-
Notifications
You must be signed in to change notification settings - Fork 1.4k
📖 infrastructure provider security guidelines #11131
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
Merged
Changes from all commits
Commits
File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
25 changes: 25 additions & 0 deletions
25
docs/book/src/security/infrastructure-provider-security-guidance.md
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,25 @@ | ||
# Infrastructure Provider Security Guidance | ||
|
||
There are several critical areas that any infrastructure provider implementer must address to ensure secure operations. These include: | ||
|
||
- **Management of cloud credentials** assigned to the infrastructure provider, including setting quotas and rate limiting. | ||
- **Ensuring secure access to VMs** for troubleshooting, with proper authentication methods. | ||
- **Controlling manual operations** performed on cloud infrastructure targeted by the provider. | ||
- **Housekeeping** of the cloud infrastructure, ensuring timely cleanup and garbage collection of unused resources. | ||
|
||
The following list outlines high-level security recommendations. It is a community-maintained resource, and everyone’s contributions are essential to continuously improve and adapt these best practices. Each provider implementer is responsible for translating these recommendations to fit the context of their specific cloud provider: | ||
|
||
1. **Credentials Management**: | ||
Ensure credentials used by Cluster API are least privileged. Apply access control to Cluster API controller namespaces, restricting unauthorized access to cloud administrators only. | ||
|
||
2. **Two-Factor Authentication (2FA)**: | ||
Implement 2FA for all maintainer accounts on GitHub. For any privileged actions (e.g., image building or updates to machine images), follow the "second pair of eyes" principle to ensure review and oversight. | ||
|
||
3. **Short-lived Credentials**: | ||
Use short-lived credentials that are automatically renewed via node-level attestation mechanisms, minimizing the risk of credential misuse. | ||
|
||
4. **Rate Limiting for Cloud Resources**: | ||
Implement rate limits for the creation, deletion, and updating of cloud resources, protecting against potential abuse or accidental overload. | ||
|
||
5. **Resource Housekeeping**: | ||
Any cloud resource not linked to a cluster after a fixed configurable period, created by cloud credentials, should be automatically deleted or marked for garbage collection to avoid resource sprawl. |
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Uh oh!
There was an error while loading. Please reload this page.