collado-mike commented on PR #1424:
URL: https://github.com/apache/polaris/pull/1424#issuecomment-2844180646

   > while there is still not an issue with users who are only using SSE, if 
the user is using CSE anywhere else within their AWS account, this could 
present a security issue as credentials vended by Polaris could be used by a 
malicious user against CSE objects.
   
   Notably, if any KMS keys that the IAM role has access to are being used for 
anything client-side (e.g., encrypted DDB, or local files or anything really), 
the caller can use the credentials vended to immediately start decrypting 
anything with those keys.
   
   I know there is some churn in the encryption configuration in Iceberg, but I 
also know that `s3.sse.key` is a property that's currently used to specify the 
KMS key associated with a table. The current `getSubscopedCreds` API doesn't 
take in table properties now, but can we make that change to allow specific 
keys to be passed in and added to the policy? 


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: issues-unsubscr...@polaris.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org

Reply via email to