Skip to content

Use deny policies rather than conditions to reject insecure access#21

Merged
RealOrangeOne merged 2 commits intomasterfrom
harden-https-requirement
Jan 28, 2026
Merged

Use deny policies rather than conditions to reject insecure access#21
RealOrangeOne merged 2 commits intomasterfrom
harden-https-requirement

Conversation

@RealOrangeOne
Copy link
Member

There were some issues with the previous format, where the condition would be applied strangely and somewhat selectively. I couldn't reproduce them, but doing the policies this way is probably better.

This uses explicit "Deny" policies, which should be easier to understand, since they're applied before any other policies, making them simpler to manage.

Policies taken from https://github.com/terraform-aws-modules/terraform-aws-s3-bucket/blob/f90d8a385e4c70afd048e8997dcccf125b362236/main.tf#L965 and https://github.com/terraform-aws-modules/terraform-aws-s3-bucket/blob/f90d8a385e4c70afd048e8997dcccf125b362236/main.tf#L934

@RealOrangeOne RealOrangeOne requested a review from tomusher June 18, 2025 13:45
@RealOrangeOne RealOrangeOne force-pushed the harden-https-requirement branch from a27fb9a to d6ee06a Compare June 18, 2025 13:47
@tomusher
Copy link
Member

tomusher commented Jan 5, 2026

Looks good to me!

S3 already only accepts TLS 1.2+
@RealOrangeOne RealOrangeOne merged commit 969e8f9 into master Jan 28, 2026
2 checks passed
@RealOrangeOne RealOrangeOne deleted the harden-https-requirement branch January 28, 2026 13:58
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants