Concourse

Security Caveats

At present, teams only provide trusted multi-tenancy. This means it should be used for cases where you know and trust who you're allowing access into your Concourse cluster.

There are a few reasons it'd be a bad idea to do otherwise:

  • Any team can run builds with privileged tasks. A bad actor in the mix could easily use this to harm your workers and your cluster.

    In the future, we'll probably have this as a flag on a team, indicating whether they're permitted to run privileged builds.

  • There are no networking restrictions in place, and traffic to and from the workers is currently unencrypted and unauthorized. Anyone could run a task that does horrible things to your worker's containers, possibly stealing sensitive information.

    This can be remedied with configuration specified on Garden to restrict access to the internal network, but this is not detailed in our docs, and we'll probably want to find a better answer than configuration in the future.