Skip to content

Commit 18fcf3b

Browse files
Update rules metadata before new release (#3570)
1 parent 6357df7 commit 18fcf3b

File tree

6 files changed

+18
-10
lines changed

6 files changed

+18
-10
lines changed

css-sonarpedia/sonarpedia.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
"languages": [
44
"CSS"
55
],
6-
"latest-update": "2022-11-03T12:53:02.211603Z",
6+
"latest-update": "2022-11-22T14:32:56.265429Z",
77
"options": {
88
"no-language-in-filenames": true
99
}

javascript-checks/src/main/resources/org/sonar/l10n/javascript/rules/javascript/S5542.html

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
<p>Encryption operations should use a secure mode and padding scheme so that confidentiality and integrity can be guaranteed.</p>
1+
<p>Encryption algorithms should use secure modes and padding schemes where appropriate to guarantee data confidentiality and integrity.</p>
22
<ul>
33
<li> For block cipher encryption algorithms (like AES):
44
<ul>

javascript-checks/src/main/resources/org/sonar/l10n/javascript/rules/javascript/S6303.html

Lines changed: 10 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,20 @@
1-
<p>Amazon Relational Database Service (RDS) allows to easily host and manage a relational database in the cloud. RDS databases can be encrypted,
2-
ensuring the security of data-at-rest. In the case that adversaries gain physical access to the storage medium they are not able to access the
3-
data.</p>
1+
<p>Using unencrypted RDS DB resources exposes data to unauthorized access to the underlying storage.<br> This includes database data, logs, automatic
2+
backups, read replicas, snapshots, and cluster metadata.</p>
3+
<p>This situation can occur in a variety of scenarios, such as:</p>
4+
<ul>
5+
<li> a malicious insider working at the cloud provider gains physical access to the storage device and exfiltrates data. </li>
6+
<li> unknown attackers penetrate the cloud provider’s logical infrastructure and systems for extortion. </li>
7+
</ul>
8+
<p>AWS-managed encryption at rest reduces this risk with a simple switch.</p>
49
<h2>Ask Yourself Whether</h2>
510
<ul>
611
<li> The database contains sensitive data that could cause harm when leaked. </li>
712
<li> There are compliance requirements for the service to store data encrypted. </li>
813
</ul>
914
<p>There is a risk if you answered yes to any of those questions.</p>
1015
<h2>Recommended Secure Coding Practices</h2>
11-
<p>It’s recommended to encrypt databases that contain sensitive information. Encryption and decryption are handled transparently by RDS, so no further
12-
modifications to the application are necessary.</p>
16+
<p>It is recommended to enable encryption at rest on any RDS DB resource, regardless of the engine.<br> In any case, no further maintenance is
17+
required as encryption at rest is fully managed by AWS.</p>
1318
<h2>Sensitive Code Example</h2>
1419
<p>For <a
1520
href="https://docs.aws.amazon.com/cdk/api/v2/docs/aws-cdk-lib.aws_rds.CfnDBCluster.html"><code>aws-cdk-lib.aws_rds.CfnDBCluster</code></a>:</p>

javascript-checks/src/main/resources/org/sonar/l10n/javascript/rules/javascript/S6303.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
{
2-
"title": "Using unencrypted RDS databases is security-sensitive",
2+
"title": "Using unencrypted RDS DB resources is security-sensitive",
33
"type": "SECURITY_HOTSPOT",
44
"status": "ready",
55
"remediation": {

javascript-checks/src/main/resources/org/sonar/l10n/javascript/rules/javascript/S6304.html

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,10 @@ <h2>Compliant Solution</h2>
4242
})
4343
</pre>
4444
<h2>Exceptions</h2>
45-
<p>No issue is reported when on Key policies in AWS KMS.</p>
45+
<ul>
46+
<li> Should not be raised on key policies (when AWS KMS actions are used.) </li>
47+
<li> Should not be raised on policies not using any resources (if and only if all actions in the policy never require resources.) </li>
48+
</ul>
4649
<h2>See</h2>
4750
<ul>
4851
<li> <a href="https://owasp.org/Top10/A01_2021-Broken_Access_Control/">OWASP Top 10 2021 Category A1</a> - Broken Access Control </li>

sonarpedia.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
"languages": [
44
"JS"
55
],
6-
"latest-update": "2022-11-03T12:52:58.188044Z",
6+
"latest-update": "2022-11-22T14:32:35.766299Z",
77
"options": {
88
"no-language-in-filenames": true,
99
"preserve-filenames": true

0 commit comments

Comments
 (0)