This product is not supported for your selected
Datadog site. (
).
이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우
언제든지 연락주시기 바랍니다.Id: f1g2h3i4-j5k6-7lmn-8opq-9012rstuvwxy
Cloud Provider: aws
Framework: Terraform
Severity: High
Category: Best Practices
Learn More
Description
AWS Instance Metadata Service Version 1 (IMDSv1) is susceptible to Server-Side Request Forgery (SSRF) attacks, which can allow attackers to access instance metadata and potentially steal credentials or sensitive information from EC2 instances. IMDSv2 mitigates this risk by requiring session tokens for metadata requests, providing an additional layer of protection against SSRF vulnerabilities. To secure your infrastructure, set http_tokens
to "required"
in your AWS instance or launch template metadata options, as shown in the following example:
resource "aws_instance" "secure_example" {
ami = "ami-123456"
instance_type = "t2.micro"
metadata_options {
http_tokens = "required" // Secure configuration
}
}
Compliant Code Examples
resource "aws_launch_template" "good_example" {
name_prefix = "example"
image_id = "ami-123456"
instance_type = "t2.micro"
metadata_options {
http_tokens = "required" # ✅ Secure
}
}
resource "aws_instance" "good_example" {
ami = "ami-123456"
instance_type = "t2.micro"
metadata_options {
http_tokens = "required" # ✅ Secure
}
}
Non-Compliant Code Examples
resource "aws_instance" "bad_example" {
ami = "ami-123456"
instance_type = "t2.micro"
metadata_options {
http_tokens = "optional" # ❌ Should be "required"
}
}
resource "aws_launch_template" "bad_example" {
name_prefix = "example"
image_id = "ami-123456"
instance_type = "t2.micro"
metadata_options {
http_tokens = "optional" # ❌ Should be "required"
}
}