-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CAPA Security Hardening #3015
Comments
@T-Kukawka Regarding the security group, can we know what security group is it? the |
Created a feature request upstream and asked in their slack kubernetes-sigs/cluster-api-provider-aws#4675 |
Created PR upstream to enable transit encryption on the S3 buckets kubernetes-sigs/cluster-api-provider-aws#4676 |
Working on this PR upstream to secure the VPC default security group kubernetes-sigs/cluster-api-provider-aws#4707 |
I tested my PR on |
Based on customer security scanning, we will have to implement following features in CAPA:
for
{MC_NAME}-vpc
the Network without Traffic Logging has to be followed - roadmap ticket: AWS VPC Flow Logs #502security group belonging to
{MC_NAME}-vpc
- Access List Default Allows Ingress/Egress (AWS)for
S3 Bucket eu-central-1-capa-{MC_NAME}
- Storage Container Not Enforcing Transit EncryptionWe have this covered in Vintage implementation on AWS side, more information on the implementation details can be found in internal slack chat: https://gigantic.slack.com/archives/C02HLSDH3DZ/p1701179789159519.
Useful links:
The text was updated successfully, but these errors were encountered: