Skip to content

Commit 5e79bbe

Browse files
authored
Security rules: example alert if enforcement not possible (#84)
* Security rules: example alert if enforcement not possible * Formatting issues * Whitespace
1 parent 2949c5d commit 5e79bbe

File tree

1 file changed

+21
-1
lines changed

1 file changed

+21
-1
lines changed

practices/security.md

Lines changed: 21 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@
3030
- Guard against time based authentication attacks, e.g. using a WAF
3131
- Guarded against invalid **certificates** e.g. expiry monitoring.
3232
- Consider [OCSP stapling](https://blog.cloudflare.com/high-reliability-ocsp-stapling/) for improved performance
33-
- Ensure **cookies** cannot leak from production to non-produnction environments e.g. avoid non-produnction on subdomain of production domain
33+
- Ensure **cookies** cannot leak from production to non-production environments e.g. avoid non-production on subdomain of production domain
3434
- Prevent **[clickjacking](https://sudo.pagerduty.com/for_engineers/#clickjacking)** with `X-Frame-Options`
3535
- Be careful not to **leak information**, e.g. error messages, stack traces, headers
3636
- **Don't trust** yourself or others!
@@ -98,6 +98,26 @@
9898
}​​​​​​​​
9999
```
100100
</details>
101+
102+
<details><summary>If enforcement is not possible / appropriate, use alerts to identify potential issues: example AWS Config rule to identify public-facing RDS databases (click to expand)</summary>
103+
104+
```yaml
105+
{
106+
"ConfigRuleName": "RDS_INSTANCE_PUBLIC_ACCESS_CHECK",
107+
"Description": "Checks whether the Amazon Relational Database Service (RDS) instances are not publicly accessible. The rule is non-compliant if the publiclyAccessible field is true in the instance configuration item."
108+
"Scope": {
109+
"ComplianceResourceTypes": [
110+
"AWS::RDS::DBInstance"
111+
]
112+
},
113+
"Source": {
114+
"Owner": "AWS",
115+
"SourceIdentifier": "RDS_INSTANCE_PUBLIC_ACCESS_CHECK"
116+
}
117+
}
118+
```
119+
</details>
120+
101121
- Lock down your **networks**
102122
- Restrict external and internal network traffic by appropriate firewall rules
103123
- Consider using a WAF (Web Application Firewall)

0 commit comments

Comments
 (0)