What should be considered a secure
module
#1295
AlexanderSehr
started this conversation in
General
Replies: 2 comments
-
Just adding suggested ruleset from discussion in teams:
|
Beta Was this translation helpful? Give feedback.
0 replies
-
We should also consider what we mean by "breaking change". I would not consider a new secure default value that breaks deployments for resources where certain settings can only be configured on deployment time (set-once properties) in a brow fielding setting as "breaking change". In any brownfield setting you would collect all the parameters of a module from the environment you would retrofit into IaC. This discussion also goes into versioning of the module for publication I think. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
We currently updating the security of our modules with the following approach:
All default values should comply with a security baseline, e.g. NIST 800
The build-in policies of Azure can be used as a reference.
However, while the security baseline provides a good starting point, it also raises questions to be answered. For example:
We should agree on an approach. For example
cc: @mblant @eriqua @MariusStorhaug @matebarabas @alex-lee-microsoft @elanzel @elbatane @ahmadabdalla @rahalan @SeSeicht
Beta Was this translation helpful? Give feedback.
All reactions