Best practices for workflow actions in Amazon CodeCatalyst
There are a number of security best practices to consider as you develop your workflows in CodeCatalyst. The following are general guidelines and don’t represent a complete security solution. Because these best practices might not be appropriate or sufficient for your environment, treat them as helpful considerations rather than prescriptions.
Sensitive information
Do not embed sensitive information in your YAML. Rather than embedding credentials, keys, or tokens in your YAML, we recommend you use CodeCatalyst secrets. Secrets provide an easy way to store and reference sensitive information from within your YAML.
Licensing terms
Make sure to pay attention to the licensing terms of the action you choose to use.
Untrusted code
Actions are generally self-contained, single purpose modules that can be shared across a project, space, or the broader community. Using code from others can be a great convenience and efficiency gain, but also introduces a new threat vector. Review the following sections to ensure you’re following best practices to keep your CI/CD workflows secure.
GitHub Actions
GitHub Actions are open source, built and maintained by the community. We follow the shared responsibility
model
More specific guidance and security best practices for GitHub Actions: