Skip to content

[Infrastructure] Add network policies & scope Vault permissions per service #413

@Flegma

Description

@Flegma

Summary

The cluster lacks network segmentation and secrets management uses overly broad access policies.

Tasks

  • Create NetworkPolicies with default-deny for the namespace
  • Whitelist only required pod-to-pod communication
  • Create per-service Vault policies instead of wildcard
  • Implement per-service Vault roles with specific path restrictions

Impact

No network segmentation between pods. Broad secrets access increases compromise blast radius.

Details

Full details in internal audit document. Finding IDs: CRIT-INFRA-03, CRIT-INFRA-04, MED-INFRA-05


Related Issues (Security Hardening Pattern)

Metadata

Metadata

Assignees

No one assigned

    Labels

    P0-criticalSecurity & data loss riskaudit-2026-03From March 2026 codebase auditsecuritySecurity vulnerability or hardeningservice:infrastructure5stackgg/5stack-panel infrastructure

    Type

    No type

    Projects

    Status

    In progress

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions