Security Enforcement for Trusted Registries: Only allow module restore from trusted registries#19395
Open
jiangmingzhe wants to merge 2 commits intoAzure:mainfrom
Open
Security Enforcement for Trusted Registries: Only allow module restore from trusted registries#19395jiangmingzhe wants to merge 2 commits intoAzure:mainfrom
jiangmingzhe wants to merge 2 commits intoAzure:mainfrom
Conversation
…e from truested registries
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Description: Block credential exfiltration via untrusted OCI registry restore
Problem
Opening an untrusted
.bicepfile triggers automatic OCI module restore, which sends Azure credentials to any referenced registry — including attacker-controlled ones — via the authenticate challenge. Simply opening a file is sufficient to exfiltrate credentials.Solution
A registry trust allowlist enforced before any network I/O. Restore is blocked entirely for registries not on the list — no connection, no credential challenge.
Built-in trusted registries (
*.azurecr.io,*.azurecr.cn,*.azurecr.us,mcr.microsoft.com,mcr.azure.cn,ghcr.io) are hardcoded. Users extend the list viasecurity.trustedRegistriesinbicepconfig.json.Two new diagnostics:
BCP446(registry not trusted) andBCP447(invalid pattern in config). Invalid patterns fail closed — all restore blocked until fixed.Trust is checked against the literal hostname string in the source file. No DNS resolution is performed, preventing DNS rebinding attacks.
Checklist
Microsoft Reviewers: Open in CodeFlow