Test new version#518
Conversation
|
Caution [High Risk] New API instance will create a direct EC2 HTTP endpoint in the public ALB subnet The change adds a new production API EC2 instance in Because those security groups are shared, attaching them to another host expands every existing CIDR-based ingress rule to an additional target. The new host will answer on port Caution [High Risk] Production EC2 instances are being left publicly reachable while root storage remains unencrypted The change leaves That combination creates a real security and compliance failure rather than a hypothetical best-practice gap: production compute is being exposed directly while local root storage remains unencrypted. If either instance is compromised, data and configuration stored on the root volume are not protected at rest, and the change does not remediate that condition. This is a high-severity risk because it violates explicit security policy and increases the blast radius of an internet-exposed EC2 compromise. SignalsRoutine → Multiple AWS access and notification resources showing unusual and infrequent change patterns at 1-2 events/week for the last 3 months, including load balancer attachment activity at 1 event/week for the last 3 months and subscription activity at 2 events/week for the last 3 months. Additional Change Details: |
No description provided.