Skip to content

Dangerous/broad policy attached to ECS tasks #54

@r2bit

Description

@r2bit

We noticed a suspicious policy attached to cloud-connector ECS task role:

resource "aws_iam_role_policy" "secrets_reader" {
name = "SecretsReader"
role = local.ecs_task_role_id
policy = data.aws_iam_policy_document.secrets_reader.json
}
data "aws_iam_policy_document" "secrets_reader" {
statement {
effect = "Allow"
actions = [
"kms:Decrypt",
"secretsmanager:GetSecretValue"
]
resources = ["*"]
}
}

Essentially granting access to all secrets in an account (or something close to that?).
Given the danger such policy poses, is there a specific reason that access is required by cloud-connector? Meanwhile, we're forced to use our own local copy of modules/services/cloud-connector which simply excludes the problematic blocks. :(

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions