Skip to content
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
12 changes: 11 additions & 1 deletion modules/high-sev-security-policies.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -22,6 +22,16 @@ The following table lists the default security policies in {product-title} that
|Build or Deploy |Fixable Severity at least Important |Alerts when deployments with fixable vulnerabilities have a severity rating of at least Important. |Enabled
|Build or Deploy |Rapid Reset: Denial of Service Vulnerability in HTTP/2 Protocol |Alerts on deployments with images containing components that are susceptible to a Denial of Service (DoS) vulnerability for HTTP/2 servers. This addresses a flaw in the handling of multiplexed streams in HTTP/2. A client can rapidly create a request and immediately reset them, which creates extra work for the server while avoiding hitting any server-side limits, resulting in a denial of service attack. To use this policy, consider cloning the policy and adding the `Fixable` policy criteria before enabling it. |Disabled
|Build or Deploy |Secure Shell (ssh) Port Exposed in Image |Alerts when deployments expose port 22, which is commonly reserved for SSH access. |Enabled
|Build or Deploy
|Red{nbsp}Hat Images must be signed by the Red{nbsp}Hat Release Key
a|Alerts when a Red{nbsp}Hat image is not signed by the official link:https://access.redhat.com/security/team/key[Red{nbsp}Hat product signing key, "Release Key 3"]. These alerts apply to images from the following registries and remotes:

* `registry.redhat.io`
* `registry.access.redhat.com`
* `quay.io/openshift-release-dev/ocp-release`
* `quay.io/openshift-release-dev/ocp-v4.0-art-dev`

|Disabled
|Deploy |Emergency Deployment Annotation |Alerts when deployments use the emergency annotation, such as "admission.stackrox.io/break-glass":"ticket-1234" to circumvent StackRox Admission controller checks. |Enabled
|Deploy |Environment Variable Contains Secret |Alerts when deployments have environment variables that contain 'SECRET'. |Enabled
|Deploy |Fixable CVSS >= 6 and Privileged |Alerts when deployments run in privileged mode with fixable vulnerabilities that have a CVSS of at least 6. However, Red{nbsp}Hat recommends that you create policies using CVE severity instead of CVSS score. |Disabled by default in version 3.72.0 and later
Expand Down Expand Up @@ -59,4 +69,4 @@ The following table lists the default security policies in {product-title} that
* A bulleted list of links to other closely-related material. These links can include `link:` and `xref:` macros.
* For more details on writing reference modules, see the link:https://github.com/redhat-documentation/modular-docs#modular-documentation-reference-guide[Modular Documentation Reference Guide].
* Use a consistent system for file names, IDs, and titles. For tips, see _Anchor Names and File Names_ in link:https://github.com/redhat-documentation/modular-docs#modular-documentation-reference-guide[Modular Documentation Reference Guide].
////
////