This product is not supported for your selected
Datadog site. (
).
이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우
언제든지 연락주시기 바랍니다.Id: 2b3c8a6d-9856-43e6-ab1d-d651094f03b4
Cloud Provider: aws
Framework: Terraform
Severity: Low
Category: Networking and Firewall
Learn More
Description
This check ensures that Amazon Elastic MapReduce (EMR) clusters are deployed within a Virtual Private Cloud (VPC) by specifying a subnet_id
in the Terraform resource. Launching EMR clusters without associating them to a VPC, as shown by omitting the subnet_id
attribute in the aws_emr_cluster
resource, exposes the cluster to public networks and increases the risk of unauthorized access or data compromise. By deploying EMR clusters in a VPC, network access control can be properly enforced through security groups and network ACLs, limiting exposure to only trusted sources. Failure to launch EMR clusters inside a VPC can lead to serious security vulnerabilities, including unauthorized data access, data exfiltration, or service disruption.
Compliant Code Examples
resource "aws_emr_cluster" "negative1" {
name = "emr-test-arn"
release_label = "emr-4.6.0"
subnet_id = aws_subnet.main.id
}
Non-Compliant Code Examples
resource "aws_emr_cluster" "positive1" {
name = "emr-test-arn"
release_label = "emr-4.6.0"
}