turbot/aws_top_10

Benchmark: 3. No hard-coding secrets

Description

When you build applications on AWS, you can use AWS IAM roles to deliver temporary, short-lived credentials for calling AWS services. However, some applications require longer-lived credentials, such as database passwords or other API keys. If this is the case, you should never hard code these secrets in the application or store them in source code.

Usage

Install the mod:

mkdir dashboards
cd dashboards
powerpipe mod init
powerpipe mod install github.com/turbot/steampipe-mod-aws-top-10

Start the Powerpipe server:

steampipe service start
powerpipe server

Open http://localhost:9033 in your browser and select 3. No hard-coding secrets.

Run this benchmark in your terminal:

powerpipe benchmark run aws_top_10.benchmark.account_security_no_hardcoded_secrets

Snapshot and share results via Turbot Pipes:

powerpipe benchmark run aws_top_10.benchmark.account_security_no_hardcoded_secrets --share

Controls

Tags