You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Currently the toolkit always passes IAM and IAM_NAMED capabilities when creating/updating stacks. This is not a secure default as it technically allows anyone deploying stacks to create IAM roles and modify IAM policies.
Idea (by @RomainMuller): associate this to the environment? Also, we should be able to identify what type of IAM capability is needed for a deploying a specific stack and indicate to users what they should do.
Idea (by @rix0rrr): add an interactive mode where "cdk deploy" asks you if you want to proceed when making IAM-related modifications, and provide details on what changes.
Another thing to consider when designing this solution is allowing a separation between stacks that include security-related resources (and can only deployed by certain people in the org) and app stacks.
We should also find a way to regress test explicitly IAM policy widening
@attias suggested: interactive mode in the toolkit which identifies "access denied" errors while deploying and allows the user to add permissions to the user that performs the deployment (given there's another profile for an admin that the toolkit can use)
The text was updated successfully, but these errors were encountered:
eladb
changed the title
Toolkit: IAM Capabilities
IAM safety in the CDK
Jul 10, 2018
Currently the toolkit always passes
IAM
andIAM_NAMED
capabilities when creating/updating stacks. This is not a secure default as it technically allows anyone deploying stacks to create IAM roles and modify IAM policies.Idea (by @RomainMuller): associate this to the environment? Also, we should be able to identify what type of IAM capability is needed for a deploying a specific stack and indicate to users what they should do.
Idea (by @rix0rrr): add an interactive mode where "cdk deploy" asks you if you want to proceed when making IAM-related modifications, and provide details on what changes.
Another thing to consider when designing this solution is allowing a separation between stacks that include security-related resources (and can only deployed by certain people in the org) and app stacks.
We should also find a way to regress test explicitly IAM policy widening
@attias suggested: interactive mode in the toolkit which identifies "access denied" errors while deploying and allows the user to add permissions to the user that performs the deployment (given there's another profile for an admin that the toolkit can use)
The text was updated successfully, but these errors were encountered: