Make terraform templates secure by default
What does this MR do and why?
Describe in detail what your merge request does and why.
With GitLab-managed Terraform state, Terraform state files are stored as artifacts. These files can contain sensitive data, and having them available in public artifacts is a security concern.
Our own documentation recommends people manually change this setting:
We also strongly recommend that you disable public pipelines by setting the artifact’s public flag to false (public: false)
We should ensure we are using our own best practices in any templates we provide, to make it easy for everyone to be secure by default.
This MR adds the recommended flag to the baseline Terraform templates.
Screenshots or screen recordings
Screenshots are required for UI changes, and strongly recommended for all other merge requests.
How to set up and validate locally
Numbered steps to set up and validate the change are strongly suggested.
MR acceptance checklist
This checklist encourages us to confirm any changes have been analyzed to reduce risks in quality, performance, reliability, security, and maintainability.
-
I have evaluated the MR acceptance checklist for this MR.