-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add new check: Enforce IMDSv2 in EC2 instance and Launch Configuration #152
Comments
This would be a great feature to have! For Terraform, I think we would do if (
metadata_options["http_tokens"] == "required"
or
metadata_options["http_endpoint"] == "disabled"
):
# return and don't alert...
# otherwise, alert from https://www.terraform.io/docs/providers/aws/r/instance.html#metadata-options |
Thanks for contributing to Checkov! We've automatically marked this issue as stale to keep our issues list tidy, because it has not had any activity for 6 months. It will be closed in 14 days if no further activity occurs. Commenting on this issue will remove the stale tag. If you want to talk through the issue or help us understand the priority and context, feel free to add a comment or join us in the Checkov slack channel at https://slack.bridgecrew.io |
This is kinda done as far as Terraform goes, re: my commit above ref'ing this issue What should we do for cloudformation? |
…is disabled (#152) * Add check CKV_AZURE_101 - Ensure that Azure Cosmos DB disables public network access * Add check CKV_AZURE_104 - Ensure that Azure Data factory public network access is disabled * CKV_AZURE_104 - Ensure that Azure Data factory public network access is disabled
…is disabled (#152) * Add check CKV_AZURE_101 - Ensure that Azure Cosmos DB disables public network access * Add check CKV_AZURE_104 - Ensure that Azure Data factory public network access is disabled * CKV_AZURE_104 - Ensure that Azure Data factory public network access is disabled
FYI - as far Cloudformation goes, it seems this is still not possible on an EC2 instance level; still marked as 'open' on the roadmap. For details see aws-cloudformation/cloudformation-coverage-roadmap#655 |
I believe this has been implemented for cloudformation and terraform. If someone disagrees - please reopen! |
@nimrodkor - thanks for the update and looking into this. |
Blog Post Here: https://aws.amazon.com/blogs/security/defense-in-depth-open-firewalls-reverse-proxies-ssrf-vulnerabilities-ec2-instance-metadata-service/
CloudFormation: https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-ec2-launchtemplate-launchtemplatedata-metadataoptions.html
- Doesn’t appear possible for individual EC2 instance…
Terraform: It does not appear configurable, but suggest further research.
https://www.terraform.io/docs/providers/aws/r/launch_template.html
https://www.terraform.io/docs/providers/aws/r/instance.html
The text was updated successfully, but these errors were encountered: