Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Mesh CVE policy #8100

Merged
merged 7 commits into from
Nov 5, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
7 changes: 7 additions & 0 deletions app/_data/docs_nav_mesh_2.10.x.yml
Original file line number Diff line number Diff line change
Expand Up @@ -32,6 +32,11 @@ inherit:
url: /support-policy/
action: insert
index: -3
- path: [ Introduction ]
text: Vulnerability patching process
url: /vulnerability-patching-process/
action: insert
index: -3
- path: [ Introduction, Release notes]
url: /mesh/changelog
src: /mesh/changelog
Expand Down Expand Up @@ -157,6 +162,8 @@ inherit:
url: /features/ubi-images
- text: Red Hat OpenShift Quickstart
url: /features/openshift-quickstart
- text: Windows Support
url: /features/windows
- text: ECS Support
url: /installation/ecs
- text: Auditing
Expand Down
2 changes: 2 additions & 0 deletions app/_data/docs_nav_mesh_2.4.x.yml
Original file line number Diff line number Diff line change
Expand Up @@ -158,6 +158,8 @@ inherit:
generate: false
- text: UBI Images
url: /features/ubi-images
- text: Windows Support
url: /features/windows
- text: ECS Support
url: /installation/ecs
- text: Auditing
Expand Down
2 changes: 2 additions & 0 deletions app/_data/docs_nav_mesh_2.5.x.yml
Original file line number Diff line number Diff line change
Expand Up @@ -162,6 +162,8 @@ inherit:
url: /features/ubi-images
- text: Red Hat OpenShift Quickstart
url: /features/openshift-quickstart
- text: Windows Support
url: /features/windows
- text: ECS Support
url: /installation/ecs
- text: Auditing
Expand Down
2 changes: 2 additions & 0 deletions app/_data/docs_nav_mesh_2.6.x.yml
Original file line number Diff line number Diff line change
Expand Up @@ -152,6 +152,8 @@ inherit:
url: /features/ubi-images
- text: Red Hat OpenShift Quickstart
url: /features/openshift-quickstart
- text: Windows Support
url: /features/windows
- text: ECS Support
url: /installation/ecs
- text: Auditing
Expand Down
2 changes: 2 additions & 0 deletions app/_data/docs_nav_mesh_2.7.x.yml
Original file line number Diff line number Diff line change
Expand Up @@ -157,6 +157,8 @@ inherit:
url: /features/ubi-images
- text: Red Hat OpenShift Quickstart
url: /features/openshift-quickstart
- text: Windows Support
url: /features/windows
- text: ECS Support
url: /installation/ecs
- text: Auditing
Expand Down
2 changes: 2 additions & 0 deletions app/_data/docs_nav_mesh_2.8.x.yml
Original file line number Diff line number Diff line change
Expand Up @@ -162,6 +162,8 @@ inherit:
url: /features/ubi-images
- text: Red Hat OpenShift Quickstart
url: /features/openshift-quickstart
- text: Windows Support
url: /features/windows
- text: ECS Support
url: /installation/ecs
- text: Auditing
Expand Down
7 changes: 7 additions & 0 deletions app/_data/docs_nav_mesh_2.9.x.yml
Original file line number Diff line number Diff line change
Expand Up @@ -32,6 +32,11 @@ inherit:
url: /support-policy/
action: insert
index: -3
- path: [ Introduction ]
text: Vulnerability patching process
url: /vulnerability-patching-process/
action: insert
index: -3
- path: [ Introduction, Release notes]
url: /mesh/changelog
src: /mesh/changelog
Expand Down Expand Up @@ -157,6 +162,8 @@ inherit:
url: /features/ubi-images
- text: Red Hat OpenShift Quickstart
url: /features/openshift-quickstart
- text: Windows Support
url: /features/windows
- text: ECS Support
url: /installation/ecs
- text: Auditing
Expand Down
1 change: 1 addition & 0 deletions app/_src/mesh/features/access-audit.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,6 @@
---
title: Access Audit
badge: enterprise
---

Access Audit lets you track all actions that are executed in {{site.mesh_product_name}}.
Expand Down
1 change: 1 addition & 0 deletions app/_src/mesh/features/acmpca.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,6 @@
---
title: ACM Private CA Policy
badge: enterprise
---

## Amazon Certificate Manager Private CA Backend
Expand Down
1 change: 1 addition & 0 deletions app/_src/mesh/features/ca-rotation.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,6 @@
---
title: Certificate Authority rotation
badge: enterprise
---

## Overview
Expand Down
1 change: 1 addition & 0 deletions app/_src/mesh/features/cert-manager.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,6 @@
---
title: Kubernetes cert-manager CA Policy
badge: enterprise
---

## cert-manager CA Backend
Expand Down
1 change: 1 addition & 0 deletions app/_src/mesh/features/fips-support.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,6 @@
---
title: FIPS Support
badge: enterprise
---

With version 1.2.0, {{site.mesh_product_name}} provides built-in support for the Federal Information Processing Standard (FIPS-2). Compliance with this standard is typically required for working with U.S. federal government agencies and their contractors.
Expand Down
1 change: 1 addition & 0 deletions app/_src/mesh/features/index.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,7 @@
---
title: Enterprise Features
content_type: explanation
badge: enterprise
---

{{site.mesh_product_name}} builds on top of Kuma with the following Enterprise features:
Expand Down
1 change: 1 addition & 0 deletions app/_src/mesh/features/kds-auth.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,6 @@
---
title: Multi-zone authentication
badge: enterprise
---

To add to the security of your deployments, {{site.mesh_product_name}} provides authentication of zone control planes to the global control plane.
Expand Down
1 change: 1 addition & 0 deletions app/_src/mesh/features/meshopa.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,7 @@
---
title: MeshOPA - OPA Policy Integration
content_type: reference
badge: enterprise
---


Expand Down
1 change: 1 addition & 0 deletions app/_src/mesh/features/opa.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,6 @@
---
title: OPA Policy Integration
badge: enterprise
---

## OPA policy plugin
Expand Down
1 change: 1 addition & 0 deletions app/_src/mesh/features/openshift-quickstart.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,7 @@
title: Get started with Red Hat OpenShift and Kong Mesh
content_type: tutorial
description: This guide explains how to get started on Kong Mesh with Red Hat OpenShift.
badge: enterprise
---

In this guide, you will learn how to get {{site.mesh_product_name}} up and running quickly in [standalone mode](/mesh/{{page.release}}/production/deployment/stand-alone/) on [Red Hat OpenShift](https://www.redhat.com/technologies/cloud-computing/openshift). This tutorial assumes some base-level OpenShift knowledge.
Expand Down
1 change: 1 addition & 0 deletions app/_src/mesh/features/rbac.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,6 @@
---
title: Role-Based Access Control
badge: enterprise
---

Role-Based Access Control (RBAC) lets you restrict access to resources and actions to specified users or groups, based on user roles.
Expand Down
1 change: 1 addition & 0 deletions app/_src/mesh/features/ubi-images.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,6 @@
---
title: Red Hat Universal Base Images
badge: enterprise
---

In addition to the standard {{site.mesh_product_name}} images built on Alpine Linux, {{site.mesh_product_name}} also ships with images based on the [Red Hat Universal Base Image (UBI)](https://developers.redhat.com/products/rhel/ubi).
Expand Down
1 change: 1 addition & 0 deletions app/_src/mesh/features/vault.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,6 @@
---
title: Vault Policy
badge: enterprise
---

## Vault CA Backend
Expand Down
7 changes: 6 additions & 1 deletion app/_src/mesh/features/windows.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,12 @@
title: Kong Mesh with Windows
---

{% if_version gte:2.4.x %}
{% if_version gte:1.7.x lt:2.11.x %}
{% if_version gte:2.9.x %}
{:.important}
> **Deprecation notice:** Windows support in {{site.mesh_product_name}} has
been deprecated as of v2.9.0 and will be removed in v2.11.0.
{% endif_version %}

To install and run {{site.mesh_product_name}} on Windows:

Expand Down
2 changes: 1 addition & 1 deletion app/_src/mesh/gettingstarted.md
Original file line number Diff line number Diff line change
Expand Up @@ -57,7 +57,7 @@ Learn about enterprise features:
* [Certificate Authority rotation](/mesh/{{page.release}}/features/ca-rotation/)
* [Role-Based Access Control](/mesh/{{page.release}}/features/rbac/)
* [Red Hat Universal Base Images](/mesh/{{page.release}}/features/ubi-images/)
{% if_version lte:2.3.x -%}
{% if_version lte:2.9.x -%}
* [Windows Support](/mesh/{{page.release}}/features/windows/)
{% endif_version %}

Expand Down
44 changes: 44 additions & 0 deletions app/_src/mesh/vulnerability-patching-process.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,44 @@
---
title: Vulnerability Patching Process
badge: enterprise
---

{{site.mesh_product_name}} is primarily delivered as [binary file](/mesh/{{page.release}}/install) artifacts. Kong also offers Docker images with the artifacts preinstalled as a convenience to customers. At the time of release, all artifacts and images are patched, scanned, and are free of publicly-known vulnerabilities.

## Types of vulnerabilities

Generally, there may be three types of vulnerabilities:
* In {{site.mesh_product_name}} code.
* In third-party code that {{site.mesh_product_name}} directly links (such as Envoy, CoreDNS, OPA, and so on).
* In third-party code that is part of the convenience Docker image (such as Python, Perl, cURL, and so on). This code is not part of {{site.mesh_product_name}}.

Vulnerabilities reported in {{site.mesh_product_name}} code will be assessed by Kong. If the vulnerability is validated, a CVSS3.0 score will be assigned. Based on the CVSS score, Kong will aim to produce patches for all applicable {{site.mesh_product_name}} versions currently under support within the SLAs below. The SLA clock starts from the day the CVSS score is assigned.

For a CVSS 3.0 Critical vulnerability (CVSS > 9.0), Kong will provide a workaround or recommendation as soon as possible. This will take the shape of a configuration change recommendation, if available. If there is no workaround or recommendation readily available, Kong will use continuous efforts to develop one.

For a CVSS < 9.0, Kong will use commercially-reasonable efforts to provide a workaround or patch within the applicable SLA period.

| CVSS 3.0 Criticality | CVSS 3.0 Score | SLA |
|---|---|---|
| Critical | 9.0 - 10.0 | 15 days |
| High | 7.0 - 8.9 | 30 days |
| Medium | 4.0 - 6.9 | 90 days |
| Low | 0.1 - 3.9 | 180 days |


Vulnerabilities reported in third-party code that {{site.mesh_product_name}} links directly must have confirmed CVE numbers assigned. Kong will aim to produce patches for all applicable {{site.mesh_product_name}} versions currently under support within the SLA reproduced in the table below. The SLA clock for these vulnerabilities starts from the day the upstream (third party) announces availability of patches.

| CVSS 3.0 Criticality | CVSS 3.0 Score | SLA |
|---|---|---|
| Critical | 9.0 - 10.0 | 15 days |
| High | 7.0 - 8.9 | 30 days |
| Medium | 4.0 - 6.9 | 90 days |
| Low | 0.1 - 3.9 | 180 days |


Vulnerabilities reported in third-party code that is part of the convenience Docker images are only addressed by Kong as part of the regularly scheduled release process. These vulnerabilities are not exploitable during normal {{site.mesh_product_name}} operations. Kong always applies all available patches when releasing a Docker image, but by definition images accrue vulnerabilities over time. All customers using containers are strongly urged to generate their own images using their secure corporate-approved base images. Customers wishing to use the convenience images from Kong should always apply the latest patches for their Gateway version to receive the latest patched container images. Kong does not undertake to address third-party vulnerabilities in convenience images outside of the scheduled release mechanism.

## Reporting vulnerabilities in Kong code

If you are reporting a vulnerability in Kong code, we request you to follow the instructions in the [Kong Vulnerability Disclosure Program](https://konghq.com/compliance/bug-bounty).

Loading