docs
docs copied to clipboard
Add to FAQ: Are Cloud Posse Terraform Modules Secure?
question
Including an externally-controlled terraform module as part of your infrastructure feels like a huge security concern. If a malicious actor somehow got write access to this repository they could add an instance to the module with their own SSH key and some startup script to report to a control server, then next time someone updates their infrastructure the hacker would have direct access to a host inside your network.
Might it be better to do something like:
- Fork the repo into your own namespace and use that git URL
- Copy the module source directly into your repo
- Add this repository as a submodule of your own (Least secure but still more secure as you have to manually update it)
answer
See: https://github.com/cloudposse/terraform-aws-dynamodb-autoscaler/issues/9