Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Enable TLS for transport encryption #581

Open
4 tasks
lfrancke opened this issue May 30, 2024 · 0 comments
Open
4 tasks

Enable TLS for transport encryption #581

lfrancke opened this issue May 30, 2024 · 0 comments

Comments

@lfrancke
Copy link
Member

lfrancke commented May 30, 2024

Description

As a user of SDP I want the traffic between OpenPolicyAgent (OPA) and its clients to be encrypted.

Value

We want the SDP platform to be as secure as possible by default and design and in addition this will be a requirement of the Cyber Resilience Act.
Therefore as many transport connections should be encrypted as possible.
This will also lead to fewer explanations and exceptions with customers where we have to explain any unencrypted connection.

Dependencies

This requires the Secret Operator to provide the necessary certificates for OPA itself and all authorizers communicating with OPA will need to have a CA bundle to verify the connection and the server certificate.

Tasks

Tasks

Preview Give feedback

Acceptance Criteria

  • Connections to OPA are encrypted using TLS (by default if possible, disabling should be a concious decision)
  • All authorizers verify the authenticity of the server certificate

(Information Security) Risk Assessment

This will strictly make our product more secure and helps us with regulations such as the Cyber Resilience Act.

Release Notes

Traffic between OpenPolicyAgent (OPA) and clients is now encrypted using TLS with the support of our secret-operator.
Clients (our authorizers) verify the authenticity of the server certificates.

Remarks

See the OPA docs on this and read them prior to implementing anything.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant