Scan and fix security issues in your CloudFormation files (current IaC)
This page applies to current IaC only.
Snyk scans CloudFormation code for misconfigurations and security issues. After configuration files are scanned, Snyk reports on any misconfigurations based on the settings that administrators implement and makes recommendations for fixes accordingly.
Prerequisites for scanning and fixing issues in CloudFormation files
An administrator integrates the Organization with a preferred Git repository and enables the detection of configuration files as described in Configure your integration to find security issues in your CloudFormation files.
The Snyk account and CloudFormation files are in
JSON
andYAML
formats.
Scan and fix configuration files
Log in to the account and navigate to the relevant Group and Organization.
If you imported your repositories for testing before the infrastructure as code feature was enabled by your administrator, from the Add project screen, re-import that repository in order to detect the CloudFormation code:
Every time a repository is scanned, every CloudFormation file is imported as a separate Project, grouped together per repository, similar to the example shown.
If you re-imported the repository in order to import the CloudFormation files, then Snyk imports and re-tests the already imported application manifest files, displaying the test time as "now".
Click a Project link to view the scan results and details for the CloudFormation code:
Last updated