Lambda Runtime Security Policy #690
Closed
willfarrell
started this conversation in
Ideas
Replies: 2 comments
-
Thanks so much for opening this discussion.
That's a fair observation and I am inclined to think as such, but I'd be keen to hear what other folks from the community think on this matter. |
Beta Was this translation helpful? Give feedback.
0 replies
-
Seem Node.js has taken up the challenge. https://nodejs.org/en/blog/announcements/v20-release-announce#permission-model |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
With all of the supply chain attacks happening these days, I was recently reminded about
@puresec/function-shield
which existed pre node v12 (It was even part of middy for a while). It allowed the blocking of outbound connections, read/write to tmp, access to source code, and running of child processes. Currently I run all of my lambdas within private subnets with VPC Endpoints to prevent any outbound traffic. It is possible to whitelist domain using AWS Network Firewall, but it's super expensive for just for a couple of lambdas. It would be nice if it was possible to harden the security of lambdas further and without additional complexity and trade offs.Dream implementation:
fs
(this includes chmod, unset, rm, etc)fs
, after runtime has been started.Not sure if this is better suited for the lambda team or the nodejs community as a whole. I'm sure others are talking about this, but I haven't heard of any movement in this area in years.
Ref:
cc @lmammino
Beta Was this translation helpful? Give feedback.
All reactions