AWS082 - It is AWS best practice to not use the default VPC for workflows

Explanation

Default VPC does not have a lot of the critical security features that standard VPC comes with, new resources should not be created in the default VPC and it should not be present in the Terraform.

Insecure Example

The following example will fail the AWS082 check.

resource "aws_default_vpc" "default" {
	tags = {
	  Name = "Default VPC"
	}
  }

Secure Example

The following example will pass the AWS082 check.

# no aws default vpc present