Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Each client would have its own client key in this case, compartmentalizing access. The loss of a single client key would not expose your entire infrastructure.

I had been planning to do this with keys stored in S3 and IAM roles to retrieve the keys at instance boot time, stored in a ramdisk, but this saves all of that trouble.



Instance profiles (credentials) are accessible to all users for the life of the instance. Until AWS provides an ability to lock down portions of instance metadata and/or a way to delete early in the boot process, it's much safer to bake your bootstrap key directly into the AMI as root (or specific user) visible only.


Good point. I've been using IAM roles to bake the AMIs with Packer, where the key is fetched during the bake process; perhaps I'll investigate sneaker if there's time tonight.

Thanks for rubber duckying this with me!


Yeah, perhaps as an additional block device you can mount with whatever permissions you want.


right on, like the FUSE in question.. but securely mounting something remotely means storing a bootstrap key somewhere anyway. Turtles all the way down :)




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: