{
  "results": {
    "violations": [
      {
        "rule_name": "rdsAutoMinorVersionUpgradeEnabled",
        "description": "RDS Instance Auto Minor Version Upgrade flag disabled",
        "rule_id": "AC_AWS_0005",
        "severity": "HIGH",
        "category": "Data Security",
        "resource_name": "PtShGgAdi3",
        "resource_type": "aws_db_instance",
        "module_name": "root",
        "file": "main.tf",
        "root_path": "./",
        "line": 39
      },
      {
        "rule_name": "rdsPubliclyAccessible",
        "description": "RDS Instance publicly_accessible flag is true",
        "rule_id": "AC_AWS_0002",
        "severity": "HIGH",
        "category": "Network Security",
        "resource_name": "PtShGgAdi3",
        "resource_type": "aws_db_instance",
        "module_name": "root",
        "file": "main.tf",
        "root_path": "./",
        "line": 39
      },
      {
        "rule_name": "rdsIamAuthEnabled",
        "description": "Ensure that your RDS database has IAM Authentication enabled.",
        "rule_id": "AC_AWS_0004",
        "severity": "HIGH",
        "category": "Data Security",
        "resource_name": "PtShGgAdi3",
        "resource_type": "aws_db_instance",
        "module_name": "root",
        "file": "main.tf",
        "root_path": "./",
        "line": 39
      },
      {
        "rule_name": "rdsIamAuthEnabled",
        "description": "Ensure that your RDS database has IAM Authentication enabled.",
        "rule_id": "AC_AWS_0004",
        "severity": "HIGH",
        "category": "Data Security",
        "resource_name": "PtShGgAdi2",
        "resource_type": "aws_db_instance",
        "module_name": "root",
        "file": "main.tf",
        "root_path": "./",
        "line": 25
      },
      {
        "rule_name": "rdsIamAuthEnabled",
        "description": "Ensure that your RDS database has IAM Authentication enabled.",
        "rule_id": "AC_AWS_0004",
        "severity": "HIGH",
        "category": "Data Security",
        "resource_name": "PtShGgAdi4",
        "resource_type": "aws_db_instance",
        "module_name": "root",
        "file": "main.tf",
        "root_path": "./",
        "line": 55
      },
      {
        "rule_name": "rdsIamAuthEnabled",
        "description": "Ensure that your RDS database has IAM Authentication enabled.",
        "rule_id": "AC_AWS_0004",
        "severity": "HIGH",
        "category": "Data Security",
        "resource_name": "PtShGgAdi5",
        "resource_type": "aws_db_instance",
        "module_name": "root",
        "file": "main.tf",
        "root_path": "./",
        "line": 69
      },
      {
        "rule_name": "rdsIamAuthEnabled",
        "description": "Ensure that your RDS database has IAM Authentication enabled.",
        "rule_id": "AC_AWS_0004",
        "severity": "HIGH",
        "category": "Data Security",
        "resource_name": "PtShGgAdi6",
        "resource_type": "aws_db_instance",
        "module_name": "root",
        "file": "main.tf",
        "root_path": "./",
        "line": 82
      },
      {
        "rule_name": "rdsIamAuthEnabled",
        "description": "Ensure that your RDS database has IAM Authentication enabled.",
        "rule_id": "AC_AWS_0004",
        "severity": "HIGH",
        "category": "Data Security",
        "resource_name": "PtShGgAdi3",
        "resource_type": "aws_db_instance",
        "module_name": "root",
        "file": "main.tf",
        "root_path": "./",
        "line": 39
      }
    ],
    "skipped_violations": null,
    "scan_summary": {
      "file/folder": "/Users/apple/go/src/github.com/patilpankaj212/terrascan/test/e2e/test_data/iac/aws/aws_db_instance_violation",
      "iac_type": "terraform",
      "scanned_at": "2021-03-02 13:52:25.686594 +0000 UTC",
      "policies_validated": 3,
      "violated_policies": 8,
      "low": 0,
      "medium": 0,
      "high": 8
    }
  }
}