Skip to content

Commit e98a518

Browse files
authored
docs(pipelines): explain that CDK Pipelines is not a security mechanism (#24925)
By its nature, developers will always be able to influence CDK Pipelines. If more guarantees are necessary, they should be configured from the outside. ---- *By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license*
1 parent ac81ec0 commit e98a518

File tree

1 file changed

+9
-0
lines changed

1 file changed

+9
-0
lines changed

packages/aws-cdk-lib/pipelines/README.md

+9
Original file line numberDiff line numberDiff line change
@@ -1291,6 +1291,15 @@ We therefore expect you to mind the following:
12911291
come with CDK Pipelines will expect `package-lock.json` and `yarn.lock` to
12921292
ensure your dependencies are the ones you expect.
12931293

1294+
- CDK Pipelines runs on resources created in your own account, and the configuration
1295+
of those resources is controlled by developers submitting code through the pipeline.
1296+
Therefore, CDK Pipelines by itself cannot protect against malicious
1297+
developers trying to bypass compliance checks. If your threat model includes
1298+
developers writing CDK code, you should have external compliance mechanisms in place like
1299+
[AWS CloudFormation Hooks](https://aws.amazon.com/blogs/mt/proactively-keep-resources-secure-and-compliant-with-aws-cloudformation-hooks/)
1300+
(preventive) or [AWS Config](https://aws.amazon.com/config/) (reactive) that
1301+
the CloudFormation Execution Role does not have permissions to disable.
1302+
12941303
- Credentials to production environments should be short-lived. After
12951304
bootstrapping and the initial pipeline provisioning, there is no more need for
12961305
developers to have access to any of the account credentials; all further

0 commit comments

Comments
 (0)