Skip to content
Discussion options

You must be logged in to vote

Let me see if I understand:

You have resources deployed into your own account (such as the artifact bucket and staging bucket), and given enough permissions you are able to replace files in those S3 buckets between when they are written and when they are read, so that the deployment does something else?

It's true that protecting against your own developers is not really in the CDK Pipelines threat model. I'm not even sure it's possible. It's fair to say that this should be mentioned in the documentation so that organizations that cannot trust their developers will be aware they should have something like CFN Hooks or AWS Config in place.

Is there a way to sign the templates and assets ge…

Replies: 2 comments 2 replies

Comment options

You must be logged in to vote
2 replies
@hupe1980
Comment options

@rix0rrr
Comment options

Answer selected by peterwoodworth
Comment options

You must be logged in to vote
0 replies
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
2 participants