Skip to content

fix(terraform): add aws:VpceAccount to recognized condition keys in check CKV_AWS_70#7514

Merged
itrocki merged 1 commit intomainfrom
fix/ckv-aws-70-add-vpce-account-condition-key
Apr 12, 2026
Merged

fix(terraform): add aws:VpceAccount to recognized condition keys in check CKV_AWS_70#7514
itrocki merged 1 commit intomainfrom
fix/ckv-aws-70-add-vpce-account-condition-key

Conversation

@itrocki
Copy link
Copy Markdown
Contributor

@itrocki itrocki commented Apr 12, 2026

By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.

Description

Customer is experiencing a false positive with Checkov policy CKV_AWS_70 ("Ensure S3 bucket does not allow an action with any Principal").
The policy currently fails whenever an AWS resource policy uses the aws:VpceAccount condition key to restrict access.
In this PR the condition aws:VpceAccount is being added to the conditions list in policy CKV_AWS_70.

Fixes PCSUP-30968

Checklist:

  • I have performed a self-review of my own code
  • I have commented my code, particularly in hard-to-understand areas
  • I have made corresponding changes to the documentation
  • I have added tests that prove my feature, policy, or fix is effective and works
  • New and existing tests pass locally with my changes

@itrocki itrocki merged commit 090ac9b into main Apr 12, 2026
39 of 40 checks passed
@itrocki itrocki deleted the fix/ckv-aws-70-add-vpce-account-condition-key branch April 12, 2026 10:59
Saarett pushed a commit that referenced this pull request Apr 12, 2026
…heck CKV_AWS_70 (#7514)

add aws:VpceAccount to recognized condition keys in check CKV_AWS_70
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants