Skip to content

Commit cb7cbb3

Browse files
MukeshMukesh
authored andcommitted
update
1 parent f0d09b9 commit cb7cbb3

4 files changed

Lines changed: 216 additions & 0 deletions

File tree

modules/eks/tflint-config.hcl

Lines changed: 54 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,54 @@
1+
# Enable the AWS plugin for TFLint
2+
plugin "aws" {
3+
enabled = true
4+
source = "github.com/terraform-linters/tflint-ruleset-aws"
5+
version = "0.24.1"
6+
}
7+
8+
# General TFLint settings
9+
config {
10+
recursive = true # Scan all Terraform files in subdirectories
11+
}
12+
13+
# Enable AWS rules to enforce best practices
14+
rule "aws_instance_invalid_type" {
15+
enabled = true
16+
}
17+
18+
rule "aws_s3_bucket_public_access" {
19+
enabled = true
20+
}
21+
22+
rule "aws_security_group_open_ports" {
23+
enabled = true
24+
}
25+
26+
rule "aws_iam_policy_no_wildcard" {
27+
enabled = true
28+
}
29+
30+
# Ensure that security groups do not allow unrestricted access
31+
rule "aws_security_group_ingress_cidr_blocks" {
32+
enabled = true
33+
}
34+
35+
# Enforce required tags for resources
36+
rule "terraform_module_tag_required" {
37+
enabled = true
38+
required_tags = ["Name", "Environment", "Owner"]
39+
}
40+
41+
# Prevent IAM roles from using excessive permissions
42+
rule "aws_iam_role_restricted_permissions" {
43+
enabled = true
44+
restricted_actions = [
45+
"iam:*",
46+
"s3:*"
47+
]
48+
}
49+
50+
# Ensure EKS clusters use recommended instance types
51+
rule "aws_eks_node_group_instance_types" {
52+
enabled = true
53+
allowed_types = ["t3.medium", "m5.large", "m5.xlarge"]
54+
}

modules/iam/tflint-config.hcl

Lines changed: 54 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,54 @@
1+
# Enable the AWS plugin for TFLint
2+
plugin "aws" {
3+
enabled = true
4+
source = "github.com/terraform-linters/tflint-ruleset-aws"
5+
version = "0.24.1"
6+
}
7+
8+
# General TFLint settings
9+
config {
10+
recursive = true # Scan all Terraform files in subdirectories
11+
}
12+
13+
# Enable AWS rules to enforce best practices
14+
rule "aws_instance_invalid_type" {
15+
enabled = true
16+
}
17+
18+
rule "aws_s3_bucket_public_access" {
19+
enabled = true
20+
}
21+
22+
rule "aws_security_group_open_ports" {
23+
enabled = true
24+
}
25+
26+
rule "aws_iam_policy_no_wildcard" {
27+
enabled = true
28+
}
29+
30+
# Ensure that security groups do not allow unrestricted access
31+
rule "aws_security_group_ingress_cidr_blocks" {
32+
enabled = true
33+
}
34+
35+
# Enforce required tags for resources
36+
rule "terraform_module_tag_required" {
37+
enabled = true
38+
required_tags = ["Name", "Environment", "Owner"]
39+
}
40+
41+
# Prevent IAM roles from using excessive permissions
42+
rule "aws_iam_role_restricted_permissions" {
43+
enabled = true
44+
restricted_actions = [
45+
"iam:*",
46+
"s3:*"
47+
]
48+
}
49+
50+
# Ensure EKS clusters use recommended instance types
51+
rule "aws_eks_node_group_instance_types" {
52+
enabled = true
53+
allowed_types = ["t3.medium", "m5.large", "m5.xlarge"]
54+
}
Lines changed: 54 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,54 @@
1+
# Enable the AWS plugin for TFLint
2+
plugin "aws" {
3+
enabled = true
4+
source = "github.com/terraform-linters/tflint-ruleset-aws"
5+
version = "0.24.1"
6+
}
7+
8+
# General TFLint settings
9+
config {
10+
recursive = true # Scan all Terraform files in subdirectories
11+
}
12+
13+
# Enable AWS rules to enforce best practices
14+
rule "aws_instance_invalid_type" {
15+
enabled = true
16+
}
17+
18+
rule "aws_s3_bucket_public_access" {
19+
enabled = true
20+
}
21+
22+
rule "aws_security_group_open_ports" {
23+
enabled = true
24+
}
25+
26+
rule "aws_iam_policy_no_wildcard" {
27+
enabled = true
28+
}
29+
30+
# Ensure that security groups do not allow unrestricted access
31+
rule "aws_security_group_ingress_cidr_blocks" {
32+
enabled = true
33+
}
34+
35+
# Enforce required tags for resources
36+
rule "terraform_module_tag_required" {
37+
enabled = true
38+
required_tags = ["Name", "Environment", "Owner"]
39+
}
40+
41+
# Prevent IAM roles from using excessive permissions
42+
rule "aws_iam_role_restricted_permissions" {
43+
enabled = true
44+
restricted_actions = [
45+
"iam:*",
46+
"s3:*"
47+
]
48+
}
49+
50+
# Ensure EKS clusters use recommended instance types
51+
rule "aws_eks_node_group_instance_types" {
52+
enabled = true
53+
allowed_types = ["t3.medium", "m5.large", "m5.xlarge"]
54+
}

modules/vpc/tflint-config.hcl

Lines changed: 54 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,54 @@
1+
# Enable the AWS plugin for TFLint
2+
plugin "aws" {
3+
enabled = true
4+
source = "github.com/terraform-linters/tflint-ruleset-aws"
5+
version = "0.24.1"
6+
}
7+
8+
# General TFLint settings
9+
config {
10+
recursive = true # Scan all Terraform files in subdirectories
11+
}
12+
13+
# Enable AWS rules to enforce best practices
14+
rule "aws_instance_invalid_type" {
15+
enabled = true
16+
}
17+
18+
rule "aws_s3_bucket_public_access" {
19+
enabled = true
20+
}
21+
22+
rule "aws_security_group_open_ports" {
23+
enabled = true
24+
}
25+
26+
rule "aws_iam_policy_no_wildcard" {
27+
enabled = true
28+
}
29+
30+
# Ensure that security groups do not allow unrestricted access
31+
rule "aws_security_group_ingress_cidr_blocks" {
32+
enabled = true
33+
}
34+
35+
# Enforce required tags for resources
36+
rule "terraform_module_tag_required" {
37+
enabled = true
38+
required_tags = ["Name", "Environment", "Owner"]
39+
}
40+
41+
# Prevent IAM roles from using excessive permissions
42+
rule "aws_iam_role_restricted_permissions" {
43+
enabled = true
44+
restricted_actions = [
45+
"iam:*",
46+
"s3:*"
47+
]
48+
}
49+
50+
# Ensure EKS clusters use recommended instance types
51+
rule "aws_eks_node_group_instance_types" {
52+
enabled = true
53+
allowed_types = ["t3.medium", "m5.large", "m5.xlarge"]
54+
}

0 commit comments

Comments
 (0)