Skip to content

Commit

Permalink
Address nccgroup#110: Added note about stealing env variables from TF…
Browse files Browse the repository at this point in the history
…E runs
  • Loading branch information
Frichetten committed Jan 23, 2022
1 parent 816acc6 commit e50d70c
Showing 1 changed file with 3 additions and 0 deletions.
3 changes: 3 additions & 0 deletions content/terraform/terraform_enterprise_metadata_service.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,9 @@ If Terraform Enterprise is deployed to a VM from a cloud provider we may be able

"By default, Terraform Enterprise does not prevent Terraform operations from accessing the instance metadata service, which may contain IAM credentials or other sensitive data" ([source](https://www.terraform.io/enterprise/system-overview/security-model#restrict-terraform-build-worker-metadata-access))

!!! Note
While the focus of this article is on targeting the metadata service, it is worth noting that gaining code execution inside a Terraform run may provide other avenues for attack. For example, environment variables could be leaked which may contain sensitive credentials.

## Remote (Code) Execution

For many engineers, their first experience with Terraform was locally on their workstations. When they invoked a `terraform apply` or `terraform plan` all of that activity took place on the local machine (reaching out to cloud APIs, tracking state, etc.)
Expand Down

0 comments on commit e50d70c

Please sign in to comment.