json > conftest.json
python tools/label_with_conftest.py --rows rows.jsonl --conftest conftest.json --map tools/label_rules.json --out labeled.jsonl
Then split labeled.jsonl into train/validation/test and replace the provided JSONL files.
License
MIT
- Downloads last month
- 55