Description
Issues
I feel that the templated behaviour of creating a security group is wrong. It involves making security assumptions which I do not feel are suitable for a test program to make.
It is too loose: Allowing public ssh into instances which often have default passwords set is problematic.
It is too restrictive: Windows instances won't work due to the port not being accessible, #47 is an example of the issues which arise from this. It also means special handling is required to test roles which expose other ports, such as a web server.
It trips up auditing: Security group changes are commonly monitored to detect AWS compromises or misconfigurations. Frequently creating and destroying security groups is undesirable behaviour.
Solutions
At a minimum I feel we should support passing a security group in via the platform configuration. The default security group should only be created if this parameter is not set.
WinRM port 5986 should be opened by the default security group. No other program seems to use the port, it will not meaningfully weaken the security of the Linux instances and will allow contact to Windows instances.
My preference would also be for a security group not to be created if not set. Instead it should fall back to the default security group for that VPC. I believe this was the prior behaviour, however my recollection and the git history don't align.
Activity