Releases: cloudposse/terraform-aws-service-control-policies
v0.15.1
🚀 Enhancements
Update EC2 policies to include new instance types @Nuru (#64)
## what- Update
DenyEC2NonNitroInstancesandDenyEC2InstancesWithoutEncryptionInTransitto include instances made available since the last update
why
- Allow qualifying instances that would have otherwise been denied because they were too new
v0.15.0
feat: Add require ebs encryption scp @wavemoran (#60)
## what- Adds SCP to require EBS volume encryption
why
- Encrypting EBS volumes is a good default security policy
- Seems like a common enough policy to include in the provided catalog
references
- Shamelessly stolen from Latacora's recommend policies
Run tests 1 policy at a time @goruha (#62)
## what * Run tests 1 policy at a timewhy
- Workaround service control policies limits
🚀 Enhancements
chore(deps): bump github.com/hashicorp/go-getter from 1.7.3 to 1.7.5 in /test/src in the go_modules group @dependabot (#57)
Bumps the go_modules group in /test/src with 1 update: [github.com/hashicorp/go-getter](https://github.com/hashicorp/go-getter).Updates github.com/hashicorp/go-getter from 1.7.3 to 1.7.5
Release notes
Sourced from github.com/hashicorp/go-getter's releases.
v1.7.5
What's Changed
- Prevent Git Config Alteration on Git Update by
@dduzgun-securityin hashicorp/go-getter#497New Contributors
@dduzgun-securitymade their first contribution in hashicorp/go-getter#497Full Changelog: hashicorp/go-getter@v1.7.4...v1.7.5
v1.7.4
What's Changed
- Escape user-provided strings in
gitcommands hashicorp/go-getter#483- Fixed a bug in
.netrchandling if the file does not exist hashicorp/go-getter#433Full Changelog: hashicorp/go-getter@v1.7.3...v1.7.4
Commits
5a63fd9Merge pull request #497 from hashicorp/fix-git-update5b7ec5ffetch tags on update and fix tests9906874recreate git config during update to prevent config alteration268c11cescape user provide string to git (#483)975961fMerge pull request #433 from adrian-bl/netrc-fix5ccb39aMake addAuthFromNetrc ignore ENOTDIR errors- See full diff in compare view
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot mergewill merge this PR after your CI passes on it@dependabot squash and mergewill squash and merge this PR after your CI passes on it@dependabot cancel mergewill cancel a previously requested merge and block automerging@dependabot reopenwill reopen this PR if it is closed@dependabot closewill close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency@dependabot ignore <dependency name> major versionwill close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)@dependabot ignore <dependency name> minor versionwill close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)@dependabot ignore <dependency name>will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)@dependabot unignore <dependency name>will remove all of the ignore conditions of the specified dependency@dependabot unignore <dependency name> <ignore condition>will remove the ignore condition of the specified dependency and ignore conditions
You can disable automated security fix PRs for this repo from the Security Alerts page.
🤖 Automatic Updates
chore(deps): bump github.com/hashicorp/go-getter from 1.7.3 to 1.7.5 in /test/src in the go_modules group @dependabot (#57)
Bumps the go_modules group in /test/src with 1 update: [github.com/hashicorp/go-getter](https://github.com/hashicorp/go-getter).Updates github.com/hashicorp/go-getter from 1.7.3 to 1.7.5
Release notes
Sourced from github.com/hashicorp/go-getter's releases.
v1.7.5
What's Changed
- Prevent Git Config Alteration on Git Update by
@dduzgun-securityin hashicorp/go-getter#497New Contributors
@dduzgun-securitymade their first contribution in hashicorp/go-getter#497Full Changelog: hashicorp/go-getter@v1.7.4...v1.7.5
v1.7.4
What's Changed
- Escape user-provided strings in
gitcommands hashicorp/go-getter#483- Fixed a bug in
.netrchandling if the file does not exist hashicorp/go-getter#433Full Changelog: hashicorp/go-getter@v1.7.3...v1.7.4
Commits
5a63fd9Merge pull request #497 from hashicorp/fix-git-update5b7ec5ffetch tags on update and fix tests9906874recreate git config during update to prevent config alteration268c11cescape user provide string to git (#483)975961fMerge pull request #433 from adrian-bl/netrc-fix5ccb39aMake addAuthF...
v0.14.2
🐛 Bug Fixes
Minor cleanups @Nuru (#50)
what
Minor fixes to several SCPs
DenyLambdaWithoutVpcwas previously invalid. It is now valid, but has not been thoroughly tested to ensure it does what it promises.DenyRDSUnencryptedwas fixed to denyrds:RestoreDBClusterFromSnapshotwhen not encrypted. Previously this action was not denied, and instead the nonexistentRestoreDBClusterFromDBSnapshotwas denied- The
DenyS3BucketsPublicAccesspolicy was cleaned up by eliminating the nonexistents3:DeletePublicAccessBlockaction. Note that it still is probably not something you want to use, because it denies enabling a public access block as well as removing one. We hope to have a better policy in the future. - The Region Restriction Templates
DenyRegionsandRestrictToSpecifiedRegionswere updated to exclude theaccount,artifact, andsupportplansservices from region restrictions, since they are global services. The obsoleteawsbillingconsoleservice was removed. DenyS3InNonSelectedRegionwas fixed to allow users to allow S3 bucket creation inus-east-1. Previouslyus-east-1was always prohibited even when expressly allowed, due to quirks in S3.
why
- Restore intended behavior
references
- Closes #33
v0.14.1 Fix encryption-in-transit requirements
Warning
When the DenyEC2NonNitroInstances policy was first introduced, it was primarily intended
to ensure that network traffic was encrypted in transit, which was seen to be a feature
that all Nitro instances supported and all non-Nitro instances did not. However, this
is not the case, as instance families such as a1, t3, and t4g are Nitro based but
do not support network traffic encryption in transit.
As such, the DenyEC2NonNitroInstances policy is not a reliable way to ensure that
network traffic is encrypted in transit. It is recommended that you use the
DenyEC2InstancesWithoutEncryptionInTransit policy instead if that is your goal.
Caution
These changes could have the side effect of having other policies that were previously configured but ignored to start being enforced. The previous version of these updated policies were too big and thus any policy that included them was not enforced. It is possible that upgrading to this version will cause not just this policy to be updated, but cause other policies (statements) that were previously not enforced due to the overall size of the SCP to become enforced now that the full SCP is valid.
🐛 Bug Fixes
Update/Fix EC2 Policies @Nuru (#49)
what
- Update/fix EC2 Policies
DenyEC2InstancesWithoutEncryptionInTransitandDenyEC2NonNitroInstances - Update test framework (even though testing does not work)
why
- Prior policies exceeded 5120-character length limit and were also out of date
- Satisfy Dependabot
references
- Fixes #34
🤖 Automatic Updates
Use GitHub Action Workflows from `cloudposse/.github` Repo @osterman (#47)
what
- Install latest GitHub Action Workflows
why
- Use shared workflows from
cldouposse/.githubrepository - Simplify management of workflows from centralized hub of configuration
Add GitHub Settings @osterman (#42)
what
- Install a repository config (
.github/settings.yaml)
why
- Programmatically manage GitHub repo settings
Update Scaffolding @osterman (#40)
what
- Reran
make readmeto rebuildREADME.mdfromREADME.yaml - Migrate to square badges
- Add scaffolding for repo settings and Mergify
why
- Upstream template changed in the
.githubrepo - Work better with repository rulesets
- Modernize look & feel
Update Scaffolding @osterman (#39)
what
- Reran
make readmeto rebuildREADME.mdfromREADME.yaml - Migrate to square badges
- Add scaffolding for repo settings and Mergify
why
- Upstream template changed in the
.githubrepo - Work better with repository rulesets
- Modernize look & feel
Update Scaffolding @osterman (#38)
what
- Reran
make readmeto rebuildREADME.mdfromREADME.yaml - Migrate to square badges
- Add scaffolding for repo settings and Mergify
why
- Upstream template changed in the
.githubrepo - Work better with repository rulesets
- Modernize look & feel
Update Scaffolding @osterman (#37)
what
- Reran
make readmeto rebuildREADME.mdfromREADME.yaml - Migrate to square badges
- Add scaffolding for repo settings and Mergify
why
- Upstream template changed in the
.githubrepo - Work better with repository rulesets
- Modernize look & feel
v0.14.0
Ensure support of the AWS Provider V5 and latest terraform @max-lobur (#31)
what
Ensure support of the AWS Provider V5
Update terraform version
Update dependencies in tests
Linter fixes
why
Maintenance
references
https://github.com/hashicorp/terraform-provider-aws/releases/tag/v5.0.0
update AWS family policies for mid-2023 @jonathan-3play (#30)
what
- Updated to all EC2 families as of 2023-06-23 that AWS documentation indicate are Nitro-based or support inherent encryption in transit.
why
- Discovered that many useful EC2 families that should be permitted were in fact blocked.
references
Sync github @max-lobur (#25)
Rebuild github dir from the template
v0.13.0
- No changes
v0.12.0
Update DenyEC2InstancesWithoutEncryptionInTransit @Nuru (#23)
what
- Update
DenyEC2InstancesWithoutEncryptionInTransitpolicy with current list of instances - Move policies requiring template parameters to separate sub-directories
- Fix
DenyS3InNonSelectedRegionpolicy - Replace
DenyRegionUsagepolicy withDenyRegionsandRestrictToSpecifiedRegionspolicies
why
- Previous policy was missing a lot of instance types that provide encryption in transit, such as
c6i,c7g, andg5to name a few - Allow people to include
catalog/*.yamlwithout needing to specify any parameters - The
DenyS3InNonSelectedRegionpolicy was completely broken, having no effect - The
DenyRegionUsagepolicy was confusing, because it took a parameter calledregions_lockdownwhich was a list of regions to allow. The new policies let you choose to either whitelist or blacklist regions.
references
- Supersedes and closes #22
git.io->cloudposse.tools update @dylanbannon (#20)
what and why
Change all references to git.io/build-harness into cloudposse.tools/build-harness, since git.io redirects will stop working on April 29th, 2022.
References
- DEV-143
v0.11.0
Adding policies @jamengual (#11)
what
- Adding Aditional SCPs to the catalog
- Adding Parameters
- Updating example
why
- Adding AWS recommended SCPs plus some additional SCPs to improve security compliance
references
v0.10.0
v0.9.2
🤖 Automatic Updates
Update context.tf @cloudpossebot (#17)
what
This is an auto-generated PR that updates the context.tf file to the latest version from cloudposse/terraform-null-label
why
To support all the features of the context interface.