1
0
mirror of synced 2026-05-22 14:43:35 +00:00
Files
Bharathi Srinivasan e746bf7764 Features folder revamp (#1540)
adding scripts for agentcore features; jupyter notebooks moved to workshops; reorganising folders
2026-05-20 18:35:16 -07:00

161 lines
4.7 KiB
YAML

# Checkov configuration for amazon-bedrock-agentcore-samples
# This repository contains tutorial and sample code. Certain security best
# practices are intentionally simplified to keep samples focused and accessible.
# Production deployments should implement all security best practices.
skip-check:
# Lambda - VPC configuration
# Sample Lambda functions use public internet access by design (Bedrock API calls).
# Production code should evaluate VPC placement based on network requirements.
- CKV_AWS_117
# Lambda - Dead Letter Queue
# Tutorial samples do not require DLQ for demonstration purposes.
# Production workloads should configure DLQ for error handling.
- CKV_AWS_116
# Lambda - Concurrent execution limit
# Samples use unreserved concurrency; production deployments should set limits.
- CKV_AWS_115
# Lambda - Code signing configuration
# Code signing adds operational overhead beyond the scope of these tutorials.
- CKV_AWS_173
# ECR - KMS encryption (default AWS-managed encryption is used)
# Samples use default ECR encryption. Production should use KMS CMK.
- CKV_AWS_136
# DynamoDB - KMS CMK encryption
# Samples use default DynamoDB encryption. Production should use KMS CMK.
- CKV_AWS_119
# DynamoDB - Point-in-time recovery (PITR)
# Not required for tutorial sample data.
- CKV_AWS_28
# S3 - Access logging
# Access logging requires an additional logging bucket; omitted for sample simplicity.
- CKV_AWS_18
# S3 - Versioning
# Not required for tutorial samples.
- CKV_AWS_21
# CloudWatch Logs - KMS encryption
# Sample log groups use default encryption. Production should use KMS CMK.
- CKV_AWS_158
# SecretsManager - KMS CMK
# Samples use default Secrets Manager encryption. Production should use KMS CMK.
- CKV_AWS_149
# IAM - Write access without constraints / data exfiltration
# Sample IAM roles are intentionally scoped broadly for tutorial clarity.
# Production deployments must apply least-privilege policies.
- CKV_AWS_111
- CKV_AWS_108
- CKV_AWS_109
# Lambda permission - source account / source ARN
# Tutorial sample Lambda permissions use simplified resource-based policies.
- CKV_AWS_364
- CKV_AWS_363
# API Gateway - caching, access logging, metrics
# Sample API Gateway stages omit optional monitoring/caching configuration.
- CKV_AWS_120
- CKV_AWS_73
- CKV_AWS_76
# Kinesis - stream encryption
# Sample streams use default encryption.
- CKV_AWS_43
# SQS - encryption at rest
# Sample queues use default encryption.
- CKV_AWS_27
# EC2 Security Group - description / open ports
# Sample security groups are intentionally permissive for connectivity demos.
- CKV_AWS_24
- CKV_AWS_23
# CloudFront - various configuration checks
- CKV_AWS_86
- CKV_AWS_68
- CKV_AWS_174
- CKV_AWS_2
- CKV_AWS_103
# RDS/Aurora - various checks
- CKV_AWS_162
- CKV_AWS_165
# API Gateway - open method access
# Bearer-token-injection workshop intentionally uses open API methods for demo purposes.
- CKV_AWS_59
# Lambda - X-Ray tracing
# Sample Lambda functions do not enable X-Ray for tutorial simplicity.
- CKV_AWS_50
# Lambda - Code signing (v2 check)
# Workshop sample Lambdas do not use code signing.
- CKV_AWS_272
# Lambda - Resource-based policy with broad invoke permissions
# AgentCore gateway role intentionally allows invoking target Lambdas.
- CKV_AWS_290
- CKV_AWS_355
# API Gateway - WAF association
# Workshop sample API Gateway stages do not require WAF for tutorial demos.
- CKV_AWS_237
- CKV2_AWS_4
# API Gateway - access logging and client certificates
# Omitted for workshop sample simplicity.
- CKV2_AWS_29
- CKV2_AWS_51
# Docker - HEALTHCHECK instruction
# Sample Dockerfiles omit HEALTHCHECK for tutorial simplicity.
- CKV_DOCKER_2
# Docker - USER instruction (non-root)
# Sample Dockerfiles run as root for simplicity; production should use a non-root user.
- CKV_DOCKER_3
# Kubernetes - various security checks
# Sample K8s manifests are simplified for demonstration purposes.
- CKV_K8S_21
- CKV_K8S_37
- CKV_K8S_31
- CKV_K8S_8
- CKV_K8S_20
- CKV_K8S_15
- CKV_K8S_13
- CKV_K8S_40
- CKV_K8S_22
- CKV_K8S_9
- CKV_K8S_28
- CKV_K8S_14
- CKV_K8S_38
- CKV_K8S_23
- CKV_K8S_43
- CKV_K8S_11
- CKV2_K8S_6
# OpenAPI - security definitions
# Sample OpenAPI specs use simplified security for tutorial clarity.
- CKV_OPENAPI_4
- CKV_OPENAPI_5
- CKV_OPENAPI_21
# Secret scanning - false positives in API spec examples and placeholder values
# These files contain example tokens in OpenAPI/Smithy documentation and
# explicit placeholder values, not real credentials.
- CKV_SECRET_6
- CKV_SECRET_2