Skip to main content

⭐ Repository β†’ πŸ“ Compliance Engine β†’ πŸ“ CloudAware β†’ πŸ“ AWS β†’ πŸ“ ECR

πŸ›‘οΈ AWS ECR Repository Image Tag Mutability is set to Mutable🟒

  • Contextual name: πŸ›‘οΈ Repository Image Tag Mutability is set to Mutable🟒
  • ID: /ce/ca/aws/ecr/repository-image-tag-mutability
  • Tags:
  • Policy Type: COMPLIANCE_POLICY
  • Policy Categories: RELIABILITY

Logic​

Similar Policies​

Similar Internal Rules​

RulePoliciesFlags
βœ‰οΈ dec-x-767cce1f1

Description​

Open File

Description​

This policy identifies AWS ECR Repositories that are not configured with image tag immutability. When enabled, image tag immutability prevents existing image tags from being overwritten by subsequent pushes with the same tag.

Rationale​

Setting image tag mutability to IMMUTABLE ensures that a tag, such as my-app:latest or my-app:v1.0, consistently references a specific image digest. This safeguards against accidental or malicious overwrites, which could result in deploying incorrect or vulnerable application versions. Immutable tags provide a reliable and auditable deployment history, facilitating rollbacks and supporting a secure software supply chain.

To selectively allow updates, you can configure Mutable tag exclusions or Immutable tag exclusions, enabling flexibility for specific use cases while maintaining overall immutability.

Audit​

This policy flags an AWS ECR Repository as INCOMPLIANT if its Image Tag Mutability is set to MUTABLE.

Remediation​

Open File

Remediation​

Configure Image Tag Mutability​

Setting image tags to immutable helps prevent accidental overwrites of container images, enhancing security and ensuring consistency in your deployments.

From AWS CLI​
aws ecr put-image-tag-mutability \
--repository-name {{repository-name}} \
--image-tag-mutability {{IMMUTABLE | IMMUTABLE_WITH_EXCLUSION | MUTABLE_WITH_EXCLUSION}} \
--image-tag-mutability-exclusion-filters filterType=WILDCARD,filter=latest
  • IMMUTABLE_WITH_EXCLUSION: Prevents overwrites except for specified exclusions.
  • MUTABLE_WITH_EXCLUSION: Allows overwrites but can make certain tags immutable.

policy.yaml​

Open File

Linked Framework Sections​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [ECR.2] ECR private repositories should have tag immutability configured11no data
πŸ’Ό Cloudaware Framework β†’ πŸ’Ό System Configuration35no data
πŸ’Ό FedRAMP High Security Controls β†’ πŸ’Ό CM-2 Baseline Configuration (L)(M)(H)3128no data
πŸ’Ό FedRAMP High Security Controls β†’ πŸ’Ό CM-8(1) Updates During Installation and Removal (M)(H)2no data
πŸ’Ό FedRAMP Low Security Controls β†’ πŸ’Ό CM-2 Baseline Configuration (L)(M)(H)27no data
πŸ’Ό FedRAMP Moderate Security Controls β†’ πŸ’Ό CM-2 Baseline Configuration (L)(M)(H)328no data
πŸ’Ό FedRAMP Moderate Security Controls β†’ πŸ’Ό CM-8(1) Updates During Installation and Removal (M)(H)2no data
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό CA-9(1) Internal System Connections _ Compliance Checks23no data
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό CM-2 Baseline Configuration727no data
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό CM-8(1) System Component Inventory _ Updates During Installation and Removal2no data