Update K8s Security CS with Service mesh & OPA #496
Conversation
Grammar update in the Access_Control_Cheat_Sheet.md cheatsheet. (#422)
Syncing with the OWASP/CheatSheetSeries
Syncing with master branch of OWASP/CheatSheetSeries
Syncing with OWASP/CheatSheetSeries
|
Looks very good thank you. |
| #### RBAC | ||
| A strong Role Based Access Control (RBAC) system is arguably one of the most critical requirements in large engineering organizations, since even the most secure system can be easily circumvented by overprivileged users or employees. Restricting privileged users to least privileges necessary to perform job responsibilities, ensuring access to systems are set to “deny all” by default, and ensuring proper documentation detailing roles and responsibilities are in place is one of the most critical security concerns in the enterprise. | ||
|
|
||
| ### Implementing Open Policy Agent (OPA) for a centralized policy management |
mackowski
Oct 22, 2020
Collaborator
any alternatives for it?
any alternatives for it?
ragashreeshekar
Oct 28, 2020
Author
Contributor
This topic was one of suggestions and I'm not quite exposed to it. I did some research however couldn't find much resource. Could the team pls help with it? Thanks in advance
This topic was one of suggestions and I'm not quite exposed to it. I did some research however couldn't find much resource. Could the team pls help with it? Thanks in advance
mackowski
Oct 29, 2020
Collaborator
No worries if you done fair research and you did not find anything that is fine. OPA is kind of the standard now so I am happy that you covered it here.
No worries if you done fair research and you did not find anything that is fine. OPA is kind of the standard now so I am happy that you covered it here.
ragashreeshekar
Nov 9, 2020
Author
Contributor
Thanks @mackowski.
I have done the research to the best of my understanding, would be happy to add details based of the team's guidance.
Thanks @mackowski.
I have done the research to the best of my understanding, would be happy to add details based of the team's guidance.
While writing my bachelor thesis, I encountered massive issues when using Istio together with Ranger and Azure automization of certificates of exposed services (e.g. a web app): istio/istio#7776 The reason was that Istio used a ressource called "Gateway" to expose a service, while the Azure automatization required an "Ingress" ressource to recognize it for certificate creation.
--> I would clearly state that using "hostNetwork:true" will cause NetworkPolicies to be ignored since the Pod will use its host (=the node it runs on) network (The Git issue is from Calico but I encountered that one with all CNI providers I used): projectcalico/felix#1361. |
|
@ragashreeshekar please address @Seppl2202 and my comments. If you need any help let us know. |
|
I have updated the
Thanks for your review and suggestions. Please advise how we could handle the "Ingress & Egress Control using service mesh", as far as I understand from the review, It may be better to remove that section. Kindly let me know. I have updated the draft with the second comment, updated version commit - 1584fdd Thanks again! |
|
Thanks @Seppl2202 @mackowski for your time and review, part of the review comments have been addressed, I have added comments where I need some clarifications, please go through them and let me know your thoughts. |
|
Thanks @ragashreeshekar! |
|
If it looks good, could we merge it to the active CS? |
|
Yeh it looks well. I will merge it. Thank you @ragashreeshekar for your woirk! |
|
LGTM |
Thank you for submitting a Pull Request (PR) to the Cheat Sheet Series.
Please make sure that for your contribution:
If your PR is related to an issue, please finish your PR text with the following line:
This PR covers issue #.
Thank you again for your contribution😃