| ▲ | raw_anon_1111 a day ago | |||||||
Please tell me how is going to be “hacked”? A) The IAM role of the Lambda runtime it’s running in is least privileged and only has access read and write access to the required S3 bucket and other required AWS services and even those are tightly scoped. B) For authentication I used Amazon Cognito and ran a curl shell script against each endpoint for authentication vs non authenticated end points C) The database user has least privilege access So how pray tell could insecure code overcome that? | ||||||||
| ▲ | mattmanser 20 hours ago | parent [-] | |||||||
So you've made a read only wrapper around a database? That one person needs to access? There's no tentantization? You can't access more than one person's data? So there's zero chance one user can access someone else's data? If you answered NO to any question, refer to my previous post. If you answered YES, you could have just hooked your DB up to power BI or tableaux or whatever. Not exactly something to start boasting about that you're doing web dev. | ||||||||
| ||||||||