-
Notifications
You must be signed in to change notification settings - Fork 0
Open
Labels
effort/medium2-3 days of work2-3 days of workpriority/highHigh priorityHigh priorityscope/terraformRelated to TerraformRelated to Terraformtype/securitySecurity-related changesSecurity-related changes
Description
Security Concerns
The following sensitive values are currently exposed in the Terraform configuration:
- ACM Certificate ARN
- AWS account IDs
- Bucket names
- Domain names
Recommendation
These values should be moved out of the codebase and managed securely using one of the following methods:
- External variable files (tfvars)
- Environment variables
- AWS Parameter Store
- AWS Secrets Manager
Impact
Current exposure of these values in version control poses security risks and doesn't follow infrastructure-as-code best practices.
Next Steps
- Identify all sensitive values
- Choose appropriate secure storage method
- Update Terraform code to reference secured values
- Update documentation with instructions for value management
- Add necessary files to .gitignore
Note
Implementation method choice should align with existing infrastructure and security requirements.
Metadata
Metadata
Assignees
Labels
effort/medium2-3 days of work2-3 days of workpriority/highHigh priorityHigh priorityscope/terraformRelated to TerraformRelated to Terraformtype/securitySecurity-related changesSecurity-related changes