Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

APP.4.4.A7 #33

Closed
sluetze opened this issue Nov 7, 2023 · 4 comments
Closed

APP.4.4.A7 #33

sluetze opened this issue Nov 7, 2023 · 4 comments
Assignees
Labels
new-rules Issue which requires us to write new rules

Comments

@sluetze
Copy link

sluetze commented Nov 7, 2023

No description provided.

@sluetze
Copy link
Author

sluetze commented Dec 5, 2023

Networks for the administration of nodes, the control plane, and the individual networks of
application services SHOULD be separated.

rules:
- ?

Only the network ports of the pods necessary for operation SHOULD be released into the
designated networks.

rules:
# check if a network plugin is used which supports network policies
- configure_network_policies
# check that network policies exist in every non control plane namespace
- configure_network_policies_namespaces

If a Kubernetes cluster contains multiple applications, all the network
connections between the Kubernetes namespaces SHOULD first be prohibited and only
required network connections permitted (whitelisting).

rules:
# check that there is a default network policy configured and included
- project_config_and_template_network_policy

The network ports necessary for the
administration of the nodes, the runtime, and Kubernetes (including its extensions) SHOULD
ONLY be accessible from the corresponding administration network and from pods that need
them.
cannot be checked?

Only selected administrators SHOULD be authorised in Kubernetes to manage the CNI and
create or change rules for the network.

rules:
- rbac check if there is a special cluser-admin for cni and network_policies? or check that noone but cluster-admins can manage CNI or network_policies?

@sluetze sluetze added the new-rules Issue which requires us to write new rules label Dec 11, 2023
@benruland
Copy link

On comment on

Networks for the administration of nodes, the control plane, and the individual networks of
application services SHOULD be separated.

In on-prem environments, I would see a requirement for additional IngressController, in order to seperate app-traffic from admin traffic (e.g. OpenShift console).
Or, one needs to use a solution based on K8S Services of type Load Balancer using Cloud LBs or Metal LB in on-prem.

@sluetze sluetze self-assigned this Mar 18, 2024
@sluetze
Copy link
Author

sluetze commented Apr 8, 2024

ComplianceAsCode#11794

@sluetze
Copy link
Author

sluetze commented Jun 28, 2024

upstream merged

@sluetze sluetze closed this as completed Jun 28, 2024
This issue was closed.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
new-rules Issue which requires us to write new rules
Projects
Development

No branches or pull requests

2 participants