Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Sandbox] Tratteria #115

Open
2 tasks done
tulshi opened this issue Aug 8, 2024 · 3 comments
Open
2 tasks done

[Sandbox] Tratteria #115

tulshi opened this issue Aug 8, 2024 · 3 comments

Comments

@tulshi
Copy link

tulshi commented Aug 8, 2024

Application contact emails

atul@sgnl.ai, erik@sgnl.ai, chiranjeewee@sgnl.ai

Project Summary

Assure identity and context in microservices call chains

Project Description

Tratteria implements a new IETF OAuth WG draft called "Transaction Tokens" (TraTs). TraTs are short-lived signed JWTs that provide immutable identity and context information in microservices call chains. By providing such immutable context, TraTs prevent attacks like software supply chain, privileged user compromise or malicious insiders, because microservices automatically deny calls that do not have such TraTs associated with them, or the parameters of the call do not match an associated, valid TraT.

Tratteria is a Kubernetes-native framework designed to facilitate the adoption of TraTs in existing applications to secure their call chains. The framework consists of a TraT issuance service, a Kubernetes custom controller for configuration management, and sidecar agents for verifying TraTs. Tratteria requires applications to implement the SPIFFE for service-to-service trust. TraTs generation and verification policies for APIs are described using Kubernetes Custom Resources, allowing applications to describe their services, API endpoints, and immutable context elements (such as path and query parameters, headers, and body elements). Convenient defaults let applications reuse such policy descriptions across a number of microservices. Tratteria documentation includes a tutorial on why TraTs are required, what they are, and how to use them in existing applications. It has a quickstart guide that provides a sample application, which uses the Dex IdP for user authentication and shows the TraTs to the user. While Tratteria can operate alongside service meshes such as Istio, ongoing development aims to optimize this integration, potentially leveraging existing Istio capabilities for improved overall functionality.

Org repo URL (provide if all repos under the org are in scope of the application)

https://github.com/tratteria/

Project repo URL in scope of application

N/A

Additional repos in scope of the application

No response

Website URL

tratteria.io

Roadmap

https://github.com/orgs/tratteria/projects/1

Roadmap context

No response

Contributing Guide

https://github.com/tratteria/.github/blob/main/CONTRIBUTING.md

Code of Conduct (CoC)

https://github.com/cncf/foundation/blob/main/code-of-conduct.md

Adopters

No response

Contributing or Sponsoring Org

https://sgnl.ai

Maintainers file

https://github.com/tratteria/.github/blob/main/MAINTAINERS.md

IP Policy

  • If the project is accepted, I agree the project will follow the CNCF IP Policy

Trademark and accounts

  • If the project is accepted, I agree to donate all project trademarks and accounts to the CNCF

Why CNCF?

CNCF is a natural venue for this project because:

  • It addresses the security concerns of almost all microservices based applications, most of which are based on Kubernetes, which is a CNCF project
  • It builds on top of other CNCF projects such as SPIFFE
  • It enables Kubernetes based code to rapidly adopt identity and context security

Benefit to the Landscape

The CNCF landscape currently does not have a mechanism to assure identity and context in microservices applications. This is a critical need to thwart software supply chain, privileged user compromise, and privileged insider attacks. All of these have wreaked havoc in large organizations in recent years. Tratteria enables the CNCF to provide a standards-based solution to this important security gap in its portfolio

Cloud Native 'Fit'

Tratteria is useful mostly when one has a Kubernetes based application, which has a number of communicating microservices in it. It is configured using custom Kubernetes resources, and builds on other CNCF projects such as SPIFFE. It also coexists with other CNCF projects like Istio.

Cloud Native 'Integration'

Tratteria depends on SPIFFE, and complements SPIFFE/SPIRE and Istio. It can be thought of as a complement to Kubernetes to ensure security throughout any Kubernetes application.

Cloud Native Overlap

Tratteria does not overlap with other existing CNCF projects, although it might be thought of as an alternative to the Open Policy Agent (OPA) in some circumstances. The approaches to security in OPA and Tratteria are vastly different however.

Similar projects

N/A.

Landscape

No.

Business Product or Service to Project separation

N/A

Project presentations

No response

Project champions

Andrés Vega

Additional information

No response

@tulshi tulshi added the New New Application label Aug 8, 2024
@angellk
Copy link
Contributor

angellk commented Aug 29, 2024

@tulshi please submit a presentation issue to give an overview of the project to TAG Security

@tulshi
Copy link
Author

tulshi commented Aug 29, 2024 via email

@tulshi
Copy link
Author

tulshi commented Oct 3, 2024

@tulshi please submit a presentation issue to give an overview of the project to TAG Security

Hi @angellk , FYI we had our presentation today in the Security TAG.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Development

No branches or pull requests

3 participants