-
Notifications
You must be signed in to change notification settings - Fork 33
Closed
Description
Including an externally-controlled terraform module as part of your infrastructure feels like a huge security concern. If a malicious actor somehow got write access to this repository they could add an instance to the module with their own SSH key and some startup script to report to a control server, then next time someone updates their infrastructure the hacker would have direct access to a host inside your network.
Instead of recommending people use the module with:
module "dynamodb_autoscaler" {
source = "git::https://github.com/cloudposse/terraform-aws-dynamodb-autoscaler.git?ref=master"
...
}
IMO it'd be better to suggest something like:
- Fork the repo into your own namespace and use that git URL
- Copy the module source directly into your repo
- Add this repository as a submodule of your own (Least secure but still more secure as you have to manually update it)
Metadata
Metadata
Assignees
Labels
No labels