Skip to main content

IaC Lacework Policies

Lacework IaC Security is converting existing policies to Rego. You may notice duplicate findings due to checkov or tfsec policies temporarily co-existing. For remediation, Lacework offers suppression options for both Code Security App and CI/CD integrations.

Assessments

Invoked via Code Security App and CI/CD

In the Console, the new Lacework authored policies are visible as part of your assessment findings. The old policies they have replaced can be seen in Suppressed findings (Soluble) / Exceptions (Lacework).

Note that these new policies have been carefully reviewed and tested by Lacework, and they may not use the same logic as the checkov or tfsec policies. You may see false positive results disappear and true positive results appear.

Invoked via the CLI

The CLI runs one tool per scan, for example a checkov scan or a tfsec scan. Therefore, all the policies for a given tool are evaluated.

Duplicate Findings

For Code Security App and CI/CD invoked assessments, to avoid duplication, Lacework suppresses the old policy findings. As assessments are built dynamically, the old policies will show up as suppressed for old assessments too.

Published Lacework Policies

Policies converted to Rego are released in small batches. In cases where an existing policy is no longer relevant, it is deprecated without replacement.

The following table tracks released Rego policies.

Policy Mapping

Policy NameLacework Policy IDCheckov Policy IDTfsec Policy IDPublish Date
EKS should not allow public access to API endpointlacework-iac-aws-network-1ckv-aws-38tfsec-aws068, tfsec-aws0697/10/23
Ensure RDS cluster has IAM authentication enabledlacework-iac-aws-iam-1ckv-aws-1627/10/23
Pods should not run containers with allowPrivilegeEscalationlacework-iac-k8s-security-2ckv-k8s-207/10/23
KMS master keys should not be globally accessiblelacework-iac-aws-security-1ckv-aws-337/10/23
Container image should be versionedlacework-iac-k8s-workload-1ckv-k8s-437/27/23
Minimize the execution of container workloads with added capabilitieslacework-iac-k8s-workload-2ckv-k8s-247/27/23
Minimize the execution of container workloads with the NET_RAW capabilitylacework-iac-k8s-workload-3ckv-k8s-7, ckv-k8s-287/27/23
AWS resources must specify a Security Grouplacework-iac-aws-network-2ckv2-aws-57/27/23
Apply security context to pods and containerslacework-iac-k8s-security-1ckv-k8s-29, ckv-k8s-307/27/23
An inbound firewall rule allows traffic from /0lacework-iac-gcp-network-1tfsec-gcp0037/27/23
Amazon ALBs should implement HTTPSlacework-iac-aws-tls-1ckv-aws-2tfsec-aws0048/4/23
An outdated SSL policy is in use by a load balancerlacework-iac-aws-tls-2tfsec-aws0108/4/23
CloudFront distribution uses outdated SSL/TLS protocolslacework-iac-aws-tls-3tfsec-aws0218/4/23
API Gateway domain name uses outdated SSL/TLS protocollacework-iac-aws-tls-4tfsec-aws0258/4/23
ElasticSearch domain endpoint uses outdated TLS policylacework-iac-aws-tls-5tfsec-aws0348/4/23
Network ACL allows ingress from 0.0.0.0/0lacework-iac-aws-network-3tfsec-aws0498/4/23
Network ACL ingress must not permit all portslacework-iac-aws-network-4tfsec-aws0508/4/23
S3 bucket does not block public accesslacework-iac-aws-storage-1cks-aws-53, ckv-aws-54, ckv-aws-55, ckv-aws-56tfsec-aws001, tfsec-aws074, tfsec-aws075, tfsec-aws076,8/4/23
DAX Cluster should encrypt data at restlacework-iac-aws-encryption-2tfsec-aws0818/17/23
Unencrypted SNS topiclacework-iac-aws-encryption-4tfsec-aws0168/17/23
A KMS key is not configured to auto-rotatelacework-iac-aws-encryption-5tfsec-aws0198/17/23
CloudFront viewer protocol policy should be set to https-only or redirect-to-httplacework-iac-aws-encryption-6tfsec-aws0208/17/23
EKS Clusters should encrypt secretslacework-iac-aws-encryption-10tfsec-aws0668/17/23
EKS Cluster should have control plane logging enabledlacework-iac-aws-logging-1ckv-aws-37tfsec-aws0678/17/23
S3 bucket does not have access logginglacework-iac-aws-storage-2tfsec-aws0028/17/23
RDS instance is publicly accessiblelacework-iac-aws-storage-3tfsec-aws0118/17/23
RDS instance does not encrypt Performance Insightslacework-iac-aws-storage-4tfsec-aws0538/17/23
Athena database not encrypted at restlacework-iac-aws-storage-5ckv-aws-77tfsec-aws0598/17/23
Athena workgroup not encrypted at restlacework-iac-aws-storage-6ckv-aws-159tfsec-aws0608/17/23
S3 Versioning should be enabledlacework-iac-aws-storage-7ckv-aws-21tfsec-aws0778/17/23 (Replacing tfsef-aws077), 9/19/23 (Replacing ckv-aws-21)
ECR should have immutable image tagslacework-iac-aws-storage-8tfsec-aws0788/17/23
Launch configuration with unencrypted block devicelacework-iac-aws-encryption-1tfsec-aws0148/29/23
Unencrypted SQS queuelacework-iac-aws-encryption-3tfsec-aws0158/29/23
A MSK cluster allows unencrypted data in transitlacework-iac-aws-encryption-7tfsec-aws0228/29/23
Elasticsearch domain is not encrypted at restlacework-iac-aws-encryption-8tfsec-aws0318/29/23
CodeBuild artifacts and logs should be encryptedlacework-iac-aws-encryption-9ckv-aws-78, ckv-aws-147tfsec-aws0808/29/23
CloudTrail log files should be encrypted with customer managed KMS keyslacework-iac-aws-encryption-11ckv-aws-35tfsec-aws0658/29/23
ElasticSearch node-to-node encryption not enabledlacework-iac-aws-encryption-12tfsec-aws0558/29/23
ElasticSearch domains should enforce HTTPSlacework-iac-aws-encryption-14ckv-aws-054tfsec-aws033, tfsec-aws0548/29/23
RDS Cluster should have storage encryption enabledlacework-iac-aws-encryption-16tfsec-aws0518/29/23
RDS DB instance should have storage encryptedlacework-iac-aws-encryption-17tfsec-aws0528/29/23
Unencrypted Elasticache Replication Grouplacework-iac-encryption-18ckv-aws-29tfsec-aws0358/29/23
Elastic File System should be encryptedlacework-iac-encryption-19ckv-aws-184tfsec-aws0489/12/23
Enable transit encryption for Elasticache RGlacework-iac-aws-encryption-20tfsec-aws0369/12/23

Policy Deprecation

The following table tracks policies that have been deprecated without a replacement Lacework policy.

Policies may be deprecated for various reasons including but not limited to:

  • the resource, service or feature targeted by the policy being deprecated
  • lack of security rationale
checkov Policies
AWS
Policy IDPolicy NameDeprecation Date
ckv-aws-11Ensure IAM password policy requires at least one lowercase letter9/11/23
ckv-aws-12Ensure IAM password policy requires at least one number9/11/23
ckv-aws-14Ensure IAM password policy requires at least one symbol9/11/23
ckv-aws-15Ensure IAM password policy requires at least one uppercase letter9/11/23
ckv-aws-19Ensure all data stored in the S3 bucket is securely encrypted at rest7/3/23
ckv-aws-145Ensure that S3 buckets are encrypted with KMS by default7/3/23
Google Cloud
Policy IDPolicy NameDeprecation Date
ckv-gcp-24GKE is enabled with PodSecurityPolicy check8/10/23
Kubernetes (K8s)
Policy IDPolicy NameDeprecation Date
ckv-k8s-1Minimize the admission of containers wishing to share the host process ID namespace8/10/23
ckv-k8s-2Minimize the admission of privileged containers in PodSecurityPolicy8/10/23
ckv-k8s-3Minimize the admission of containers wishing to share the host IPC namespace8/10/23
ckv-k8s-4Minimize the admission of containers wishing to share the host network namespace8/10/23
ckv-k8s-5Minimize the admission of containers with allowPrivilegeEscalation8/10/23
ckv-k8s-6Minimize the admission of root containers8/10/23
ckv-k8s-11CPU limits should be set8/16/23
ckv-k8s-16Minimize the admission of privileged containers8/10/23
ckv-k8s-17CronJob containers should not share the host process ID namespace8/10/23
ckv-k8s-18CronJob containers should not share the host IPC namespace8/10/23
ckv-k8s-19CronJob containers should not share the host network namespace8/10/23
ckv-k8s-23Minimize the admission of root containers8/10/23
ckv-k8s-36Minimize the admission of containers with capabilities assigned8/10/23
ckv-k8s-39Do not use the CAP_SYS_ADMIN linux capability8/10/23
ckv-k8s-40Containers should run as a high UID to avoid host conflict8/10/23
ckv-k8s-84Ensure that the admission control plugin PodSecurityPolicy is set8/10/23
tfsec Policies
AWS
Policy IDPolicy NameDeprecation Date
tfsec-aws017Unencrypted S3 bucket7/3/23
tfsec-aws041IAM Password policy should have requirement for at least one number in the password9/11/23
tfsec-aws042IAM Password policy should have requirement for at least one lowercase character9/11/23
tfsec-aws043IAM Password policy should have requirement for at least one uppercase character9/11/23
Google Cloud
Policy IDPolicy NameDeprecation Date
tfsec-gcp009Pod security policy enforcement not defined8/10/23