Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Rotate the AWS access keys of the IAM users created by Terraform #96

Open
mikefox opened this issue Jun 23, 2021 · 2 comments
Open

Rotate the AWS access keys of the IAM users created by Terraform #96

mikefox opened this issue Jun 23, 2021 · 2 comments
Labels
enhancement New feature or request

Comments

@mikefox
Copy link
Contributor

mikefox commented Jun 23, 2021

Is there a way to rotate the AWS access keys of the two IAM users (the one that can access the blobstore and the one that can deploy EC2 instances as explained here)? The keys in our AWS account that were set up by Control Tower are now over a year old. The lack of access key rotation is a common issue raised by penetration testing. I've scoured the documentation but can't find anything relating to this.

@crsimmons
Copy link
Contributor

That isn't currently a feature of Control Tower (mostly because no one has ever requested it before). The users are created via terraform (bosh user & blobstore user).

I haven't tested it but I would think you could delete the user manually then re-run control-tower deploy and terraform should recreate the users and their keys. You may need to edit the terraform state as well (it's stored in the config S3 bucket).

We'd also be open to a PR if you want to take a stab at automating the process as part of the tool.

@crsimmons crsimmons added the enhancement New feature or request label Jun 23, 2021
@friegger
Copy link

Deleting the user worked. The next redeploy created a new user. If I remember correctly we did not edit the terraform state.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

3 participants