An overview of contributor trends.
Committed in past 6 months (a rookie = the first commit in past year)
Past 30 days (2):
No contributors in past 31 to 90 days.
Past 91 to 180 days (1):
Last contributors more than 6 months ago
Commits (3m) |
Commit Days |
2
|
2
|
2
|
2
|
3
|
3
|
4
|
3
|
2
|
4
|
4
|
3
|
7
|
2
|
2
|
4
|
5
|
6
|
5
|
6
|
-
|
-
|
-
|
-
|
-
|
|
80756766+anna-shcherbak@users.noreply.github.com | 11 | 78 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
-
|
-
|
-
|
-
|
-
|
anna_shcherbak@epam.com | 17 | 80 |
|
|
|
|
|
|
|
|
|
|
|
-
|
|
|
-
|
|
|
|
|
|
-
|
-
|
-
|
-
|
-
|
mykhailo_tolstyi@epam.com | - | 8 |
-
|
-
|
-
|
-
|
|
|
|
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
53881141+mykhailo-tolstyi@users.noreply.github.com | - | 1 |
-
|
-
|
-
|
-
|
-
|
-
|
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
anna-shcherbak@users.noreply.github.com | - | 2 |
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
|
-
|
-
|
-
|
-
|
-
|
-
|
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
dmytrobeveraki@thebeverakiair.local | - | 1 |
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
yurii_lystopad@epam.com | - | 1 |
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
aavolosh@gmail.com | - | 1 |
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
astr1kyv@gmail.com | - | 16 |
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
|
|
-
|
-
|
|
|
|
|
|
-
|
-
|
-
|
-
|
-
|
vasyl_volkov@epam.com | - | 1 |
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
129157237+jamthehackerscat@users.noreply.github.com | - | 3 |
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
|
-
|
-
|
-
|
-
|
-
|
-
|
|
-
|
-
|
-
|
-
|
-
|
anna_andronnikova@epam.com | - | 2 |
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
|
-
|
-
|
-
|
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
jamthehackerscat@users.noreply.github.com | - | 2 |
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
|
-
|
-
|
-
|
-
|
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
vladyslav_yevsiukov@epam.com | - | 28 |
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
|
-
|
|
|
-
|
|
|
-
|
-
|
-
|
-
|
-
|
-
|
andronnikova.anna@gmail.com | - | 2 |
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
|
|
-
|
-
|
-
|
-
|
-
|
-
|
vitalii_kanivets@epam.com | - | 2 |
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
|
-
|
-
|
-
|
-
|
-
|
69165906+vit-ts@users.noreply.github.com | - | 1 |
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
|
-
|
-
|
-
|
-
|
-
|
Commits (3m) |
Commit Days |
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
-
|
2 contributors (2 commits):
# | Contributor |
First Commit |
Latest Commit |
Commits Count |
File Updates (per extension) |
---|---|---|---|---|---|
1. | anna_shcherbak@epam.com | 2023-06-17 | 2025-01-03 | 1 (50%) | json (2) |
2. | 80756766+anna-shcherbak@users.noreply.github.com | 2023-06-22 | 2025-01-04 | 1 (50%) | json (2) |
A contributor dependency is detected if two contributors have changed the same files in the past 30 days.
The number on lines shows the number of same files that both persons changed in past 30 days.
Contributor 1 | Contributor 2 | # shared files | |
---|---|---|---|
1. | 80756766+anna-shcherbak@users.noreply.github.com | anna_shcherbak@epam.com |
2 shared files
tests/ecc-aws-133-guardduty_service_is_enabled/placebo-green/guardduty.GetAdministratorAccount_1.json terraform/ecc-aws-133-guardduty_service_is_enabled/iam/133-policy.json |
Contributor | # connections | # commits | |
---|---|---|---|
1. | anna_shcherbak@epam.com | 1 | 1 |
2. | 80756766+anna-shcherbak@users.noreply.github.com | 1 | 1 |
C-median: 1.0
A half of the contributors has more than 1.0 connections, and a half has less than this number.
C-mean: 1.0
An average number of connections a contributor has with other contributors.
C-index: 1.0
There are 1.0 contributors with 1.0 or more connections.
2 contributors (28 commits):
# | Contributor |
First Commit |
Latest Commit |
Commits Count |
File Updates (per extension) |
---|---|---|---|---|---|
1. | anna_shcherbak@epam.com | 2023-06-17 | 2025-01-03 | 17 (60%) | tf (97), json (84), yaml (47), tfvars (21), py (16) |
2. | 80756766+anna-shcherbak@users.noreply.github.com | 2023-06-22 | 2025-01-04 | 11 (39%) | tf (97), json (84), yaml (46), tfvars (21), py (16) |
A contributor dependency is detected if two contributors have changed the same files in the past 90 days.
The number on lines shows the number of same files that both persons changed in past 90 days.
Contributor 1 | Contributor 2 | # shared files | |
---|---|---|---|
1. | 80756766+anna-shcherbak@users.noreply.github.com | anna_shcherbak@epam.com |
264 shared files
terraform/ecc-aws-353-redshift_user_activity_logging_enabled/red1/terraform.tfvars policies/ecc-aws-099-route_table_changes_alarm_exists.yml terraform/ecc-aws-112-s3_bucket_versioning_mfa_delete_enabled/green3/terraform.tfvars terraform/ecc-aws-508-mwaa_latest_version/green/mwaa.tf tests/ecc-aws-112-s3_bucket_versioning_mfa_delete_enabled/red_policy_test.py tests/ecc-aws-006-rds_retention_backup_is_at_least_7_days/placebo-green/rds.DescribeDBInstances_1.json tests/ecc-aws-112-s3_bucket_versioning_mfa_delete_enabled/placebo-red/s3.GetBucketVersioning_1.json terraform/ecc-aws-295-use_secure_ssl_protocols_between_cloudfront_origin/red2/distribution.tf terraform/ecc-aws-353-redshift_user_activity_logging_enabled/red1/variables.tf terraform/ecc-aws-224-ec2_instance_imdsv2_enabled/green1/terraform.tfvars tests/ecc-aws-112-s3_bucket_versioning_mfa_delete_enabled/placebo-green/s3.ListBuckets_1.json policies/ecc-aws-043-s3_bucket_lifecycle.yml policies/ecc-aws-597-reserved_redshift_node_recent_purchases.yml terraform/ecc-aws-224-ec2_instance_imdsv2_enabled/green1/ec2.tf policies/ecc-aws-112-s3_bucket_versioning_mfa_delete_enabled.yml tests/ecc-aws-112-s3_bucket_versioning_mfa_delete_enabled/placebo-green/s3.GetBucketLogging_3.json tests/ecc-aws-461-lambda_latest_runtime_environment_version/red_policy_test.py tests/ecc-aws-283-elasticsearch_latest_version/red_policy_test.py tests/ecc-aws-112-s3_bucket_versioning_mfa_delete_enabled/placebo-green/s3.GetBucketLifecycleConfiguration_2.json terraform/ecc-aws-536-lambda_function_settings_check/red/variables.tf terraform/ecc-aws-490-ec2_token_hop_limit_check/green/ec2.tf terraform/ecc-aws-006-rds_retention_backup_is_at_least_7_days/green2/variables.tf tests/ecc-aws-164-redshift_clusters_audit_logging_enabled/placebo-green/redshift.DescribeClusters_1.json terraform/ecc-aws-434-mq_broker_latest_version/green/mq.tf tests/ecc-aws-112-s3_bucket_versioning_mfa_delete_enabled/placebo-green/s3.GetBucketVersioning_3.json terraform/ecc-aws-164-redshift_clusters_audit_logging_enabled/green2/terraform.tfvars terraform/ecc-aws-004-bucket_policy_allows_https_requests/green/s3-3.tf tests/ecc-aws-283-elasticsearch_latest_version/placebo-green/es.DescribeElasticsearchDomains_1.json policies/ecc-aws-004-bucket_policy_allows_https_requests.yml tests/ecc-aws-112-s3_bucket_versioning_mfa_delete_enabled/placebo-green/s3.GetBucketTagging_1.json tests/ecc-aws-508-mwaa_latest_version/placebo-red/airflow.GetEnvironment_1.json tests/ecc-aws-112-s3_bucket_versioning_mfa_delete_enabled/placebo-green/s3.GetBucketNotificationConfiguration_3.json tests/ecc-aws-112-s3_bucket_versioning_mfa_delete_enabled/placebo-green/s3.GetBucketAcl_2.json terraform/ecc-aws-013-remove_weak_ciphers_for_clb/red/vpc.tf policies/ecc-aws-295-use_secure_ssl_protocols_between_cloudfront_origin.yml tests/ecc-aws-164-redshift_clusters_audit_logging_enabled/placebo-green/redshift.DescribeLoggingStatus_1.json tests/ecc-aws-353-redshift_user_activity_logging_enabled/placebo-green/redshift.DescribeClusterParameters_1.json terraform/ecc-aws-164-redshift_clusters_audit_logging_enabled/green1/provider.tf terraform/ecc-aws-164-redshift_clusters_audit_logging_enabled/green2/provider.tf terraform/ecc-aws-295-use_secure_ssl_protocols_between_cloudfront_origin/green2/terraform.tfvars terraform/ecc-aws-497-eks_cluster_oldest_supported_version/red/terraform.tfvars policies/ecc-aws-536-lambda_function_settings_check.yml tests/ecc-aws-112-s3_bucket_versioning_mfa_delete_enabled/placebo-green/s3.GetBucketVersioning_1.json terraform/ecc-aws-026-rds_instance_with_no_backups/red/rds.tf policies/ecc-aws-224-ec2_instance_imdsv2_enabled.yml terraform/ecc-aws-490-ec2_token_hop_limit_check/green2/provider.tf tests/ecc-aws-434-mq_broker_latest_version/placebo-green/mq.DescribeBroker_1.json policies/ecc-aws-142-s3_buckets_configured_with_block_public_access.yml terraform/ecc-aws-084-cloudtrail_bucket_logging_enabled/green/cloudtrail.tf policies/ecc-aws-164-redshift_clusters_audit_logging_enabled.yml policies/ecc-aws-461-lambda_latest_runtime_environment_version.yml tests/ecc-aws-112-s3_bucket_versioning_mfa_delete_enabled/placebo-green/s3.GetBucketWebsite_1.json tests/ecc-aws-112-s3_bucket_versioning_mfa_delete_enabled/placebo-red/s3.GetBucketPolicy_1.json terraform/ecc-aws-490-ec2_token_hop_limit_check/green2/variables.tf tests/ecc-aws-490-ec2_token_hop_limit_check/placebo-green/ec2.DescribeInstances_1.json terraform/ecc-aws-040-eks_cluster_version_latest/iam/040-policy.json tests/ecc-aws-490-ec2_token_hop_limit_check/red_policy_test.py tests/ecc-aws-508-mwaa_latest_version/placebo-green/airflow.GetEnvironment_1.json tests/ecc-aws-434-mq_broker_latest_version/placebo-green/mq.DescribeBroker_2.json terraform/ecc-aws-520-autoscaling_launch_config_hop_limit/green2/provider.tf tests/ecc-aws-164-redshift_clusters_audit_logging_enabled/placebo-red/redshift.DescribeLoggingStatus_1.json terraform/ecc-aws-353-redshift_user_activity_logging_enabled/red2/redshift.tf terraform/ecc-aws-006-rds_retention_backup_is_at_least_7_days/green2/terraform.tfvars tests/ecc-aws-283-elasticsearch_latest_version/placebo-red/es.ListTags_1.json policies/ecc-aws-518-s3_version_lifecycle_policy_check.yml policies/ecc-aws-549-ec2_instance_previous_generation.yml tests/ecc-aws-434-mq_broker_latest_version/red_policy_test.py terraform/ecc-aws-353-redshift_user_activity_logging_enabled/red3/variables.tf policies/ecc-aws-040-eks_cluster_version_latest.yml terraform/ecc-aws-497-eks_cluster_oldest_supported_version/red/provider.tf policies/ecc-aws-463-bucket_not_dns_compliant.yml terraform/ecc-aws-508-mwaa_latest_version/red/provider.tf terraform/ecc-aws-353-redshift_user_activity_logging_enabled/green1/variables.tf tests/ecc-aws-112-s3_bucket_versioning_mfa_delete_enabled/placebo-red/s3.GetBucketTagging_1.json terraform/ecc-aws-520-autoscaling_launch_config_hop_limit/green2/asg.tf tests/ecc-aws-295-use_secure_ssl_protocols_between_cloudfront_origin/placebo-red/cloudfront.ListDistributions_1.json policies/ecc-aws-354-redshift_not_using_default_port.yml terraform/ecc-aws-490-ec2_token_hop_limit_check/red/ec2.tf policies/ecc-aws-520-autoscaling_launch_config_hop_limit.yml tests/ecc-aws-112-s3_bucket_versioning_mfa_delete_enabled/placebo-green/s3.GetBucketAcl_1.json policies/ecc-aws-026-rds_instance_with_no_backups.yml tests/ecc-aws-099-route_table_changes_alarm_exists/placebo-green/cloudtrail.GetTrailStatus_1.json policies/ecc-aws-598-redshift_instance_generation.yml tests/ecc-aws-112-s3_bucket_versioning_mfa_delete_enabled/placebo-green/s3.GetBucketLocation_3.json terraform/ecc-aws-013-remove_weak_ciphers_for_clb/green/vpc.tf terraform/ecc-aws-353-redshift_user_activity_logging_enabled/red3/provider.tf tests/ecc-aws-353-redshift_user_activity_logging_enabled/placebo-green/redshift.DescribeClusterParameters_2.json tests/ecc-aws-040-eks_cluster_version_latest/placebo-red/eks.DescribeCluster_1.json terraform/ecc-aws-006-rds_retention_backup_is_at_least_7_days/green2/provider.tf tests/ecc-aws-295-use_secure_ssl_protocols_between_cloudfront_origin/red_policy_test.py terraform/ecc-aws-490-ec2_token_hop_limit_check/green2/terraform.tfvars tests/ecc-aws-520-autoscaling_launch_config_hop_limit/red_policy_test.py terraform/ecc-aws-353-redshift_user_activity_logging_enabled/red1/provider.tf tests/ecc-aws-353-redshift_user_activity_logging_enabled/placebo-green/redshift.DescribeLoggingStatus_2.json policies/ecc-aws-517-s3_bucket_acl_prohibited.yml tests/ecc-aws-353-redshift_user_activity_logging_enabled/placebo-red/redshift.DescribeLoggingStatus_1.json tests/ecc-aws-283-elasticsearch_latest_version/placebo-green/es.ListTags_1.json terraform/ecc-aws-112-s3_bucket_versioning_mfa_delete_enabled/red2/terraform.tfvars terraform/ecc-aws-006-rds_retention_backup_is_at_least_7_days/red/rds.tf tests/ecc-aws-295-use_secure_ssl_protocols_between_cloudfront_origin/placebo-red/tagging.GetResources_1.json ... |
Contributor | # connections | # commits | |
---|---|---|---|
1. | anna_shcherbak@epam.com | 1 | 17 |
2. | 80756766+anna-shcherbak@users.noreply.github.com | 1 | 11 |
C-median: 1.0
A half of the contributors has more than 1.0 connections, and a half has less than this number.
C-mean: 1.0
An average number of connections a contributor has with other contributors.
C-index: 1.0
There are 1.0 contributors with 1.0 or more connections.
3 contributors (75 commits):
# | Contributor |
First Commit |
Latest Commit |
Commits Count |
---|---|---|---|---|
1. | anna_shcherbak@epam.com | 2023-06-17 | 2025-01-03 | 44 (58%) |
2. | 80756766+anna-shcherbak@users.noreply.github.com | 2023-06-22 | 2025-01-04 | 27 (36%) |
3. | mykhailo_tolstyi@epam.com | 2024-06-13 | 2024-09-17 | 4 (5%) |
A contributor dependency is detected if two contributors have changed the same files in the past 180 days.
The number on lines shows the number of same files that both persons changed in past 180 days.
Contributor 1 | Contributor 2 | # shared files | |
---|---|---|---|
1. | 80756766+anna-shcherbak@users.noreply.github.com | anna_shcherbak@epam.com |
528 shared files
tests/ecc-aws-444-mwaa_dag_processing_logs_set_correctly/placebo-red/airflow.GetEnvironment_1.json terraform/ecc-aws-445-mwaa_scheduler_logs_set_correctly/green/mwaa.tf terraform/ecc-aws-437-s3_bucket_object_lock_enabled/iam/437-policy.json terraform/ecc-aws-112-s3_bucket_versioning_mfa_delete_enabled/green3/terraform.tfvars terraform/ecc-aws-437-s3_bucket_object_lock_enabled/green2/provider.tf terraform/ecc-aws-072-autoscaling_group_health_checks/green3/variables.tf terraform/ecc-aws-437-s3_bucket_object_lock_enabled/green1/provider.tf tests/ecc-aws-006-rds_retention_backup_is_at_least_7_days/placebo-green/rds.DescribeDBInstances_1.json terraform/ecc-aws-071-codebuild_project_source_repo_url_check/red1/terraform.tfvars tests/ecc-aws-112-s3_bucket_versioning_mfa_delete_enabled/placebo-red/s3.GetBucketVersioning_1.json terraform/ecc-aws-353-redshift_user_activity_logging_enabled/red1/variables.tf terraform/ecc-aws-224-ec2_instance_imdsv2_enabled/green1/terraform.tfvars tests/ecc-aws-437-s3_bucket_object_lock_enabled/placebo-red/s3.GetBucketPolicy_1.json tests/ecc-aws-446-mwaa_task_logs_set_correctly/placebo-green/airflow.GetEnvironment_1.json tests/ecc-aws-437-s3_bucket_object_lock_enabled/placebo-green/s3.GetBucketPolicy_2.json tests/ecc-aws-437-s3_bucket_object_lock_enabled/placebo-green/s3.GetBucketLogging_1.json tests/ecc-aws-437-s3_bucket_object_lock_enabled/placebo-green/s3.GetBucketVersioning_1.json terraform/ecc-aws-536-lambda_function_settings_check/red/variables.tf terraform/ecc-aws-004-bucket_policy_allows_https_requests/green/s3-3.tf tests/ecc-aws-111-alb_is_protected_by_waf_regional/placebo-green/wafv2.ListWebACLs_1.json tests/ecc-aws-283-elasticsearch_latest_version/placebo-green/es.DescribeElasticsearchDomains_1.json tests/ecc-aws-369-workspaces_cloudwatch_integration/red_policy_test.py terraform/ecc-aws-011-http_elb_certificate_expire_in_one_month/iam/011-policy.json tests/ecc-aws-112-s3_bucket_versioning_mfa_delete_enabled/placebo-green/s3.GetBucketNotificationConfiguration_3.json terraform/ecc-aws-072-autoscaling_group_health_checks/green2/variables.tf policies/ecc-aws-111-alb_is_protected_by_waf_regional.yml tests/ecc-aws-353-redshift_user_activity_logging_enabled/placebo-green/redshift.DescribeClusterParameters_1.json tests/ecc-aws-437-s3_bucket_object_lock_enabled/placebo-green/s3.GetBucketLifecycleConfiguration_1.json non-compatible/tests/ecc-aws-485-codedeploy_ec2_minimum_healthy_hosts_configured/red_policy_test.py terraform/ecc-aws-010-http_elb_certificate_expire_in_one_week/green/vpc.tf non-compatible/tests/ecc-aws-135-clb_with_unencrypted_service_is_exposed_to_public_internet/placebo-green/elasticloadbalancing.DescribeLoadBalancers_1.json terraform/ecc-aws-136-alb_with_sensitive_service_is_exposed_to_entire_internet/iam/136-policy.json terraform/ecc-aws-490-ec2_token_hop_limit_check/green2/provider.tf policies/ecc-aws-164-redshift_clusters_audit_logging_enabled.yml tests/ecc-aws-437-s3_bucket_object_lock_enabled/placebo-green/s3.GetBucketAcl_1.json terraform/ecc-aws-195-alb_http_to_https_redirection_enabled/iam/195-policy.json terraform/ecc-aws-072-autoscaling_group_health_checks/green2/asg.tf tests/ecc-aws-112-s3_bucket_versioning_mfa_delete_enabled/placebo-red/s3.GetBucketPolicy_1.json tests/ecc-aws-490-ec2_token_hop_limit_check/placebo-green/ec2.DescribeInstances_1.json tests/ecc-aws-164-redshift_clusters_audit_logging_enabled/placebo-red/redshift.DescribeLoggingStatus_1.json policies/ecc-aws-518-s3_version_lifecycle_policy_check.yml terraform/ecc-aws-353-redshift_user_activity_logging_enabled/red3/variables.tf policies/ecc-aws-040-eks_cluster_version_latest.yml policies/ecc-aws-463-bucket_not_dns_compliant.yml terraform/ecc-aws-137-alb_with_unencrypted_service_is_exposed_to_public_internet/red1/alb.tf terraform/ecc-aws-353-redshift_user_activity_logging_enabled/green1/variables.tf tests/ecc-aws-112-s3_bucket_versioning_mfa_delete_enabled/placebo-red/s3.GetBucketTagging_1.json policies/ecc-aws-520-autoscaling_launch_config_hop_limit.yml terraform/ecc-aws-111-alb_is_protected_by_waf_regional/green2/terraform.tfvars policies/ecc-aws-598-redshift_instance_generation.yml tests/ecc-aws-437-s3_bucket_object_lock_enabled/placebo-green/s3.GetBucketNotificationConfiguration_1.json terraform/ecc-aws-437-s3_bucket_object_lock_enabled/red/s3.tf terraform/ecc-aws-353-redshift_user_activity_logging_enabled/red3/provider.tf terraform/ecc-aws-014-clb_uses_https/iam/014-policy.json terraform/ecc-aws-353-redshift_user_activity_logging_enabled/red1/provider.tf policies/ecc-aws-517-s3_bucket_acl_prohibited.yml tests/ecc-aws-437-s3_bucket_object_lock_enabled/placebo-green/s3.GetBucketNotificationConfiguration_2.json terraform/ecc-aws-112-s3_bucket_versioning_mfa_delete_enabled/red2/terraform.tfvars policies/ecc-aws-448-mwaa_worker_logs_set_correctly.yml terraform/ecc-aws-010-http_elb_certificate_expire_in_one_week/green/certificate.tf policies/ecc-aws-044-s3_buckets_without_tags.yml tests/ecc-aws-058-ensure_support_role_created_to_manage_incidents/placebo-green/iam.GetRole_1.json policies/ecc-aws-484-codedeploy_auto_rollback_monitor_enabled.yml terraform/ecc-aws-137-alb_with_unencrypted_service_is_exposed_to_public_internet/red2/vpc.tf terraform/ecc-aws-353-redshift_user_activity_logging_enabled/red2/variables.tf tests/ecc-aws-111-alb_is_protected_by_waf_regional/red_policy_test.py policies/ecc-aws-429-redshift_clusters_without_tag_information.yml terraform/ecc-aws-071-codebuild_project_source_repo_url_check/red1/provider.tf policies/ecc-aws-148-logging_for_s3_enabled.yml tests/ecc-aws-164-redshift_clusters_audit_logging_enabled/placebo-red/redshift.DescribeClusters_1.json terraform/ecc-aws-164-redshift_clusters_audit_logging_enabled/green1/variables.tf tests/ecc-aws-353-redshift_user_activity_logging_enabled/placebo-green/redshift.DescribeLoggingStatus_1.json terraform/ecc-aws-164-redshift_clusters_audit_logging_enabled/green1/redshift.tf tests/ecc-aws-058-ensure_support_role_created_to_manage_incidents/placebo-red/iam.GetRole_1.json terraform/ecc-aws-152-clb_connection_draining_enabled/iam/152-policy.json terraform/ecc-aws-295-use_secure_ssl_protocols_between_cloudfront_origin/red2/provider.tf terraform/ecc-aws-111-alb_is_protected_by_waf_regional/green1/vpc.tf terraform/ecc-aws-369-workspaces_cloudwatch_integration/green/provider.tf tests/ecc-aws-369-workspaces_cloudwatch_integration/placebo-red/tagging.GetResources_2.json terraform/ecc-aws-497-eks_cluster_oldest_supported_version/green/provider.tf tests/ecc-aws-434-mq_broker_latest_version/placebo-red/mq.DescribeBroker_1.json tests/ecc-aws-437-s3_bucket_object_lock_enabled/placebo-green/s3.GetBucketPolicy_1.json terraform/ecc-aws-011-http_elb_certificate_expire_in_one_month/green/alb.tf terraform/ecc-aws-026-rds_instance_with_no_backups/green/rds.tf terraform/ecc-aws-129-enable_elb_access_logs/iam/129-policy.json terraform/ecc-aws-536-lambda_function_settings_check/red/provider.tf policies/ecc-aws-072-autoscaling_group_health_checks.yml policies/ecc-aws-437-s3_bucket_object_lock_enabled.yml tests/ecc-aws-437-s3_bucket_object_lock_enabled/placebo-red/s3.GetBucketLifecycleConfiguration_1.json terraform/ecc-aws-011-http_elb_certificate_expire_in_one_month/red/vpc.tf policies/ecc-aws-369-workspaces_cloudwatch_integration.yml terraform/ecc-aws-536-lambda_function_settings_check/red/lambda.tf policies/ecc-aws-537-ecs_containers_nonprivileged.yml tests/ecc-aws-071-codebuild_project_source_repo_url_check/placebo-red/codebuild.ListSourceCredentials_1.json terraform/ecc-aws-444-mwaa_dag_processing_logs_set_correctly/green/mwaa.tf terraform/ecc-aws-071-codebuild_project_source_repo_url_check/green/variables.tf tests/ecc-aws-071-codebuild_project_source_repo_url_check/red_policy_test.py terraform/ecc-aws-512-elb_internet_facing/iam/512-policy.json policies/ecc-aws-506-redshift_default_db_name_check.yml terraform/ecc-aws-437-s3_bucket_object_lock_enabled/green1/s3.tf ... |
2. | 80756766+anna-shcherbak@users.noreply.github.com | mykhailo_tolstyi@epam.com |
81 shared files
policies/ecc-aws-141-expired_ssl_tls_certificates_stored_in_aws_iam_are_removed.yml policies/ecc-aws-330-mysql_sql_mode_flag_contains_strict_all_tables.yml non-compatible/policies/ecc-aws-369-workspaces_cloudwatch_integration.yml policies/ecc-aws-096-security_group_changes_alarm_exists.yml non-compatible/policies/ecc-aws-146-no_acls_allow_ingress_for_everyone_to_remote_server_administration_ports.yml policies/ecc-aws-060-cloudtrail_logs_encrypted_using_KMS_CMKs.yml policies/ecc-aws-018-iam_users_receive_permissions_only_through_groups.yml non-compatible/policies/ecc-aws-084-cloudtrail_bucket_logging_enabled.yml policies/ecc-aws-531-ebs_default_encryption_enabled.yml policies/ecc-aws-097-network_access_control_lists_changes_alarm_exists.yml policies/ecc-aws-140-only_one_active_access_key_available_for_any_single_iam_user.yml non-compatible/policies/ecc-aws-373-workspaces_radius_server_uses_strongest_security_protocol.yml policies/ecc-aws-078-root_usage_alarm_exists.yml policies/ecc-aws-138-eliminate_use_root_user_for_administrative_and_daily_tasks.yml policies/ecc-aws-175-rds_instances_storage_is_encrypted.yml policies/ecc-aws-316-oracle_global_names_flag_enabled.yml policies/ecc-aws-063-security_group_ingress_is_restricted_3389.yml non-compatible/policies/ecc-aws-056-iam_user_with_password_and_unused_access_keys.yml policies/ecc-aws-320-oracle_sec_protocol_error_trace_action_flag_set_to_log.yml non-compatible/policies/ecc-aws-371-workspaces_primary_interface_ports_not_open_to_all_inbound_traffic.yml policies/ecc-aws-061-kms_key_rotation_is_enabled.yml policies/ecc-aws-318-oracle_sec_max_failed_login_attempts_flag_is_3_or_less.yml policies/ecc-aws-067-unauthorized_api_calls_alarm_exists.yml policies/ecc-aws-317-oracle_remote_listener_flag_empty.yml .github/workflows/ci.yaml policies/ecc-aws-050-iam_password_min_length_ge_14.yml policies/ecc-aws-123-efs_is_encrypted.yml policies/ecc-aws-225-eks_control_plane_logging_enabled.yml non-compatible/policies/ecc-aws-143-bucket_object-level_logging_for_write_enabled.yml policies/ecc-aws-004-bucket_policy_allows_https_requests.yml policies/ecc-aws-001-ensure_mfa_is_enabled_for_all_iam_users_with_console_password.yml policies/ecc-aws-095-aws_config_configuration_changes_alarm_exists.yml policies/ecc-aws-082-cmk_key_disabling_or_deletion_alarm_exists.yml policies/ecc-aws-149-rds_public_access_disabled.yml policies/ecc-aws-100-vpc_changes_alarm_exists.yml policies/ecc-aws-872-access_to_cloudshell_restricted.yml policies/ecc-aws-290-workspaces_storage_encrypted.yml policies/ecc-aws-127-rds_cluster_storage_is_encrypted.yml policies/ecc-aws-139-iam_access_analyzer_is_enabled.yml policies/ecc-aws-331-workspaces_images_not_older_than_90_days.yml policies/ecc-aws-017-credentials_unused_for_45_days.yml policies/ecc-aws-059-config_enabled_all_regions.yml policies/ecc-aws-054-iam_policies_full_administrative_privileges.yml policies/ecc-aws-515-security_hub_enabled.yml policies/ecc-aws-321-oracle_sec_return_server_release_banner_flag_disabled.yml policies/ecc-aws-046-ensure_no_root_account_access_key_exists.yml policies/ecc-aws-099-route_table_changes_alarm_exists.yml policies/ecc-aws-002-ensure_access_keys_are_rotated_every_90_days.yml policies/ecc-aws-015-ensure_mfa_is_enabled_for_the_root_account.yml non-compatible/policies/ecc-aws-058-ensure_support_role_created_to_manage_incidents.yml policies/ecc-aws-224-ec2_instance_imdsv2_enabled.yml policies/ecc-aws-145-organizations_changes_alarm_exists.yml policies/ecc-aws-053-cloudtrail_log_validation_enabled.yml policies/ecc-aws-314-oracle_audit_sys_operations_flag_enabled.yml policies/ecc-aws-057-ensure_iam_instance_roles_are_used_for_resource_access_from_instance.yml policies/ecc-aws-332-workspaces_web_access_disabled.yml policies/ecc-aws-324-oracle_resource_limit_flag_enabled.yml policies/ecc-aws-064-default_security_group_every_vpc_restricts_all_traffic.yml policies/ecc-aws-375-workspaces_storage_encrypted_with_cmk.yml policies/ecc-aws-502-rds_automatic_minor_version_upgrade_enabled.yml policies/ecc-aws-080-cloudtrail_configuration_changes_alarm_exists.yml policies/ecc-aws-112-s3_bucket_versioning_mfa_delete_enabled.yml policies/ecc-aws-019-iam_password_policy_password_reuse.yml policies/ecc-aws-077-sign_in_without_mfa_alarm_exist.yml policies/ecc-aws-142-s3_buckets_configured_with_block_public_access.yml policies/ecc-aws-098-network_gateways_changes_alarm_exists.yml non-compatible/policies/ecc-aws-052-cloudtrail_enabled_in_all_regions.yml policies/ecc-aws-003-ensure_vpc_flow_logging_enabled_for_every_vpc.yml policies/ecc-aws-323-oracle_trace_files_public.yml policies/ecc-aws-370-workspaces_maintenance_mode_enabled.yml policies/ecc-aws-079-iam_policy_changes_alarm_exist.yml policies/ecc-aws-062-security_group_ingress_is_restricted_22.yml policies/ecc-aws-319-oracle_sec_protocol_error_further_action_flag_set_to_drop_3.yml policies/ecc-aws-016-ensure_hardware_mfa_is_enabled_for_root_account.yml policies/ecc-aws-286-workspaces_unused_instances.yml non-compatible/policies/ecc-aws-144-bucket_object-level_logging_for_read_enabled.yml policies/ecc-aws-322-oracle_sql92_security_flag_enabled.yml non-compatible/policies/ecc-aws-372-workspaces_api_requests_flow_through_vpc_endpoint.yml policies/ecc-aws-094-s3_bucket_policy_changes_alarm_exists.yml policies/ecc-aws-081-console_auth_failure_alarm_exists.yml policies/ecc-aws-315-oracle_audit_trail_flag_set_correctly.yml |
3. | anna_shcherbak@epam.com | mykhailo_tolstyi@epam.com |
9 shared files
.github/workflows/ci.yaml policies/ecc-aws-004-bucket_policy_allows_https_requests.yml policies/ecc-aws-054-iam_policies_full_administrative_privileges.yml policies/ecc-aws-099-route_table_changes_alarm_exists.yml policies/ecc-aws-224-ec2_instance_imdsv2_enabled.yml policies/ecc-aws-057-ensure_iam_instance_roles_are_used_for_resource_access_from_instance.yml policies/ecc-aws-502-rds_automatic_minor_version_upgrade_enabled.yml policies/ecc-aws-112-s3_bucket_versioning_mfa_delete_enabled.yml policies/ecc-aws-142-s3_buckets_configured_with_block_public_access.yml |
Contributor | # connections | # commits | |
---|---|---|---|
1. | anna_shcherbak@epam.com | 2 | 44 |
2. | 80756766+anna-shcherbak@users.noreply.github.com | 2 | 27 |
3. | mykhailo_tolstyi@epam.com | 2 | 4 |
C-median: 2.0
A half of the contributors has more than 2.0 connections, and a half has less than this number.
C-mean: 2.0
An average number of connections a contributor has with other contributors.
C-index: 2.0
There are 2.0 contributors with 2.0 or more connections.
14 contributors (180 commits):
# | Contributor |
First Commit |
Latest Commit |
Commits Count |
---|---|---|---|---|
1. | anna_shcherbak@epam.com | 2023-06-17 | 2025-01-03 | 83 (46%) |
2. | 80756766+anna-shcherbak@users.noreply.github.com | 2023-06-22 | 2025-01-04 | 71 (39%) |
3. | vladyslav_yevsiukov@epam.com | 2023-07-05 | 2024-01-23 | 2 (1%) |
4. | astr1kyv@gmail.com | 2023-06-14 | 2024-02-28 | 2 (1%) |
5. | mykhailo_tolstyi@epam.com | 2024-06-13 | 2024-09-17 | 10 (5%) |
6. | vasyl_volkov@epam.com | 2024-02-22 | 2024-02-22 | 3 (1%) |
7. | 129157237+jamthehackerscat@users.noreply.github.com | 2023-06-29 | 2024-01-29 | 2 (1%) |
8. | anna-shcherbak@users.noreply.github.com | 2023-09-20 | 2024-04-17 | 1 (<1%) |
9. | anna_andronnikova@epam.com | 2023-09-26 | 2024-01-29 | 1 (<1%) |
10. | jamthehackerscat@users.noreply.github.com | 2023-08-21 | 2024-01-25 | 1 (<1%) |
11. | 53881141+mykhailo-tolstyi@users.noreply.github.com | 2024-07-02 | 2024-07-02 | 1 (<1%) |
12. | dmytrobeveraki@thebeverakiair.local | 2024-04-14 | 2024-04-14 | 1 (<1%) |
13. | yurii_lystopad@epam.com | 2024-03-27 | 2024-03-27 | 1 (<1%) |
14. | aavolosh@gmail.com | 2024-03-27 | 2024-03-27 | 1 (<1%) |
A contributor dependency is detected if two contributors have changed the same files in the past 365 days.
The number on lines shows the number of same files that both persons changed in past 365 days.
Contributor 1 | Contributor 2 | # shared files | |
---|---|---|---|
1. | 80756766+anna-shcherbak@users.noreply.github.com | anna_shcherbak@epam.com |
1253 shared files
terraform/ecc-aws-445-mwaa_scheduler_logs_set_correctly/green/mwaa.tf non-compatible/tests/ecc-aws-372-workspaces_api_requests_flow_through_vpc_endpoint/placebo-green/tagging.GetResources_1.json terraform/ecc-aws-112-s3_bucket_versioning_mfa_delete_enabled/green3/terraform.tfvars non-compatible/tests/ecc-aws-084-cloudtrail_bucket_logging_enabled/red_policy_test.py tests/ecc-aws-069-s3_bucket_should_not_allow_all_actions_from_all_principals/red_policy_test.py terraform/ecc-aws-437-s3_bucket_object_lock_enabled/green2/provider.tf tests/ecc-aws-006-rds_retention_backup_is_at_least_7_days/placebo-green/rds.DescribeDBInstances_1.json terraform/ecc-aws-071-codebuild_project_source_repo_url_check/red1/terraform.tfvars tests/ecc-aws-154-elasticsearch_domains_have_at_least_three_data_nodes/placebo-red/es.ListTags_1.json tests/ecc-aws-112-s3_bucket_versioning_mfa_delete_enabled/placebo-red/s3.GetBucketVersioning_1.json tests/ecc-aws-437-s3_bucket_object_lock_enabled/placebo-green/s3.GetBucketPolicy_2.json non-compatible/tests/ecc-aws-371-workspaces_primary_interface_ports_not_open_to_all_inbound_traffic/placebo-green/tagging.GetResources_1.json non-compatible/tests/ecc-aws-105-kinesis_streams_keys_are_rotated/placebo-red/kinesis.ListStreams_1.json non-compatible/tests/ecc-aws-297-elastic_beanstalk_managed_platform_updates/placebo-red/elasticbeanstalk.DescribeConfigurationSettings_1.json tests/ecc-aws-069-s3_bucket_should_not_allow_all_actions_from_all_principals/placebo-red/s3.GetBucketPolicy_1.json terraform/ecc-aws-004-bucket_policy_allows_https_requests/green/s3-3.tf tests/ecc-aws-111-alb_is_protected_by_waf_regional/placebo-green/wafv2.ListWebACLs_1.json tests/ecc-aws-283-elasticsearch_latest_version/placebo-green/es.DescribeElasticsearchDomains_1.json tests/ecc-aws-369-workspaces_cloudwatch_integration/red_policy_test.py terraform/ecc-aws-011-http_elb_certificate_expire_in_one_month/iam/011-policy.json tests/ecc-aws-112-s3_bucket_versioning_mfa_delete_enabled/placebo-green/s3.GetBucketNotificationConfiguration_3.json terraform/ecc-aws-072-autoscaling_group_health_checks/green2/variables.tf non-compatible/policies/ecc-aws-084-cloudtrail_bucket_logging_enabled.yml tests/ecc-aws-069-s3_bucket_should_not_allow_all_actions_from_all_principals/placebo-red/s3.GetBucketAcl_1.json non-compatible/tests/ecc-aws-086-lambda_with_admin_privileges/placebo-green/lambda.ListFunctions_1.json policies/ecc-aws-222-ec2_instance_managed_by_systems_manager.yml non-compatible/tests/ecc-aws-485-codedeploy_ec2_minimum_healthy_hosts_configured/red_policy_test.py non-compatible/tests/ecc-aws-437-s3_bucket_object_lock_enabled/red_policy_test.py non-compatible/tests/ecc-aws-135-clb_with_unencrypted_service_is_exposed_to_public_internet/placebo-green/elasticloadbalancing.DescribeLoadBalancers_1.json terraform/ecc-aws-136-alb_with_sensitive_service_is_exposed_to_entire_internet/iam/136-policy.json non-compatible/tests/ecc-aws-010-http_elb_certificate_expire_in_one_week/red_policy_test.py tests/ecc-aws-437-s3_bucket_object_lock_enabled/placebo-green/s3.GetBucketAcl_1.json terraform/ecc-aws-072-autoscaling_group_health_checks/green2/asg.tf non-compatible/tests/ecc-aws-052-cloudtrail_enabled_in_all_regions/placebo-red/iam.ListAccountAliases_1.json terraform/ecc-aws-489-ec2_instance_detailed_monitoring_enabled/red/provider.tf tests/ecc-aws-112-s3_bucket_versioning_mfa_delete_enabled/placebo-red/s3.GetBucketPolicy_1.json non-compatible/tests/ecc-aws-264-elasticache_no_default_ports/red_policy_test.py tests/ecc-aws-164-redshift_clusters_audit_logging_enabled/placebo-red/redshift.DescribeLoggingStatus_1.json non-compatible/tests/ecc-aws-163-rds_database_instance_engine_no_default_ports/placebo-red/rds.DescribeDBInstances_1.json policies/ecc-aws-463-bucket_not_dns_compliant.yml terraform/ecc-aws-547-rds_instance_generation/iam/547-policy.json tests/ecc-aws-112-s3_bucket_versioning_mfa_delete_enabled/placebo-red/s3.GetBucketTagging_1.json non-compatible/tests/ecc-aws-011-http_elb_certificate_expire_in_one_month/placebo-red/acm.DescribeCertificate_1.json policies/ecc-aws-520-autoscaling_launch_config_hop_limit.yml terraform/ecc-aws-222-ec2_instance_managed_by_systems_manager/iam/222-policy.json policies/ecc-aws-529-ebs_attached_volume_delete_on_termination_enabled.yml policies/ecc-aws-407-beanstalk_without_tag_information.yml terraform/ecc-aws-111-alb_is_protected_by_waf_regional/green2/terraform.tfvars tests/ecc-aws-069-s3_bucket_should_not_allow_all_actions_from_all_principals/placebo-green/s3.GetBucketLifecycleConfiguration_1.json non-compatible/tests/ecc-aws-110-ecs_cluster_at_rest_encryption/placebo-red/ecs.DescribeContainerInstances_1.json policies/ecc-aws-598-redshift_instance_generation.yml terraform/ecc-aws-437-s3_bucket_object_lock_enabled/red/s3.tf terraform/ecc-aws-014-clb_uses_https/iam/014-policy.json non-compatible/tests/ecc-aws-052-cloudtrail_enabled_in_all_regions/placebo-red/tagging.GetResources_1.json tests/ecc-aws-437-s3_bucket_object_lock_enabled/placebo-green/s3.GetBucketNotificationConfiguration_2.json terraform/ecc-aws-112-s3_bucket_versioning_mfa_delete_enabled/red2/terraform.tfvars terraform/ecc-aws-010-http_elb_certificate_expire_in_one_week/green/certificate.tf tests/ecc-aws-058-ensure_support_role_created_to_manage_incidents/placebo-green/iam.GetRole_1.json policies/ecc-aws-484-codedeploy_auto_rollback_monitor_enabled.yml terraform/ecc-aws-137-alb_with_unencrypted_service_is_exposed_to_public_internet/red2/vpc.tf terraform/ecc-aws-353-redshift_user_activity_logging_enabled/red2/variables.tf terraform/ecc-aws-490-ec2_token_hop_limit_check/red/provider.tf non-compatible/tests/ecc-aws-358-cloudtrail_security_trail_enabled/placebo-red/cloudtrail.GetTrail_1.json non-compatible/tests/ecc-aws-459-lambda_code_signing_enabled/placebo-red/tagging.GetResources_1.json policies/ecc-aws-429-redshift_clusters_without_tag_information.yml terraform/ecc-aws-071-codebuild_project_source_repo_url_check/red1/provider.tf terraform/ecc-aws-268-elasticache_encrypted_at_rest_using_cmk/iam/268-policy.json terraform/ecc-aws-353-redshift_user_activity_logging_enabled/green/provider.tf non-compatible/policies/ecc-aws-373-workspaces_radius_server_uses_strongest_security_protocol.yml terraform/ecc-aws-348-msk_encryption_in_transit_enabled/green/provider.tf tests/ecc-aws-164-redshift_clusters_audit_logging_enabled/placebo-red/redshift.DescribeClusters_1.json policies/ecc-aws-223-ec2_managed_instance_association_compliance_status_check.yml non-compatible/tests/ecc-aws-274-rds_aurora_cluster_logging_enabled/placebo-red/rds.DescribeDBClusterParameters_1.json terraform/ecc-aws-025-instance_without_termination_protection/iam/025-policy.json terraform/ecc-aws-164-redshift_clusters_audit_logging_enabled/green1/redshift.tf tests/ecc-aws-069-s3_bucket_should_not_allow_all_actions_from_all_principals/placebo-red/s3.GetBucketReplication_1.json terraform/ecc-aws-283-elasticsearch_latest_version/iam/283-policy.json terraform/ecc-aws-221-sns_kms_encryption_enabled/iam/221-policy.json terraform/ecc-aws-355-redshift_encrypted_with_kms_cmk/red/provider.tf terraform/ecc-aws-469-alb_desync_mode_check/green/provider.tf terraform/ecc-aws-295-use_secure_ssl_protocols_between_cloudfront_origin/red2/provider.tf non-compatible/tests/ecc-aws-143-bucket_object-level_logging_for_write_enabled/red_policy_test.py terraform/ecc-aws-497-eks_cluster_oldest_supported_version/green/provider.tf terraform/ecc-aws-586-elasticsearch_general_purpose_ssd_volume/iam/586-policy.json non-compatible/tests/ecc-aws-068-s3_bucket_cloudtrail_logs_not_publicly_accessible/placebo-red/cloudtrail.DescribeTrails_1.json terraform/ecc-aws-026-rds_instance_with_no_backups/green/rds.tf non-compatible/tests/ecc-aws-131-instance_with_unencrypted_service_is_exposed_to_public_internet/placebo-red/ec2.DescribeSecurityGroups_1.json non-compatible/tests/ecc-aws-477-cloudformation_stack_notification_check/placebo-green/sns.GetTopicAttributes_1.json terraform/ecc-aws-471-autoscaling_groups_capacity_rebalancing_enabled/green/provider.tf non-compatible/tests/ecc-aws-011-http_elb_certificate_expire_in_one_month/placebo-green/elasticloadbalancing.DescribeListenerCertificates_1.json policies/ecc-aws-072-autoscaling_group_health_checks.yml non-compatible/tests/ecc-aws-251-appflow_encrypted_with_kms_cmk/placebo-red/appflow.DescribeFlow_1.json non-compatible/tests/ecc-aws-161-rds_database_parameter_group_events_notification_exists/placebo-red/rds.DescribeDBInstances_1.json policies/ecc-aws-437-s3_bucket_object_lock_enabled.yml non-compatible/tests/ecc-aws-143-bucket_object-level_logging_for_write_enabled/placebo-red/iam.ListAccountAliases_1.json non-compatible/tests/ecc-aws-372-workspaces_api_requests_flow_through_vpc_endpoint/placebo-red/tagging.GetResources_1.json tests/ecc-aws-437-s3_bucket_object_lock_enabled/placebo-red/s3.GetBucketLifecycleConfiguration_1.json terraform/ecc-aws-011-http_elb_certificate_expire_in_one_month/red/vpc.tf tests/ecc-aws-301-sqs_dead_letter_queue_enabled/red_policy_test.py terraform/ecc-aws-536-lambda_function_settings_check/red/lambda.tf ... |
2. | astr1kyv@gmail.com | 80756766+anna-shcherbak@users.noreply.github.com |
809 shared files
terraform/ecc-aws-041-rds_without_tag_information/green/rds.tf terraform/ecc-aws-209-rds_aurora_postgresql_logging_enabled/green/rds.tf terraform/ecc-aws-014-clb_uses_https/green/provider.tf terraform/ecc-aws-166-security_group_ingress_is_restricted_traffic_to_port_135/red/provider.tf terraform/ecc-aws-330-mysql_sql_mode_flag_contains_strict_all_tables/red/provider.tf terraform/ecc-aws-292-elastic_beanstalk_access_logs_enabled/green/provider.tf terraform/ecc-aws-285-xray-encrypted_with_kms_cmk/red/provider.tf terraform/ecc-aws-193-alb_drop_invalid_http_header/red/provider.tf terraform/ecc-aws-010-http_elb_certificate_expire_in_one_week/red/provider.tf terraform/ecc-aws-204-rds_mysql_logging_enabled/red/provider.tf terraform/ecc-aws-316-oracle_global_names_flag_enabled/green/provider.tf terraform/ecc-aws-166-security_group_ingress_is_restricted_traffic_to_port_135/green/provider.tf terraform/ecc-aws-059-config_enabled_all_regions/red/provider.tf terraform/ecc-aws-210-rds_instance_iam_authentication_configured/green/rds.tf terraform/ecc-aws-043-s3_bucket_lifecycle/red/provider.tf terraform/ecc-aws-044-s3_buckets_without_tags/green/provider.tf terraform/ecc-aws-071-codebuild_project_source_repo_url_check/green/provider.tf terraform/ecc-aws-061-kms_key_rotation_is_enabled/red/kms.tf terraform/ecc-aws-039-security_group_ingress_is_restricted_traffic_to_telnet_port_23/green/provider.tf terraform/ecc-aws-079-iam_policy_changes_alarm_exist/green/provider.tf terraform/ecc-aws-181-dms_replication_not_public/green/provider.tf terraform/ecc-aws-129-enable_elb_access_logs/red/provider.tf terraform/ecc-aws-200-rds_cluster_deletion_protection_enabled/green/provider.tf terraform/ecc-aws-175-rds_instances_storage_is_encrypted/green/provider.tf terraform/ecc-aws-245-postgresql_log_duration_flag_enabled/red/provider.tf terraform/ecc-aws-295-use_secure_ssl_protocols_between_cloudfront_origin/red/provider.tf terraform/ecc-aws-194-elb_deletion_protection_enabled/green/provider.tf terraform/ecc-aws-239-postgresql_log_error_verbosity_flag_set_correctly/green/provider.tf terraform/ecc-aws-078-root_usage_alarm_exists/red1/provider.tf terraform/ecc-aws-174-rds_database_cluster_engine_no_default_ports/green/provider.tf terraform/ecc-aws-332-workspaces_web_access_disabled/red/provider.tf terraform/ecc-aws-124-efs_is_encrypted_using_managed_cmk/green/provider.tf terraform/ecc-aws-008-iam_ssl_or_tls_certificates_expire_in_one_month/red/provider.tf terraform/ecc-aws-199-rds_instance_enhanced_monitoring_enabled/green/provider.tf terraform/ecc-aws-151-security_group_ingress_is_restricted_traffic_to_port_20/red/provider.tf terraform/ecc-aws-012-use_secure_ciphers_in_cloudfront_distribution/red/provider.tf terraform/ecc-aws-221-sns_kms_encryption_enabled/red/provider.tf terraform/ecc-aws-212-rds_aurora_mysql_backtracking_enabled/green/cluster.tf terraform/ecc-aws-114-k8s_cluster_network_firewall_inbound_rule_permissive_to_all_traffic/red1/provider.tf terraform/ecc-aws-016-ensure_hardware_mfa_is_enabled_for_root_account/red/provider.tf terraform/ecc-aws-186-ec2_instance_no_public_ip/green/provider.tf terraform/ecc-aws-322-oracle_sql92_security_flag_enabled/red/provider.tf terraform/ecc-aws-035-security_group_ingress_is_restricted_traffic_to_oracle_db_port_1521/red/provider.tf terraform/ecc-aws-026-rds_instance_with_no_backups/green/rds.tf terraform/ecc-aws-302-postgresql_log_parser_stats_flag_is_disabled/green/rds.tf terraform/ecc-aws-267-elasticache_encrypted_in_transit/red/provider.tf terraform/ecc-aws-191-efs_in_backup_plan/green/provider.tf terraform/ecc-aws-299-cloudfront_distribution_fieldlevel_encryption/green/provider.tf terraform/ecc-aws-201-rds_instance_deletion_protection_enabled/red/provider.tf terraform/ecc-aws-247-transit_gateway_default_route_table_propagation_disabled/red/provider.tf terraform/ecc-aws-283-elasticsearch_latest_version/green/provider.tf terraform/ecc-aws-215-redshift_cluster_automatic_snapshot_enabled/red/redshift.tf terraform/ecc-aws-343-mq_broker_not_publicly_accessible/red/provider.tf terraform/ecc-aws-033-security_group_ingress_is_restricted_traffic_to_mysql_db_port_3306/green/provider.tf terraform/ecc-aws-162-rds_database_security_group_events_notification_exists/red/provider.tf terraform/ecc-aws-120-kinesis_server_data_at_rest_has_sse/green/kinesis.tf terraform/ecc-aws-002-ensure_access_keys_are_rotated_every_90_days/green/provider.tf terraform/ecc-aws-040-eks_cluster_version_latest/red/provider.tf terraform/ecc-aws-203-rds_postgresql_logging_enabled/red/rds.tf terraform/ecc-aws-161-rds_database_parameter_group_events_notification_exists/red/provider.tf terraform/ecc-aws-059-config_enabled_all_regions/red1/provider.tf terraform/ecc-aws-038-security_group_ingress_is_restricted_traffic_to_smtp_port_25/green/provider.tf terraform/ecc-aws-344-route53_domain_expires_in_30_days/green/provider.tf terraform/ecc-aws-130-update_security_policy_of_network_load_balancer/red/provider.tf terraform/ecc-aws-307-postgresql_log_min_error_statement_flag_set_correctly/green/provider.tf terraform/ecc-aws-177-api_gateway_rest_api_stages_ssl_certificates_configured/red/provider.tf terraform/ecc-aws-221-sns_kms_encryption_enabled/green/provider.tf terraform/ecc-aws-096-security_group_changes_alarm_exists/green/provider.tf terraform/ecc-aws-127-rds_cluster_storage_is_encrypted/green/provider.tf terraform/ecc-aws-313-dms_replication_instances_encrypted_with_kms_cmk/red/provider.tf terraform/ecc-aws-125-elasticache_redis_clusters_encryption_at_rest/red2/provider.tf terraform/ecc-aws-175-rds_instances_storage_is_encrypted/red/provider.tf terraform/ecc-aws-305-postgresql_log_planner_stats_flag_disabled/green/provider.tf terraform/ecc-aws-182-dynamodb_tables_autoscaling_enabled/green/provider.tf terraform/ecc-aws-032-security_group_ingress_is_restricted_traffic_to_mongodb_port_27017/green/provider.tf terraform/ecc-aws-345-mq_broker_open_to_all_ports_protocols/green/mq.tf terraform/ecc-aws-291-backup_service_compliant_lifecycle_enabled/green/provider.tf terraform/ecc-aws-167-security_group_ingress_is_restricted_traffic_to_port_143/red/provider.tf terraform/ecc-aws-217-redshift_cluster_enhanced_vpc_routing_enabled/green/redshift.tf terraform/ecc-aws-306-postgresql_log_executor_stats_flag_disabled/green/rds.tf terraform/ecc-aws-113-managed_policies_instead_of_inline_iam_policies/red/provider.tf terraform/ecc-aws-250-rest_api_gateway_cache_enabled/green/provider.tf terraform/ecc-aws-321-oracle_sec_return_server_release_banner_flag_disabled/red/provider.tf terraform/ecc-aws-124-efs_is_encrypted_using_managed_cmk/red/provider.tf terraform/ecc-aws-180-cloudfront_origin_failover_configured/red/cloudfront.tf terraform/ecc-aws-284-autoscaling_group_has_associated_elb/green/provider.tf terraform/ecc-aws-013-remove_weak_ciphers_for_clb/green/lb.tf terraform/ecc-aws-226-eks_clusters_security_group_traffic_restricted/red/provider.tf terraform/ecc-aws-043-s3_bucket_lifecycle/green/provider.tf terraform/ecc-aws-111-alb_is_protected_by_waf_regional/green/provider.tf terraform/ecc-aws-006-rds_retention_backup_is_at_least_7_days/green/rds.tf terraform/ecc-aws-223-ec2_managed_instance_association_compliance_status_check/red/provider.tf terraform/ecc-aws-256-glue_s3_encryption_enabled/red/provider.tf terraform/ecc-aws-246-transit_gateway_default_route_table_association_disabled/red/provider.tf terraform/ecc-aws-084-cloudtrail_bucket_logging_enabled/green/provider.tf terraform/ecc-aws-337-lambda_variables_encrypted_with_kms_cmk/red/provider.tf terraform/ecc-aws-301-sqs_dead_letter_queue_enabled/green/provider.tf terraform/ecc-aws-145-organizations_changes_alarm_exists/green/provider.tf terraform/ecc-aws-169-security_group_ingress_is_restricted_traffic_to_port_4333/red/provider.tf terraform/ecc-aws-209-rds_aurora_postgresql_logging_enabled/red/rds.tf ... |
3. | 53881141+mykhailo-tolstyi@users.noreply.github.com | 80756766+anna-shcherbak@users.noreply.github.com |
90 shared files
terraform/ecc-aws-547-rds_instance_generation/iam/547-policy.json terraform/ecc-aws-268-elasticache_encrypted_at_rest_using_cmk/iam/268-policy.json terraform/ecc-aws-283-elasticsearch_latest_version/iam/283-policy.json terraform/ecc-aws-221-sns_kms_encryption_enabled/iam/221-policy.json terraform/ecc-aws-586-elasticsearch_general_purpose_ssd_volume/iam/586-policy.json terraform/ecc-aws-159-rds_critical_cluster_events_notification_exists/iam/159-policy.json terraform/ecc-aws-277-elasticsearch_slow_logs_enabled/iam/277-policy.json terraform/ecc-aws-175-rds_instances_storage_is_encrypted/iam/175-policy.json terraform/ecc-aws-456-emr_imdsv1_disabled/iam/456-policy.json terraform/ecc-aws-347-msk_data_encrypted_with_kms_cmk/iam/347-policy.json terraform/ecc-aws-352-sns_encrypted_with_kms_cmk/iam/352-policy.json tests/ecc-aws-310-dms_latest_version/placebo-green/dms.ListTagsForResource_1.json terraform/ecc-aws-162-rds_database_security_group_events_notification_exists/iam/162-policy.json terraform/ecc-aws-501-opensearch_access_control_enabled/iam/501-policy.json terraform/ecc-aws-348-msk_encryption_in_transit_enabled/iam/348-policy.json tests/ecc-aws-310-dms_latest_version/placebo-green/dms.DescribeReplicationInstances_1.json terraform/ecc-aws-630-ec2_ami_not_in_use/iam/630-policy.json terraform/ecc-aws-258-emr_at_rest_and_in_transit_encryption_enabled/iam/258-policy.json policies/ecc-aws-310-dms_latest_version.yml terraform/ecc-aws-148-logging_for_s3_enabled/iam/148-policy.json terraform/ecc-aws-201-rds_instance_deletion_protection_enabled/iam/201-policy.json tests/ecc-aws-482-codebuild_project_logging_enabled/placebo-red/codebuild.ListProjects_1.json terraform/ecc-aws-329-unused_ec2_access_keys/iam/329-policy.json terraform/ecc-aws-160-rds_database_instance_events_notification_exists/iam/160-policy.json terraform/ecc-aws-592-reserved_rds_instance_payment_pending/iam/592-policy.json terraform/ecc-aws-075-elasticsearch_service_domains_encryption_at_rest/iam/075-policy.json terraform/ecc-aws-044-s3_buckets_without_tags/iam/044-policy.json terraform/ecc-aws-161-rds_database_parameter_group_events_notification_exists/iam/161-policy.json terraform/ecc-aws-198-elasticsearch_error_logging_to_cloudwatch_enabled/iam/198-policy.json terraform/ecc-aws-007-rds_high-availability_zone/iam/007-policy.json terraform/ecc-aws-591-reserved_rds_instance_payment_failed/iam/591-policy.json terraform/ecc-aws-310-dms_latest_version/green/dms.tf terraform/ecc-aws-042-s3_encrypted_using_kms/iam/042-policy.json terraform/ecc-aws-197-elasticsearch_node_to_node_encryption_enabled/iam/197-policy.json terraform/ecc-aws-392-vpc_endpoint_without_tag_information/iam/392-policy.json terraform/ecc-aws-410-elasticsearch_without_tag_information/iam/410-policy.json terraform/ecc-aws-017-credentials_unused_for_45_days/iam/017-policy.json terraform/ecc-aws-016-ensure_hardware_mfa_is_enabled_for_root_account/iam/016-policy.json terraform/ecc-aws-041-rds_without_tag_information/iam/041-policy.json terraform/ecc-aws-417-msk_clusters_without_tag_information/iam/417-policy.json terraform/ecc-aws-061-kms_key_rotation_is_enabled/iam/061-policy.json terraform/ecc-aws-282-elasticsearch_enforces_https/iam/282-policy.json terraform/ecc-aws-158-rds_db_instances_configured_to_copy_tags_to_snapshots/iam/158-policy.json terraform/ecc-aws-463-bucket_not_dns_compliant/iam/463-policy.json terraform/ecc-aws-593-reserved_rds_instance_recent_purchases/iam/593-policy.json terraform/ecc-aws-074-elasticsearch_service_domains_in_vpc/iam/074-policy.json terraform/ecc-aws-113-managed_policies_instead_of_inline_iam_policies/iam/113-policy.json terraform/ecc-aws-006-rds_retention_backup_is_at_least_7_days/iam/006-policy.json terraform/ecc-aws-428-rds_snapshot_without_tag_information/iam/428-policy.json terraform/ecc-aws-127-rds_cluster_storage_is_encrypted/iam/127-policy.json terraform/ecc-aws-431-sns_without_tag_information/iam/431-policy.json terraform/ecc-aws-502-rds_automatic_minor_version_upgrade_enabled/iam/502-policy.json terraform/ecc-aws-149-rds_public_access_disabled/red/rds.tf terraform/ecc-aws-345-mq_broker_open_to_all_ports_protocols/iam/345-policy.json tests/ecc-aws-482-codebuild_project_logging_enabled/placebo-green/codebuild.BatchGetProjects_1.json .github/workflows/ci.yaml terraform/ecc-aws-482-codebuild_project_logging_enabled/green/codebuild.tf terraform/ecc-aws-566-opensearch_auto_tune_enabled/iam/566-policy.json terraform/ecc-aws-507-sns_topic_message_delivery_notification_enabled/iam/507-policy.json iam/All-permissions_2.json tests/ecc-aws-482-codebuild_project_logging_enabled/placebo-red/tagging.GetResources_1.json terraform/ecc-aws-296-rds_mysql_instances_latest_major_version/iam/296-policy.json terraform/ecc-aws-155-elasticsearch_domains_configured_with_at_least_three_dedicated_master_nodes/iam/155-policy.json terraform/ecc-aws-153-elasticsearch_domains_audit_logging_enabled/green/es.tf terraform/ecc-aws-140-only_one_active_access_key_available_for_any_single_iam_user/iam/140-policy.json terraform/ecc-aws-002-ensure_access_keys_are_rotated_every_90_days/iam/002-policy.json terraform/ecc-aws-088-s3_bucket_cross_region_replication_enabled/iam/088-policy.json terraform/ecc-aws-149-rds_public_access_disabled/iam/149-policy.json tests/ecc-aws-310-dms_latest_version/red_policy_test.py terraform/ecc-aws-142-s3_buckets_configured_with_block_public_access/iam/142-policy.json terraform/ecc-aws-153-elasticsearch_domains_audit_logging_enabled/iam/153-policy.json terraform/ecc-aws-004-bucket_policy_allows_https_requests/iam/004-policy.json terraform/ecc-aws-026-rds_instance_with_no_backups/iam/026-policy.json terraform/ecc-aws-060-cloudtrail_logs_encrypted_using_KMS_CMKs/iam/060-policy.json terraform/ecc-aws-504-rds_instance_default_admin_check/iam/504-policy.json terraform/ecc-aws-590-rds_general_purpose_ssd_storage_type/iam/590-policy.json terraform/ecc-aws-139-iam_access_analyzer_is_enabled/iam/139-policy.json terraform/ecc-aws-350-msk_logging_enabled/iam/350-policy.json terraform/ecc-aws-479-cloudwatch_log_group_encrypted_with_kms_cmk/iam/479-policy.json terraform/ecc-aws-313-dms_replication_instances_encrypted_with_kms_cmk/iam/313-policy.json policies/ecc-aws-482-codebuild_project_logging_enabled.yml terraform/ecc-aws-156-elasticsearch_domain_connections_encrypted_using_TLS_1_2/iam/156-policy.json terraform/ecc-aws-518-s3_version_lifecycle_policy_check/iam/518-policy.json terraform/ecc-aws-001-ensure_mfa_is_enabled_for_all_iam_users_with_console_password/iam/001-policy.json terraform/ecc-aws-070-unused_ec2_security_groups/iam/070-policy.json tests/ecc-aws-482-codebuild_project_logging_enabled/placebo-red/codebuild.BatchGetProjects_1.json iam/All-permissions_1.json terraform/ecc-aws-043-s3_bucket_lifecycle/iam/043-policy.json terraform/ecc-aws-280-elasticsearch_encrypted_with_kms_cmk/iam/280-policy.json terraform/ecc-aws-420-kms_key_without_tag_information/iam/420-policy.json |
4. | 53881141+mykhailo-tolstyi@users.noreply.github.com | anna_shcherbak@epam.com |
90 shared files
terraform/ecc-aws-547-rds_instance_generation/iam/547-policy.json terraform/ecc-aws-268-elasticache_encrypted_at_rest_using_cmk/iam/268-policy.json terraform/ecc-aws-283-elasticsearch_latest_version/iam/283-policy.json terraform/ecc-aws-221-sns_kms_encryption_enabled/iam/221-policy.json terraform/ecc-aws-586-elasticsearch_general_purpose_ssd_volume/iam/586-policy.json terraform/ecc-aws-159-rds_critical_cluster_events_notification_exists/iam/159-policy.json terraform/ecc-aws-277-elasticsearch_slow_logs_enabled/iam/277-policy.json terraform/ecc-aws-175-rds_instances_storage_is_encrypted/iam/175-policy.json terraform/ecc-aws-456-emr_imdsv1_disabled/iam/456-policy.json terraform/ecc-aws-347-msk_data_encrypted_with_kms_cmk/iam/347-policy.json terraform/ecc-aws-352-sns_encrypted_with_kms_cmk/iam/352-policy.json tests/ecc-aws-310-dms_latest_version/placebo-green/dms.ListTagsForResource_1.json terraform/ecc-aws-162-rds_database_security_group_events_notification_exists/iam/162-policy.json terraform/ecc-aws-501-opensearch_access_control_enabled/iam/501-policy.json terraform/ecc-aws-348-msk_encryption_in_transit_enabled/iam/348-policy.json tests/ecc-aws-310-dms_latest_version/placebo-green/dms.DescribeReplicationInstances_1.json terraform/ecc-aws-630-ec2_ami_not_in_use/iam/630-policy.json terraform/ecc-aws-258-emr_at_rest_and_in_transit_encryption_enabled/iam/258-policy.json policies/ecc-aws-310-dms_latest_version.yml terraform/ecc-aws-148-logging_for_s3_enabled/iam/148-policy.json terraform/ecc-aws-201-rds_instance_deletion_protection_enabled/iam/201-policy.json tests/ecc-aws-482-codebuild_project_logging_enabled/placebo-red/codebuild.ListProjects_1.json terraform/ecc-aws-329-unused_ec2_access_keys/iam/329-policy.json terraform/ecc-aws-160-rds_database_instance_events_notification_exists/iam/160-policy.json terraform/ecc-aws-592-reserved_rds_instance_payment_pending/iam/592-policy.json terraform/ecc-aws-075-elasticsearch_service_domains_encryption_at_rest/iam/075-policy.json terraform/ecc-aws-044-s3_buckets_without_tags/iam/044-policy.json terraform/ecc-aws-161-rds_database_parameter_group_events_notification_exists/iam/161-policy.json terraform/ecc-aws-198-elasticsearch_error_logging_to_cloudwatch_enabled/iam/198-policy.json terraform/ecc-aws-007-rds_high-availability_zone/iam/007-policy.json terraform/ecc-aws-591-reserved_rds_instance_payment_failed/iam/591-policy.json terraform/ecc-aws-310-dms_latest_version/green/dms.tf terraform/ecc-aws-042-s3_encrypted_using_kms/iam/042-policy.json terraform/ecc-aws-197-elasticsearch_node_to_node_encryption_enabled/iam/197-policy.json terraform/ecc-aws-392-vpc_endpoint_without_tag_information/iam/392-policy.json terraform/ecc-aws-410-elasticsearch_without_tag_information/iam/410-policy.json terraform/ecc-aws-017-credentials_unused_for_45_days/iam/017-policy.json terraform/ecc-aws-016-ensure_hardware_mfa_is_enabled_for_root_account/iam/016-policy.json terraform/ecc-aws-041-rds_without_tag_information/iam/041-policy.json terraform/ecc-aws-417-msk_clusters_without_tag_information/iam/417-policy.json terraform/ecc-aws-061-kms_key_rotation_is_enabled/iam/061-policy.json terraform/ecc-aws-282-elasticsearch_enforces_https/iam/282-policy.json terraform/ecc-aws-158-rds_db_instances_configured_to_copy_tags_to_snapshots/iam/158-policy.json terraform/ecc-aws-463-bucket_not_dns_compliant/iam/463-policy.json terraform/ecc-aws-593-reserved_rds_instance_recent_purchases/iam/593-policy.json terraform/ecc-aws-074-elasticsearch_service_domains_in_vpc/iam/074-policy.json terraform/ecc-aws-113-managed_policies_instead_of_inline_iam_policies/iam/113-policy.json terraform/ecc-aws-006-rds_retention_backup_is_at_least_7_days/iam/006-policy.json terraform/ecc-aws-428-rds_snapshot_without_tag_information/iam/428-policy.json terraform/ecc-aws-127-rds_cluster_storage_is_encrypted/iam/127-policy.json terraform/ecc-aws-431-sns_without_tag_information/iam/431-policy.json terraform/ecc-aws-502-rds_automatic_minor_version_upgrade_enabled/iam/502-policy.json terraform/ecc-aws-149-rds_public_access_disabled/red/rds.tf terraform/ecc-aws-345-mq_broker_open_to_all_ports_protocols/iam/345-policy.json tests/ecc-aws-482-codebuild_project_logging_enabled/placebo-green/codebuild.BatchGetProjects_1.json .github/workflows/ci.yaml terraform/ecc-aws-482-codebuild_project_logging_enabled/green/codebuild.tf terraform/ecc-aws-566-opensearch_auto_tune_enabled/iam/566-policy.json terraform/ecc-aws-507-sns_topic_message_delivery_notification_enabled/iam/507-policy.json iam/All-permissions_2.json tests/ecc-aws-482-codebuild_project_logging_enabled/placebo-red/tagging.GetResources_1.json terraform/ecc-aws-296-rds_mysql_instances_latest_major_version/iam/296-policy.json terraform/ecc-aws-155-elasticsearch_domains_configured_with_at_least_three_dedicated_master_nodes/iam/155-policy.json terraform/ecc-aws-153-elasticsearch_domains_audit_logging_enabled/green/es.tf terraform/ecc-aws-140-only_one_active_access_key_available_for_any_single_iam_user/iam/140-policy.json terraform/ecc-aws-002-ensure_access_keys_are_rotated_every_90_days/iam/002-policy.json terraform/ecc-aws-088-s3_bucket_cross_region_replication_enabled/iam/088-policy.json terraform/ecc-aws-149-rds_public_access_disabled/iam/149-policy.json tests/ecc-aws-310-dms_latest_version/red_policy_test.py terraform/ecc-aws-142-s3_buckets_configured_with_block_public_access/iam/142-policy.json terraform/ecc-aws-153-elasticsearch_domains_audit_logging_enabled/iam/153-policy.json terraform/ecc-aws-004-bucket_policy_allows_https_requests/iam/004-policy.json terraform/ecc-aws-026-rds_instance_with_no_backups/iam/026-policy.json terraform/ecc-aws-060-cloudtrail_logs_encrypted_using_KMS_CMKs/iam/060-policy.json terraform/ecc-aws-504-rds_instance_default_admin_check/iam/504-policy.json terraform/ecc-aws-590-rds_general_purpose_ssd_storage_type/iam/590-policy.json terraform/ecc-aws-139-iam_access_analyzer_is_enabled/iam/139-policy.json terraform/ecc-aws-350-msk_logging_enabled/iam/350-policy.json terraform/ecc-aws-479-cloudwatch_log_group_encrypted_with_kms_cmk/iam/479-policy.json terraform/ecc-aws-313-dms_replication_instances_encrypted_with_kms_cmk/iam/313-policy.json policies/ecc-aws-482-codebuild_project_logging_enabled.yml terraform/ecc-aws-156-elasticsearch_domain_connections_encrypted_using_TLS_1_2/iam/156-policy.json terraform/ecc-aws-518-s3_version_lifecycle_policy_check/iam/518-policy.json terraform/ecc-aws-001-ensure_mfa_is_enabled_for_all_iam_users_with_console_password/iam/001-policy.json terraform/ecc-aws-070-unused_ec2_security_groups/iam/070-policy.json tests/ecc-aws-482-codebuild_project_logging_enabled/placebo-red/codebuild.BatchGetProjects_1.json iam/All-permissions_1.json terraform/ecc-aws-043-s3_bucket_lifecycle/iam/043-policy.json terraform/ecc-aws-280-elasticsearch_encrypted_with_kms_cmk/iam/280-policy.json terraform/ecc-aws-420-kms_key_without_tag_information/iam/420-policy.json |
5. | 80756766+anna-shcherbak@users.noreply.github.com | mykhailo_tolstyi@epam.com |
83 shared files
policies/ecc-aws-141-expired_ssl_tls_certificates_stored_in_aws_iam_are_removed.yml policies/ecc-aws-330-mysql_sql_mode_flag_contains_strict_all_tables.yml non-compatible/policies/ecc-aws-084-cloudtrail_bucket_logging_enabled.yml policies/ecc-aws-097-network_access_control_lists_changes_alarm_exists.yml policies/ecc-aws-140-only_one_active_access_key_available_for_any_single_iam_user.yml non-compatible/policies/ecc-aws-373-workspaces_radius_server_uses_strongest_security_protocol.yml policies/ecc-aws-175-rds_instances_storage_is_encrypted.yml policies/ecc-aws-320-oracle_sec_protocol_error_trace_action_flag_set_to_log.yml non-compatible/policies/ecc-aws-371-workspaces_primary_interface_ports_not_open_to_all_inbound_traffic.yml policies/ecc-aws-061-kms_key_rotation_is_enabled.yml policies/ecc-aws-318-oracle_sec_max_failed_login_attempts_flag_is_3_or_less.yml policies/ecc-aws-317-oracle_remote_listener_flag_empty.yml policies/ecc-aws-225-eks_control_plane_logging_enabled.yml policies/ecc-aws-004-bucket_policy_allows_https_requests.yml policies/ecc-aws-095-aws_config_configuration_changes_alarm_exists.yml policies/ecc-aws-149-rds_public_access_disabled.yml policies/ecc-aws-100-vpc_changes_alarm_exists.yml policies/ecc-aws-331-workspaces_images_not_older_than_90_days.yml policies/ecc-aws-017-credentials_unused_for_45_days.yml policies/ecc-aws-054-iam_policies_full_administrative_privileges.yml policies/ecc-aws-515-security_hub_enabled.yml policies/ecc-aws-046-ensure_no_root_account_access_key_exists.yml policies/ecc-aws-099-route_table_changes_alarm_exists.yml policies/ecc-aws-015-ensure_mfa_is_enabled_for_the_root_account.yml non-compatible/policies/ecc-aws-058-ensure_support_role_created_to_manage_incidents.yml policies/ecc-aws-053-cloudtrail_log_validation_enabled.yml policies/ecc-aws-332-workspaces_web_access_disabled.yml policies/ecc-aws-324-oracle_resource_limit_flag_enabled.yml policies/ecc-aws-375-workspaces_storage_encrypted_with_cmk.yml policies/ecc-aws-080-cloudtrail_configuration_changes_alarm_exists.yml policies/ecc-aws-019-iam_password_policy_password_reuse.yml policies/ecc-aws-142-s3_buckets_configured_with_block_public_access.yml non-compatible/policies/ecc-aws-052-cloudtrail_enabled_in_all_regions.yml policies/ecc-aws-323-oracle_trace_files_public.yml policies/ecc-aws-319-oracle_sec_protocol_error_further_action_flag_set_to_drop_3.yml policies/ecc-aws-016-ensure_hardware_mfa_is_enabled_for_root_account.yml non-compatible/policies/ecc-aws-144-bucket_object-level_logging_for_read_enabled.yml policies/ecc-aws-315-oracle_audit_trail_flag_set_correctly.yml non-compatible/policies/ecc-aws-369-workspaces_cloudwatch_integration.yml policies/ecc-aws-096-security_group_changes_alarm_exists.yml non-compatible/policies/ecc-aws-146-no_acls_allow_ingress_for_everyone_to_remote_server_administration_ports.yml version policies/ecc-aws-060-cloudtrail_logs_encrypted_using_KMS_CMKs.yml policies/ecc-aws-018-iam_users_receive_permissions_only_through_groups.yml policies/ecc-aws-531-ebs_default_encryption_enabled.yml policies/ecc-aws-078-root_usage_alarm_exists.yml policies/ecc-aws-138-eliminate_use_root_user_for_administrative_and_daily_tasks.yml policies/ecc-aws-316-oracle_global_names_flag_enabled.yml policies/ecc-aws-063-security_group_ingress_is_restricted_3389.yml non-compatible/policies/ecc-aws-056-iam_user_with_password_and_unused_access_keys.yml policies/ecc-aws-067-unauthorized_api_calls_alarm_exists.yml .github/workflows/ci.yaml policies/ecc-aws-050-iam_password_min_length_ge_14.yml policies/ecc-aws-123-efs_is_encrypted.yml non-compatible/policies/ecc-aws-143-bucket_object-level_logging_for_write_enabled.yml policies/ecc-aws-001-ensure_mfa_is_enabled_for_all_iam_users_with_console_password.yml policies/ecc-aws-082-cmk_key_disabling_or_deletion_alarm_exists.yml policies/ecc-aws-872-access_to_cloudshell_restricted.yml policies/ecc-aws-290-workspaces_storage_encrypted.yml policies/ecc-aws-127-rds_cluster_storage_is_encrypted.yml policies/ecc-aws-139-iam_access_analyzer_is_enabled.yml policies/ecc-aws-059-config_enabled_all_regions.yml policies/ecc-aws-321-oracle_sec_return_server_release_banner_flag_disabled.yml policies/ecc-aws-002-ensure_access_keys_are_rotated_every_90_days.yml policies/ecc-aws-224-ec2_instance_imdsv2_enabled.yml policies/ecc-aws-145-organizations_changes_alarm_exists.yml policies/ecc-aws-314-oracle_audit_sys_operations_flag_enabled.yml policies/ecc-aws-057-ensure_iam_instance_roles_are_used_for_resource_access_from_instance.yml policies/ecc-aws-064-default_security_group_every_vpc_restricts_all_traffic.yml policies/ecc-aws-502-rds_automatic_minor_version_upgrade_enabled.yml policies/ecc-aws-112-s3_bucket_versioning_mfa_delete_enabled.yml policies/ecc-aws-077-sign_in_without_mfa_alarm_exist.yml policies/ecc-aws-098-network_gateways_changes_alarm_exists.yml policies/ecc-aws-003-ensure_vpc_flow_logging_enabled_for_every_vpc.yml policies/ecc-aws-370-workspaces_maintenance_mode_enabled.yml policies/ecc-aws-079-iam_policy_changes_alarm_exist.yml policies/ecc-aws-062-security_group_ingress_is_restricted_22.yml version-custodian policies/ecc-aws-286-workspaces_unused_instances.yml policies/ecc-aws-322-oracle_sql92_security_flag_enabled.yml non-compatible/policies/ecc-aws-372-workspaces_api_requests_flow_through_vpc_endpoint.yml policies/ecc-aws-094-s3_bucket_policy_changes_alarm_exists.yml policies/ecc-aws-081-console_auth_failure_alarm_exists.yml |
6. | aavolosh@gmail.com | 80756766+anna-shcherbak@users.noreply.github.com |
33 shared files
terraform/ecc-aws-534-autoscaling_launch_template/green1/provider.tf terraform/ecc-aws-386-security_group_without_tag_information/green/provider.tf terraform/ecc-aws-494-ecs_fargate_latest_platform_version/red/provider.tf terraform/ecc-aws-534-autoscaling_launch_template/green/provider.tf terraform/ecc-aws-505-redshift_default_admin_check/red/provider.tf terraform/ecc-aws-491-ec2_transit_gateway_auto_vpc_attach_disabled/green/provider.tf terraform/ecc-aws-520-autoscaling_launch_config_hop_limit/red/provider.tf terraform/ecc-aws-365-glue_connection_passwords_encrypted/red/provider.tf terraform/ecc-aws-387-subnet_without_tag_information/red/provider.tf terraform/ecc-aws-492-ecr_private_lifecycle_policy_configured/green/provider.tf terraform/ecc-aws-374-cloudtrail_logs_data_events/green/provider.tf terraform/ecc-aws-374-cloudtrail_logs_data_events/red/provider.tf terraform/ecc-aws-491-ec2_transit_gateway_auto_vpc_attach_disabled/red/provider.tf terraform/ecc-aws-388-transit_gateway_without_tag_information/red/provider.tf terraform/ecc-aws-493-ecs_container_insights_enabled/green/provider.tf terraform/ecc-aws-521-ecs_containers_readonly_access/red/provider.tf terraform/ecc-aws-365-glue_connection_passwords_encrypted/green/provider.tf terraform/ecc-aws-521-ecs_containers_readonly_access/green/provider.tf terraform/ecc-aws-492-ecr_private_lifecycle_policy_configured/green/ecr.tf terraform/ecc-aws-386-security_group_without_tag_information/red/provider.tf terraform/ecc-aws-494-ecs_fargate_latest_platform_version/green/provider.tf terraform/ecc-aws-388-transit_gateway_without_tag_information/green/provider.tf terraform/ecc-aws-493-ecs_container_insights_enabled/red/provider.tf terraform/ecc-aws-387-subnet_without_tag_information/green/provider.tf terraform/ecc-aws-492-ecr_private_lifecycle_policy_configured/red/provider.tf terraform/ecc-aws-505-redshift_default_admin_check/green/provider.tf terraform/ecc-aws-510-unused_efs_filesystem/green/provider.tf terraform/ecc-aws-506-redshift_default_db_name_check/green/provider.tf terraform/ecc-aws-520-autoscaling_launch_config_hop_limit/green/provider.tf terraform/ecc-aws-510-unused_efs_filesystem/red/provider.tf terraform/ecc-aws-506-redshift_default_db_name_check/red/provider.tf terraform/ecc-aws-534-autoscaling_launch_template/red/provider.tf terraform/ecc-aws-492-ecr_private_lifecycle_policy_configured/red/ecr.tf |
7. | dmytrobeveraki@thebeverakiair.local | 80756766+anna-shcherbak@users.noreply.github.com |
32 shared files
terraform/ecc-aws-513-acm_certificate_not_using_a_minimum_of_2048-bit_key_for_rsa_certificate/green/provider.tf terraform/ecc-aws-488-cloudwatch_log_group_retention_period_check/red/provider.tf terraform/ecc-aws-479-cloudwatch_log_group_encrypted_with_kms_cmk/green/provider.tf terraform/ecc-aws-503-rds_cluster_default_admin_check/green/cluster.tf terraform/ecc-aws-552-dynamodb_tables_unused/green/provider.tf terraform/ecc-aws-529-ebs_attached_volume_delete_on_termination_enabled/red/provider.tf terraform/ecc-aws-383-nat_gateway_without_tag_information/green/provider.tf terraform/ecc-aws-385-route_table_without_tag_information/green/provider.tf terraform/ecc-aws-476-cloudformation_stack_drift_detection_check/green/provider.tf terraform/ecc-aws-461-lambda_latest_runtime_environment_version/red/provider.tf terraform/ecc-aws-503-rds_cluster_default_admin_check/red/provider.tf terraform/ecc-aws-529-ebs_attached_volume_delete_on_termination_enabled/green/provider.tf terraform/ecc-aws-504-rds_instance_default_admin_check/red/provider.tf terraform/ecc-aws-384-network_acl_without_tag_information/red/provider.tf terraform/ecc-aws-479-cloudwatch_log_group_encrypted_with_kms_cmk/red/provider.tf terraform/ecc-aws-474-clb-multiple_az/green/provider.tf terraform/ecc-aws-503-rds_cluster_default_admin_check/red/cluster.tf terraform/ecc-aws-461-lambda_latest_runtime_environment_version/green/provider.tf terraform/ecc-aws-513-acm_certificate_not_using_a_minimum_of_2048-bit_key_for_rsa_certificate/red/provider.tf terraform/ecc-aws-552-dynamodb_tables_unused/red/provider.tf terraform/ecc-aws-503-rds_cluster_default_admin_check/green/provider.tf terraform/ecc-aws-385-route_table_without_tag_information/red/provider.tf terraform/ecc-aws-383-nat_gateway_without_tag_information/red/provider.tf terraform/ecc-aws-475-clb_cross_zone_load_balancing_enabled/green/provider.tf terraform/ecc-aws-384-network_acl_without_tag_information/green/provider.tf terraform/ecc-aws-488-cloudwatch_log_group_retention_period_check/green/provider.tf terraform/ecc-aws-514-inactive_iam_access_keys_are_not_deleted/red/provider.tf terraform/ecc-aws-475-clb_cross_zone_load_balancing_enabled/red/provider.tf terraform/ecc-aws-504-rds_instance_default_admin_check/green/provider.tf terraform/ecc-aws-476-cloudformation_stack_drift_detection_check/red/provider.tf terraform/ecc-aws-474-clb-multiple_az/red/provider.tf terraform/ecc-aws-514-inactive_iam_access_keys_are_not_deleted/green/provider.tf |
8. | 80756766+anna-shcherbak@users.noreply.github.com | vladyslav_yevsiukov@epam.com |
26 shared files
terraform/ecc-aws-597-reserved_redshift_node_recent_purchases/iam/597-policy.json tests/ecc-aws-283-elasticsearch_latest_version/placebo-green/es.DescribeElasticsearchDomains_1.json tests/ecc-aws-597-reserved_redshift_node_recent_purchases/red_policy_test.py terraform/ecc-aws-272-elasticache_latest_version/red/elasticache.tf policies/ecc-aws-283-elasticsearch_latest_version.yml policies/ecc-aws-461-lambda_latest_runtime_environment_version.yml tests/ecc-aws-508-mwaa_latest_version/placebo-green/airflow.GetEnvironment_1.json tests/ecc-aws-272-elasticache_latest_version/red_policy_test.py tests/ecc-aws-310-dms_latest_version/placebo-green/dms.DescribeReplicationInstances_1.json policies/ecc-aws-310-dms_latest_version.yml policies/ecc-aws-508-mwaa_latest_version.yml terraform/ecc-aws-310-dms_latest_version/green/dms.tf tests/ecc-aws-597-reserved_redshift_node_recent_purchases/placebo-red/redshift.DescribeReservedNodes_1.json tests/ecc-aws-497-eks_cluster_oldest_supported_version/placebo-green/eks.DescribeCluster_1.json tests/ecc-aws-310-dms_latest_version/placebo-red/dms.DescribeReplicationInstances_1.json terraform/ecc-aws-310-dms_latest_version/red/dms.tf terraform/ecc-aws-461-lambda_latest_runtime_environment_version/green/lambda.tf tests/ecc-aws-272-elasticache_latest_version/placebo-red/elasticache.DescribeCacheClusters_1.json policies/ecc-aws-597-reserved_redshift_node_recent_purchases.yml tests/ecc-aws-310-dms_latest_version/red_policy_test.py terraform/ecc-aws-283-elasticsearch_latest_version/green/elasticsearch.tf tests/ecc-aws-461-lambda_latest_runtime_environment_version/placebo-green/lambda.ListFunctions_1.json tests/ecc-aws-272-elasticache_latest_version/placebo-green/elasticache.DescribeCacheClusters_1.json policies/ecc-aws-272-elasticache_latest_version.yml policies/ecc-aws-497-eks_cluster_oldest_supported_version.yml tests/ecc-aws-597-reserved_redshift_node_recent_purchases/placebo-green/redshift.DescribeReservedNodes_1.json |
9. | astr1kyv@gmail.com | anna_shcherbak@epam.com |
25 shared files
terraform/ecc-aws-026-rds_instance_with_no_backups/green/rds.tf terraform/ecc-aws-013-remove_weak_ciphers_for_clb/green/lb.tf terraform/ecc-aws-006-rds_retention_backup_is_at_least_7_days/green/rds.tf terraform/ecc-aws-337-lambda_variables_encrypted_with_kms_cmk/red/provider.tf terraform/ecc-aws-340-mq_broker_logging_enabled/green/provider.tf terraform/ecc-aws-336-sagemaker_endpoint_configuration_encrypted/red/provider.tf terraform/ecc-aws-338-sagemaker_instance_root_disabled/red/provider.tf terraform/ecc-aws-336-sagemaker_endpoint_configuration_encrypted/green/provider.tf terraform/ecc-aws-333-fsx_all_types_of_file_systems_encrypted_with_kms_cmk/green/provider.tf terraform/ecc-aws-339-mq_broker_auto_minor_version_upgrade_enabled/red/provider.tf terraform/ecc-aws-335-lambda_active_tracing_enabled/green/provider.tf terraform/ecc-aws-340-mq_broker_logging_enabled/red/provider.tf terraform/ecc-aws-149-rds_public_access_disabled/red/rds.tf terraform/ecc-aws-334-kinesis_firehose_delivery_streams_encrypted_using_SSE/green/provider.tf terraform/ecc-aws-333-fsx_all_types_of_file_systems_encrypted_with_kms_cmk/red/provider.tf terraform/ecc-aws-334-kinesis_firehose_delivery_streams_encrypted_using_SSE/red/provider.tf terraform/ecc-aws-006-rds_retention_backup_is_at_least_7_days/red/rds.tf terraform/ecc-aws-335-lambda_active_tracing_enabled/red/provider.tf terraform/ecc-aws-153-elasticsearch_domains_audit_logging_enabled/green/es.tf terraform/ecc-aws-338-sagemaker_instance_root_disabled/green/provider.tf terraform/ecc-aws-026-rds_instance_with_no_backups/red/rds.tf terraform/ecc-aws-337-lambda_variables_encrypted_with_kms_cmk/green/provider.tf terraform/ecc-aws-021-ebs-volume_without_recent_snapshot/red/provider.tf terraform/ecc-aws-339-mq_broker_auto_minor_version_upgrade_enabled/green/provider.tf terraform/ecc-aws-334-kinesis_firehose_delivery_streams_encrypted_using_SSE/green1/provider.tf |
10. | mykhailo_tolstyi@epam.com | anna_shcherbak@epam.com |
24 shared files
non-compatible/policies/ecc-aws-084-cloudtrail_bucket_logging_enabled.yml non-compatible/policies/ecc-aws-373-workspaces_radius_server_uses_strongest_security_protocol.yml non-compatible/policies/ecc-aws-371-workspaces_primary_interface_ports_not_open_to_all_inbound_traffic.yml policies/ecc-aws-004-bucket_policy_allows_https_requests.yml policies/ecc-aws-054-iam_policies_full_administrative_privileges.yml policies/ecc-aws-099-route_table_changes_alarm_exists.yml non-compatible/policies/ecc-aws-058-ensure_support_role_created_to_manage_incidents.yml policies/ecc-aws-142-s3_buckets_configured_with_block_public_access.yml non-compatible/policies/ecc-aws-052-cloudtrail_enabled_in_all_regions.yml non-compatible/policies/ecc-aws-144-bucket_object-level_logging_for_read_enabled.yml non-compatible/policies/ecc-aws-369-workspaces_cloudwatch_integration.yml non-compatible/policies/ecc-aws-146-no_acls_allow_ingress_for_everyone_to_remote_server_administration_ports.yml version non-compatible/policies/ecc-aws-056-iam_user_with_password_and_unused_access_keys.yml policies/ecc-aws-067-unauthorized_api_calls_alarm_exists.yml .github/workflows/ci.yaml non-compatible/policies/ecc-aws-143-bucket_object-level_logging_for_write_enabled.yml policies/ecc-aws-224-ec2_instance_imdsv2_enabled.yml policies/ecc-aws-057-ensure_iam_instance_roles_are_used_for_resource_access_from_instance.yml policies/ecc-aws-502-rds_automatic_minor_version_upgrade_enabled.yml policies/ecc-aws-112-s3_bucket_versioning_mfa_delete_enabled.yml version-custodian policies/ecc-aws-286-workspaces_unused_instances.yml non-compatible/policies/ecc-aws-372-workspaces_api_requests_flow_through_vpc_endpoint.yml |
11. | 80756766+anna-shcherbak@users.noreply.github.com | vasyl_volkov@epam.com |
19 shared files
tests/ecc-aws-218-secrets_manager_rotation_enabled/placebo-green/secretsmanager.ListSecrets_1.json tests/ecc-aws-218-secrets_manager_rotation_enabled/placebo-red/secretsmanager.DescribeSecret_1.json tests/ecc-aws-219-secrets_manager_successful_rotation_check/placebo-green/secretsmanager.ListSecrets_1.json tests/ecc-aws-218-secrets_manager_rotation_enabled/placebo-green/secretsmanager.DescribeSecret_1.json tests/ecc-aws-219-secrets_manager_successful_rotation_check/placebo-red/secretsmanager.ListSecrets_1.json policies/ecc-aws-219-secrets_manager_successful_rotation_check.yml tests/ecc-aws-220-secrets_manager_unused_secret/placebo-green/secretsmanager.ListSecrets_1.json policies/ecc-aws-220-secrets_manager_unused_secret.yml tests/ecc-aws-220-secrets_manager_unused_secret/green_policy_test.py tests/ecc-aws-220-secrets_manager_unused_secret/placebo-red/secretsmanager.DescribeSecret_1.json tests/ecc-aws-219-secrets_manager_successful_rotation_check/red_policy_test.py tests/ecc-aws-218-secrets_manager_rotation_enabled/red_policy_test.py tests/ecc-aws-219-secrets_manager_successful_rotation_check/placebo-green/secretsmanager.DescribeSecret_1.json tests/ecc-aws-220-secrets_manager_unused_secret/placebo-red/secretsmanager.ListSecrets_1.json tests/ecc-aws-220-secrets_manager_unused_secret/placebo-green/secretsmanager.DescribeSecret_1.json tests/ecc-aws-220-secrets_manager_unused_secret/red_policy_test.py policies/ecc-aws-218-secrets_manager_rotation_enabled.yml tests/ecc-aws-218-secrets_manager_rotation_enabled/placebo-red/secretsmanager.ListSecrets_1.json tests/ecc-aws-219-secrets_manager_successful_rotation_check/placebo-red/secretsmanager.DescribeSecret_1.json |
12. | yurii_lystopad@epam.com | 80756766+anna-shcherbak@users.noreply.github.com |
14 shared files
terraform/ecc-aws-367-ds_directory_not_open_to_large_scope/red/provider.tf terraform/ecc-aws-367-ds_directory_not_open_to_large_scope/green/provider.tf terraform/ecc-aws-360-ecs_exec_logging_encryption_enabled/green/provider.tf terraform/ecc-aws-394-app_flow_without_tag_information/red/provider.tf terraform/ecc-aws-362-mwaa_encrypted_with_kms_cmk/red/provider.tf terraform/ecc-aws-360-ecs_exec_logging_encryption_enabled/red/provider.tf terraform/ecc-aws-364-autoscaling_launch_config_public_ip_disabled/red/provider.tf terraform/ecc-aws-362-mwaa_encrypted_with_kms_cmk/green/provider.tf terraform/ecc-aws-394-app_flow_without_tag_information/green/provider.tf terraform/ecc-aws-376-api_gateway_http_api_and_websocket_api_logs_not_enabled/red1/provider.tf terraform/ecc-aws-376-api_gateway_http_api_and_websocket_api_logs_not_enabled/red/provider.tf terraform/ecc-aws-376-api_gateway_http_api_and_websocket_api_logs_not_enabled/green/provider.tf terraform/ecc-aws-396-cloudformation_stacks_without_tag_information/red/provider.tf terraform/ecc-aws-396-cloudformation_stacks_without_tag_information/green/provider.tf |
13. | anna_shcherbak@epam.com | vladyslav_yevsiukov@epam.com |
12 shared files
tests/ecc-aws-283-elasticsearch_latest_version/placebo-green/es.DescribeElasticsearchDomains_1.json policies/ecc-aws-283-elasticsearch_latest_version.yml policies/ecc-aws-461-lambda_latest_runtime_environment_version.yml tests/ecc-aws-508-mwaa_latest_version/placebo-green/airflow.GetEnvironment_1.json tests/ecc-aws-310-dms_latest_version/placebo-green/dms.DescribeReplicationInstances_1.json policies/ecc-aws-310-dms_latest_version.yml policies/ecc-aws-508-mwaa_latest_version.yml terraform/ecc-aws-310-dms_latest_version/green/dms.tf policies/ecc-aws-597-reserved_redshift_node_recent_purchases.yml tests/ecc-aws-310-dms_latest_version/red_policy_test.py terraform/ecc-aws-283-elasticsearch_latest_version/green/elasticsearch.tf policies/ecc-aws-497-eks_cluster_oldest_supported_version.yml |
14. | 53881141+mykhailo-tolstyi@users.noreply.github.com | vladyslav_yevsiukov@epam.com |
4 shared files
tests/ecc-aws-310-dms_latest_version/placebo-green/dms.DescribeReplicationInstances_1.json policies/ecc-aws-310-dms_latest_version.yml terraform/ecc-aws-310-dms_latest_version/green/dms.tf tests/ecc-aws-310-dms_latest_version/red_policy_test.py |
15. | astr1kyv@gmail.com | 53881141+mykhailo-tolstyi@users.noreply.github.com |
2 shared files
terraform/ecc-aws-149-rds_public_access_disabled/red/rds.tf terraform/ecc-aws-153-elasticsearch_domains_audit_logging_enabled/green/es.tf |
16. | mykhailo_tolstyi@epam.com | 53881141+mykhailo-tolstyi@users.noreply.github.com |
1 shared file
.github/workflows/ci.yaml |
17. | 129157237+jamthehackerscat@users.noreply.github.com | anna_andronnikova@epam.com |
1 shared file
.github/workflows/changelog.yml |
18. | 80756766+anna-shcherbak@users.noreply.github.com | anna-shcherbak@users.noreply.github.com |
1 shared file
CHANGELOG.md |
19. | 80756766+anna-shcherbak@users.noreply.github.com | 129157237+jamthehackerscat@users.noreply.github.com |
1 shared file
CHANGELOG.md |
20. | 80756766+anna-shcherbak@users.noreply.github.com | jamthehackerscat@users.noreply.github.com |
1 shared file
CHANGELOG.md |
21. | anna-shcherbak@users.noreply.github.com | 129157237+jamthehackerscat@users.noreply.github.com |
1 shared file
CHANGELOG.md |
22. | anna-shcherbak@users.noreply.github.com | jamthehackerscat@users.noreply.github.com |
1 shared file
CHANGELOG.md |
23. | 129157237+jamthehackerscat@users.noreply.github.com | jamthehackerscat@users.noreply.github.com |
1 shared file
CHANGELOG.md |
Contributor | # connections | # commits | |
---|---|---|---|
1. | 80756766+anna-shcherbak@users.noreply.github.com | 12 | 71 |
2. | anna_shcherbak@epam.com | 5 | 83 |
3. | 53881141+mykhailo-tolstyi@users.noreply.github.com | 5 | 1 |
4. | 129157237+jamthehackerscat@users.noreply.github.com | 4 | 2 |
5. | mykhailo_tolstyi@epam.com | 3 | 10 |
6. | vladyslav_yevsiukov@epam.com | 3 | 2 |
7. | astr1kyv@gmail.com | 3 | 2 |
8. | anna-shcherbak@users.noreply.github.com | 3 | 1 |
9. | jamthehackerscat@users.noreply.github.com | 3 | 1 |
10. | vasyl_volkov@epam.com | 1 | 3 |
11. | anna_andronnikova@epam.com | 1 | 1 |
12. | dmytrobeveraki@thebeverakiair.local | 1 | 1 |
13. | yurii_lystopad@epam.com | 1 | 1 |
14. | aavolosh@gmail.com | 1 | 1 |
C-median: 3.0
A half of the contributors has more than 3.0 connections, and a half has less than this number.
C-mean: 3.2
An average number of connections a contributor has with other contributors.
C-index: 3.0
There are 3.0 contributors with 3.0 or more connections.