

Source = "cloudposse/waf/aws " # Cloud Posse recommends pinning every module to a specific version # version = "x.x.x" Source = "cloudposse/label/null " # Cloud Posse recommends pinning every module to a specific version # version = "x.x.x" (which tests and deploys the example on AWS), see test. The table below correctly indicates which inputs are required.įor a complete example, see examples/complete.įor automated tests of the complete example using bats and Terratest The registry shows many of our inputs as required when in fact they are optional. Systematic way so that they do not catch you by surprise.Īlso, because of a bug in the Terraform registry ( hashicorp/terraform#21417),

Using so that your infrastructure remains stable, and update versions in a We highly recommend that in your code you pin the version to the exact version you are IMPORTANT: We do not pin modules to versions in our examples because of theĭifficulty of keeping the versions in the documentation in sync with the latest released versions. Health Insurance Portability and Accountability Compliance Service Organization Control 2 ComplianceĬenter for Internet Security, GCP Compliance

Information Security Management System, ISO/IEC 27001 Compliance National Institute of Standards and Technology Compliance Payment Card Industry Data Security Standards Compliance BenchmarkĬenter for Internet Security, KUBERNETES ComplianceĬenter for Internet Security, AWS ComplianceĬenter for Internet Security, AZURE Compliance Bridgecrew is the leading fully hosted, cloud-native solution providing continuous Terraform security and compliance. Security scanning is graciously provided by Bridgecrew. We literally have hundreds of terraform modules that are Open Source and well-maintained. It's 100% Open Source and licensed under the APACHE2. This project is part of our comprehensive "SweetOps" approach towards DevOps. Terraform module to create and manage AWS WAFv2 rules.
