This rule ensures that CodeBuild project plaintext environment variables do not contain sensitive AWS values.
Rule | CodeBuild project plaintext environment variables should not contain sensitive AWS values |
Framework | Federal Financial Institutions Examination Council (FFIEC) |
Severity | ✔ Critical |
Rule Description
This rule enforces that CodeBuild project plaintext environment variables do not contain sensitive AWS values for Federal Financial Institutions Examination Council (FFIEC). It aims to ensure that any plaintext environment variables used in CodeBuild projects do not contain any sensitive AWS credentials that could potentially jeopardize the security of financial institutions.
Remediation
To remediate this rule violation, follow the step-by-step guide below:
Step 1: Identify the CodeBuild project
Identify the CodeBuild project that contains plaintext environment variables with sensitive AWS values. You can find this information in your project configuration.
Step 2: Replace sensitive AWS values with secure alternatives
Replace the plaintext environment variables that contain sensitive AWS values with more secure alternatives. Avoid storing AWS credentials directly in plaintext environment variables.
Step 3: Use AWS Secrets Manager or Parameter Store
To securely store and manage sensitive AWS values, it is recommended to use AWS Secrets Manager or Parameter Store. These services provide a secure and centralized way to store secrets and securely retrieve them during build and deployment processes.
Step 4: Update CodeBuild project environment variables
Update the CodeBuild project environment variables to use either AWS Secrets Manager or Parameter Store to retrieve the required sensitive values securely.
Step 5: Update the buildspec.yml file
If applicable, update the buildspec.yml file used by the CodeBuild project to utilize the retrieved sensitive values from AWS Secrets Manager or Parameter Store. Modify the necessary sections within the buildspec.yml file to refer to the secured values instead of the previous plaintext environment variables.
Step 6: Test and validate the changes
Test the updated CodeBuild project to ensure that it functions correctly with the new secure configuration. Validate that the build and deployment processes are not impacted by the changes made to address this rule violation.
Troubleshooting
In case you encounter any issues during the remediation process, consider the following troubleshooting steps:
Additional Notes
Please note that this information is only a general guide, and you should refer to the official AWS documentation and consult with security professionals to ensure compliance with specific regulatory requirements such as FFIEC.