feat: Add dynamic admission controller section to scs 0217#1106
feat: Add dynamic admission controller section to scs 0217#1106viccuad wants to merge 2 commits intoSovereignCloudStack:mainfrom
Conversation
6ac2fe4 to
36dd9c1
Compare
| this, the Kubernetes API server MUST be configured with mutual TLS | ||
| authentication for the Webhooks (see [Kubernetes | ||
| docs](https://kubernetes.io/docs/reference/access-authn-authz/extensible-admission-controllers/#authenticate-apiservers)) | ||
| . The Policy Engine MUST be able to authenticate the API server and MUST be |
There was a problem hiding this comment.
As an example, here's the threat model for Kubewarden, and the documentation on how to generally configure a cluster API server & Kubewarden, or specifically configure both a K3s API server & Kubewarden as well.
85bfd66 to
e4d0aa3
Compare
Dynamic Admission Controllers from Policy Engines constitute a special attack surface. From the SIG security threat model, the majority of mitigations are implemented by policy engines and cluster operators. But cluster providers must enable mutual TLS for secure consumption of Kubernetes API webhooks, and cluster operators must use a policy engine that authenticates against those TLS-terminated webhooks (not all policy engines do). Signed-off-by: Víctor Cuadrado Juan <vcuadradojuan@suse.de>
e4d0aa3 to
f6d3a0d
Compare
|
I removed couple people from the review assignment, I don't have any insights into this topic. |
|
Makes sense for policy engines specifically. They see every admission request, sensitive data included, so the attack surface is real. No argument there. But the blanket
Would make more sense to split it:
That way the strong requirement lands where the risk actually is. |
|
thanks @batistein for your commentary. Much appreciated! |
Totally agree here, that was the original intention indeed. There's no need to enable this K8s hardening feature if the underlying dynamic admission feature is not being used. Added commit with a clarification, hope that's enough! |
Signed-off-by: Víctor Cuadrado Juan <vcuadradojuan@suse.de>
98e142d to
6c7e95f
Compare
Dynamic Admission Controllers from Policy Engines constitute a special attack surface.
From the SIG security threat model, the majority of mitigations are implemented by policy engines and cluster operators.
But cluster providers must enable mutual TLS for secure consumption of Kubernetes API webhooks, and cluster operators must use a policy engine that authenticates against those TLS-terminated webhooks (not all policy engines do).