fix: enable API Gateway cache encryption at rest#70
Conversation
Adds cache_data_encrypted/cacheDataEncrypted to both Terraform and CDK API Gateway method settings. Resolves KICS critical finding for unencrypted API Gateway cache.
|
Latest scan for commit: Security Scan ResultsScan Metadata
SummaryScanner ResultsThe table below shows findings by scanner, with status based on severity thresholds and dependencies: Column Explanations: Severity Levels (S/C/H/M/L/I):
Other Columns:
Scanner Results:
Severity Thresholds (Thresh Column):
Threshold Source: Values in parentheses indicate where the threshold is configured:
Statistics calculation:
Detailed FindingsShow 26 actionable findingsFinding 1: CKV_AWS_119
Description: Code Snippet: Finding 2: CKV_AWS_158
Description: Code Snippet: Finding 3: CKV_AWS_117
Description: Code Snippet: Finding 4: CKV_AWS_173
Description: Code Snippet: Finding 5: CKV_AWS_50
Description: Code Snippet: Finding 6: CKV_AWS_116
Description: Code Snippet: Finding 7: CKV_AWS_115
Description: Code Snippet: Finding 8: CKV_AWS_272
Description: Code Snippet: Finding 9: CKV_AWS_237
Description: Code Snippet: Finding 10: CKV_AWS_120
Description: Code Snippet: Finding 11: CKV_AWS_73
Description: Code Snippet: Finding 12: CKV_AWS_158
Description: Code Snippet: Finding 13: CKV2_AWS_53
Description: Code Snippet: Finding 14: CKV2_AWS_53
Description: Code Snippet: Finding 15: CKV2_AWS_51
Description: Code Snippet: Finding 16: CKV2_AWS_29
Description: Code Snippet: Finding 17: terraform.aws.security.aws-dynamodb-table-unencrypted.aws-dynamodb-table-unencrypted
Description: Code Snippet: Finding 18: terraform.aws.security.aws-cloudwatch-log-group-unencrypted.aws-cloudwatch-log-group-unencrypted
Description: Code Snippet: Finding 19: terraform.aws.security.aws-lambda-x-ray-tracing-not-active.aws-lambda-x-ray-tracing-not-active
Description: Code Snippet: Finding 20: terraform.aws.security.aws-lambda-environment-unencrypted.aws-lambda-environment-unencrypted
Description: Code Snippet: Finding 21: terraform.aws.security.aws-cloudwatch-log-group-unencrypted.aws-cloudwatch-log-group-unencrypted
Description: Code Snippet: Finding 22: terraform.aws.security.aws-dynamodb-table-unencrypted.aws-dynamodb-table-unencrypted
Description: Code Snippet: Finding 23: terraform.aws.security.aws-cloudwatch-log-group-unencrypted.aws-cloudwatch-log-group-unencrypted
Description: Code Snippet: Finding 24: terraform.aws.security.aws-lambda-x-ray-tracing-not-active.aws-lambda-x-ray-tracing-not-active
Description: Code Snippet: Finding 25: terraform.aws.security.aws-lambda-environment-unencrypted.aws-lambda-environment-unencrypted
Description: Code Snippet: Finding 26: terraform.aws.security.aws-cloudwatch-log-group-unencrypted.aws-cloudwatch-log-group-unencrypted
Description: Code Snippet: Report generated by Automated Security Helper (ASH) at 2026-03-25T18:11:32+00:00 |
Adds cache_data_encrypted/cacheDataEncrypted to both Terraform and CDK API Gateway method settings. Resolves KICS critical finding for unencrypted API Gateway cache.
Issue #, if available:
Description of changes:
By submitting this pull request, I confirm that you can use, modify, copy, and redistribute this contribution, under the terms of your choice.