Tag log buckets created by AWS CDK for third party tools
Overview
How you secure cloud configuration often starts with cdk-nag, but many teams also use third-party tools after deployments.
Using the “server access logs not configured” example, this post...
Introduction
In some cases, the CDK bootstrap resources need changes beyond what's possible with the standard bootstrap parameters. While the CDK provides customization options, certain...
Overview
cdk-nag’s AwsSolutions-IAM5 rule is one of the most frequent findings in real-world stacks. It flags wildcard permissions in both Action (e.g., kms:GenerateDataKey) and Resource (e.g., `)...
Suppress cdk-nag findings for custom resource singleton lambda globally
Overview
When using AWS CDK with custom resources, CDK creates a singleton Lambda function that handles all custom resource operations. This Lambda function can trigger several cdk-nag findings,...