False Positive report for EKS Clusters should have the public access disabled
#9907
korporationcl
started this conversation in
False Detection
Replies: 2 comments 1 reply
-
|
Hi @korporationcl ! I scanned your configuration example and did not reproduce the problem: Do you have |
Beta Was this translation helpful? Give feedback.
0 replies
-
|
yeah I have it specified as false (sorry I can't share everything but pretty much): vpc_config {
endpoint_private_access = true
endpoint_public_access = false
security_group_ids = [aws_security_group.eks_control_plane.id]
subnet_ids = var.subnet_ids
} |
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
IDs
AVD-AWS-0041, AVD-AWS-0040
Description
Trivy incorrectly flagged the EKS cluster configuration for public endpoint exposure.
Evidence
Current
aws_eks_clusterconfiguration:this triggers:
moreover if you try to do something like:
Applying this change (with Terraform), will fail with:
Reproduction Steps
Target
Git Repository
Scanner
Misconfiguration
Target OS
No response
Debug Output
Version
Checklist
-f jsonthat shows data sources and confirmed that the security advisory in data sources was correctBeta Was this translation helpful? Give feedback.
All reactions