-
Notifications
You must be signed in to change notification settings - Fork 504
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
terrascan: scanning terraform files vs terraform plan #407
Comments
Hi @ismailyenigul! |
Thanks @amirbenv |
Not yet, but should be in the next few weeks. It would be good to know how popular this feature is- If others are interested let us know by commenting on this thread! |
I would like to have this feature. |
I would like to have this feature too. |
Actually this is not a bug report it is a feature request.
Terrascan downloads remote source in terraform modules and evaluate the variables while checking terraform codes.
some other iac tools(regula,checkov) and OPA itself can scan terraform plan output in JSON.
Do you have any plan to support terraform plan output in JSON or do you think that scanning terraform plan provides better result?
From checkov documentation: https://github.com/bridgecrewio/checkov/blob/master/docs/2.Concepts/Evaluate%20Terraform%20Plan.md#evaluate-checkov-policies-on-terraform-plan
Evaluate Checkov policies on Terraform plan
Checkov supports the evaluation of policies on resources declared in
.tf
files. It can also be used to evaluateterraform plan
expressed in a json file.Plan evaluation provides Checkov additional dependencies and context that can result in a more complete scan result.
Since Terraform plan files may contain arguments (like secrets) that are injected dynamically, it is advised to run a plan evaluation using Checkov in a secure CI/CD pipeline setting.
The text was updated successfully, but these errors were encountered: