Skip to main content

πŸ§ͺ test-data.json

  • Contextual name: πŸ§ͺ test-data.json
  • ID: /ce/ca/aws/ec2/security-group-allows-unrestricted-traffic-to-postgres/test-data.json

Used In​

LogicPolicyFlags
🧠 prod.logic.yaml πŸŸ’πŸ“ AWS EC2 Security Group allows unrestricted traffic to PostgreSQL 🟒🟒 x3

Content​

Open File

[
{
"expectedResult": {
"status": "DISAPPEARED",
"conditionIndex": "99",
"conditionText": "isDisappeared(CA10__disappearanceTime__c)",
"runtimeError": null
},
"context": {
"snapshotTime": "2024-05-30T02:23:36Z"
},
"Id": "test1",
"CA10__disappearanceTime__c": "2024-05-27T17:37:28Z",
"CA10__AWS_EC2_Security_Group_Rules__r": []
},
{
"expectedResult": {
"status": "INCOMPLIANT",
"conditionIndex": "199",
"conditionText": "CA10__AWS_EC2_Security_Group_Rules__r.has(INCOMPLIANT)",
"runtimeError": null
},
"context": {
"snapshotTime": "2024-05-30T02:23:36Z"
},
"Id": "test2",
"CA10__disappearanceTime__c": null,
"CA10__AWS_EC2_Security_Group_Rules__r": [
{
"Id": "test2_1",
"CA10__disappearanceTime__c": null,
"CA10__direction__c": "Inbound",
"CA10__sourceIpRange__c": "::/0",
"CA10__protocol__c": "All",
"CA10__fromPort__c": 5432,
"CA10__toPort__c": 5432,
"CA10__securityGroup__c": "test2"
}
]
},
{
"expectedResult": {
"status": "INCOMPLIANT",
"conditionIndex": "199",
"conditionText": "CA10__AWS_EC2_Security_Group_Rules__r.has(INCOMPLIANT)",
"runtimeError": null
},
"context": {
"snapshotTime": "2024-05-30T02:23:36Z"
},
"Id": "test3",
"CA10__disappearanceTime__c": null,
"CA10__AWS_EC2_Security_Group_Rules__r": [
{
"Id": "test3_1",
"CA10__disappearanceTime__c": null,
"CA10__direction__c": "Inbound",
"CA10__sourceIpRange__c": "0.0.0.0/0",
"CA10__protocol__c": "tcp",
"CA10__fromPort__c": 5430,
"CA10__toPort__c": 5440,
"CA10__securityGroup__c": "test3"
}
]
},
{
"expectedResult": {
"status": "COMPLIANT",
"conditionIndex": "200",
"conditionText": "otherwise",
"runtimeError": null
},
"context": {
"snapshotTime": "2024-05-30T02:23:36Z"
},
"Id": "test5",
"CA10__disappearanceTime__c": null,
"CA10__AWS_EC2_Security_Group_Rules__r": [
{
"Id": "test5_1",
"CA10__disappearanceTime__c": null,
"CA10__direction__c": "Outbound",
"CA10__sourceIpRange__c": "::/0",
"CA10__protocol__c": "tcp",
"CA10__fromPort__c": null,
"CA10__toPort__c": null,
"CA10__securityGroup__c": "test5"
}
]
},
{
"expectedResult": {
"status": "COMPLIANT",
"conditionIndex": "200",
"conditionText": "otherwise",
"runtimeError": null
},
"context": {
"snapshotTime": "2024-05-30T02:23:36Z"
},
"Id": "test6",
"CA10__disappearanceTime__c": null,
"CA10__AWS_EC2_Security_Group_Rules__r": [
{
"Id": "test6_1",
"CA10__disappearanceTime__c": null,
"CA10__direction__c": "Inbound",
"CA10__sourceIpRange__c": "0.0.0.0/0",
"CA10__protocol__c": "tcp",
"CA10__fromPort__c": null,
"CA10__toPort__c": null,
"CA10__securityGroup__c": "test6"
}
]
},
{
"expectedResult": {
"status": "COMPLIANT",
"conditionIndex": "200",
"conditionText": "otherwise",
"runtimeError": null
},
"context": {
"snapshotTime": "2024-05-30T02:23:36Z"
},
"Id": "test7",
"CA10__disappearanceTime__c": null,
"CA10__AWS_EC2_Security_Group_Rules__r": [
{
"Id": "test7_1",
"CA10__disappearanceTime__c": null,
"CA10__direction__c": "Inbound",
"CA10__sourceIpRange__c": "0.0.0.0/0",
"CA10__protocol__c": "tcp",
"CA10__fromPort__c": 1111,
"CA10__toPort__c": 1111,
"CA10__securityGroup__c": "test7"
}
]
},
{
"expectedResult": {
"status": "COMPLIANT",
"conditionIndex": "200",
"conditionText": "otherwise",
"runtimeError": null
},
"context": {
"snapshotTime": "2024-05-30T02:23:36Z"
},
"Id": "test8",
"CA10__disappearanceTime__c": null,
"CA10__AWS_EC2_Security_Group_Rules__r": []
}
]