IaC Scanning with Checkmarx KICS #185
Annotations
11 warnings
|
Upload SARIF file to GitHub Security tab
CodeQL Action v3 will be deprecated in December 2026. Please update all occurrences of the CodeQL Action in your workflow files to v4. For more information, see https://github.blog/changelog/2025-10-28-upcoming-deprecation-of-codeql-action-v3/
|
|
Run kics Scan:
terraform/azure/aks.tf#L23
Azure Container Service (AKS) instance should have role-based access control (RBAC) enabled
|
|
Run kics Scan:
terraform/azure/aks.tf#L1
Azure Kubernetes Service (AKS) API should not be exposed to the internet
|
|
Run kics Scan:
terraform/azure/sql.tf#L9
The Active Directory Administrator is not configured for a SQL server
|
|
Run kics Scan:
terraform/azure/networking.tf#L64
Port 3389 (Remote Desktop) is exposed to the internet
|
|
Run kics Scan:
terraform/azure/sql.tf#L64
Query to find passwords and secrets in infrastructure code.
|
|
Run kics Scan:
terraform/azure/sql.tf#L41
Query to find passwords and secrets in infrastructure code.
|
|
Run kics Scan:
terraform/azure/instance.tf#L36
Query to find passwords and secrets in infrastructure code.
|
|
Run kics Scan:
terraform/azure/sql.tf#L15
Query to find passwords and secrets in infrastructure code.
|
|
Run kics Scan:
terraform/azure/instance.tf#L11
Query to find passwords and secrets in infrastructure code.
|
|
Run kics Scan:
terraform/azure/sql.tf#L50
MySQL Server public access should be disabled
|
Loading