If you discover a security vulnerability within any of the Cloud DevOps Labs repositories, please send an email to security@alexgarcia.info. All security vulnerabilities will be promptly addressed.
Please do not disclose security vulnerabilities publicly until they have been addressed by the maintainers.
These repositories follow these security best practices:
-
No Secrets in Code: No API keys, passwords, or other secrets are stored in the code. All examples use environment variables, AWS Secrets Manager, or other secure methods for handling secrets.
-
Least Privilege: IAM roles and policies follow the principle of least privilege, granting only the permissions necessary for the specific task.
-
Infrastructure as Code Security: All IaC templates (Terraform, CloudFormation, CDK) follow security best practices and are regularly reviewed.
-
Dependency Management: Dependencies are regularly updated to address security vulnerabilities.
-
Code Scanning: GitHub code scanning is enabled to identify potential security issues.
If you're contributing to these repositories, please follow these security guidelines:
- Never commit secrets, credentials, or personal data
- Use IAM roles with least privilege principles
- Follow secure coding practices
- Keep dependencies updated
- Use secure defaults in all configurations
- Document security considerations for each lab/project
- GitHub Advanced Security
- Dependabot alerts and security updates
- AWS CloudFormation Guard
- Checkov for IaC scanning
- AWS Config rules for compliance checks