-
Notifications
You must be signed in to change notification settings - Fork 24
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Neutron Policies Standard #543
Comments
This issue has links to:
|
Network rbacAn example of a user editing the rules of a shared security group (not the users one)
|
Network rbacAs a user it is alos possible to share a network as external:
|
network rbacrouter cannot be shared:
qos policiesThey should be handled but:
It seems this has to be activated in the Plug-Ins config: |
network rbacSubnet pools can be shared too:
I currently do not see any reason to share access to this for customers. Concerning address scope, it seems this can be shared between projects for itself:
The address groups can also be shared:
Conclusion
|
Great research, thanks, @josephineSei! From what I can see, the security risk with sharing networks and SGs would come from the fact that the sharer may not expect the sharing to be a read-write thing, but a read-only thing. In general, sharing SGs and networks would seem useful to me: I could easily imagine that you have a company with a central IT department that provides certain centralized services that the various departments can use. For this, they may share networks and SGs to the projects used by these departments, saving their departments some work. Due to the read-write character, this only works if they trust these departments not to do bad things. (They may have a reconciliation loop in there for robustness and alarming ...) Sharing a network as external network can also be confusing, but my default approach would again be to prefer education over ruling things out. Or maybe have an upstream discussion and see if we can have it changed there. Maybe there is no scenario where sharing a network as external makes sense? I'll have a look how clouds that I have access to behave w.r.t. network rbac. |
This should be done as part of #572 . |
While looking into #473 I came across the
network rbac
command. It allows to share network resources. Networks shared like this can be marked as external and Security Groups can be adjusted by all projects that it is shared with, risking open ports because those changes are applied immediately.A possible solution for those potential security issues is to disallow this API endpoint being used by users. This requires a policy change.
When looking into the Neutron policies this may not be the only policy we want to adjust to improve network security. So this issue should:
Definition of Done:
scs-xxxx-v1-slug.md
(only substituteslug
)status
,type
,track
setDraft
, file renamed:xxxx
replaced by document numberDraft
)The text was updated successfully, but these errors were encountered: