You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Within the le-tf-infra-aws-template repository, there's a need to ensure that restrictive Network ACLs (NACLs) are disabled by default. This proactive approach will prevent potential complications, streamline user experience, and ensure that the use of NACLs is only when explicitly required and approved.
Expected Behavior
In the default configuration, NACLs should be disabled, particularly in the shared account base-network layer variables.
Expected variables setup:
manage_default_network_acl=truepublic_dedicated_network_acl=false// use dedicated network ACL for the public subnets.private_dedicated_network_acl=false// use dedicated network ACL for the private subnets.
Users or tech leads wishing to enable NACLs must undergo an explicit approval process.
Feedback mechanisms should be in place to inform users of the status of NACLs and any associated permissions.
Comprehensive testing should be conducted to ensure that the default disabling of NACLs does not introduce new issues.
Use Case
Given the recurrent challenges and complications associated with NACLs, especially during real-time troubleshooting with clients, a safer default approach is to have them disabled. This ensures a smoother experience for most users while still providing the flexibility to enable NACLs when necessary.
Describe Ideal Solution
Update the default configurations in the le-tf-infra-aws-template repository to have NACLs disabled.
Implement a clear and straightforward process for users or tech leads to request and approve the activation of NACLs.
Enhance the architecture's feedback mechanisms to provide users with clear information about NACL status and permissions.
Strengthen testing protocols to validate the behavior and implications of having NACLs disabled by default.
Alternatives Considered
Maintaining the current setup and addressing NACL-related challenges reactively.
Offering granular NACL controls without changing the default state.
Additional Context
The emphasis is on providing a safer and more user-friendly default setting by having restrictive NACLs disabled.
The proposed changes aim to reduce the frequency of NACL-related issues while still offering the capability to use them when justified.
The text was updated successfully, but these errors were encountered:
@rodriguez-matias Matu I think It could be useful if we have a dedicated VPC NACLs entry with the info in this PR in the doc under the Ref Arch Network section:
Describe the Feature
Within the
le-tf-infra-aws-template
repository, there's a need to ensure that restrictive Network ACLs (NACLs) are disabled by default. This proactive approach will prevent potential complications, streamline user experience, and ensure that the use of NACLs is only when explicitly required and approved.Expected Behavior
Use Case
Given the recurrent challenges and complications associated with NACLs, especially during real-time troubleshooting with clients, a safer default approach is to have them disabled. This ensures a smoother experience for most users while still providing the flexibility to enable NACLs when necessary.
Describe Ideal Solution
le-tf-infra-aws-template
repository to have NACLs disabled.Alternatives Considered
Additional Context
The text was updated successfully, but these errors were encountered: