Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Create a security checklist for deploying a cluster #28

Closed
9 tasks
savitharaghunathan opened this issue Jan 6, 2022 · 27 comments
Closed
9 tasks

Create a security checklist for deploying a cluster #28

savitharaghunathan opened this issue Jan 6, 2022 · 27 comments
Labels
sig/docs Categorizes an issue or PR as relevant to SIG Docs. sig/security Categorizes an issue or PR as relevant to SIG Security.

Comments

@savitharaghunathan
Copy link
Member

savitharaghunathan commented Jan 6, 2022

While there are many checklists available, this could be a recommended checklist for ensuring security in Kubernetes clusters.

Overall guidance:

  • Avoid 3rd party tools
  • Avoid linking to documentation outside of K8s website (as it might not be maintained)
  • If you identify a section that needs more documentation, please create an issue and tag sig-security.

Potential checklist sections:
Cluster level

Application/workload:

  • Ingress/Network config
  • RBAC
@savitharaghunathan
Copy link
Member Author

/sig security docs

@k8s-ci-robot k8s-ci-robot added sig/security Categorizes an issue or PR as relevant to SIG Security. sig/docs Categorizes an issue or PR as relevant to SIG Docs. labels Jan 6, 2022
@mtardy
Copy link
Member

mtardy commented Feb 3, 2022

Thanks Savitha! I think I would be glad to write the part about PodSecurity, I took a look at it recently (here) and found it very convenient to use! I could also try to handle the "Enabling seccomp" part also but don't want to take all the good stuff 😄!

I think we could discuss this at the next security documentation meeting, but for this checklist, do you envision something complete in and of itself or a short descriptions and references to the documentation?

@savitharaghunathan
Copy link
Member Author

I think we could discuss this at the next security documentation meeting, but for this checklist, do you envision something complete in and of itself or a short descriptions and references to the documentation?

Thanks @mtardy :) I am thinking that we will have a one liner and also a link to documentation if available. WDYT?

@mtardy
Copy link
Member

mtardy commented Feb 3, 2022

Yes I agree! I don't think it would be a good idea to repeat what is already well presented in the documentation, but a central page to refer to all the good security features of Kubernetes with a one liner to introduce them and why they are important would be great!

@Skybound1
Copy link

I'm happy to pick up Network Security and Secrets. Also, I agree on taking the approach of making this more summary based and linking to relevant detailed guides.

@p4ck3t0
Copy link

p4ck3t0 commented Feb 4, 2022

I can do the Container & Image scanning part. Also agreeing on the summary based approach.

@p4ck3t0
Copy link

p4ck3t0 commented Feb 4, 2022

What about confidential Kubernetes? I could link some interesting stuff to some open source projects, I was involved in.

@savitharaghunathan
Copy link
Member Author

What about confidential Kubernetes? I could link some interesting stuff to some open source projects, I was involved in.

@p4ck3t0 is confidential Kubernetes a part of the Kubernetes ecosystem or core concepts? We want to limit this checklist to that and avoid third party recommendations in order to keep it vendor neutral.

@p4ck3t0
Copy link

p4ck3t0 commented Feb 9, 2022

@p4ck3t0 is confidential Kubernetes a part of the Kubernetes ecosystem or core concepts? We want to limit this checklist to that and avoid third party recommendations in order to keep it vendor neutral.

No it's not a core concept, I will focus on Container & Image scanning.

@savitharaghunathan
Copy link
Member Author

savitharaghunathan commented Feb 9, 2022

No it's not a core concept, I will focus on Container & Image scanning.

@p4ck3t0 would you like to create a blog post for confidential Kubernetes? It sounds like a beneficial topic.

@p4ck3t0
Copy link

p4ck3t0 commented Feb 9, 2022

@p4ck3t0 would you like to create a blog post for confidential Kubernetes? It sounds like a beneficial topic.

@savitharaghunathan sure I want to write a short blog post about it. I just need to see if I could do both, Confidential Kubernetes blogpost and Container & Image scanning checklist.

@Skybound1
Copy link

Based of the conversation in Slack, also happy to pick up pod placement :)

@savitharaghunathan
Copy link
Member Author

Based of the conversation in Slack, also happy to pick up pod placement :)

Added a new task item and assigned it to you. Thanks, @Skybound1 :)

@PushkarJ PushkarJ added this to To do in sig-security-tracker Feb 11, 2022
@PushkarJ PushkarJ moved this from To do to Umbrella issues in sig-security-tracker Feb 11, 2022
@k8s-triage-robot
Copy link

The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs.

This bot triages issues and PRs according to the following rules:

  • After 90d of inactivity, lifecycle/stale is applied
  • After 30d of inactivity since lifecycle/stale was applied, lifecycle/rotten is applied
  • After 30d of inactivity since lifecycle/rotten was applied, the issue is closed

You can:

  • Mark this issue or PR as fresh with /remove-lifecycle stale
  • Mark this issue or PR as rotten with /lifecycle rotten
  • Close this issue or PR with /close
  • Offer to help out with Issue Triage

Please send feedback to sig-contributor-experience at kubernetes/community.

/lifecycle stale

@k8s-ci-robot k8s-ci-robot added the lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. label May 11, 2022
@cailynse
Copy link
Contributor

cailynse commented Jun 1, 2022

@Skybound1 - I'd love to pair on the Network Security section if you're up for it!

@Skybound1
Copy link

@cailynse sure, happy to work with others and get their opinions :) We have got some drafts in the PR linked above (kubernetes/website#33992), feel free to have a look and give comments, happy to discuss any of the points as well :) ( Skybound on the Kube slack )

@k8s-triage-robot
Copy link

The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs.

This bot triages issues and PRs according to the following rules:

  • After 90d of inactivity, lifecycle/stale is applied
  • After 30d of inactivity since lifecycle/stale was applied, lifecycle/rotten is applied
  • After 30d of inactivity since lifecycle/rotten was applied, the issue is closed

You can:

  • Mark this issue or PR as fresh with /remove-lifecycle rotten
  • Close this issue or PR with /close
  • Offer to help out with Issue Triage

Please send feedback to sig-contributor-experience at kubernetes/community.

/lifecycle rotten

@k8s-ci-robot k8s-ci-robot added lifecycle/rotten Denotes an issue or PR that has aged beyond stale and will be auto-closed. and removed lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. labels Jul 1, 2022
@mtardy
Copy link
Member

mtardy commented Jul 7, 2022

/remove-lifecycle rotten

@k8s-ci-robot k8s-ci-robot removed the lifecycle/rotten Denotes an issue or PR that has aged beyond stale and will be auto-closed. label Jul 7, 2022
@sftim
Copy link
Contributor

sftim commented Jul 9, 2022

@mtardy, kubernetes/website#34873 added some sound advice - you might want to add that to the checklist too.

@mtardy
Copy link
Member

mtardy commented Jul 11, 2022

@mtardy, kubernetes/website#34873 added some sound advice - you might want to add that to the checklist too.

Indeed thanks @sftim, it's already present in the RBAC guide best practices that we recommend for that topic, do you think we should make another warning directly on the checklist? https://kubernetes.io/docs/concepts/security/rbac-good-practices/#listing-secrets

@sftim
Copy link
Contributor

sftim commented Jul 11, 2022

do you think we should make another warning directly on the checklist?

I'm fine either way. I'm not sure how you frame a common misunderstanding as a checklist item, but if there's a way then I'm all for it.

@sftim
Copy link
Contributor

sftim commented Aug 22, 2022

I noticed some security advice in kubernetes/website#35511 and thought I'd mention it here.

@mtardy
Copy link
Member

mtardy commented Sep 26, 2022

Should we close this issue and create a central issue for updates to this page? Or should we edit this one for a follow-up?

If nobody opposes I guess I'll close this one and create another!

@sftim
Copy link
Contributor

sftim commented Sep 26, 2022

We created a checklist.

/close

(folks can reopen if they don't agree this is resolved)

@k8s-ci-robot
Copy link
Contributor

@sftim: Closing this issue.

In response to this:

We created a checklist.

/close

(folks can reopen if they don't agree this is resolved)

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@sftim
Copy link
Contributor

sftim commented Sep 26, 2022

I like the idea of making another issue to track further improvements.

@mtardy
Copy link
Member

mtardy commented Sep 26, 2022

(folks can reopen if they don't agree this is resolved)

You are correct I should be more confident 😄

@PushkarJ PushkarJ moved this from Umbrella issues to Done in sig-security-tracker May 19, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
sig/docs Categorizes an issue or PR as relevant to SIG Docs. sig/security Categorizes an issue or PR as relevant to SIG Security.
Projects
Development

No branches or pull requests

8 participants