-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathsentinel.hcl
68 lines (57 loc) · 1.86 KB
/
sentinel.hcl
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
// Copyright (c) HashiCorp, Inc.
// SPDX-License-Identifier: BUSL-1.1
import "module" "report" {
source = "./modules/report/report.sentinel"
}
import "module" "tfresources" {
source = "./modules/tfresources/tfresources.sentinel"
}
policy "ec2-ebs-encryption-enabled" {
source = "./policies/ec2-ebs-encryption-enabled.sentinel"
enforcement_level = "advisory"
}
policy "ec2-network-acl" {
source = "./policies/ec2-network-acl.sentinel"
enforcement_level = "advisory"
}
policy "ec2-vpc-flow-logging-enabled" {
source = "./policies/ec2-vpc-flow-logging-enabled.sentinel"
enforcement_level = "advisory"
}
policy "ec2-vpc-default-security-group-no-traffic" {
source = "./policies/ec2-vpc-default-security-group-no-traffic.sentinel"
enforcement_level = "advisory"
}
policy "ec2-metadata-imdsv2-required" {
source = "./policies/ec2-metadata-imdsv2-required.sentinel"
enforcement_level = "advisory"
}
policy "ec2-security-group-ipv4-ingress-traffic-restriction" {
source = "./policies/ec2-security-group-ingress-traffic-restriction-protocol.sentinel"
enforcement_level = "advisory"
params = {
prevent_unknown_ipv4_ingress = true
}
}
policy "ec2-security-group-ipv6-ingress-traffic-restriction" {
source = "./policies/ec2-security-group-ingress-traffic-restriction-protocol.sentinel"
enforcement_level = "advisory"
params = {
prevent_unknown_ipv6_ingress = true
prevent_unknown_ipv4_ingress = false
}
}
policy "ec2-security-group-ingress-traffic-restriction-port-22" {
source = "./policies/ec2-security-group-ingress-traffic-restriction-port.sentinel"
enforcement_level = "advisory"
params = {
port = 22
}
}
policy "ec2-security-group-ingress-traffic-restriction-port-3389" {
source = "./policies/ec2-security-group-ingress-traffic-restriction-port.sentinel"
enforcement_level = "advisory"
params = {
port = 3389
}
}