Skip to content

avm.ptn.aca-lza.hosting-environment #41

avm.ptn.aca-lza.hosting-environment

avm.ptn.aca-lza.hosting-environment #41

Manually triggered February 22, 2025 21:48
Status Success
Total duration 6m 15s
Artifacts
Initialize pipeline
11s
Initialize pipeline
Run  /  Static validation
2m 7s
Run / Static validation
Matrix: Run / job_psrule_test_waf_reliability
Matrix: Run / job_psrule_test_waf_security_cb
Matrix: Run / job_psrule_test
Matrix: Run / job_psrule_test_waf_security
Matrix: Run / job_module_deploy_validation
Run  /  Publishing
0s
Run / Publishing
Fit to window
Zoom out
Zoom in

Annotations

38 errors
Run / PSRule - WAF Security [waf-aligned]
AZR-000137: nsg-agw-cawaf-dev-eus failed Azure.NSG.AnyInboundSource. Network security groups (NSGs) should avoid rules that allow "any" as an inbound source.
Run / PSRule - WAF Security [waf-aligned]
AZR-000139: nsg-agw-cawaf-dev-eus failed Azure.NSG.LateralTraversal. Deny outbound management connections from non-management hosts.
Run / PSRule - WAF Security [waf-aligned]
AZR-000139: nsg-cae-cawaf-dev-eus failed Azure.NSG.LateralTraversal. Deny outbound management connections from non-management hosts.
Run / PSRule - WAF Security [waf-aligned]
AZR-000139: nsg-vm-cawaf-dev-eus failed Azure.NSG.LateralTraversal. Deny outbound management connections from non-management hosts.
Run / PSRule - WAF Security [waf-aligned]
AZR-000408: vault-b9e4bbf6f43ac failed Azure.Deployment.SecureParameter. Sensitive parameters that have been not been marked as secure may leak the secret into deployment history or logs.
Run / PSRule - WAF Security [waf-aligned]
AZR-000408: 98b10c988b3f7-secrets-kv failed Azure.Deployment.SecureParameter. Sensitive parameters that have been not been marked as secure may leak the secret into deployment history or logs.
Run / PSRule - WAF Security [waf-aligned]
AZR-000304: agw-cawaf-dev-eusPolicy001 failed Azure.AppGwWAF.RuleGroups. Use recommended rule groups in Application Gateway Web Application Firewall (WAF) policies to protect back end resources.
Run / PSRule - WAF Security [waf-aligned]
One or more assertions failed. One or more rules reported failure.
Run / PSRule - WAF Security [waf-aligned]
Process completed with exit code 1.
Run / PSRule - WAF Security [defaults]
AZR-000137: nsg-agw-camin-test-eus failed Azure.NSG.AnyInboundSource. Network security groups (NSGs) should avoid rules that allow "any" as an inbound source.
Run / PSRule - WAF Security [defaults]
AZR-000139: nsg-agw-camin-test-eus failed Azure.NSG.LateralTraversal. Deny outbound management connections from non-management hosts.
Run / PSRule - WAF Security [defaults]
AZR-000139: nsg-cae-camin-test-eus failed Azure.NSG.LateralTraversal. Deny outbound management connections from non-management hosts.
Run / PSRule - WAF Security [defaults]
AZR-000139: nsg-vm-camin-test-eus failed Azure.NSG.LateralTraversal. Deny outbound management connections from non-management hosts.
Run / PSRule - WAF Security [defaults]
AZR-000408: vault-6e62ed3e5a88a failed Azure.Deployment.SecureParameter. Sensitive parameters that have been not been marked as secure may leak the secret into deployment history or logs.
Run / PSRule - WAF Security [defaults]
AZR-000408: f9fd07b81390d-secrets-kv failed Azure.Deployment.SecureParameter. Sensitive parameters that have been not been marked as secure may leak the secret into deployment history or logs.
Run / PSRule - WAF Security [defaults]
AZR-000304: agw-camin-test-eusPolicy001 failed Azure.AppGwWAF.RuleGroups. Use recommended rule groups in Application Gateway Web Application Firewall (WAF) policies to protect back end resources.
Run / PSRule - WAF Security [defaults]
One or more assertions failed. One or more rules reported failure.
Run / PSRule - WAF Security [defaults]
Process completed with exit code 1.
Run / PSRule [defaults]
AZR-000137: nsg-agw-camin-test-eus failed Azure.NSG.AnyInboundSource. Network security groups (NSGs) should avoid rules that allow "any" as an inbound source.
Run / PSRule [defaults]
AZR-000139: nsg-agw-camin-test-eus failed Azure.NSG.LateralTraversal. Deny outbound management connections from non-management hosts.
Run / PSRule [defaults]
AZR-000139: nsg-cae-camin-test-eus failed Azure.NSG.LateralTraversal. Deny outbound management connections from non-management hosts.
Run / PSRule [defaults]
AZR-000139: nsg-vm-camin-test-eus failed Azure.NSG.LateralTraversal. Deny outbound management connections from non-management hosts.
Run / PSRule [defaults]
AZR-000166: dcr-vm-test-eus failed Azure.Resource.UseTags. Azure resources should be tagged using a standard convention.
Run / PSRule [defaults]
AZR-000408: vault-6e62ed3e5a88a failed Azure.Deployment.SecureParameter. Sensitive parameters that have been not been marked as secure may leak the secret into deployment history or logs.
Run / PSRule [defaults]
AZR-000408: f9fd07b81390d-secrets-kv failed Azure.Deployment.SecureParameter. Sensitive parameters that have been not been marked as secure may leak the secret into deployment history or logs.
Run / PSRule [defaults]
AZR-000304: agw-camin-test-eusPolicy001 failed Azure.AppGwWAF.RuleGroups. Use recommended rule groups in Application Gateway Web Application Firewall (WAF) policies to protect back end resources.
Run / PSRule [defaults]
One or more assertions failed. One or more rules reported failure.
Run / PSRule [defaults]
Process completed with exit code 1.
Run / PSRule [waf-aligned]
AZR-000137: nsg-agw-cawaf-dev-eus failed Azure.NSG.AnyInboundSource. Network security groups (NSGs) should avoid rules that allow "any" as an inbound source.
Run / PSRule [waf-aligned]
AZR-000139: nsg-agw-cawaf-dev-eus failed Azure.NSG.LateralTraversal. Deny outbound management connections from non-management hosts.
Run / PSRule [waf-aligned]
AZR-000139: nsg-cae-cawaf-dev-eus failed Azure.NSG.LateralTraversal. Deny outbound management connections from non-management hosts.
Run / PSRule [waf-aligned]
AZR-000139: nsg-vm-cawaf-dev-eus failed Azure.NSG.LateralTraversal. Deny outbound management connections from non-management hosts.
Run / PSRule [waf-aligned]
AZR-000166: dcr-vm-dev-eus failed Azure.Resource.UseTags. Azure resources should be tagged using a standard convention.
Run / PSRule [waf-aligned]
AZR-000408: vault-b9e4bbf6f43ac failed Azure.Deployment.SecureParameter. Sensitive parameters that have been not been marked as secure may leak the secret into deployment history or logs.
Run / PSRule [waf-aligned]
AZR-000408: 98b10c988b3f7-secrets-kv failed Azure.Deployment.SecureParameter. Sensitive parameters that have been not been marked as secure may leak the secret into deployment history or logs.
Run / PSRule [waf-aligned]
AZR-000304: agw-cawaf-dev-eusPolicy001 failed Azure.AppGwWAF.RuleGroups. Use recommended rule groups in Application Gateway Web Application Firewall (WAF) policies to protect back end resources.
Run / PSRule [waf-aligned]
One or more assertions failed. One or more rules reported failure.
Run / PSRule [waf-aligned]
Process completed with exit code 1.