You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Thanks so much for sharing how the RDS root password provisioning works in issue #98. Based on how the RDS root user password provisioning works, the application servers which set the root user's password, as a result, have root MySQL user access to the RDS database when they only need the access that the application user that they use is granted (e.g. no rights to create and delete other MySQL users).
Please provision the RDS root user's password through a different means to avoid this unnecessary privilege being granted to RDS clients.
@tinnightcap@RichardWeiss can you confirm that for all 4 apps in Nubis plan B there is only 1 or no database user per app (which means not having separate RDS users is a lower risk)?
These 4 apps being:
EDNS/akamai
Bugzilla
LDAP Okta Agent
LDAP master
The risk would be higher for future app is these use multiple users.
From @gene1wood on November 3, 2015 23:55
Thanks so much for sharing how the RDS root password provisioning works in issue #98. Based on how the RDS root user password provisioning works, the application servers which set the root user's password, as a result, have root MySQL user access to the RDS database when they only need the access that the application user that they use is granted (e.g. no rights to create and delete other MySQL users).
Please provision the RDS root user's password through a different means to avoid this unnecessary privilege being granted to RDS clients.
Copied from original issue: tinnightcap/nubis-stacks#219
The text was updated successfully, but these errors were encountered: