Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Additional Fields in Data #1607

Open
scrickman opened this issue Apr 21, 2023 · 0 comments
Open

Additional Fields in Data #1607

scrickman opened this issue Apr 21, 2023 · 0 comments

Comments

@scrickman
Copy link

This is more of a general question I have. When I look at the code for the plugins it looks like it's exporting various fields that don't appear in the data.

Data from Clouodsploit:

{ "plugin": "acmCertificateExpiry", "category": "ACM", "title": "ACM Certificate Expiry", "description": "Detect upcoming expiration of ACM certificates", "resource": "xxxxxxx", "region": "us-east-1", "status": "OK", "message": "Certificate for domain: xxxxxxxx expires in 327 days", "compliance": "PCI: PCI requires certificates to be kept up to date and rotated prior to expiry." },

Plugin Code:

module.exports = { title: 'ACM Certificate Expiry', category: 'ACM', domain: 'Identity and Access management', description: 'Detect upcoming expiration of ACM certificates', more_info: 'Certificates that have expired will trigger warnings in all major browsers. AWS will attempt to automatically renew the certificate but may be unable to do so if email or DNS validation cannot be confirmed.', link: 'https://docs.aws.amazon.com/acm/latest/userguide/managed-renewal.html', recommended_action: 'Ensure AWS is able to renew the certificate via email or DNS validation of the domain.', apis: ['ACM:listCertificates', 'ACM:describeCertificate'], compliance: { pci: 'PCI requires certificates to be kept up to date and rotated prior to expiry.' }, settings: { acm_certificate_expiry_pass: { name: 'ACM Certificate Expiry Pass', description: 'Return a passing result when certificate expiration date exceeds this number of days in the future', regex: '^[1-9]{1}[0-9]{0,3}$', default: 45 }, acm_certificate_expiry_warn: { name: 'ACM Certificate Expiry Warn', description: 'Return a warning result when certificate expiration date exceeds this number of days in the future', regex: '^[1-9]{1}[0-9]{0,3}$', default: 30 } },

I'm wondering if there is any way to see these additional fields in the Cloudsploit data, like the link and recommended action field. Is there a specific command line flag that needs to be specified? I can't find anything in the documentation that describes this.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant