-
Notifications
You must be signed in to change notification settings - Fork 4
Open
Labels
authIssues related to authentication, authorization and overall service securityIssues related to authentication, authorization and overall service security
Description
(https://gvisor.dev/docs/architecture_guide/security/)
A sandbox is not a substitute for a secure architecture.
save-cloud services should either be able to authorize against each other (including agent), or the tested tool should have restricted network access (i.e. being able to communicate only with targets outside of cluster IP range)
Plan:
- Add a
NetworkPolicy
to allow access from save-agent pods only to main ports of backend, orchestrator and sandbox ([WIP] Authenticated agent #1247) - Move
/actuator
and/swagger-ui
to a separate management port ([Helm] Set another port as a management port for all JVM services #1342) - Make requests between services authorized using
ServiceAccount
tokens ([WIP] authenticated microservices #1238) - Make requests from save-agent use ServiceAccount token; hide the token from the tested tool (also [WIP] Authenticated agent #1247)
Metadata
Metadata
Assignees
Labels
authIssues related to authentication, authorization and overall service securityIssues related to authentication, authorization and overall service security