Skip to content

Commit 4f241ea

Browse files
authored
Update terraform-security.md
1 parent d08e309 commit 4f241ea

File tree

1 file changed

+0
-8
lines changed

1 file changed

+0
-8
lines changed

src/pentesting-ci-cd/terraform-security.md

Lines changed: 0 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -304,14 +304,6 @@ With these creds, attackers can create/modify/destroy resources directly using n
304304
- Prefer OIDC/WIF over static cloud credentials; treat runners as sensitive. Monitor speculative plan runs and unexpected egress.
305305
- Detect exfiltration of `tfc-*` credential artifacts and alert on suspicious `external` program usage during plans.
306306

307-
Useful references:
308-
- Permissions: https://developer.hashicorp.com/terraform/cloud-docs/users-teams-organizations/permissions
309-
- Show workspace API: https://developer.hashicorp.com/terraform/cloud-docs/api-docs/workspaces#show-workspace
310-
- AWS provider configuration: https://registry.terraform.io/providers/hashicorp/aws/latest/docs#provider-configuration
311-
- AWS CLI OIDC role: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-role.html#cli-configure-role-oidc
312-
- GCP provider with TFC: https://registry.terraform.io/providers/hashicorp/google/latest/docs/guides/provider_reference.html#using-terraform-cloud
313-
- Sensitive variables: https://developer.hashicorp.com/terraform/tutorials/configuration-language/sensitive-variables
314-
- Prior art on plan-time RCE: https://alex.kaskaso.li/post/terraform-plan-rce and https://labs.snyk.io/resources/gitflops-dangers-of-terraform-automation-platforms/
315307

316308
## Automatic Audit Tools
317309

0 commit comments

Comments
 (0)