--- policy: /ce/ca/aws/cloudfront/distribution-uses-default-certificate logic: /ce/ca/aws/cloudfront/distribution-uses-default-certificate/prod.logic.yaml executionTime: 2026-02-10T22:32:35.54990838Z generationMs: 97 executionMs: 718 rows: - id: test1 match: true status: expected: DISAPPEARED actual: DISAPPEARED conditionIndex: expected: 99 actual: 99 conditionText: expected: isDisappeared(CA10__disappearanceTime__c) actual: isDisappeared(CA10__disappearanceTime__c) runtimeError: {} - id: test3 match: true status: expected: INCOMPLIANT actual: INCOMPLIANT conditionIndex: expected: 299 actual: 299 conditionText: expected: extract('CA10__viewerCertificateCloudFrontDefaultCert__c') == true actual: extract('CA10__viewerCertificateCloudFrontDefaultCert__c') == true runtimeError: {} - id: test4 match: true status: expected: COMPLIANT actual: COMPLIANT conditionIndex: expected: 300 actual: 300 conditionText: expected: otherwise actual: otherwise runtimeError: {} usedFiles: - path: /ce/ca/aws/cloudfront/distribution-uses-default-certificate/policy.yaml md5Hash: 4A7876515F076E5406F25EC4C96E295A content: "---\nnames:\n full: AWS CloudFront Web Distribution uses default SSL/TLS\ \ certificate\n contextual: Web Distribution uses default SSL/TLS certificate\n\ description: >\n Ensure that AWS CloudFront Distributions are configured with\ \ a custom SSL/TLS \n certificate from AWS Certificate Manager (ACM) or IAM,\ \ instead of the default \n CloudFront certificate.\ncategories:\n - \"SECURITY\"\ \n - \"RELIABILITY\"\ntype: \"COMPLIANCE_POLICY\"\nframeworkMappings:\n -\ \ \"/frameworks/cloudaware/resource-security/data-encryption\"\n - \"/frameworks/cloudaware/resource-reliability/system-configuration\"\ \n - \"/frameworks/aws-fsbp-v1.0.0/cloudfront/07\"\n - \"/frameworks/aws-well-architected/sec/09/03\"\ \nsimilarPolicies:\n awsSecurityHub:\n - name: \"[CloudFront.7] CloudFront\ \ distributions should use custom SSL/TLS certificates\"\n url: \"https://docs.aws.amazon.com/securityhub/latest/userguide/cloudfront-controls.html#cloudfront-7\"\ \n internal:\n - \"dec-x-4efd073e\"" - path: /ce/ca/aws/cloudfront/distribution-uses-default-certificate/prod.logic.yaml md5Hash: A18E8848112103776455F7622C2A5C3F content: "---\ninputType: \"CA10__CaAwsDistribution__c\"\nimportExtracts:\n -\ \ file: \"/types/CA10__CaAwsDistribution__c/object.extracts.yaml\"\ntestData:\n\ \ - file: \"test-data.json\" \nrecordTypes:\n - \"caWebDistribution\"\nconditions:\n\ \ - status: \"INCOMPLIANT\"\n currentStateMessage: \"The CloudFront distribution\ \ is configured to use the default SSL/TLS certificate.\"\n remediationMessage:\ \ \"Configure the distribution to use a custom SSL/TLS certificate.\"\n check:\n\ \ IS_EQUAL:\n left:\n EXTRACT: \"CA10__viewerCertificateCloudFrontDefaultCert__c\"\ \n right:\n BOOLEAN: true\notherwise:\n status: \"COMPLIANT\"\ \n currentStateMessage: \"The CloudFront distribution uses a custom SSL/TLS\ \ certificate.\"\n" - path: /ce/ca/aws/cloudfront/distribution-uses-default-certificate/test-data.json md5Hash: 70AE97F6F26A10D7CE823B1327875617 content: |- [ { "expectedResult": { "status": "DISAPPEARED", "conditionIndex": "99", "conditionText": "isDisappeared(CA10__disappearanceTime__c)", "runtimeError": null }, "context": { "snapshotTime": "2025-05-10T18:55:17Z" }, "Id": "test1", "RecordTypeId": "RecordTypeId1", "CA10__disappearanceTime__c": "2025-05-10T18:55:17Z", "CA10__viewerCertificateCloudFrontDefaultCert__c": false, "RecordType": { "DeveloperName": "caRtmpDistribution", "Id": "RecordTypeId1" } }, { "expectedResult": { "status": "INCOMPLIANT", "conditionIndex": "299", "conditionText": "extract('CA10__viewerCertificateCloudFrontDefaultCert__c') == true", "runtimeError": null }, "context": { "snapshotTime": "2025-05-10T18:55:17Z" }, "Id": "test3", "RecordTypeId": "RecordTypeId2", "CA10__disappearanceTime__c": null, "CA10__viewerCertificateCloudFrontDefaultCert__c": true, "RecordType": { "DeveloperName": "caWebDistribution", "Id": "RecordTypeId2" } }, { "expectedResult": { "status": "COMPLIANT", "conditionIndex": "300", "conditionText": "otherwise", "runtimeError": null }, "context": { "snapshotTime": "2025-05-10T18:55:17Z" }, "Id": "test4", "RecordTypeId": "RecordTypeId2", "CA10__disappearanceTime__c": null, "CA10__viewerCertificateCloudFrontDefaultCert__c": false, "RecordType": { "DeveloperName": "caWebDistribution", "Id": "RecordTypeId2" } } ] - path: /types/CA10__CaAwsDistribution__c/object.extracts.yaml md5Hash: 9BBABDA14FE5FD983E28F77F5CC80BF9 content: |- --- extracts: # Nullable - name: "CA10__defaultRootObject__c" value: FIELD: path: CA10__defaultRootObject__c # undeterminedIf: # noAccessDelegate: # path: "CA10__defaultRootObject__c" # currentStateMessage: "Unable to determine Default Root Object. Possible permission issue with cloudfront:GetDistribution." # Checkbox - name: "CA10__loggingEnabled__c" value: FIELD: path: "CA10__loggingEnabled__c" # Checkbox - name: "CA10__viewerCertificateCloudFrontDefaultCert__c" value: FIELD: path: "CA10__viewerCertificateCloudFrontDefaultCert__c" # Values: sni-only | vip | static-ip. Nullable - name: "CA10__viewerCertificateSslSupportMethod__c" value: FIELD: path: "CA10__viewerCertificateSslSupportMethod__c" # undeterminedIf: # noAccessDelegate: # path: "CA10__defaultRootObject__c" # currentStateMessage: "Unable to determine Viewer Certificate SSL Support Method. Possible permission issue with cloudfront:GetDistribution." # Text. Nullable - name: "CA10__viewerCertificateMinimumProtocolVersion__c" value: FIELD: path: "CA10__viewerCertificateMinimumProtocolVersion__c" # Text. Nullable - name: "CA10__s3OriginDomainName__c" value: FIELD: path: "CA10__s3OriginDomainName__c" # Text. Nullable - name: "CA10__s3OriginAccessIdentity__c" value: FIELD: path: "CA10__s3OriginAccessIdentity__c" script: |- CREATE TEMP FUNCTION mock_ExpectedResult() RETURNS ARRAY >> DETERMINISTIC LANGUAGE js AS r""" return [ { "Id" : "test1", "expectedResult" : { "status" : "DISAPPEARED", "conditionIndex" : "99", "conditionText" : "isDisappeared(CA10__disappearanceTime__c)", "runtimeError" : null } }, { "Id" : "test3", "expectedResult" : { "status" : "INCOMPLIANT", "conditionIndex" : "299", "conditionText" : "extract('CA10__viewerCertificateCloudFrontDefaultCert__c') == true", "runtimeError" : null } }, { "Id" : "test4", "expectedResult" : { "status" : "COMPLIANT", "conditionIndex" : "300", "conditionText" : "otherwise", "runtimeError" : null } } ]; """; CREATE TEMP FUNCTION mock_CA10__CaAwsDistribution__c() RETURNS ARRAY >> DETERMINISTIC LANGUAGE js AS r""" return [ { "context" : { "snapshotTime" : new Date("2025-05-10T18:55:17Z") }, "CA10__disappearanceTime__c" : new Date("2025-05-10T18:55:17Z"), "CA10__viewerCertificateCloudFrontDefaultCert__c" : false, "Id" : "test1", "RecordTypeId" : "RecordTypeId1" }, { "context" : { "snapshotTime" : new Date("2025-05-10T18:55:17Z") }, "CA10__viewerCertificateCloudFrontDefaultCert__c" : true, "Id" : "test3", "RecordTypeId" : "RecordTypeId2" }, { "context" : { "snapshotTime" : new Date("2025-05-10T18:55:17Z") }, "CA10__viewerCertificateCloudFrontDefaultCert__c" : false, "Id" : "test4", "RecordTypeId" : "RecordTypeId2" } ]; """; CREATE TEMP FUNCTION mock_RecordType() RETURNS ARRAY >> DETERMINISTIC LANGUAGE js AS r""" return [ { "context" : { "snapshotTime" : new Date("2025-05-10T18:55:17Z") }, "DeveloperName" : "caRtmpDistribution", "Id" : "RecordTypeId1" }, { "context" : { "snapshotTime" : new Date("2025-05-10T18:55:17Z") }, "DeveloperName" : "caWebDistribution", "Id" : "RecordTypeId2" } ]; """; CREATE TEMP FUNCTION process_CA10__CaAwsDistribution__c( obj STRUCT< CA10__disappearanceTime__c TIMESTAMP, CA10__viewerCertificateCloudFrontDefaultCert__c BOOLEAN, Id STRING, RecordTypeId STRING, RecordType STRUCT< DeveloperName STRING, Id STRING > >, snapshotTime TIMESTAMP ) RETURNS STRUCT DETERMINISTIC LANGUAGE js AS r""" var BytesLib = new function () { this.normalize = function(arg) { return arg == null ? '' : arg; }; this.isEmpty = function(arg) { return this.normalize(arg) == ''; }; this.isNotEmpty = function(arg) { return this.normalize(arg) != ''; }; this.equal = function(left, right) { return this.normalize(left) == this.normalize(right); }; this.notEqual = function(left, right) { return this.normalize(left) != this.normalize(right); }; this.startsWith = function(arg, substring) { return this.normalize(arg).startsWith(this.normalize(substring)); }; this.endsWith = function(arg, substring) { return this.normalize(arg).endsWith(this.normalize(substring)); }; this.contains = function(arg, substring) { return this.normalize(arg).includes(this.normalize(substring)); }; this.containsAll = function(arg, substrings) { if (substrings == null || substrings.length === 0) return false; let normalizedArg = this.normalize(arg); return substrings.every(sub => normalizedArg.includes(this.normalize(sub))); }; this.containsAny = function(arg, substrings) { if (substrings == null || substrings.length === 0) return false; let normalizedArg = this.normalize(arg); return substrings.some(sub => normalizedArg.includes(this.normalize(sub))); }; }(); var CollectionLib = new function () { this.parse = function(arg, separator, skipEmpty, skipDuplicates, sort, normalize) { if (arg == null) return []; let parts = arg.split(separator); return this.fromArray(parts, skipEmpty, skipDuplicates, sort, normalize); }; this.fromArray = function(arr, skipEmpty, skipDuplicates, sort, normalize) { if (arr == null) return []; let result = []; let seen = new Set(); arr.forEach(el => { let normalized = normalize ? TextLib.normalize(el) : BytesLib.normalize(el); if (!skipEmpty || (normalize ? TextLib.isNotEmpty(el) : BytesLib.isNotEmpty(el))) { if (!skipDuplicates || !seen.has(normalized)) { if (skipDuplicates) seen.add(normalized); result.push(normalized); } } }); if (sort) result.sort(); return result; }; this.equal = function(left, right) { left = left == null ? [] : left; right = right == null ? [] : right; if (left.length !== right.length) return false; for (let i = 0; i < left.length; i++) { if (left[i] !== right[i]) return false; } return true; }; this.notEqual = function(left, right) { return !this.equal(left, right); }; this.size = function(collection) { return collection == null ? 0 : collection.length; }; this.startsWith = function(collection, search, normalize) { if (collection == null || collection.length === 0) return false; let normalizedSearch = normalize ? TextLib.normalize(search) : BytesLib.normalize(search); return collection[0] === normalizedSearch; }; this.endsWith = function(collection, search, normalize) { if (collection == null || collection.length === 0) return false; let normalizedSearch = normalize ? TextLib.normalize(search) : BytesLib.normalize(search); return collection[collection.length - 1] === normalizedSearch; }; this.contains = function(collection, search, normalize) { if (collection == null || collection.length === 0) return false; return collection.includes(normalize ? TextLib.normalize(search) : BytesLib.normalize(search)); }; this.containsAll = function(collection, searchArray, normalize) { if (collection == null || collection.length === 0 || searchArray == null || searchArray.length === 0) return false; return searchArray.every(search => collection.includes(normalize ? TextLib.normalize(search) : BytesLib.normalize(search))); }; this.containsAny = function(collection, searchArray, normalize) { if (collection == null || collection.length === 0 || searchArray == null || searchArray.length === 0) return false; return searchArray.some(search => collection.includes(normalize ? TextLib.normalize(search) : BytesLib.normalize(search))); }; }(); var TextLib = new function () { this.normalize = function(arg) { return arg == null ? '' : arg.replace(/\s+/g, ' ').trim().toLowerCase(); }; this.isEmpty = function(arg) { return this.normalize(arg) == ''; }; this.isNotEmpty = function(arg) { return this.normalize(arg) != ''; }; this.equal = function(left, right) { return this.normalize(left) == this.normalize(right); }; this.notEqual = function(left, right) { return this.normalize(left) != this.normalize(right); }; this.startsWith = function(arg, substring) { return this.normalize(arg).startsWith(this.normalize(substring)); }; this.endsWith = function(arg, substring) { return this.normalize(arg).endsWith(this.normalize(substring)); }; this.contains = function(arg, substring) { return this.normalize(arg).includes(this.normalize(substring)); }; this.containsAll = function(arg, substrings) { if (substrings == null || substrings.length === 0) return false; let normalizedArg = this.normalize(arg); return substrings.every(sub => normalizedArg.includes(this.normalize(sub))); }; this.containsAny = function(arg, substrings) { if (substrings == null || substrings.length === 0) return false; let normalizedArg = this.normalize(arg); return substrings.some(sub => normalizedArg.includes(this.normalize(sub))); }; }(); var references1 = []; // condition[0], conditionIndex:[0..99] references1.push('Deleted From AWS [CA10__disappearanceTime__c]: ' + obj.CA10__disappearanceTime__c); if (obj.CA10__disappearanceTime__c != null) { return {status: 'DISAPPEARED', conditionIndex: 99, conditionText: "isDisappeared(CA10__disappearanceTime__c)", currentStateMessage: "Object is deleted in the source", currentStateReferences: references1.join('\n'), remediation: null, runtimeError: null}; } // condition[1], conditionIndex:[100..199] references1.push('Record Type Name [obj.RecordType.DeveloperName]: ' + obj.RecordType.DeveloperName); if (!CollectionLib.contains(CollectionLib.fromArray(['caWebDistribution'], true, true, true, true), obj.RecordType.DeveloperName, true)) { return {status: 'INAPPLICABLE', conditionIndex: 199, conditionText: "not(setOfText(['caWebDistribution']).contains(RecordType.DeveloperName))", currentStateMessage: "Object record type is not applicable", currentStateReferences: references1.join('\n'), remediation: null, runtimeError: null}; } // condition[2], conditionIndex:[200..299] function extract4() { if (!this.out) { this.out = obj.CA10__viewerCertificateCloudFrontDefaultCert__c; } return this.out; }; references1.push('Viewer Certificate CloudFront Default [obj.CA10__viewerCertificateCloudFrontDefaultCert__c]: ' + obj.CA10__viewerCertificateCloudFrontDefaultCert__c); if (extract4.call(extract4) == true) { return {status: 'INCOMPLIANT', conditionIndex: 299, conditionText: "extract('CA10__viewerCertificateCloudFrontDefaultCert__c') == true", currentStateMessage: "The CloudFront distribution is configured to use the default SSL/TLS certificate.", currentStateReferences: references1.join('\n'), remediation: "Configure the distribution to use a custom SSL/TLS certificate.", runtimeError: null}; } return {status: 'COMPLIANT', conditionIndex: 300, conditionText: "otherwise", currentStateMessage: "The CloudFront distribution uses a custom SSL/TLS certificate.", currentStateReferences: references1.join('\n'), remediation: null, runtimeError: null}; """; SELECT expectedResult.Id as Id, IF ( IFNULL(expectedResult.expectedResult.status, '') = IFNULL(sObject.result.status, '') AND IFNULL(expectedResult.expectedResult.conditionIndex, -1) = IFNULL(sObject.result.conditionIndex, -1) AND IFNULL(expectedResult.expectedResult.conditionText, '') = IFNULL(sObject.result.conditionText, '') AND IFNULL(expectedResult.expectedResult.runtimeError, '') = IFNULL(sObject.result.runtimeError, ''), "MATCH", "FAIL" ) as match, expectedResult.expectedResult.status as expectedStatus, sObject.result.status as actualStatus, expectedResult.expectedResult.conditionIndex as expectedConditionIndex, sObject.result.conditionIndex as actualConditionIndex, expectedResult.expectedResult.conditionText as expectedConditionText, sObject.result.conditionText as actualConditionText, expectedResult.expectedResult.runtimeError as expectedRuntimeError, sObject.result.runtimeError as actualRuntimeError FROM UNNEST(mock_ExpectedResult()) expectedResult LEFT JOIN ( SELECT sObject.CA10__disappearanceTime__c AS CA10__disappearanceTime__c, sObject.CA10__viewerCertificateCloudFrontDefaultCert__c AS CA10__viewerCertificateCloudFrontDefaultCert__c, sObject.Id AS Id, sObject.RecordTypeId AS RecordTypeId, STRUCT ( `RecordType`.DeveloperName AS DeveloperName, `RecordType`.Id AS Id ) AS RecordType, process_CA10__CaAwsDistribution__c( STRUCT( sObject.CA10__disappearanceTime__c AS CA10__disappearanceTime__c, sObject.CA10__viewerCertificateCloudFrontDefaultCert__c AS CA10__viewerCertificateCloudFrontDefaultCert__c, sObject.Id AS Id, sObject.RecordTypeId AS RecordTypeId, STRUCT ( `RecordType`.DeveloperName AS DeveloperName, `RecordType`.Id AS Id ) AS RecordType ), sObject.context.snapshotTime ) as result FROM UNNEST(mock_CA10__CaAwsDistribution__c()) AS sObject LEFT JOIN UNNEST(mock_RecordType()) AS `RecordType` ON sObject.RecordTypeId = `RecordType`.Id ) sObject ON sObject.Id = expectedResult.Id;