This repository has been archived by the owner on Jul 19, 2019. It is now read-only.
Prevent Agent Nodes' Unprivileged Users From Accessing EC2 Metadata #37
Labels
bug
Something isn't working
Problem Description:
Currently, unprivileged users on agent nodes can access EC2 metadata. Given that the agent nodes and master nodes frequently are deployed using the same Instance-role, this can allow unprivileged users on the agent nodes from leveraging powers that should only be accessible from processes on the master node.
Expected Behavior:
Master and agent nodes can share an instance-role but not inherit all the same capabilities (particularly by non-privileged users)
Actual Behavior:
Unprivileged processes running on master and agent nodes sharing an instance-role inherit all the same capabilities.
Fix recommendation:
See ServerFault thread for ideas on preventing unprivileged users from gaining access to a hosting-instance's AWS metadata.
Alternately, create an agent-specific role-template that removes access to the S3 resources (and ensure agents only have that role attached).
The text was updated successfully, but these errors were encountered: