Skip to content

Commit

Permalink
Do not disable CKV_AWS_274 completely
Browse files Browse the repository at this point in the history
This is generally a good check but we do need to disable it for the
IAM role used by Terraform as it does require Administrative
permissions to manage AWS resources.

Signed-off-by: Thanh Ha <[email protected]>
  • Loading branch information
zxiiro committed Nov 20, 2024
1 parent de5f0b5 commit a5de365
Show file tree
Hide file tree
Showing 2 changed files with 1 addition and 1 deletion.
1 change: 0 additions & 1 deletion .checkov.yml
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,6 @@ skip-path:
# Skip INFO and other unresolvable checks
skip-check:
- CKV2_AWS_61
- CKV_AWS_274
- CKV_AWS_355
- CKV_AWS_290
- CKV_AWS_119
Expand Down
1 change: 1 addition & 0 deletions ali/aws/391835788720/us-east-1/iam_policies.tf
Original file line number Diff line number Diff line change
Expand Up @@ -32,6 +32,7 @@ resource "aws_iam_role" "ossci_gha_terraform" {

resource "aws_iam_role_policy_attachment" "ossci_gha_terraform_admin" {
role = aws_iam_role.ossci_gha_terraform.name
#checkov:skip=CKV_AWS_274:Terraform needs AdministratorAccess to run
policy_arn = "arn:aws:iam::aws:policy/AdministratorAccess"
}

Expand Down

0 comments on commit a5de365

Please sign in to comment.