turbot/aws_compliance

Control: CloudFormation stacks outputs should not have any secrets

Description

Ensure CloudFormation stacks outputs do not contain secrets like user names, passwords, and tokens. It is recommended to remove secrets since outputs cannot be encrypted resulting in any entity with basic read-metadata-only and access to CloudFormation outputs having access to these secrets.

Usage

Run the control in your terminal:

powerpipe control run aws_compliance.control.cloudformation_stack_output_no_secrets

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run aws_compliance.control.cloudformation_stack_output_no_secrets --share

SQL

This control uses a named query:

cloudformation_stack_output_no_secrets

Tags