-
Notifications
You must be signed in to change notification settings - Fork 27
Closed
Description
We noticed a suspicious policy attached to cloud-connector
ECS task role:
terraform-aws-secure-for-cloud/modules/services/cloud-connector/ecs-service-security.tf
Lines 106 to 121 in bdd8505
resource "aws_iam_role_policy" "secrets_reader" { | |
name = "SecretsReader" | |
role = local.ecs_task_role_id | |
policy = data.aws_iam_policy_document.secrets_reader.json | |
} | |
data "aws_iam_policy_document" "secrets_reader" { | |
statement { | |
effect = "Allow" | |
actions = [ | |
"kms:Decrypt", | |
"secretsmanager:GetSecretValue" | |
] | |
resources = ["*"] | |
} | |
} |
Essentially granting access to all secrets in an account (or something close to that?).
Given the danger such policy poses, is there a specific reason that access is required by cloud-connector
? Meanwhile, we're forced to use our own local copy of modules/services/cloud-connector
which simply excludes the problematic blocks. :(
Metadata
Metadata
Assignees
Labels
No labels