Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update Standard "Baseline K8s Cluster Security" - rename to "K8s cluster hardening" #475

Closed
2 tasks done
cah-hbaum opened this issue Feb 14, 2024 · 2 comments · Fixed by #581
Closed
2 tasks done
Assignees
Labels
Container Issues or pull requests relevant for Team 2: Container Infra and Tooling SCS is standardized SCS is standardized SCS-VP10 Related to tender lot SCS-VP10 security Issues or pull requests that are security-relevant standards Issues / ADR / pull requests relevant for standardization & certification

Comments

@cah-hbaum
Copy link
Contributor

cah-hbaum commented Feb 14, 2024

The "Baseline K8s cluster security" was created previously. In the PR (#376) there were some discussions about the structure and overall usefulness of the standard.
This issue should adapt the standard (since it is still in the draft phase) in order to better adhere to the requirements brought forward.
Some things to consider (citations) can be found in the comments of this issue.

Definition of Done:

@cah-hbaum cah-hbaum added Container Issues or pull requests relevant for Team 2: Container Infra and Tooling standards Issues / ADR / pull requests relevant for standardization & certification SCS is standardized SCS is standardized SCS-VP10 Related to tender lot SCS-VP10 labels Feb 14, 2024
@cah-hbaum cah-hbaum self-assigned this Feb 14, 2024
@cah-hbaum
Copy link
Contributor Author

Comment from @artificial-intelligence at #376 (comment)

I find this very unspecific for a standards document.

Especially with regards to security this allows for many possible implementations which usually leads to - inadvertently - insecure implementations because there is no clear mandatory way to configure things in a secure fashion.

this is what opened many security holes in previous TLS standards, for example.

See this RFC for recommendations on how to write security related standards documents:

https://www.rfc-editor.org/rfc/rfc3552.html#page-26

I want to particularly highlight something relevant to the above:

If the technology involves authentication, particularly user-host
authentication, the security of the authentication method MUST be
clearly specified. That is, authors MUST document the assumptions
that the security of this authentication method is predicated upon.

So, to sum it up:

If you don't enforce secure authentication and authorization by the standard it's a matter of time until someone implementing your standard will end up implementing it in an insecure manner.

It is also not sufficient that the standard relies on third party security-by-accident schemes, made up example:

"the supported authentication schemes in kubernetes are all secure, therefore we do not need to specify explicitly secure auth schemes".

A standard should not rely on implementation specific behaviour, which might change in the future, or might be version specific.

Be explicit what is secure and be strict, not liberal in what you accept, see this famous criticism of the robustness principle:

https://datatracker.ietf.org/doc/html/draft-iab-protocol-maintenance

@cah-hbaum
Copy link
Contributor Author

Started working on this issue and collected some sources again. I will update this comment with everything I found and read:

@cah-hbaum cah-hbaum changed the title Update Standard "Baseline K8s Cluster Security" Update Standard "Baseline K8s Cluster Security" - rename to "K8s cluster hardening" Apr 25, 2024
cah-hbaum added a commit that referenced this issue Apr 30, 2024
Update baseline cluster security

Signed-off-by: Hannes Baum <[email protected]>
cah-hbaum added a commit that referenced this issue Apr 30, 2024
cah-hbaum added a commit that referenced this issue Apr 30, 2024
cah-hbaum added a commit that referenced this issue Apr 30, 2024
cah-hbaum added a commit that referenced this issue Apr 30, 2024
cah-hbaum added a commit that referenced this issue May 2, 2024
Update baseline cluster security

Signed-off-by: Hannes Baum <[email protected]>
cah-hbaum added a commit that referenced this issue May 2, 2024
cah-hbaum added a commit that referenced this issue May 2, 2024
Update baseline cluster security

Signed-off-by: Hannes Baum <[email protected]>
cah-hbaum added a commit that referenced this issue May 2, 2024
cah-hbaum added a commit that referenced this issue May 2, 2024
cah-hbaum added a commit that referenced this issue May 2, 2024
Update baseline cluster security

Signed-off-by: Hannes Baum <[email protected]>
cah-hbaum added a commit that referenced this issue May 2, 2024
Update baseline cluster security

Signed-off-by: Hannes Baum <[email protected]>
cah-hbaum added a commit that referenced this issue May 3, 2024
Small pep-8 changes.

Signed-off-by: Hannes Baum <[email protected]>
cah-hbaum added a commit that referenced this issue May 21, 2024
cah-hbaum added a commit that referenced this issue May 21, 2024
cah-hbaum added a commit that referenced this issue May 23, 2024
cah-hbaum added a commit that referenced this issue May 27, 2024
Update baseline cluster security

Signed-off-by: Hannes Baum <[email protected]>
cah-hbaum added a commit that referenced this issue May 27, 2024
Small pep-8 changes.

Signed-off-by: Hannes Baum <[email protected]>
cah-hbaum added a commit that referenced this issue Jun 5, 2024
Small pep-8 changes.

Signed-off-by: Hannes Baum <[email protected]>
@martinmo martinmo mentioned this issue Jun 10, 2024
29 tasks
cah-hbaum added a commit that referenced this issue Jun 17, 2024
Small pep-8 changes.

Signed-off-by: Hannes Baum <[email protected]>
cah-hbaum added a commit that referenced this issue Jun 17, 2024
Update baseline cluster security

Signed-off-by: Hannes Baum <[email protected]>
cah-hbaum added a commit that referenced this issue Jun 17, 2024
Small pep-8 changes.

Signed-off-by: Hannes Baum <[email protected]>
cah-hbaum added a commit that referenced this issue Jun 17, 2024
Update baseline cluster security

Signed-off-by: Hannes Baum <[email protected]>
cah-hbaum added a commit that referenced this issue Jun 25, 2024
…ne security") (#581)

* Update baseline cluster security (#475)

Update baseline cluster security
Made a small adjustment to read-only port section in order to address some mentions by @bitkeks.
Made a small adjustment to related documents in order to address some mentions by @bitkeks.

---------

Signed-off-by: Hannes Baum <[email protected]>
Co-authored-by: Dominik Pataky <[email protected]>
@github-project-automation github-project-automation bot moved this from Doing to Done in Sovereign Cloud Stack Jun 25, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Container Issues or pull requests relevant for Team 2: Container Infra and Tooling SCS is standardized SCS is standardized SCS-VP10 Related to tender lot SCS-VP10 security Issues or pull requests that are security-relevant standards Issues / ADR / pull requests relevant for standardization & certification
Projects
Status: Done
2 participants