Security Policy
Supported Versions
We release patches for security vulnerabilities for the following versions:
Version |
Supported |
1.x.x |
:white_check_mark: |
< 1.0 |
:x: |
Reporting a Vulnerability
We take the security of AWS Host Factory Plugin seriously. If you believe you have found a security vulnerability, please report it to us as described below.
Where to Report
Please do not report security vulnerabilities through public GitHub issues.
Instead, please report them via email to:
You should receive a response within 24 hours. If for some reason you do not, please follow up via email to ensure we received your original message.
What to Include
Please include the following information in your report:
- Type of issue (e.g., buffer overflow, SQL injection, cross-site scripting, etc.)
- Full paths of source file(s) related to the manifestation of the issue
- The location of the affected source code (tag/branch/commit or direct URL)
- Any special configuration required to reproduce the issue
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact of the issue, including how an attacker might exploit it
What to Expect
After you have submitted your report:
- We will acknowledge your report within 24 hours
- We will provide a more detailed response within 72 hours
- Indicating the next steps in handling your report
- If we can reproduce the issue
- If we need additional information
- We will keep you informed of our progress
- How we plan to resolve the issue
- If we need additional information
- If we have questions
Protection Policy
We follow these principles:
- We will investigate all legitimate reports and do our best to quickly fix the problem
- We will keep you informed of the progress towards a fix
- We will not take legal action against you if you:
- Follow the instructions above
- Give us reasonable time to respond before disclosure
- Do not exploit the vulnerability beyond necessary testing
- Do not share information about the vulnerability until we fix it
Safe Harbor
We consider security research conducted under this policy to be:
- Authorized in accordance with the Computer Fraud and Abuse Act (CFAA)
- Exempt from DMCA restrictions
- Exempt from restrictions in our Terms of Service that would interfere with conducting security research
- Lawful, helpful to the overall security of the Internet, and conducted in good faith
You are expected, as always, to comply with all applicable laws.
Public Disclosure
We aim to resolve security issues as quickly as possible. We would like to ask that you do not share information about the vulnerability until we have had the opportunity to fix it and notify our users.
Once we have resolved the issue, we will:
- Notify affected users
- Release a security advisory
- Credit you (if desired) for discovering and reporting the issue
Security Best Practices
When using this plugin:
- Always use the latest version
- Follow AWS security best practices
- Use the principle of least privilege for AWS credentials
- Regularly rotate credentials
- Monitor AWS CloudTrail logs
- Enable AWS CloudWatch monitoring
- Use secure network configurations
- Implement appropriate access controls
Scope
This security policy applies to:
- The latest release of the AWS Host Factory Plugin
- The main branch of our GitHub repository
- All official documentation and examples
Out of Scope
The following are not in scope:
- Issues in dependencies (please report to their maintainers)
- Theoretical vulnerabilities without proof of exploitability
- Issues requiring physical access to a user’s device
- Social engineering attacks
- DOS/DDOS attacks
Security Updates
Security updates will be released as part of our regular release cycle unless a critical vulnerability requires an immediate release.
Version Numbering
We follow Semantic Versioning:
- MAJOR version for incompatible API changes
- MINOR version for backwards-compatible functionality
- PATCH version for backwards-compatible bug fixes and security updates
Update Process
- Security updates are marked with a “SECURITY” tag in the changelog
- Critical updates will be announced via:
- GitHub Security Advisories
- Release notes
- Our official communication channels
Automatic Updates
We recommend:
- Using dependency management tools that support automatic updates
- Regularly checking for updates
- Setting up automated security scanning in your CI/CD pipeline
For secure deployment, ensure:
- AWS IAM roles follow least privilege
- Network security groups are properly configured
- Encryption is enabled for data at rest
- Secure communication channels are used
- Logging and monitoring are enabled
- Access controls are implemented
- Regular security audits are performed
For questions about this security policy, please contact:
security@awshostfactory.example.com