Skip to content

Commit 74afed2

Browse files
committed
update ll security.md
1 parent e1dd38e commit 74afed2

File tree

1 file changed

+17
-9
lines changed

1 file changed

+17
-9
lines changed

internal/lambdalabs/SECURITY.md

Lines changed: 17 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -16,22 +16,30 @@ This document outlines how the Lambda Labs integration complies with Brev Cloud
1616

1717
## 🔐 Network Security
1818

19-
### Default Rules
19+
### Current Model
2020

21-
- **Inbound:** All inbound traffic is **denied by default**. Lambda instances are provisioned without open ports unless explicitly defined. (Lambda Labs by default allows SSH/ICMP; Brev overrides this to achieve a true deny-all inbound posture.)
22-
- **Outbound:** All outbound traffic is **unrestricted by default**. Lambda Cloud imposes no egress restrictions, so instances can freely initiate outbound connections.
21+
Lambda Labs recently introduced support for per-instance and per-cluster firewalls, enabling more granular network security controls. **However, the Brev Cloud SDK integration does _not yet_ utilize these new per-instance/cluster firewall features.**
22+
23+
**Currently, we rely on Lambda Labs' account-level global firewall rules to enforce network security.** This means:
24+
25+
- **Inbound:** By default, all inbound traffic is restricted at the account level except for SSH (TCP/22), which is required for instance access and management. All other inbound ports and protocols are closed unless explicitly allowed at the account/global level.
26+
- **Outbound:** All outbound traffic is **unrestricted by default**. Lambda Cloud does not impose egress restrictions, so instances can freely initiate outbound connections.
27+
28+
> **Note:** The configuration of these global firewall rules is performed _outside_ of the Brev Cloud SDK's cloud integration package. Setting up these account-level firewall rules to restrict all inbound traffic except SSH is a **prerequisite for securely adding a new Lambda Labs account** to Brev.
2329
2430
### Explicit Inbound Access
2531

26-
- Brev allows inbound access only through explicitly defined `FirewallRule` resources.
27-
- Each `FirewallRule` maps to a Lambda Cloud firewall rule allowing a specific port and protocol from an authorized source.
28-
- No ports are open unless explicitly configured by Brev.
32+
- Brev restricts inbound access to SSH only (TCP/22) using Lambda Labs' global firewall rules.
33+
- No other inbound ports are open by default. If additional access is required, it must be configured at the account/global firewall level (not per-instance).
34+
- The new per-instance/cluster firewall features are not yet integrated with Brev's `FirewallRule` abstraction.
2935

30-
### Implementation Mapping
36+
### Implementation Notes
3137

32-
- **Inbound Deny:** Achieved by removing default allow rules (e.g., SSH) and not attaching any ingress rules unless defined in `FirewallRule`.
38+
- **Inbound Deny (except SSH):** Achieved by configuring Lambda Labs' global firewall rules to allow only SSH and deny all other inbound traffic.
3339
- **Outbound Allow:** No changes needed; outbound access is unrestricted by Lambda by default.
34-
- **FirewallRule Mapping:** Each Brev `FirewallRule` maps directly to a Lambda Labs firewall rule (e.g., TCP/22 from 203.0.113.0/24).
40+
- **FirewallRule Mapping:** At this time, Brev's `FirewallRule` resources are not mapped to Lambda Labs' new per-instance/cluster firewall APIs. All restrictions are enforced at the account/global level.
41+
42+
> **Planned Improvement:** We plan to update the integration to leverage Lambda Labs' per-instance/cluster firewalls for finer-grained network control in a future release.
3543
3644
---
3745

0 commit comments

Comments
 (0)