Skip to content

Potential security-related issues #468

@mromascanu123

Description

@mromascanu123

In package 7-Fortigate

The PBR rules implemented steer through the Firewall only the following traffic (prod, nonprod, dev)

  • Pub => App
  • App => Data
    However, all the communication flows except the 2 above seem to be allowed in terms of intra-vnet routing and should not be e.g. App => Pub, Pub => Data, etc

Missing PBR for 0.0.0.0/0 => all traffic to Internet will go via NAT gateway and not inspected by the Firewall

In package (in 3-networks-hub-and-spoke
Because in 3-networks-hub-and-spoke/modules/base_shared_vpc/firewall.tf all intra-VPC traffic allowed, in fact should have allowed only egress via Firewall

This also blocks all inbound traffic from Internet, via Firewall (only intra-VPC traffic can pass) and also blocks any traffic SNAT-ed in the Fortigate rules

Missing PBR for Management and Identity spokes

Hierarchical firewall (in 3-networks-hub-and-spoke / shared) not associated w/ Management and Identity spokes

In 6 - Org Policies
The list-type constraints/compute.restrictVpcPeering does not provide any list nor wildcard and that probably means users in business-units project can freely peer their VPCs allowing traffic to bypass the firewall

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions