-
Notifications
You must be signed in to change notification settings - Fork 50
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Security of GitOps #57
Comments
I welcome this conversation. I would encourage linking to known good guides that already exist as appropriate. I'd also like to see suggestions of what we can do in the GitOps pipeline as well. |
I will start :) Basic security setup:
of course, not to be missed: |
Strong opinions, loosely held. On point 1: On point 2: On point 3: On point 4: On point 5:
Never thought about it like that. Tell me MORE! On point 6: On point 9: On point 10: |
Awesome point to raise @mateuszpruchniak! GitOps bring some great practices that helps achieving a stronger security posture, but the strength of that posture largely depends on what it is built upon (i.e. people and processes). When proposing a generic security best practices we also need to consider that some of those security requirements will be specific to the (security) posture a company wants or needs to uphold. Some companies have heavier compliance requirements (e.g. audits, regulations, etc) than others. We may benefit by grouping some of the recommendations in themes. Then we can dive into a bit more detail when necessary, or simply add pointers to industry leading sources of such information (i.e. CIS for security recomendations for locking down Kubernetes). For systems to be secure a holistic approach is generally necessary as the weakest link tend to be the entry-point for the average attacker. I would suggest we break down recommendations in some generic categories. And then add technology agnostic recommendations, which are then adapted for the specific scenario of each user. Here's a quick example of what I mean:
The above is far from being an exaustive list, but overall I think this could really benefit to focus on Security Principles, so it will be evergreen and applicable to any technology.
I also think we should lean on the CNCF, they have some good material that I think we should point to:
Sorry for the long text. I tend to get carried away talking about security. 🙈 |
Awesome! |
Yep completely agree. I think Google docs would make it easier and accessible for most folks keen on collaborating. |
I am not completely proficient in Google Docs, but I created docs based on the longest message :) https://docs.google.com/document/d/1aqYabvs1-gurX1lYB5fzQDdptuA7j-LavGCSmxOFM_g Please, ask for access and I will add anyone interested to contribute to the document. |
Hi Folks
On the one hand, GitOps increase the security itself through limitation to a minimum of administrative access to infrastructure and configuration, eliminate human error, an audit of any change, declarative single source of truth, automatic verification, and policy enforcement. Using GitOps tools and technologies, organizations can mitigate the vectors of attack by reducing the number of people and machines that have access to the target system.
On the other hand, more attention should be paid to securing Git repositories and CI/CD processes.
I would like to open a discussion about the security of GitOps and in particular what are the best security practices. And as a result create a dedicated document.
The text was updated successfully, but these errors were encountered: