Rancher Hardening Guide v2.3.5--- apiVersion: v1 kind: Namespace metadata: name: ingress-nginx --- apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: default-psp-role namespace: ingress-nginx --- apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: default-psp-rolebinding namespace: ingress-nginx roleRef: apiGroup: rbac.authorization.k8s.io name: default-psp-role subjects: - apiGroup: rbac.authorization.k8s.io kind: Group name: system:serviceaccounts - apiGroup: rbac.authorization.k8s.io kind: Group name: system:authenticated0 码力 | 21 页 | 191.56 KB | 1 年前3
Rancher Hardening Guide v2.4--- apiVersion: v1 kind: Namespace metadata: name: ingress-nginx --- apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: default-psp-role namespace: ingress-nginx --- apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: default-psp-rolebinding namespace: ingress-nginx roleRef: apiGroup: rbac.authorization.k8s.io name: default-psp-role subjects: - apiGroup: rbac.authorization.k8s.io kind: Group name: system:serviceaccounts - apiGroup: rbac.authorization.k8s.io kind: Group name: system:authenticated0 码力 | 22 页 | 197.27 KB | 1 年前3
Rancher Hardening Guide Rancher v2.1.xRemediation In the RKE cluster.yml file ensure the following options are set: addons: | apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: default-psp-role namespace: ingress-nginx --- apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: default-psp-rolebinding namespace: ingress-nginx roleRef: apiGroup: rbac.authorization.k8s.io name: default-psp-role subjects: - apiGroup: rbac.authorization.k8s.io kind: Group name: system:serviceaccounts - apiGroup: rbac.authorization.k8s.io kind: Group name: system:authenticated0 码力 | 24 页 | 336.27 KB | 1 年前3
CIS 1.6 Benchmark - Self-Assessment Guide - Rancher v2.5.4--authorization-mode argument includes Node (Automated) 1.2.9 Ensure that the --authorization-mode argument includes RBAC (Automated) 1.2.10 Ensure that the admission control plugin EventRateLimit is set (Automated) 1.2 (Automated) 4.2.13 Ensure that the Kubelet only makes use of Strong Cryptographic Ciphers (Automated) 5.1 RBAC and Service Accounts 5.1.1 Ensure that the cluster-admin role is only used where required (Manual) range=10.43.0.0/16 --tls-cert-file=/etc/kubernetes/ssl/kube- apiserver.pem --authorization-mode=Node,RBAC --audit-log- maxsize=100 --audit-log-format=json --requestheader-allowed- names=kube-apiserver-proxy-client0 码力 | 132 页 | 1.12 MB | 1 年前3
OpenShift Container Platform 4.13 认证和授权GITLAB 身份提供程序 7.8. 配置 GOOGLE 身份提供程序 7.9. 配置 OPENID CONNECT 身份提供程序 第 第 8 章 章 使用 使用 RBAC 定 定义 义和 和应 应用 用权 权限 限 8.1. RBAC 概述 8.2. 项目和命名空间 8.3. 默认项目 5 5 6 7 8 8 8 9 11 11 11 11 12 13 14 16 17 19 标头(Request header) 请求标头是一个 HTTP 标头,用于提供有关 HTTP 请求上下文的信息,以便服务器可以跟踪请求的响 应。 基于角色的 基于角色的访问 访问控制 控制 (RBAC) 重要的安全控制,以确保集群用户和工作负载只能访问执行其角色所需的资源。 服 服务帐户 务帐户 服务帐户供集群组件或应用程序使用。 系 系统 统用 用户 户 安装集群时自动创建的用户。 用户来授予用户集群管理员权限。 1.3. 关于 OPENSHIFT CONTAINER PLATFORM 中的授权 授权涉及确定用户是否有权限来执行请求的操作。 管理员可以定义权限,并使用 RBAC 对象(如规则、角色和绑定)将它们分配给用户。要了解授权在 OpenShift Container Platform 中的工作方式,请参阅评估授权。 您还可以通过项目和命名空间来控制对 OpenShift0 码力 | 201 页 | 2.74 MB | 1 年前3
OpenShift Container Platform 4.14 OperatorContainer Platform 4.14 Operator 6 Operator Lifecycle Manager (OLM) 能够控制集群中 Operator 的安装、升级和基于角色的访问控制 (RBAC)。它默认部署在 OpenShift Container Platform 4.14 中。 Operator Registry Operator Registry 存储 ClusterServiceVersions 如果 CSV 拥有自定义资源定义(CRD),则该 CRD 必须存在于捆绑包中。 2.2.1.1. 清 清单 捆绑包清单指的是一组 Kubernetes 清单,用于定义 Operator 的部署和 RBAC 模型。 捆绑包包括每个目录的一个 CSV,一般情况下,用来定义 CRD 所拥有的 API 的 CRD 位于 /manifest 目 录中。 捆绑包格式布局示例 包格式布局示例 额外支持的 外支持的对象 BundleDeployment 警告 警告 BundleDeployment 对象通过安装和删除对象来更改 Kubernetes 集群的状态。务必 要验证并信任正在安装和限制访问权限的内容,方法是使用 RBAC 到 BundleDeployment API 到需要这些权限的用户。 RukPak BundleDeployment API 指向 Bundle 对象,并表明它应当处于活动状态。这包括从活跃捆绑包0 码力 | 423 页 | 4.26 MB | 1 年前3
Vitess security auditOnce VTAdmin has obtained an actor from the incoming request, VTAdmin validates the actor against the RBAC. As such, the flow of handling the permissions of incoming requests looks as such: Authentication interface: https://github.com/vitessio/vitess/blob/da1906d54eaca4447e039d90b96fb07251ae852c/g o/vt/vtadmin/rbac/authentication.go#L37. Vitess links to an example authentication plugin which is available here: https://gist The logic is implemented here: https://github.com/vitessio/vitess/tree/main/go/vt/vtadmin/rbac. VTAdmin checks RBAC rules in the route handlers with a call to IsAuthorized, for example: https://github.c0 码力 | 41 页 | 1.10 MB | 1 年前3
OpenShift Container Platform 4.10 构建应用程序name:$ oc describe clusterrolebinding.rbac self-provisioners Name: self-provisioners Labels: Annotations: rbac.authorization.kubernetes.io/autoupdate=true Role: Kind: ClusterRole self-provisioners 集群角色绑定,以防止自动更新角色。自动更新会使集群角色重置为默认 状态。 使用 CLI 更新角色绑定: i. 运行以下命令: ii. 在显示的角色绑定中,将 rbac.authorization.kubernetes.io/autoupdate 参数值设置为 false,如下例所示: 使用单个命令更新角色绑定: 5. 以通过身份验证的用户身份登陆,验证是否无法再自助置备项目: clusterrolebinding.rbac self-provisioners -p '{"subjects": null}' $ oc adm policy \ remove-cluster-role-from-group self-provisioner \ system:authenticated:oauth $ oc edit clusterrolebinding.rbac self-provisioners 0 码力 | 198 页 | 3.62 MB | 1 年前3
[Buyers Guide_DRAFT_REVIEW_V3] Rancher 2.6, OpenShift, Tanzu, AnthosPod and Network Security Policies 4 3 2 2 Configurable Adherence to CIS 4 3 2 2 Global RBAC Policies 4 2 3 2 2.4 Shared Tools and Services Once deployed, Kubernetes Management Platforms After an administrator launches a user cluster, end users can access it according to Kubernetes RBAC boundaries. 3.1.11 Private Registry and Image Management • SUSE Rancher: 3 • OpenShift: 4 the global level, after which users and groups from the provider are available for assignment to RBAC roles and downstream clusters. A Buyer’s Guide to Enterprise Kubernetes Management Platforms Copyright0 码力 | 39 页 | 488.95 KB | 1 年前3
Dapr july 2020 security audit reportPollution in Hashicorp secret vault (Low) Orchestration Hardening Network Policy Zero-Trust Concepts RBAC Secrets Management Conclusions Cure53, Berlin · 07/01/20 1/19 maintainers during the audit. It was mitigated by changing the service token to Dapr-sidecar and adding RBAC for the service-token. DAP-01-003 WP1: HTTP Parameter Pollution through invocation (Low) It was Data ==== token: eyJhbGciOiJSUzI1NiIsImtpZCI6[...] It is strongly recommended to implement RBAC6 and configure access delegation for assets and resources in the cluster in order to offer what is0 码力 | 19 页 | 267.84 KB | 1 年前3
共 171 条
- 1
- 2
- 3
- 4
- 5
- 6
- 18













