You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
SAST Scans Show Nebari Has Critical/High Vulnerabilities in AWS
Summary
Of the several critical vulnerabilities reported by GitLab SAST for Nebari, deployed in AWS, some vulnerabilities could be mitigated by adding AWS Key Management Service (KMS) controls & configuration options in addition to applying encryption as default settings in the corresponding AWS services:
CRITICAL: DynamoDB Table Not Encrypted - Consider adding server_side_encryption into the aws_dynamodb_table resource and setting enabled: true as default with optional config variable for kms_key_arn
Title
SAST Scans Show Nebari Has Critical/High Vulnerabilities in AWS
Summary
Of the several critical vulnerabilities reported by GitLab SAST for Nebari, deployed in AWS, some vulnerabilities could be mitigated by adding AWS Key Management Service (KMS) controls & configuration options in addition to applying encryption as default settings in the corresponding AWS services:
User benefit
Defense in Depth Security Strategy
Design Proposal
MITIGATION:
- Add
encryption_config
toaws_eks_cluster
tf resource that enables a config option to accept an ARN of a KMS key- Proposing PR#2723 as solution
- Add
storage_encrypted
into the aws_rds_cluster tf resource and set astrue
- Possibly add either a kms_key
policy
or a separatekms_key_policy
resource- Consider adding
server_side_encryption
into the aws_dynamodb_table resource and settingenabled: true
as default with optional config variable forkms_key_arn
- Possibly add either a kms_key
policy
or a separatekms_key_policy
resource- Possibly add either a kms_key
policy
or a separatekms_key_policy
resourceAlternatives or approaches considered (if any)
Best practices
User impact
Unresolved questions
The text was updated successfully, but these errors were encountered: