File tree Expand file tree Collapse file tree
Expand file tree Collapse file tree Original file line number Diff line number Diff line change 1+ # Enable the AWS plugin for TFLint
2+ plugin "aws" {
3+ enabled = true
4+ source = " github.com/terraform-linters/tflint-ruleset-aws"
5+ version = " 0.24.1"
6+ }
7+
8+ # General TFLint settings
9+ config {
10+ recursive = true # Scan all Terraform files in subdirectories
11+ }
12+
13+ # Enable AWS rules to enforce best practices
14+ rule "aws_instance_invalid_type" {
15+ enabled = true
16+ }
17+
18+ rule "aws_s3_bucket_public_access" {
19+ enabled = true
20+ }
21+
22+ rule "aws_security_group_open_ports" {
23+ enabled = true
24+ }
25+
26+ rule "aws_iam_policy_no_wildcard" {
27+ enabled = true
28+ }
29+
30+ # Ensure that security groups do not allow unrestricted access
31+ rule "aws_security_group_ingress_cidr_blocks" {
32+ enabled = true
33+ }
34+
35+ # Enforce required tags for resources
36+ rule "terraform_module_tag_required" {
37+ enabled = true
38+ required_tags = [" Name" , " Environment" , " Owner" ]
39+ }
40+
41+ # Prevent IAM roles from using excessive permissions
42+ rule "aws_iam_role_restricted_permissions" {
43+ enabled = true
44+ restricted_actions = [
45+ " iam:*" ,
46+ " s3:*"
47+ ]
48+ }
49+
50+ # Ensure EKS clusters use recommended instance types
51+ rule "aws_eks_node_group_instance_types" {
52+ enabled = true
53+ allowed_types = [" t3.medium" , " m5.large" , " m5.xlarge" ]
54+ }
Original file line number Diff line number Diff line change 1+ # Enable the AWS plugin for TFLint
2+ plugin "aws" {
3+ enabled = true
4+ source = " github.com/terraform-linters/tflint-ruleset-aws"
5+ version = " 0.24.1"
6+ }
7+
8+ # General TFLint settings
9+ config {
10+ recursive = true # Scan all Terraform files in subdirectories
11+ }
12+
13+ # Enable AWS rules to enforce best practices
14+ rule "aws_instance_invalid_type" {
15+ enabled = true
16+ }
17+
18+ rule "aws_s3_bucket_public_access" {
19+ enabled = true
20+ }
21+
22+ rule "aws_security_group_open_ports" {
23+ enabled = true
24+ }
25+
26+ rule "aws_iam_policy_no_wildcard" {
27+ enabled = true
28+ }
29+
30+ # Ensure that security groups do not allow unrestricted access
31+ rule "aws_security_group_ingress_cidr_blocks" {
32+ enabled = true
33+ }
34+
35+ # Enforce required tags for resources
36+ rule "terraform_module_tag_required" {
37+ enabled = true
38+ required_tags = [" Name" , " Environment" , " Owner" ]
39+ }
40+
41+ # Prevent IAM roles from using excessive permissions
42+ rule "aws_iam_role_restricted_permissions" {
43+ enabled = true
44+ restricted_actions = [
45+ " iam:*" ,
46+ " s3:*"
47+ ]
48+ }
49+
50+ # Ensure EKS clusters use recommended instance types
51+ rule "aws_eks_node_group_instance_types" {
52+ enabled = true
53+ allowed_types = [" t3.medium" , " m5.large" , " m5.xlarge" ]
54+ }
Original file line number Diff line number Diff line change 1+ # Enable the AWS plugin for TFLint
2+ plugin "aws" {
3+ enabled = true
4+ source = " github.com/terraform-linters/tflint-ruleset-aws"
5+ version = " 0.24.1"
6+ }
7+
8+ # General TFLint settings
9+ config {
10+ recursive = true # Scan all Terraform files in subdirectories
11+ }
12+
13+ # Enable AWS rules to enforce best practices
14+ rule "aws_instance_invalid_type" {
15+ enabled = true
16+ }
17+
18+ rule "aws_s3_bucket_public_access" {
19+ enabled = true
20+ }
21+
22+ rule "aws_security_group_open_ports" {
23+ enabled = true
24+ }
25+
26+ rule "aws_iam_policy_no_wildcard" {
27+ enabled = true
28+ }
29+
30+ # Ensure that security groups do not allow unrestricted access
31+ rule "aws_security_group_ingress_cidr_blocks" {
32+ enabled = true
33+ }
34+
35+ # Enforce required tags for resources
36+ rule "terraform_module_tag_required" {
37+ enabled = true
38+ required_tags = [" Name" , " Environment" , " Owner" ]
39+ }
40+
41+ # Prevent IAM roles from using excessive permissions
42+ rule "aws_iam_role_restricted_permissions" {
43+ enabled = true
44+ restricted_actions = [
45+ " iam:*" ,
46+ " s3:*"
47+ ]
48+ }
49+
50+ # Ensure EKS clusters use recommended instance types
51+ rule "aws_eks_node_group_instance_types" {
52+ enabled = true
53+ allowed_types = [" t3.medium" , " m5.large" , " m5.xlarge" ]
54+ }
Original file line number Diff line number Diff line change 1+ # Enable the AWS plugin for TFLint
2+ plugin "aws" {
3+ enabled = true
4+ source = " github.com/terraform-linters/tflint-ruleset-aws"
5+ version = " 0.24.1"
6+ }
7+
8+ # General TFLint settings
9+ config {
10+ recursive = true # Scan all Terraform files in subdirectories
11+ }
12+
13+ # Enable AWS rules to enforce best practices
14+ rule "aws_instance_invalid_type" {
15+ enabled = true
16+ }
17+
18+ rule "aws_s3_bucket_public_access" {
19+ enabled = true
20+ }
21+
22+ rule "aws_security_group_open_ports" {
23+ enabled = true
24+ }
25+
26+ rule "aws_iam_policy_no_wildcard" {
27+ enabled = true
28+ }
29+
30+ # Ensure that security groups do not allow unrestricted access
31+ rule "aws_security_group_ingress_cidr_blocks" {
32+ enabled = true
33+ }
34+
35+ # Enforce required tags for resources
36+ rule "terraform_module_tag_required" {
37+ enabled = true
38+ required_tags = [" Name" , " Environment" , " Owner" ]
39+ }
40+
41+ # Prevent IAM roles from using excessive permissions
42+ rule "aws_iam_role_restricted_permissions" {
43+ enabled = true
44+ restricted_actions = [
45+ " iam:*" ,
46+ " s3:*"
47+ ]
48+ }
49+
50+ # Ensure EKS clusters use recommended instance types
51+ rule "aws_eks_node_group_instance_types" {
52+ enabled = true
53+ allowed_types = [" t3.medium" , " m5.large" , " m5.xlarge" ]
54+ }
You can’t perform that action at this time.
0 commit comments