Skip to content

Template should not be creating a security group #50

Open
@lod

Description

Issues

I feel that the templated behaviour of creating a security group is wrong. It involves making security assumptions which I do not feel are suitable for a test program to make.

It is too loose: Allowing public ssh into instances which often have default passwords set is problematic.

It is too restrictive: Windows instances won't work due to the port not being accessible, #47 is an example of the issues which arise from this. It also means special handling is required to test roles which expose other ports, such as a web server.

It trips up auditing: Security group changes are commonly monitored to detect AWS compromises or misconfigurations. Frequently creating and destroying security groups is undesirable behaviour.

Solutions

At a minimum I feel we should support passing a security group in via the platform configuration. The default security group should only be created if this parameter is not set.

WinRM port 5986 should be opened by the default security group. No other program seems to use the port, it will not meaningfully weaken the security of the Linux instances and will allow contact to Windows instances.

My preference would also be for a security group not to be created if not set. Instead it should fall back to the default security group for that VPC. I believe this was the prior behaviour, however my recollection and the git history don't align.

Activity

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Metadata

Metadata

Assignees

No one assigned

    Labels

    ec2Amazon EC2

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions