This rule ensures CodeBuild projects do not contain sensitive AWS values in plaintext environment variables.
Rule | CodeBuild project plaintext environment variables should not contain sensitive AWS values |
Framework | NIST 800-53 Revision 4 |
Severity | ✔ Critical |
Rule Description:
This rule ensures that CodeBuild project plaintext environment variables do not contain sensitive AWS values, in alignment with NIST 800-53 Revision 4 guidelines. Plaintext environment variables containing sensitive AWS values can potentially expose critical information to unauthorized individuals, leading to security breaches and unauthorized access to AWS resources.
Troubleshooting Steps:
Remediation Steps:
Open the AWS Management Console and navigate to the CodeBuild service.
Select the CodeBuild project that violates the rule.
In the project settings, locate the "Environment" section.
Review the environment variables and identify any plaintext variables containing sensitive AWS values.
Replace the sensitive AWS values with secure alternatives. This can be done using AWS Secrets Manager or AWS Systems Manager Parameter Store.
Using AWS Secrets Manager:
Using AWS Systems Manager Parameter Store:
Repeat steps 4 to 7 for each plaintext environment variable containing sensitive AWS values in the CodeBuild project.
Test the CodeBuild project to ensure it functions correctly with the updated secure environment variables.
Note: It is essential to follow AWS security best practices when storing sensitive information and ensure proper access control and encryption measures are in place.