Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Alert to customer SOC when ACL processing stops #14039

Open
wilsonmar opened this issue Aug 8, 2022 · 0 comments
Open

Alert to customer SOC when ACL processing stops #14039

wilsonmar opened this issue Aug 8, 2022 · 0 comments
Labels
theme/security type/enhancement Proposed improvement or new feature

Comments

@wilsonmar
Copy link

wilsonmar commented Aug 8, 2022

Please have Consul emit a log entry when ACL processing is stopped. This is one of several other conditions which require a security log output for SOC operations. Others conditions include the Consul Agent configuration file containing settings which turn off TLS verification:

  verify_incoming = false
  verify_outgoing = false
  verify_server_hostname = false

Feature Description

Most large enterprises have a SOC (Security Operations Center) that runs 24x7 to monitor and respond to anomalous issues identified by various monitoring systems. When, in production, processing (enforcement) of ACLs is turned off, that's something they should know about right away. This is both for customers and Consul HCP Operations.

This feature may be a utility like Terraform Sentinel/OPA/TfSec which analyzes configuration settings and issues alerts. This would provide the alerts to be identified under a different security context, in case of compromised access to the Consul server.

This issue concerns ensuring that there are procedures and systems available to prove that the above works for dev, QA, pre-sales engineers, etc. within HashiCorp, and that proven instructions and training are given to customers on this topic.

Use Case(s)

This is one of several conditions in answer to the question "Are accountable parties immediately notified about anomalies and failures?" which is item LOG-13.2 - Failures and Anomalies Reporting - in the CAIQ v4 which HashiCorp customers must fill out to provide their auditors. See https://cloudsecurityalliance.org/download/artifacts/star-level-1-security-questionnaire-caiq-v4/
BTW the CAIQ (Consensus Assessment Initiative Questionnaire) is called "consensus" because it was defined for use by all cloud service providers and the Q&A is applicable to 40 audit programs (SOC2, ISO 27000, FedRamp, etc.). A public example draft for Consul is at https://wilsonmar.github.io/CAIQ4.0.1.consul/

@Amier3 Amier3 added theme/security type/enhancement Proposed improvement or new feature labels Aug 9, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
theme/security type/enhancement Proposed improvement or new feature
Projects
None yet
Development

No branches or pull requests

2 participants