-
-
Notifications
You must be signed in to change notification settings - Fork 554
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
add security group functionality #184
Comments
Security group functionality is certainly something we'd like to get into this cookbook. At the moment I'd suggest the aws_security cookbook which has a resorce for managing security groups. https://supermarket.chef.io/cookbooks/aws_security/versions/0.1.1 |
@tas50 I wonder if this is a bit anti pattern from a security stance. In order to facilitate this the instance running the chef-client will require the ability to create/delete security groups which means that any node would be able to do it. IMHO a node should not manage its own security group and should be handled by the provisioner of the instance via |
I suppose if you had a dedicated node for updating security groups that would be slightly better but IMO letting a node update it's own security groups is a security risk. |
Back in the day, using chef provisioning nodes was more common. |
I had actually forgotten about chef provisioning being a thing. |
Many provisioning tools like I would argue that the majority of the providers in this cookbook are an anti pattern from a security stance. There are providers which can delete cloudformation stacks, delete dynamodb tables, delete ebs volumes, delete elbs, manage IAM users, etc. This cookbook presents providers which could easily be poorly implemented, abused or exploited. Most of what this cookbook does would be better handled using I know it feels like an anti-pattern to do this - and it does for me as well in many ways. |
Ya I certainly see where you are are coming from and agree that there are quite a few security concerns when using this cookbook to its full potential. I'd recommend importing it into your |
@majormoses - here is our use case where this cookbook could actually improve security. We'd like this cookbook to keep our ingress/egress rules in sync. There is a possibility that someone or something could add a security group rule to a node for testing, and open something up accidentally, or forget to close it. Actually it happens all the time - someone is testing or makes a change to allow a port. |
I see, I am OK with moving forward at the end of the day IAM is where the real protection into place to prevent this from being abused and its up to each implementor to decide their level of comfort. I would still like there to be somewhere in the README where we talk about the dangers of this. |
@majormoses - See #381 |
Presently, this cookbook lacks the ability to affect an EC2 instance’s security groups. Given that the AWS API allows this sort of change to instances (in a VPC), this doesn’t seem to be a provisioning-specific detail. Consequently, I see no reason that chef shouldn’t manage this (create SGs and associate them with an instance). I’m interested in working on adding this to this cookbook, but wondered what the group’s opinion would be prior to starting work.
The text was updated successfully, but these errors were encountered: