Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Metaflow Deployed AWS Batch Job Causes Security Hub To Raise Risk Items #366

Open
yuminghuang23 opened this issue Jun 16, 2023 · 1 comment

Comments

@yuminghuang23
Copy link

Hi, we use batch jobs created via metaflow --with batch option to create metaflow batch jobs on aws. Recently, after new security measures were introduced and enabling of security hub, it is raising high risk items. Below are the items:

  • ECS.1 Amazon ECS task definitions should have secure networking modes and user definitions.
  • ECS.4 containers should run as non-privileged
  • ECS.5 ECS containers should be limited to read-only access to root filesystems
    Details on aws doc for these items can be found here

Are there plans to update metaflow to adhere to these aws security checks?

@savingoyal
Copy link
Collaborator

thanks for highlighting! we will look into these.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants