Rancher Hardening Guide v2.3.5--- apiVersion: v1 kind: Namespace metadata: name: ingress-nginx --- apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: default-psp-role namespace: ingress-nginx --- apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: default-psp-rolebinding namespace: ingress-nginx roleRef: apiGroup: rbac.authorization.k8s.io name: default-psp-role subjects: - apiGroup: rbac.authorization.k8s.io kind: Group name: system:serviceaccounts - apiGroup: rbac.authorization.k8s.io kind: Group name: system:authenticated0 码力 | 21 页 | 191.56 KB | 1 年前3
Rancher Hardening Guide v2.4--- apiVersion: v1 kind: Namespace metadata: name: ingress-nginx --- apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: default-psp-role namespace: ingress-nginx --- apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: default-psp-rolebinding namespace: ingress-nginx roleRef: apiGroup: rbac.authorization.k8s.io name: default-psp-role subjects: - apiGroup: rbac.authorization.k8s.io kind: Group name: system:serviceaccounts - apiGroup: rbac.authorization.k8s.io kind: Group name: system:authenticated0 码力 | 22 页 | 197.27 KB | 1 年前3
Rancher Hardening Guide Rancher v2.1.xRemediation In the RKE cluster.yml file ensure the following options are set: addons: | apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: default-psp-role namespace: ingress-nginx --- apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: default-psp-rolebinding namespace: ingress-nginx roleRef: apiGroup: rbac.authorization.k8s.io name: default-psp-role subjects: - apiGroup: rbac.authorization.k8s.io kind: Group name: system:serviceaccounts - apiGroup: rbac.authorization.k8s.io kind: Group name: system:authenticated0 码力 | 24 页 | 336.27 KB | 1 年前3
CIS 1.6 Benchmark - Self-Assessment Guide - Rancher v2.5.4--authorization-mode argument includes Node (Automated) 1.2.9 Ensure that the --authorization-mode argument includes RBAC (Automated) 1.2.10 Ensure that the admission control plugin EventRateLimit is set (Automated) 1.2 (Automated) 4.2.13 Ensure that the Kubelet only makes use of Strong Cryptographic Ciphers (Automated) 5.1 RBAC and Service Accounts 5.1.1 Ensure that the cluster-admin role is only used where required (Manual) range=10.43.0.0/16 --tls-cert-file=/etc/kubernetes/ssl/kube- apiserver.pem --authorization-mode=Node,RBAC --audit-log- maxsize=100 --audit-log-format=json --requestheader-allowed- names=kube-apiserver-proxy-client0 码力 | 132 页 | 1.12 MB | 1 年前3
OpenShift Container Platform 4.14 OperatorContainer Platform 4.14 Operator 6 Operator Lifecycle Manager (OLM) 能够控制集群中 Operator 的安装、升级和基于角色的访问控制 (RBAC)。它默认部署在 OpenShift Container Platform 4.14 中。 Operator Registry Operator Registry 存储 ClusterServiceVersions 如果 CSV 拥有自定义资源定义(CRD),则该 CRD 必须存在于捆绑包中。 2.2.1.1. 清 清单 捆绑包清单指的是一组 Kubernetes 清单,用于定义 Operator 的部署和 RBAC 模型。 捆绑包包括每个目录的一个 CSV,一般情况下,用来定义 CRD 所拥有的 API 的 CRD 位于 /manifest 目 录中。 捆绑包格式布局示例 包格式布局示例 额外支持的 外支持的对象 BundleDeployment 警告 警告 BundleDeployment 对象通过安装和删除对象来更改 Kubernetes 集群的状态。务必 要验证并信任正在安装和限制访问权限的内容,方法是使用 RBAC 到 BundleDeployment API 到需要这些权限的用户。 RukPak BundleDeployment API 指向 Bundle 对象,并表明它应当处于活动状态。这包括从活跃捆绑包0 码力 | 423 页 | 4.26 MB | 1 年前3
Vitess security auditOnce VTAdmin has obtained an actor from the incoming request, VTAdmin validates the actor against the RBAC. As such, the flow of handling the permissions of incoming requests looks as such: Authentication interface: https://github.com/vitessio/vitess/blob/da1906d54eaca4447e039d90b96fb07251ae852c/g o/vt/vtadmin/rbac/authentication.go#L37. Vitess links to an example authentication plugin which is available here: https://gist The logic is implemented here: https://github.com/vitessio/vitess/tree/main/go/vt/vtadmin/rbac. VTAdmin checks RBAC rules in the route handlers with a call to IsAuthorized, for example: https://github.c0 码力 | 41 页 | 1.10 MB | 1 年前3
[Buyers Guide_DRAFT_REVIEW_V3] Rancher 2.6, OpenShift, Tanzu, AnthosPod and Network Security Policies 4 3 2 2 Configurable Adherence to CIS 4 3 2 2 Global RBAC Policies 4 2 3 2 2.4 Shared Tools and Services Once deployed, Kubernetes Management Platforms After an administrator launches a user cluster, end users can access it according to Kubernetes RBAC boundaries. 3.1.11 Private Registry and Image Management • SUSE Rancher: 3 • OpenShift: 4 the global level, after which users and groups from the provider are available for assignment to RBAC roles and downstream clusters. A Buyer’s Guide to Enterprise Kubernetes Management Platforms Copyright0 码力 | 39 页 | 488.95 KB | 1 年前3
Dapr july 2020 security audit reportPollution in Hashicorp secret vault (Low) Orchestration Hardening Network Policy Zero-Trust Concepts RBAC Secrets Management Conclusions Cure53, Berlin · 07/01/20 1/19 maintainers during the audit. It was mitigated by changing the service token to Dapr-sidecar and adding RBAC for the service-token. DAP-01-003 WP1: HTTP Parameter Pollution through invocation (Low) It was Data ==== token: eyJhbGciOiJSUzI1NiIsImtpZCI6[...] It is strongly recommended to implement RBAC6 and configure access delegation for assets and resources in the cluster in order to offer what is0 码力 | 19 页 | 267.84 KB | 1 年前3
Istio Security Assessmentfor Integrity 009 Medium Go Trace Profiling Enabled By Default 013 Medium Permissive Kubernetes RBAC within a Namespace 015 Medium Default Sidecar Image Not Hardened 001 Low The Sidecar Does Not Use a Kubernetes cluster. This would also enable hostnames to be more easily protected via Kubernetes’ RBAC. Regardless, care should be taken with how canonicalization and prioritiza- tion between Hostnames | Google Istio Security Assessment Google / NCC Group Confidential Finding Permissive Kubernetes RBAC within a Namespace Risk Medium Impact: Medium, Exploitability: Low Identifier NCC-GOIST2005-0150 码力 | 51 页 | 849.66 KB | 1 年前3
Hardening Guide - Rancher v2.3.3+cluster.yml fi l e e n s u r e t h e f ol l ow i n g op t i on s ar e s e t : addons: | apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: default-psp-role namespace: ingress-nginx rules: verbs: - use --- apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: default-psp-rolebinding 12 namespace: ingress-nginx roleRef: apiGroup: rbac.authorization.k8s.io kind: Role Role name: default-psp-role subjects: - apiGroup: rbac.authorization.k8s.io kind: Group name: system:serviceaccounts - apiGroup: rbac.authorization.k8s.io kind: Group name: system:authenticated ---0 码力 | 44 页 | 279.78 KB | 1 年前3
共 95 条
- 1
- 2
- 3
- 4
- 5
- 6
- 10













