Peter Burkholder

Results 36 issues of Peter Burkholder

**Describe the bug** I have a set of tests that I run to make sure certain patterns cause gitleaks to fail (status 1) or succed (status 0). One of the...

bug

The example doesn't work with GNU Make 3.81 on MacOS, so I collapsed that example out.

As the compliance lead for cloud.gov, I'd like to use InSpec to validate that resources we're creating in AWS on behalf of our customers are correctly configured, but I may...

#### User Story #3855 improved our status, but ZAP still has a few CSP findings. You can see more at: https://cspscanner.com/?q=https%3A%2F%2Ffederalistapp-staging.18f.gov or https://csp-evaluator.withgoogle.com/ #### Acceptance Criteria - [ ] Cleaner...

squad-pages

#### User Story - Public buckets may not be encrypted, and should be encrypted per CyberEO and GSA mandates - Assess and remediate (w/ cloud custodian?) - Ensure Federalist creates...

compliance
squad-pages

https://github.com/pburkholder/chef-examples Seems we have some convergent ideas. I'm more interested in ChefSpec passing since it's a lower barrier of entry than Vagrant and KitchenCI. Happy to collaborate -- let me...

GSA IS sent us a new report: [BBP alert #2247177](https://docs.google.com/document/d/1G5IO7XyW56Tnuccyc8tHDQwDvH57jYiX54Zhj__sq7U/edit) ## Acceptance Criteria - [ ] Determine next steps and acceptance criteria

We turned on GH secrets detection. There are now 14 open issues in https://github.com/cloud-gov/caulking/security/secret-scanning. I should make them go away. ## Acceptance Criteria - [ ] Zero unaddressed findings in...

## Changes proposed in this pull request: - - Added a test with sample YAML - But caulking seems to catch it, so this is not the bug we're looking...

In order to reduce the amount of operational intelligence our Terraform repos provide, we should probably fail on .tf files with: ```hcl module "foo_provision_user" { source = "../../modules/iam_user/iam_cert_provision" username =...