Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Security Concern] cdkExec Role and Environment roles contains policies which pose broader attack radius #1614

Open
TejasRGitHub opened this issue Oct 7, 2024 · 0 comments

Comments

@TejasRGitHub
Copy link
Contributor

TejasRGitHub commented Oct 7, 2024

Is your idea related to a problem? Please describe.
While onboarding / linking an external account to data.all as an Environment, CDK trust has to be established which creates a cdkExecPolicy which has broader iam permissions to create, delete, etc any role in that environment account.

Similarly when an environment is created, the environment stack creates service policies which also have broader permissions.

This is a concern for anyone who is onboarding their aws account to data.all that if an attacker is able to assume theses roles then they could ultimately create a super role(s) with admin permissions and could easily gain control over the aws account.

Describe the solution you'd like
Restrict iam permissions of these roles so that they can only operate within the boundary of data.all assets , they can only create roles which are related to data.all and they have access to only role which are data.all.

This issue of overly broad permissions is captured by the Checkov results here - #1524 , #1610
P.S. Don't attach files. Please, prefer add code snippets directly in the message body.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant