logo
Menu
 IaC Security Scanner  - Generative AI app with PartyRock

IaC Security Scanner - Generative AI app with PartyRock

The AI-Powered IaC Security Scanner using PartyRock

Published Feb 26, 2024
Infrastructure-as-code (IaC) release security is growing in importance because to the speed at which the digital world is developing. By meeting this important requirement, the AI-Powered IaC Security Scanner indicates a substantial advancement in the field of IaC security.
The IaC Security Scanner with AI Powered is not a simple tool to use. It has native support for numerous IaC systems, such as Kubernetes, Terraform, and AWS CloudFormation. As a result, your IaC installations are safe across all platforms and support a wide range of compatibilities.
Key Features of AI-Powered IaC Security Scanner
  • In-Depth Vulnerability Assessment
  • Compliance with Industry Standards
  • User-Friendly Interface
All you need to do is visit the Party Rock Website to sign up, and the magic happens in mere seconds.
 
Step #1 : Sign In
Step #2 : Write your Prompt with your Idea
Generated App
Test the app with sample Terraform code
Published App : https://partyrock.aws/u/selvapal/UI-aMM_I3/IaC-Security-Scan-App
Sample code used for testing
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
resource "aws_cloudwatch_log_group" "cloudwatch_log_group" {
name = "msk_cluster_cloudwatch_group-${random_uuid.randuuid.result}"
}

resource "aws_msk_configuration" "msk_cluster_config" {
kafka_versions = [var.msk_cluster_version]
name = "msk-${lower(var.environment)}-cluster-cfg-${random_uuid.randuuid.result}"
server_properties = <<PROPERTIES
auto.create.topics.enable = true
delete.topic.enable = true
PROPERTIES
}

resource "aws_msk_cluster" "msk_cluster" {
count = length(var.private_subnet_cidrs)
cluster_name = "msk-${lower(var.environment)}-cluster-${random_uuid.randuuid.result}"
kafka_version = var.msk_cluster_version
number_of_broker_nodes = var.broker_nodes

broker_node_group_info {
instance_type = var.msk_cluster_instance_type
ebs_volume_size = var.msk_ebs_volume_size
client_subnets = [
"${aws_subnet.private_subnet.0.id}",
"${aws_subnet.private_subnet.1.id}",
"${aws_subnet.private_subnet.2.id}"
]
security_groups = [aws_security_group.KafkaClusterSG.id]
}

/*
client_authentication {
tls {
certificate_authority_arns = [aws_acmpca_certificate_authority.pca.arn]
}
}
*/

configuration_info {
arn = aws_msk_configuration.msk_cluster_config.arn
revision = 1
}
encryption_info {
encryption_in_transit {
client_broker = var.encryption_type
}
}

enhanced_monitoring = var.monitoring_type

logging_info {
broker_logs {
cloudwatch_logs {
enabled = true
log_group = aws_cloudwatch_log_group.cloudwatch_log_group.name
}
}
}

tags = merge(
local.common-tags,
map(
"Name", "msk-${lower(var.environment)}-cluster"
)
)
}

output "zookeeper_connect_string" {
value = aws_msk_cluster.msk_cluster.*.zookeeper_connect_string
}

output "bootstrap_brokers" {
description = "Plaintext connection host:port pairs"
value = aws_msk_cluster.msk_cluster.*.bootstrap_brokers
}

output "bootstrap_brokers_tls" {
description = "TLS connection host:port pairs"
value = aws_msk_cluster.msk_cluster.*.bootstrap_brokers_tls
}
 

Comments