Skip to main content
Version: 3.9.0

report check show Command

The report check show command displays information about a security check.


report check show <check_id>


ParameterDescriptionRequired?Default Value
check_idCheck identifier✔️


> report check show aws_ec2_allow_ingress_from_internet_to_ssh_port_22_ipv4
# Categories of the check. Example: ['security', 'cost']
- 'security'
- 'compliance'
# Default values for the check. Will be merged with the values from the config.
default_values: null
# Defines possible detection methods.
# `resoto` defines a Resoto search, `resoto_cmd` a Resoto CLI command.
# At least one of `resoto` or `resoto_cmd` must be defined.
# Additional keys can be defined on top.
resoto: 'is(aws_ec2_security_group) and group_ip_permissions[*].{(ip_protocol=-1 or (from_port>=22 and to_port<=22 and ip_protocol=tcp)) and ip_ranges[*].cidr_ip=""}'
id: 'aws_ec2_allow_ingress_from_internet_to_ssh_port_22_ipv4'
provider: 'aws'
# List of related checks.
related: []
# Remediation action for the check.
# Remediation actions with tool as key.
# Example tools: resoto_cmd, awscli, gcloud, terraform
action: null
kind: 'resoto_core_report_check_remediation'
# Textual description of the remediation.
text: 'Apply Zero Trust approach. Implement a process to scan and remediate unrestricted or overly permissive network acls. Recommended best practices is to narrow the definition for the minimum ports required.'
# URL that documents the remediation action.
url: ''
# Resulting kind this check will emit. Example: aws_ec2_instance
result_kind: 'aws_ec2_security_group'
# What is the risk associated with related resources.
risk: 'If Security groups are not properly configured the attack surface is increased.'
service: 'ec2'
# Severity of the check.
severity: 'high'
# Title of the check.
title: 'Ensure no security groups allow ingress from to SSH port 22.'

Contact Us

Have feedback or need help? Don’t be shy—we’d love to hear from you!




Some Engineering Inc.