security: narrow internal ingress CIDR (JIRA-4521)#520
Conversation
|
Caution [High Risk] Shared customer whitelist security group creates direct external HTTPS reachability to the new API instance The change adds This is risky because our security requirements say EC2 instances must not be directly reachable from the internet, and our infrastructure notes warn that shared security groups have high fan-out. Even though the hypothesis overstates the effect on internal NLBs and peered-VPC resources, this change still expands external reachability to an instance-attached shared SG in production, increasing attack surface and violating least-privilege expectations for customer access control. Caution [High Risk] New production EC2 instance can launch without an IAM role and with an unencrypted root volume The change creates a new production EC2 instance, This means the new server can come up in production with no role-based AWS credentials and an unencrypted EBS root disk, forcing any AWS access to be handled outside the approved IAM path and leaving data at rest non-compliant. The architecture-mismatch part of the hypothesis is not substantiated, but the same EC2 creation change still creates a real security and compliance failure through missing IAM attachment and missing encryption controls. Caution [High Risk] Direct EIP-to-EC2 cutover will expose the new instance and break consumers of the old public endpoints This change is moving external reachability onto a directly addressed EC2 instance by associating EIP At the same time, this is an endpoint cutover with no evidence of coordinated DNS migration or compatibility handling for consumers still calling Caution [High Risk] CIDR narrowing will block peered monitoring traffic and leave the new 9090 health path on a single backend The change narrows At the same time, the plan creates a single SignalsRoutine → Multiple AWS infrastructure resources showing unusual infrequent update patterns, with load balancer target attachment resources at 1 event/week for the last 3 months and 2 events/week for the last 3 weeks, API server instance resources at 2 events/week for the last 3 months, and an elastic IP resource at 1 event/week for the last 3 months, which is rare compared to typical patterns. Additional Change Details: |
Summary
Context
Testing
Rollout / Risk