-
Notifications
You must be signed in to change notification settings - Fork 131
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
cloud-docs: Update HCP TF security model #803
base: main
Are you sure you want to change the base?
Conversation
The latest updates on your projects. Learn more about Vercel for Git ↗︎
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Saw this as I was making another PR and had a few style suggestions! As always, please feel free to ignore anything that you don't like! ✨
@@ -116,6 +116,16 @@ Marking a variable as “sensitive” will prevent it from being displayed in th | |||
|
|||
The logs from a Terraform plan or apply operation are visible to any user with at least “read” level access in the associated workspace. While Terraform tries to avoid writing sensitive information to logs, redactions are best-effort. This feature should not be treated as a security boundary, but instead as a mechanism to mitigate accidental exposure. Additionally, HCP Terraform is unable to protect against malicious users who attempt to use Terraform logs to exfiltrate sensitive data. | |||
|
|||
### Redaction of ephemeral values in Terraform logs |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
### Redaction of ephemeral values in Terraform logs | |
### Redact ephemeral values from Terraform logs |
@@ -116,6 +116,16 @@ Marking a variable as “sensitive” will prevent it from being displayed in th | |||
|
|||
The logs from a Terraform plan or apply operation are visible to any user with at least “read” level access in the associated workspace. While Terraform tries to avoid writing sensitive information to logs, redactions are best-effort. This feature should not be treated as a security boundary, but instead as a mechanism to mitigate accidental exposure. Additionally, HCP Terraform is unable to protect against malicious users who attempt to use Terraform logs to exfiltrate sensitive data. | |||
|
|||
### Redaction of ephemeral values in Terraform logs | |||
|
|||
The logs from a Terraform plan or apply operation are visible to any user with at least “read” level access in the associated workspace. Terraform tries to avoid writing ephemeral values to logs |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Suggest adding a link to ephemeral values so folks can learn more:
The logs from a Terraform plan or apply operation are visible to any user with at least “read” level access in the associated workspace. Terraform tries to avoid writing ephemeral values to logs | |
The logs from a Terraform plan or apply operation are visible to any workspace's users with **Read** permissions. Terraform attempts to avoid writing [ephemeral values](/terraform/language/resources/ephemeral) to logs, but Terraform cannot guarantee that all providers will not log ephemeral values. |
### Redaction of ephemeral values in Terraform logs | ||
|
||
The logs from a Terraform plan or apply operation are visible to any user with at least “read” level access in the associated workspace. Terraform tries to avoid writing ephemeral values to logs | ||
and provider developers are discouraged from logging those as well but Terraform cannot provide guarantees that providers will not log ephemeral values. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
If you like the suggestion above, this is just a reminder to remove this line:
and provider developers are discouraged from logging those as well but Terraform cannot provide guarantees that providers will not log ephemeral values. |
|
||
The logs from a Terraform plan or apply operation are visible to any user with at least “read” level access in the associated workspace. Terraform tries to avoid writing ephemeral values to logs | ||
and provider developers are discouraged from logging those as well but Terraform cannot provide guarantees that providers will not log ephemeral values. | ||
You can reduce the risk by only [using trusted modules and providers within Terraform configuration](#malicious-terraform-providers-or-modules). |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can you specify what they are reducing the risk of?
and provider developers are discouraged from logging those as well but Terraform cannot provide guarantees that providers will not log ephemeral values. | ||
You can reduce the risk by only [using trusted modules and providers within Terraform configuration](#malicious-terraform-providers-or-modules). | ||
|
||
### Redaction of ephemeral values in memory |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
### Redaction of ephemeral values in memory | |
### Redact ephemeral values in memory |
|
||
### Redaction of ephemeral values in memory | ||
|
||
Ephemeral Values prevents values from being persisted to disk (as part of a plan file or state file) but no efforts are made to protect ephemeral values from memory analysis of the running application. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is there any recommendation we can give to folks here? Is this something they need to worry about? Or more like something we are giving them a heads-up about?
Ephemeral Values prevents values from being persisted to disk (as part of a plan file or state file) but no efforts are made to protect ephemeral values from memory analysis of the running application. | |
Terraform does not persist ephemeral values to plan or state files. However, Terraform does not protect ephemeral values from a memory analysis of your running application. |
Added a few clarifications in the security/threat model concerning ephemeral values, as released recently in 1.10.