You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
So that I can check if qualified resources in my CDK app conforms to the following HIPAA Security control(s): 164.308(a)(3)(i), 164.308(a)(3)(ii)(A), 164.308(a)(4)(ii)(A), 164.308(a)(4)(ii)(B), 164.308(a)(4)(ii)(C), 164.312(a)(1)
Details
ruleId: HIPAA.Security-EC2InstanceProfileAttached
info: The EC2 instance does not have an instance profile attached - (Control IDs: 164.308(a)(3)(i), 164.308(a)(3)(ii)(A), 164.308(a)(4)(ii)(A), 164.308(a)(4)(ii)(B), 164.308(a)(4)(ii)(C), 164.312(a)(1))
Given Reason: EC2 instance profiles pass an IAM role to an EC2 instance. Attaching an instance profile to your instances can assist with least privilege and permissions management.
Acceptance Criteria
If the rule can be implemented
Given a CDK app with a non-compliant resource
When HIPAA Security Pack is enabled
Then the CDK stack does not deploy and the user receives an ERROR with relevant Control ID information about the non compliant resource
Given a CDK app with a compliant resource
When HIPAA Security Pack is enabled
Then the CDK stack deploys and the user does not receive an ERROR about the compliant resource
Given the cdk-nag RULES file
When the HIPAA.Security-EC2InstanceProfileAttached rule is added to the rule pack
Then the HIPAA Security Errors section is updated with the rule information
If the rule cannot be implemented
Given the cdk-nag RULES file
When the ec2-instance-profile-attached check is not added to the rule pack
Then the HIPAA Security Excluded Rules section is updated with the check information
The text was updated successfully, but these errors were encountered:
Adding remaining EC2 Checks
Closes#185Closes#187Closes#238Closes#242
----
*By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license*
Summary
As a developer
I would like to implement the ec2-instance-profile-attached config rule
So that I can check if qualified resources in my CDK app conforms to the following HIPAA Security control(s): 164.308(a)(3)(i), 164.308(a)(3)(ii)(A), 164.308(a)(4)(ii)(A), 164.308(a)(4)(ii)(B), 164.308(a)(4)(ii)(C), 164.312(a)(1)
Details
ruleId:
HIPAA.Security-EC2InstanceProfileAttached
info: The EC2 instance does not have an instance profile attached - (Control IDs: 164.308(a)(3)(i), 164.308(a)(3)(ii)(A), 164.308(a)(4)(ii)(A), 164.308(a)(4)(ii)(B), 164.308(a)(4)(ii)(C), 164.312(a)(1))
Given Reason: EC2 instance profiles pass an IAM role to an EC2 instance. Attaching an instance profile to your instances can assist with least privilege and permissions management.
Acceptance Criteria
If the rule can be implemented
Given a CDK app with a non-compliant resource
ERROR
with relevant Control ID information about the non compliant resourceGiven a CDK app with a compliant resource
ERROR
about the compliant resourceGiven the
cdk-nag
RULES fileHIPAA.Security-EC2InstanceProfileAttached
rule is added to the rule packErrors
section is updated with the rule informationIf the rule cannot be implemented
Given the
cdk-nag
RULES fileec2-instance-profile-attached
check is not added to the rule packExcluded Rules
section is updated with the check informationThe text was updated successfully, but these errors were encountered: