What should be considered a secure
module
#1295
AlexanderSehr
started this conversation in
General
Replies: 2 comments
-
Just adding suggested ruleset from discussion in teams:
|
Beta Was this translation helpful? Give feedback.
0 replies
-
We should also consider what we mean by "breaking change". I would not consider a new secure default value that breaks deployments for resources where certain settings can only be configured on deployment time (set-once properties) in a brow fielding setting as "breaking change". In any brownfield setting you would collect all the parameters of a module from the environment you would retrofit into IaC. This discussion also goes into versioning of the module for publication I think. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
We currently updating the security of our modules with the following approach:
All default values should comply with a security baseline, e.g. NIST 800
The build-in policies of Azure can be used as a reference.
However, while the security baseline provides a good starting point, it also raises questions to be answered. For example:
We should agree on an approach. For example
cc: @mblant @eriqua @MariusStorhaug @matebarabas @alex-lee-microsoft @elanzel @elbatane @ahmadabdalla @rahalan @SeSeicht
Beta Was this translation helpful? Give feedback.
All reactions