🔒 TerraScan Enterprise Policy as Code Custom Rules Remediation
Advanced Terraform security scanner with custom rules, policy-as-code, and automated remediation suggestions
Terraform Code
Results
📈 Scan Summary
Total: -- | Critical: -- | High: -- | Medium: -- | Low: --
Risk Score: --
Total: -- | Critical: -- | High: -- | Medium: -- | Low: --
Risk Score: --
Ready to scan
Custom Rules Engine
Active Rules
Auto-Remediation
Remediated Code
Security Rules Reference
🔴 Critical
S3 public access, open SSH (0.0.0.0/0), IAM wildcards
S3 public access, open SSH (0.0.0.0/0), IAM wildcards
🟠 High
Missing encryption, unrestricted egress, public DB
Missing encryption, unrestricted egress, public DB
🟡 Medium
Missing tags, no logging, large instance types
Missing tags, no logging, large instance types
🟢 Low
Deprecated resources, naming conventions
Deprecated resources, naming conventions
Best Practices
✅ Use `block_public_acls = true` for S3
✅ Restrict security group ingress to specific IPs
✅ Enable encryption for RDS and S3
✅ Use IAM roles with least privilege
✅ Enable CloudTrail and VPC Flow Logs

0 Comments