-
Notifications
You must be signed in to change notification settings - Fork 3
Open
Description
The CloudFormation template (sam.yml) you provided grants the Lambda function unrestricted access to all S3 buckets through the policy associated with the AWSLambdaExecute statement. This presents a significant security risk, as the application might unintentionally access or modify data in buckets unrelated to its intended operations. This could potentially expose sensitive information or disrupt critical business processes.
- Recommendations:
- Refactor the policy: Use a least privilege approach by specifying the exact S3 buckets the function requires access to instead of using wildcards (*).
- Consider IAM roles: Utilize IAM roles to grant specific permissions to the Lambda function instead of relying on the broader AWSLambdaExecute policy.
Metadata
Metadata
Assignees
Labels
No labels