Skip to content

Conversation

cx-andre-pereira
Copy link
Contributor

@cx-andre-pereira cx-andre-pereira commented Aug 8, 2025

Closes #7093

Reason for Proposed Changes

Proposed Changes

  • Implemented the correct logic for "ECS Cluster Not Encrypted At Rest". This query must detect if the cluster is or isn't encrypted at rest to properly flag. This encryption is set on by the "Encrypted" field inside a LaunchTemplateData.BlockDeviceMappings.Ebs field of the "AWS::EC2::LaunchTemplate" resource's "Properties" block (doc); alternatively the BlockDeviceMappings field set in an AWS::EC2::Instance can overwrite the values set in the template and so is also checked. This should ensure any EC2 instance that is declared is encrypted and account for most "ECS clusters" use cases but , as suggested per the linked documentation, could require improvements for scenarios not accounted for. The query will flag in case the path to the "Encrypted" field is incomplete or in case the field is set to false.

I submit this contribution under the Apache-2.0 license.

@github-actions github-actions bot added the query New query feature label Aug 8, 2025
Copy link
Contributor

github-actions bot commented Aug 8, 2025

kics-logo

KICS version: v2.1.11

Category Results
CRITICAL CRITICAL 0
HIGH HIGH 0
MEDIUM MEDIUM 0
LOW LOW 0
INFO INFO 0
TRACE TRACE 0
TOTAL TOTAL 0
Metric Values
Files scanned placeholder 1
Files parsed placeholder 1
Files failed to scan placeholder 0
Total executed queries placeholder 47
Queries failed to execute placeholder 0
Execution time placeholder 0

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
aws PR related with AWS Cloud cloudformation CloudFormation query query New query feature
Projects
None yet
Development

Successfully merging this pull request may close these issues.

query(cloudformation): ecs cluster not encrypted at eest should be ecs task efs volume attachment not encrypted in transit
1 participant