Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support restricting credential use to cloud.gov VPC #3119

Open
1 task
Tracked by #2512
jameshochadel opened this issue Aug 28, 2024 · 0 comments
Open
1 task
Tracked by #2512

Support restricting credential use to cloud.gov VPC #3119

jameshochadel opened this issue Aug 28, 2024 · 0 comments

Comments

@jameshochadel
Copy link
Contributor

jameshochadel commented Aug 28, 2024

The brokerpak currently supports restricting the use of binding credentials to user-specified IP addresses. The original brokerpak defaulted that value to the cloud.gov egress IP ranges, so by default the credentials could only be used from within cloud.gov. However, since the SES identities are now within our AWS account, those egress IPs are no longer accurate.

To allow customers to restrict use of the credentials to cloud.gov, we could create a VPC Endpoint for SES and add an aws:SourceVPC Condition by default to the user's IAM policy. (Note: We tried this on a test user and it didn't work, so while we think it's the right idea, there is more work after these steps.) We should probably create the endpoint anyway so SMTP traffic never has to leave cloud.gov.

  • Decide if this is a launch feature
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant