-
Notifications
You must be signed in to change notification settings - Fork 528
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Security Pals] Flux multi-tenancy proposal #896
Comments
TODO: @cncf/tag-security need to discuss with TOC @TheFoxAtWork @justincormack on next steps. |
Notes from our meeting to discuss next steps:
|
Requested access to the multi tenancy doc |
Following-up from our meeting back in May, I have updated the Self-Assessment documents with further information about Multi-Tenancy models (inc. an initial thread model) and the Flux Security Best Practices (for users). We have also submitted an issue to present Multi-tenancy. Please let us know whether anything else is required ahead of the presentation. |
This issue has been automatically marked as inactive because it has not had recent activity. |
I was away for a couple of weeks and just got back now. Is there anything that the Flux team can do to help on progressing this issue? |
Paulo
I had reviewed the threat model and provided some comments on additional
mitigations .Not sure you received those.
Aradhna
…On Wed, Sep 28, 2022 at 2:09 AM Paulo Gomes ***@***.***> wrote:
I was away for a couple of weeks and just got back now. Is there anything
that the Flux team can do to help on progressing this issue?
—
Reply to this email directly, view it on GitHub
<#896 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/ARO764QN6JHLSCOMHSLWRBDWAQDL3ANCNFSM5UKX2W7A>
.
You are receiving this because you were mentioned.Message ID:
***@***.***>
|
@pjbgf @stefanprodan are either of you and/or any of the team free at 1300 BST tomorrow for the EMEA TAG Security meeting? We have space to run through an initial threat modelling session for this proposal with our new lightweight framework. |
Andrew I m not unfortunately. But Paulo has already conducted a threat
model for that. I just added a couple more... LEt me find my comments and
Ic an email those to you.
Thank you
…On Tue, Oct 11, 2022 at 7:26 AM Andrew Martin ***@***.***> wrote:
@pjbgf <https://github.com/pjbgf> @stefanprodan
<https://github.com/stefanprodan> are either of you and/or any of the
team free at 1300 BST tomorrow for the EMEA TAG Security meeting? We have
space to run through an initial threat modelling session for this proposal
with our new lightweight framework.
—
Reply to this email directly, view it on GitHub
<#896 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/ARO764QXNNDLXWHERU6M7TLWCV2KPANCNFSM5UKX2W7A>
.
You are receiving this because you were mentioned.Message ID:
***@***.***>
|
Here is my comment on the assessment
Reviewed the project makes sense and the security assessment has addressed
key threats. Addressing Multi tenancy and cross platform continuous
config validation with runtime is the next step in the evolution of that
project... Only one comment is they must also provide API so that once an
alert is generated the API can be used to auto respond to some of the
config drifts in runtime, which could be extensive work,
including re-instantiating the instance of app containers...automatically
with correct configurations as aligned with Git. Also need to add
detection around the Flagger if that gets compromised that could impact all
the clusters and what Role/account the flagger has on each of the clusters,
ideally non privileged Read Only access.... Hope this helps. Thanks Aradhna
…On Tue, Oct 11, 2022 at 9:14 AM A C ***@***.***> wrote:
Andrew I m not unfortunately. But Paulo has already conducted a threat
model for that. I just added a couple more... LEt me find my comments and
Ic an email those to you.
Thank you
On Tue, Oct 11, 2022 at 7:26 AM Andrew Martin ***@***.***>
wrote:
> @pjbgf <https://github.com/pjbgf> @stefanprodan
> <https://github.com/stefanprodan> are either of you and/or any of the
> team free at 1300 BST tomorrow for the EMEA TAG Security meeting? We have
> space to run through an initial threat modelling session for this proposal
> with our new lightweight framework.
>
> —
> Reply to this email directly, view it on GitHub
> <#896 (comment)>,
> or unsubscribe
> <https://github.com/notifications/unsubscribe-auth/ARO764QXNNDLXWHERU6M7TLWCV2KPANCNFSM5UKX2W7A>
> .
> You are receiving this because you were mentioned.Message ID:
> ***@***.***>
>
|
@sublimino unfortunately that time conflicts with Flux's community meeting this week. When would be your next available slot? |
@achetal01 I will take a look on the comments you left and come back to you. |
Responding on behalf of @sublimino, next available slot is December 7th 1PM GMT. Does that work for you? |
@rowan-baker yes, that would be awesome, please book us in. |
Booked in for 7th December 1pm GMT. |
Thanks to everybody that contributed, the Flux threat model working document is here |
@sublimino thank you (and the tag security) for all the help through the process. We will take a look and let you know whether we have any questions. |
This issue has been automatically marked as inactive because it has not had recent activity. |
Quick status update: The Flux team is tracking the first recommendation from the threat model doc in two RFCs: |
This issue has been automatically marked as inactive because it has not had recent activity. |
I'm picking this issue up and trying to understand why this hasn't moved to completion. @pjbgf I just want to confirm that you're still interested in seeing this move along. Your assessment documents look pretty detailed so you've clearly put in a lot of work. There will be some back and forth to come, but we can try to push this forward and get the assessment completed. Please confirm your side still has the resource to work on this and wants to see it move forward. |
@JustinCappos thank you for the heads up. @makkes and I will take a look on the outstanding work and get back to you in the coming weeks. |
This issue has been automatically marked as inactive because it has not had recent activity. |
polite nudge for @pjbgf |
Hey @JustinCappos thank you for the nudge. @makkes and I caught up and went through the doc above once more. Our understanding was that the work left here was to review the recommendations. Here's our take on each one of the ones targeting the project:
Based on the above, we think we can close this issue as the work left is being tracked directly into the project's backlog. |
Okay, so is it fair to say that you have a self assessment and want to go through the joint assessment process at some point? We've a few items to take care of but can slot you in sometime in about a month, if interested. |
Going ahead in closing this issue as the work left is being tracked directly into the project's backlog. Should the project team be interested in a deeper joint assessment after the issues have been addressed, please feel free to open up an issue requesting the assessment. |
Project Name: Flux
Github URL: https://github.com/fluxcd
Key sub-projects:
CNCF project stage and issue (NA if not applicable): in-flight proposal for Graduation
Security Provider: No
Self-assessment:
Multi-tenancy: https://docs.google.com/document/d/1SluYVDuq-egSTurcnrVRMJw6ecSV65Qtgi10T4WHyYs/edit#
Flagger: https://docs.google.com/document/d/1bdsWHT1L403ss1meMF6zR1G4hUy2qLtIi8I-IMKEMmM/edit
Context:
Flux had its first security audit in November 2021. Multi-tenancy was mostly out of scope, however the report advised us to engage "with experts, such as the CNCF Security Technical Advisory Group, on both the design of the underlying user system and also on the implementation of the security model."
Therefore this assessent scope will focus on the current and proposed changes of Flux in multi-tenancy environments.
EDIT: Added flagger details and self-assessment.
The text was updated successfully, but these errors were encountered: