Security Best Practices for Device Farm - AWS Device Farm

Security Best Practices for Device Farm

Device Farm provides a number of security features to consider as you develop and implement your own security policies. The following best practices are general guidelines and don’t represent a complete security solution. Because these best practices might not be appropriate or sufficient for your environment, treat them as helpful considerations rather than prescriptions.

  • Grant any continuous integration (CI) system you use the least privilege possible under IAM. Consider using temporary credentials for each CI system test so that even if a CI system is compromised, it cannot make spurious requests. For more information about temporary credentials, see the IAM User Guide.

  • Use adb commands in a custom test environment to clean up any content created by your application. For more information about custom test environments, see Working with Custom Test Environments in AWS Device Farm.