Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Amazon SQS queues should be encrypted at rest #4721

Open
14 tasks
dsotirho-ucsc opened this issue Nov 5, 2022 · 2 comments
Open
14 tasks

Amazon SQS queues should be encrypted at rest #4721

dsotirho-ucsc opened this issue Nov 5, 2022 · 2 comments
Labels
compliance [subject] Information and software security orange [process] Done by the Azul team securityhub [subject] Represents one or more SecurityHub findings severity:medium [subject] A SecurityHub severity of MEDIUM wontfix [process] Issue is valid but resolution is not deemed necessary

Comments

@dsotirho-ucsc
Copy link
Contributor

dsotirho-ucsc commented Nov 5, 2022

{
    "GeneratorIds": [
        "aws-foundational-security-best-practices/v/1.0.0/SQS.1"
    ]
}

https://docs.aws.amazon.com/securityhub/latest/userguide/securityhub-standards-fsbp-controls.html#fsbp-sqs-1


  • Security design review completed; the Resolution of this issue does not
    • … affect authentication; for example:
      • OAuth 2.0 with the application (API or Swagger UI)
      • Authentication of developers with Google Cloud APIs
      • Authentication of developers with AWS APIs
      • Authentication with a GitLab instance in the system
      • Password and 2FA authentication with GitHub
      • API access token authentication with GitHub
      • Authentication with
    • … affect the permissions of internal users like access to
      • Cloud resources on AWS and GCP
      • GitLab repositories, projects and groups, administration
      • an EC2 instance via SSH
      • GitHub issues, pull requests, commits, commit statuses, wikis, repositories, organizations
    • … affect the permissions of external users like access to
      • TDR snapshots
    • … affect permissions of service or bot accounts
      • Cloud resources on AWS and GCP
    • … affect audit logging in the system, like
      • adding, removing or changing a log message that represents an auditable event
      • changing the routing of log messages through the system
    • … affect monitoring of the system
    • … introduce a new software dependency like
      • Python packages on PYPI
      • Command-line utilities
      • Docker images
      • Terraform providers
    • … add an interface that exposes sensitive or confidential data at the security boundary
    • … affect the encryption of data at rest
    • … require persistence of sensitive or confidential data that might require encryption at rest
    • … require unencrypted transmission of data within the security boundary
    • … affect the network security layer; for example by
      • modifying, adding or removing firewall rules
      • modifying, adding or removing security groups
      • changing or adding a port a service, proxy or load balancer listens on
  • Documentation on any unchecked boxes is provided in comments below
@dsotirho-ucsc dsotirho-ucsc added orange [process] Done by the Azul team securityhub [subject] Represents one or more SecurityHub findings severity:medium [subject] A SecurityHub severity of MEDIUM labels Nov 5, 2022
@hannes-ucsc
Copy link
Member

Our queues messages are short-lived and contain no managed-access data. I don't think encryption will increase security posture.

@hannes-ucsc hannes-ucsc added the compliance [subject] Information and software security label Feb 17, 2023
@dsotirho-ucsc
Copy link
Contributor Author

Marking ticket won't fix based on the previous comment.

@dsotirho-ucsc dsotirho-ucsc added the wontfix [process] Issue is valid but resolution is not deemed necessary label Oct 6, 2023
@dsotirho-ucsc dsotirho-ucsc modified the milestone: Compliance mitigation 23/10 Oct 6, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
compliance [subject] Information and software security orange [process] Done by the Azul team securityhub [subject] Represents one or more SecurityHub findings severity:medium [subject] A SecurityHub severity of MEDIUM wontfix [process] Issue is valid but resolution is not deemed necessary
Projects
None yet
Development

No branches or pull requests

2 participants