Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Threat Modelling] Verify that our produced container images are signed and only published to trusted container registries #53

Open
2 tasks
tobiscr opened this issue Nov 29, 2023 · 1 comment

Comments

@tobiscr
Copy link

tobiscr commented Nov 29, 2023

Description

To avoid that malicious code can be injected into our productive systems by injecting untrusted container images, we have to verify our build and delivery process and ensure that

  • all container images are build following SAP SLC-29 compliancy guidelines (using trusted build infrastructure, sign images)
  • the publishing of container images happens only via trusted container registries
  • consumption/deployments of container images are using only trusted container registries

AC:

  • Ensure that our build pipeline is using an SLC-29 compliant build-mechanism to product container images (image is also signed by the SAP Signify service)
  • Verify that any produced container image is only published and consumed from a trusted container registry (review of deployment manifests)

Steps to exploit

Attacker find a way to inject malicious code into our productive systems because container images were build on untrusted systems, not signed and published to untrusted container registries.

Risk assessment
Part of the Threat Modelling workshop from 2023-11-29.

Proposed mitigation

Review the build process of our container images and ensure they are build by using SLC-29 compliant build-pipelines and getting signed by SAP Signify. Verify also the deployment manifests and ensure that only images from trusted container registries will be deployed.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant