Releases: cloudposse/terraform-aws-service-control-policies
v0.15.0
feat: Add require ebs encryption scp @wavemoran (#60)
## what- Adds SCP to require EBS volume encryption
why
- Encrypting EBS volumes is a good default security policy
- Seems like a common enough policy to include in the provided catalog
references
- Shamelessly stolen from Latacora's recommend policies
Run tests 1 policy at a time @goruha (#62)
## what * Run tests 1 policy at a timewhy
- Workaround service control policies limits
🚀 Enhancements
chore(deps): bump github.com/hashicorp/go-getter from 1.7.3 to 1.7.5 in /test/src in the go_modules group @dependabot (#57)
Bumps the go_modules group in /test/src with 1 update: [github.com/hashicorp/go-getter](https://github.com/hashicorp/go-getter).Updates github.com/hashicorp/go-getter
from 1.7.3 to 1.7.5
Release notes
Sourced from github.com/hashicorp/go-getter's releases.
v1.7.5
What's Changed
- Prevent Git Config Alteration on Git Update by
@dduzgun-security
in hashicorp/go-getter#497New Contributors
@dduzgun-security
made their first contribution in hashicorp/go-getter#497Full Changelog: hashicorp/go-getter@v1.7.4...v1.7.5
v1.7.4
What's Changed
- Escape user-provided strings in
git
commands hashicorp/go-getter#483- Fixed a bug in
.netrc
handling if the file does not exist hashicorp/go-getter#433Full Changelog: hashicorp/go-getter@v1.7.3...v1.7.4
Commits
5a63fd9
Merge pull request #497 from hashicorp/fix-git-update5b7ec5f
fetch tags on update and fix tests9906874
recreate git config during update to prevent config alteration268c11c
escape user provide string to git (#483)975961f
Merge pull request #433 from adrian-bl/netrc-fix5ccb39a
Make addAuthFromNetrc ignore ENOTDIR errors- See full diff in compare view
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase
.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebase
will rebase this PR@dependabot recreate
will recreate this PR, overwriting any edits that have been made to it@dependabot merge
will merge this PR after your CI passes on it@dependabot squash and merge
will squash and merge this PR after your CI passes on it@dependabot cancel merge
will cancel a previously requested merge and block automerging@dependabot reopen
will reopen this PR if it is closed@dependabot close
will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually@dependabot show <dependency name> ignore conditions
will show all of the ignore conditions of the specified dependency@dependabot ignore <dependency name> major version
will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)@dependabot ignore <dependency name> minor version
will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)@dependabot ignore <dependency name>
will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)@dependabot unignore <dependency name>
will remove all of the ignore conditions of the specified dependency@dependabot unignore <dependency name> <ignore condition>
will remove the ignore condition of the specified dependency and ignore conditions
You can disable automated security fix PRs for this repo from the Security Alerts page.
🤖 Automatic Updates
chore(deps): bump github.com/hashicorp/go-getter from 1.7.3 to 1.7.5 in /test/src in the go_modules group @dependabot (#57)
Bumps the go_modules group in /test/src with 1 update: [github.com/hashicorp/go-getter](https://github.com/hashicorp/go-getter).Updates github.com/hashicorp/go-getter
from 1.7.3 to 1.7.5
Release notes
Sourced from github.com/hashicorp/go-getter's releases.
v1.7.5
What's Changed
- Prevent Git Config Alteration on Git Update by
@dduzgun-security
in hashicorp/go-getter#497New Contributors
@dduzgun-security
made their first contribution in hashicorp/go-getter#497Full Changelog: hashicorp/go-getter@v1.7.4...v1.7.5
v1.7.4
What's Changed
- Escape user-provided strings in
git
commands hashicorp/go-getter#483- Fixed a bug in
.netrc
handling if the file does not exist hashicorp/go-getter#433Full Changelog: hashicorp/go-getter@v1.7.3...v1.7.4
Commits
5a63fd9
Merge pull request #497 from hashicorp/fix-git-update5b7ec5f
fetch tags on update and fix tests9906874
recreate git config during update to prevent config alteration268c11c
escape user provide string to git (#483)975961f
Merge pull request #433 from adrian-bl/netrc-fix5ccb39a
Make addAuthF...
v0.14.2
🐛 Bug Fixes
Minor cleanups @Nuru (#50)
what
Minor fixes to several SCPs
DenyLambdaWithoutVpc
was previously invalid. It is now valid, but has not been thoroughly tested to ensure it does what it promises.DenyRDSUnencrypted
was fixed to denyrds:RestoreDBClusterFromSnapshot
when not encrypted. Previously this action was not denied, and instead the nonexistentRestoreDBClusterFromDBSnapshot
was denied- The
DenyS3BucketsPublicAccess
policy was cleaned up by eliminating the nonexistents3:DeletePublicAccessBlock
action. Note that it still is probably not something you want to use, because it denies enabling a public access block as well as removing one. We hope to have a better policy in the future. - The Region Restriction Templates
DenyRegions
andRestrictToSpecifiedRegions
were updated to exclude theaccount
,artifact
, andsupportplans
services from region restrictions, since they are global services. The obsoleteawsbillingconsole
service was removed. DenyS3InNonSelectedRegion
was fixed to allow users to allow S3 bucket creation inus-east-1
. Previouslyus-east-1
was always prohibited even when expressly allowed, due to quirks in S3.
why
- Restore intended behavior
references
- Closes #33
v0.14.1 Fix encryption-in-transit requirements
Warning
When the DenyEC2NonNitroInstances
policy was first introduced, it was primarily intended
to ensure that network traffic was encrypted in transit, which was seen to be a feature
that all Nitro instances supported and all non-Nitro instances did not. However, this
is not the case, as instance families such as a1
, t3
, and t4g
are Nitro based but
do not support network traffic encryption in transit.
As such, the DenyEC2NonNitroInstances
policy is not a reliable way to ensure that
network traffic is encrypted in transit. It is recommended that you use the
DenyEC2InstancesWithoutEncryptionInTransit
policy instead if that is your goal.
Caution
These changes could have the side effect of having other policies that were previously configured but ignored to start being enforced. The previous version of these updated policies were too big and thus any policy that included them was not enforced. It is possible that upgrading to this version will cause not just this policy to be updated, but cause other policies (statements) that were previously not enforced due to the overall size of the SCP to become enforced now that the full SCP is valid.
🐛 Bug Fixes
Update/Fix EC2 Policies @Nuru (#49)
what
- Update/fix EC2 Policies
DenyEC2InstancesWithoutEncryptionInTransit
andDenyEC2NonNitroInstances
- Update test framework (even though testing does not work)
why
- Prior policies exceeded 5120-character length limit and were also out of date
- Satisfy Dependabot
references
- Fixes #34
🤖 Automatic Updates
Use GitHub Action Workflows from `cloudposse/.github` Repo @osterman (#47)
what
- Install latest GitHub Action Workflows
why
- Use shared workflows from
cldouposse/.github
repository - Simplify management of workflows from centralized hub of configuration
Add GitHub Settings @osterman (#42)
what
- Install a repository config (
.github/settings.yaml
)
why
- Programmatically manage GitHub repo settings
Update Scaffolding @osterman (#40)
what
- Reran
make readme
to rebuildREADME.md
fromREADME.yaml
- Migrate to square badges
- Add scaffolding for repo settings and Mergify
why
- Upstream template changed in the
.github
repo - Work better with repository rulesets
- Modernize look & feel
Update Scaffolding @osterman (#39)
what
- Reran
make readme
to rebuildREADME.md
fromREADME.yaml
- Migrate to square badges
- Add scaffolding for repo settings and Mergify
why
- Upstream template changed in the
.github
repo - Work better with repository rulesets
- Modernize look & feel
Update Scaffolding @osterman (#38)
what
- Reran
make readme
to rebuildREADME.md
fromREADME.yaml
- Migrate to square badges
- Add scaffolding for repo settings and Mergify
why
- Upstream template changed in the
.github
repo - Work better with repository rulesets
- Modernize look & feel
Update Scaffolding @osterman (#37)
what
- Reran
make readme
to rebuildREADME.md
fromREADME.yaml
- Migrate to square badges
- Add scaffolding for repo settings and Mergify
why
- Upstream template changed in the
.github
repo - Work better with repository rulesets
- Modernize look & feel
v0.14.0
Ensure support of the AWS Provider V5 and latest terraform @max-lobur (#31)
what
Ensure support of the AWS Provider V5
Update terraform version
Update dependencies in tests
Linter fixes
why
Maintenance
references
https://github.com/hashicorp/terraform-provider-aws/releases/tag/v5.0.0
update AWS family policies for mid-2023 @jonathan-3play (#30)
what
- Updated to all EC2 families as of 2023-06-23 that AWS documentation indicate are Nitro-based or support inherent encryption in transit.
why
- Discovered that many useful EC2 families that should be permitted were in fact blocked.
references
Sync github @max-lobur (#25)
Rebuild github dir from the template
v0.13.0
- No changes
v0.12.0
Update DenyEC2InstancesWithoutEncryptionInTransit @Nuru (#23)
what
- Update
DenyEC2InstancesWithoutEncryptionInTransit
policy with current list of instances - Move policies requiring template parameters to separate sub-directories
- Fix
DenyS3InNonSelectedRegion
policy - Replace
DenyRegionUsage
policy withDenyRegions
andRestrictToSpecifiedRegions
policies
why
- Previous policy was missing a lot of instance types that provide encryption in transit, such as
c6i
,c7g
, andg5
to name a few - Allow people to include
catalog/*.yaml
without needing to specify any parameters - The
DenyS3InNonSelectedRegion
policy was completely broken, having no effect - The
DenyRegionUsage
policy was confusing, because it took a parameter calledregions_lockdown
which was a list of regions to allow. The new policies let you choose to either whitelist or blacklist regions.
references
- Supersedes and closes #22
git.io->cloudposse.tools update @dylanbannon (#20)
what and why
Change all references to git.io/build-harness
into cloudposse.tools/build-harness
, since git.io
redirects will stop working on April 29th, 2022.
References
- DEV-143
v0.11.0
Adding policies @jamengual (#11)
what
- Adding Aditional SCPs to the catalog
- Adding Parameters
- Updating example
why
- Adding AWS recommended SCPs plus some additional SCPs to improve security compliance
references
v0.10.0
v0.9.2
🤖 Automatic Updates
Update context.tf @cloudpossebot (#17)
what
This is an auto-generated PR that updates the context.tf
file to the latest version from cloudposse/terraform-null-label
why
To support all the features of the context
interface.
v0.9.1
🚀 Enhancements
Fix: resource attributes that cannot be determined @nitrocode (#16)
what
- This checks the input variable instead of
local.statements
, which previously required creating the policy documents to determine.
why
- The previous PR #15 worked for account SCPs but did not work for org SCPs. I checked this locally for all 3 types of policies (ou, org, and account) in
components/terraform/account
.
references
N/A
🐛 Bug Fixes
Fix: resource attributes that cannot be determined @nitrocode (#16)
what
- This checks the input variable instead of
local.statements
, which previously required creating the policy documents to determine.
why
- The previous PR #15 worked for account SCPs but did not work for org SCPs. I checked this locally for all 3 types of policies (ou, org, and account) in
components/terraform/account
.
references
N/A