avm.ptn.aca-lza.hosting-environment #41
avm.ptn.aca-lza.hosting-environment.yml
on: workflow_dispatch
Initialize pipeline
11s
Matrix: Run / job_psrule_test_waf_reliability
Matrix: Run / job_psrule_test_waf_security_cb
Matrix: Run / job_psrule_test
Matrix: Run / job_psrule_test_waf_security
Matrix: Run / job_module_deploy_validation
Run
/
Publishing
0s
Annotations
38 errors
Run / PSRule - WAF Security [waf-aligned]
AZR-000137: nsg-agw-cawaf-dev-eus failed Azure.NSG.AnyInboundSource. Network security groups (NSGs) should avoid rules that allow "any" as an inbound source.
|
Run / PSRule - WAF Security [waf-aligned]
AZR-000139: nsg-agw-cawaf-dev-eus failed Azure.NSG.LateralTraversal. Deny outbound management connections from non-management hosts.
|
Run / PSRule - WAF Security [waf-aligned]
AZR-000139: nsg-cae-cawaf-dev-eus failed Azure.NSG.LateralTraversal. Deny outbound management connections from non-management hosts.
|
Run / PSRule - WAF Security [waf-aligned]
AZR-000139: nsg-vm-cawaf-dev-eus failed Azure.NSG.LateralTraversal. Deny outbound management connections from non-management hosts.
|
Run / PSRule - WAF Security [waf-aligned]
AZR-000408: vault-b9e4bbf6f43ac failed Azure.Deployment.SecureParameter. Sensitive parameters that have been not been marked as secure may leak the secret into deployment history or logs.
|
Run / PSRule - WAF Security [waf-aligned]
AZR-000408: 98b10c988b3f7-secrets-kv failed Azure.Deployment.SecureParameter. Sensitive parameters that have been not been marked as secure may leak the secret into deployment history or logs.
|
Run / PSRule - WAF Security [waf-aligned]
AZR-000304: agw-cawaf-dev-eusPolicy001 failed Azure.AppGwWAF.RuleGroups. Use recommended rule groups in Application Gateway Web Application Firewall (WAF) policies to protect back end resources.
|
Run / PSRule - WAF Security [waf-aligned]
One or more assertions failed. One or more rules reported failure.
|
Run / PSRule - WAF Security [waf-aligned]
Process completed with exit code 1.
|
Run / PSRule - WAF Security [defaults]
AZR-000137: nsg-agw-camin-test-eus failed Azure.NSG.AnyInboundSource. Network security groups (NSGs) should avoid rules that allow "any" as an inbound source.
|
Run / PSRule - WAF Security [defaults]
AZR-000139: nsg-agw-camin-test-eus failed Azure.NSG.LateralTraversal. Deny outbound management connections from non-management hosts.
|
Run / PSRule - WAF Security [defaults]
AZR-000139: nsg-cae-camin-test-eus failed Azure.NSG.LateralTraversal. Deny outbound management connections from non-management hosts.
|
Run / PSRule - WAF Security [defaults]
AZR-000139: nsg-vm-camin-test-eus failed Azure.NSG.LateralTraversal. Deny outbound management connections from non-management hosts.
|
Run / PSRule - WAF Security [defaults]
AZR-000408: vault-6e62ed3e5a88a failed Azure.Deployment.SecureParameter. Sensitive parameters that have been not been marked as secure may leak the secret into deployment history or logs.
|
Run / PSRule - WAF Security [defaults]
AZR-000408: f9fd07b81390d-secrets-kv failed Azure.Deployment.SecureParameter. Sensitive parameters that have been not been marked as secure may leak the secret into deployment history or logs.
|
Run / PSRule - WAF Security [defaults]
AZR-000304: agw-camin-test-eusPolicy001 failed Azure.AppGwWAF.RuleGroups. Use recommended rule groups in Application Gateway Web Application Firewall (WAF) policies to protect back end resources.
|
Run / PSRule - WAF Security [defaults]
One or more assertions failed. One or more rules reported failure.
|
Run / PSRule - WAF Security [defaults]
Process completed with exit code 1.
|
Run / PSRule [defaults]
AZR-000137: nsg-agw-camin-test-eus failed Azure.NSG.AnyInboundSource. Network security groups (NSGs) should avoid rules that allow "any" as an inbound source.
|
Run / PSRule [defaults]
AZR-000139: nsg-agw-camin-test-eus failed Azure.NSG.LateralTraversal. Deny outbound management connections from non-management hosts.
|
Run / PSRule [defaults]
AZR-000139: nsg-cae-camin-test-eus failed Azure.NSG.LateralTraversal. Deny outbound management connections from non-management hosts.
|
Run / PSRule [defaults]
AZR-000139: nsg-vm-camin-test-eus failed Azure.NSG.LateralTraversal. Deny outbound management connections from non-management hosts.
|
Run / PSRule [defaults]
AZR-000166: dcr-vm-test-eus failed Azure.Resource.UseTags. Azure resources should be tagged using a standard convention.
|
Run / PSRule [defaults]
AZR-000408: vault-6e62ed3e5a88a failed Azure.Deployment.SecureParameter. Sensitive parameters that have been not been marked as secure may leak the secret into deployment history or logs.
|
Run / PSRule [defaults]
AZR-000408: f9fd07b81390d-secrets-kv failed Azure.Deployment.SecureParameter. Sensitive parameters that have been not been marked as secure may leak the secret into deployment history or logs.
|
Run / PSRule [defaults]
AZR-000304: agw-camin-test-eusPolicy001 failed Azure.AppGwWAF.RuleGroups. Use recommended rule groups in Application Gateway Web Application Firewall (WAF) policies to protect back end resources.
|
Run / PSRule [defaults]
One or more assertions failed. One or more rules reported failure.
|
Run / PSRule [defaults]
Process completed with exit code 1.
|
Run / PSRule [waf-aligned]
AZR-000137: nsg-agw-cawaf-dev-eus failed Azure.NSG.AnyInboundSource. Network security groups (NSGs) should avoid rules that allow "any" as an inbound source.
|
Run / PSRule [waf-aligned]
AZR-000139: nsg-agw-cawaf-dev-eus failed Azure.NSG.LateralTraversal. Deny outbound management connections from non-management hosts.
|
Run / PSRule [waf-aligned]
AZR-000139: nsg-cae-cawaf-dev-eus failed Azure.NSG.LateralTraversal. Deny outbound management connections from non-management hosts.
|
Run / PSRule [waf-aligned]
AZR-000139: nsg-vm-cawaf-dev-eus failed Azure.NSG.LateralTraversal. Deny outbound management connections from non-management hosts.
|
Run / PSRule [waf-aligned]
AZR-000166: dcr-vm-dev-eus failed Azure.Resource.UseTags. Azure resources should be tagged using a standard convention.
|
Run / PSRule [waf-aligned]
AZR-000408: vault-b9e4bbf6f43ac failed Azure.Deployment.SecureParameter. Sensitive parameters that have been not been marked as secure may leak the secret into deployment history or logs.
|
Run / PSRule [waf-aligned]
AZR-000408: 98b10c988b3f7-secrets-kv failed Azure.Deployment.SecureParameter. Sensitive parameters that have been not been marked as secure may leak the secret into deployment history or logs.
|
Run / PSRule [waf-aligned]
AZR-000304: agw-cawaf-dev-eusPolicy001 failed Azure.AppGwWAF.RuleGroups. Use recommended rule groups in Application Gateway Web Application Firewall (WAF) policies to protect back end resources.
|
Run / PSRule [waf-aligned]
One or more assertions failed. One or more rules reported failure.
|
Run / PSRule [waf-aligned]
Process completed with exit code 1.
|