EC2 instance is not associated with IAM role and instance profile Affecting EC2 service in AWS


Severity

0.0
low
0
10
Severity Framework
Snyk CCSS
Rule category
IAM/ Usage

Is your environment affected by this misconfiguration?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
Frameworks
SOC-2
  • Snyk IDSNYK-CC-00090
  • creditSnyk Research Team

Description

By passing role information to an EC2 instance at launch instead of using IAM access keys, you can limit the risk of access key exposure and help prevent a malicious user from compromising the instance.

How to fix?

Set the iam_instance_profile attribute to the name of an IAM instance profile.

Example Configuration

resource "aws_instance" "valid_instance" {
  ami           = "ami-0323c3dd2da7fabcd"
  instance_type = "t2.micro"
  
  iam_instance_profile = "${aws_iam_instance_profile.new_profile.name}"
}

resource "aws_iam_instance_profile" "new_profile" {
  name = "new_profile"
  role = "${aws_iam_role.new_role.name}"
}