Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CAPA Security Hardening #3015

Closed
3 tasks done
Tracked by #2949
T-Kukawka opened this issue Nov 29, 2023 · 5 comments
Closed
3 tasks done
Tracked by #2949

CAPA Security Hardening #3015

T-Kukawka opened this issue Nov 29, 2023 · 5 comments
Assignees

Comments

@T-Kukawka
Copy link
Contributor

T-Kukawka commented Nov 29, 2023

Based on customer security scanning, we will have to implement following features in CAPA:

  • for {MC_NAME}-vpc the Network without Traffic Logging has to be followed - roadmap ticket: AWS VPC Flow Logs #502

  • security group belonging to {MC_NAME}-vpc - Access List Default Allows Ingress/Egress (AWS)

  • for S3 Bucket eu-central-1-capa-{MC_NAME} - Storage Container Not Enforcing Transit Encryption

We have this covered in Vintage implementation on AWS side, more information on the implementation details can be found in internal slack chat: https://gigantic.slack.com/archives/C02HLSDH3DZ/p1701179789159519.

Useful links:

@fiunchinho
Copy link
Member

@T-Kukawka Regarding the security group, can we know what security group is it? the default one? That only allows traffic coming from itself

image

@fiunchinho fiunchinho self-assigned this Dec 5, 2023
@fiunchinho
Copy link
Member

Created a feature request upstream and asked in their slack kubernetes-sigs/cluster-api-provider-aws#4675

@fiunchinho
Copy link
Member

Created PR upstream to enable transit encryption on the S3 buckets kubernetes-sigs/cluster-api-provider-aws#4676

@fiunchinho
Copy link
Member

Working on this PR upstream to secure the VPC default security group kubernetes-sigs/cluster-api-provider-aws#4707

@fiunchinho
Copy link
Member

I tested my PR on golem to create both CAPA EC2 and CAPA EKS clusters. They both worked fine. The PR has been labeled with lgtm but still waiting on approval from maintainer. Once those changes are deployed to our MCs, we could review and merge these two

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
Archived in project
Development

No branches or pull requests

2 participants