Manage your code enclaves on AWS.
Project description
- This is alpha release of the software. Use with caution.
- You are responsible for proper management of your AWS account,
- any resources created by this software and all associated costs.
1. Overview
Claves (from code enclaves) is a software for seamless management of virtual environments on AWS for code development.
The command line application can:
- create new EC2 instances with cloned CodeCommit repository
- manage IAM roles on your behalf to grant the enclave the least privileges
- list and delete previously created code enclaves
2. Motivation
Developers write the code on daily basis. They often work on multiple projects at the same time and are willing to try new libraries as it's essential part of their job. From information security point of view it's a real challange to protect them from emerging threats. For a long time supply-chain attacks remained in a area of theoretic attacks not feasible to perform in real world scenarios but it changes... Both real and simulated attempts appeared recent years which prove that use of malicious dependencies is a great way to infect the last links of software development ecosystem. We can act and change our behaviour by following the rules of least privilege approach and security by isolation. Sometimes we won't be able to prevent the attack itself but we can minimise the impact.
The security objectives of Claves is to:
- allow developers create separated environment for each project they contribute
- prevent project's code (and its dependencies) from reading and modifying other projects data or developer's private data
- prevent the attacker from achieving the persistence on a system by the use of ephemeral environments
But also from general development perspective:
- create easily deployable environments to speed up the introduction of new code contributors
- use cloud capabilities to decrease build and test time when making changes to the codebase
References:
- https://portswigger.net/daily-swig/open-source-security-malicious-npm-packages-broadcast-sensitive-user-data-online
- https://nakedsecurity.sophos.com/2017/09/19/pypi-python-repository-hit-by-typosquatting-sneak-attack/
3. Long term goals
- Add more deployment options besides AWS EC2 (more CSP but also a local VMs/Dockers maybe?)
- Add more code provider options besides AWS CodeCommit (GitHub, etc.)
- Let Claves be used easily as the API not only command line app
- Let Claves be more customisable in terms of post-cloning configuration
- More ideas? Open an issue :)
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file claves-1.0a4.tar.gz
.
File metadata
- Download URL: claves-1.0a4.tar.gz
- Upload date:
- Size: 8.7 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/3.3.0 pkginfo/1.6.1 requests/2.22.0 setuptools/51.1.1 requests-toolbelt/0.9.1 tqdm/4.55.0 CPython/3.8.5
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 326bed5bef90cf800b661b5ba2c6b747bc60e18cfbde492be4f4b510bd25688d |
|
MD5 | d9105ea8d22942c1b58adde5f91aca29 |
|
BLAKE2b-256 | a0d26aa5239a32f10a5746b9e755edebd2a9dec678d6ed6f7cd9aa8f59ccd20f |
File details
Details for the file claves-1.0a4-py3-none-any.whl
.
File metadata
- Download URL: claves-1.0a4-py3-none-any.whl
- Upload date:
- Size: 11.3 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/3.3.0 pkginfo/1.6.1 requests/2.22.0 setuptools/51.1.1 requests-toolbelt/0.9.1 tqdm/4.55.0 CPython/3.8.5
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 21e0b14eb337707bef9b599d1cbf69d5b846816f09976561c93167ea3eaf7aa3 |
|
MD5 | 5c18bf1916cad702630e54b4186d200c |
|
BLAKE2b-256 | 0eaede9b90af30a76ec34be53d9b817c56d23debc36f7db54a510ce1fc646134 |