Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Should we explicitly make and test artifacts for multiple Clouds? #9

Open
sunstonesecure-robert opened this issue Jan 29, 2023 · 0 comments
Labels
discuss Topics for discussion documentation Improvements or additions to documentation

Comments

@sunstonesecure-robert
Copy link
Owner

Describe the solution you'd like

Will early adopters need the artifacts and components to be supported on multiple public or gov clouds? The initial effort will necessarily focus on one specific cloud environment to make it practical and deliver a proof of concept lab; but artifacts can be curated for extending the deployment to other cloud K8s implementations and control planes and supporting security capabilities.

Describe alternatives you've considered

We can make it explicitly "bare metal" and decide NOT to support commercial or public K8s platforms, and leave that to derivative project or forks, or as commercial or gov cloud provider projects.

Fully embrace multiple clouds and as soon as practicable, test all policy code and compliance code artifacts on multiple clouds, as well as add markdown content with specific details for commercial and gov cloud features/services. For example add cloud-specific operators and call cloud specific security services or use cloud specific IAM or encryption.

Make it configurable to do specific clouds but not actually implement anything specific - just stub things out and document the specific requirements.

Additional context and considerations

For an audit of the artifacts hosted in this project, the auditor likely needs to test an actual hosted environment using these artifacts. Therefore the cost of audit could expand significantly if we want to test multiple cloud implementations simultaneously. Adding elements to the project that are cloud specific and NOT auditing these may undermine the trust and assurance provided by the audit, which is a key goal for gaining early adopters in SLEDGEH environments.

@sunstonesecure-robert sunstonesecure-robert added documentation Improvements or additions to documentation discuss Topics for discussion labels Jan 29, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
discuss Topics for discussion documentation Improvements or additions to documentation
Projects
None yet
Development

No branches or pull requests

1 participant