| ▲ | Spivak 8 hours ago | |||||||||||||||||||||||||||||||||||||
The reason to not include the endpoint by default is because VPCs should be secure by default. Everything is denied and unless you explicitly configure access to the Internet, it's unreachable. An attacker who manages to compromise a system in that VPC now has a means of data exfiltration in an otherwise air gapped set up. It's annoying because this is by far the more uncommon case for a VPC, but I think it's the right way to structure, permissions and access in general. S3, the actual service, went the other way on this and has desperately been trying to reel it back for years. | ||||||||||||||||||||||||||||||||||||||
| ▲ | wulfstan 8 hours ago | parent | next [-] | |||||||||||||||||||||||||||||||||||||
Right, I can appreciate that argument - but then the right thing to do is to block S3 access from AWS VPCs until you have explicitly confirmed that you want to pay the big $$$$ to do so, or turn on the VPC endpoint. A parallel to this is how SES handles permission to send emails. There are checks and hoops to jump through to ensure you can't send out spam. But somehow, letting DevOps folk shoot themselves in the foot (credit card) is ok. What has been done is the monetary equivalent of "fail unsafe" => "succeed expensively" | ||||||||||||||||||||||||||||||||||||||
| ▲ | SOLAR_FIELDS 8 hours ago | parent | prev | next [-] | |||||||||||||||||||||||||||||||||||||
There’s zero reason why AWS can’t pop up a warning if it detects this behavior though. It should clearly explain the implications to the end user. I mean EKS has all sorts of these warning flags it pops up on cluster health there’s really no reason why they can’t do the same here. | ||||||||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||||||||
| ▲ | unethical_ban 5 hours ago | parent | prev [-] | |||||||||||||||||||||||||||||||||||||
I don't get your argument. If an ec2 needs access to an s3 resource, doesn't it need that role? Or otherwise, couldn't there be some global s3 URL filter that automagically routes same-region traffic appropriately if it is permitted? My point is that, architecturally, is there ever in the history of AWS an example where a customer wants to pay for the transit of same-region traffic when a check box exists to say "do this for free"? Authorization and transit/path are separate concepts. There has to be a better experience. | ||||||||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||||||||