-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update forge-policy.json
to support least privilege
#3
Comments
Hi, thanks for this feedback. Tower Forge can create (and therefore delete) EFS and FSx instances, this is why those permissions are added. Same for roles. However, if you don't want or need to use these capabilities you can customise the policy by just removing that permission or narrowing down the scope of allowed resources. |
For a second opinion, it would be good to tighten the permissions up. I would suggest changing the * in the resources specification to something like |
Part of what would help is to break things out into separate statements to enable the appropriate granularity. Would suggest at a start:
Happy to collaborate on that with @sjm446 and others |
Currently, forge-policy.json is overly permissive in the controls it allocates to NF Tower. The current IAM policy applies
*
to a wide variety of API calls, which can inject potential vulnerabilities, such as in having permission to delete all EFS or FSx File systems, delete IAM roles, or access all S3 objects in an account.Recommend scoping the IAM privileges down to specific ARNs/ARN patterns and updating the documentation to reflect principles of least privilege.
The text was updated successfully, but these errors were encountered: