Red Hat Advanced Cluster Management for Kubernetes governance policy framework is designed to help improve the security of the managed clusters, including the management of CVEs. There are recent vulnerability concerns within Kubernetes, CVE-2020-8554 Man in the Middle using LoadBalancer or External IPs was recently discovered . This vulnerability affects multitenant clusters and currently there is no single solution for users. The main concern is if a potential attacker already has the privileges to create or edit services and pods, then they may be able to seize traffic from other pods (or nodes) in the cluster. This issue is a design flaw, but it can be mitigated with a potential solution presented in this blog.
The good news is that OpenShift Container Platform 4.x and Red Hat Advanced Cluster Management are not affected by this CVE, but we want to help your managed clusters remain safe from this vulnerability. Developers created a solution by using the Red Hat Advanced Cluster Management policy framework to contribute the Gatekeeper allowed External IP security policy to the open source community (policy-gatekeeper-allowed-external-ips.yaml). The security policy was implemented in order to mitigate the Kubernetes vulnerability, CVE-2020-8554.
By using the Gatekeeper allowed External IP policy, externalIPs are locked to assist in hardening your managed clusters. Using the YAML template provided in the policy-collection repository allows the option to identify which external IPs are allowed for your managed clusters, and in turn can also restrict external IPs as well. To use the policy-gatekeeper-allowed-external-ips.yaml, you must install the Gatekeeper controller in order to use the gatekeeper policy. For more information about installing the Gatekeeper controller see the gatekeeper repository.
To implement the policy, see Managing policies in the Red Hat Advanced Cluster Management documentation for more information. You can also visit the related blog, Contributing and deploying community policies with Red Hat Advanced Cluster Management and GitOps for more details to deploy community policies.
In conclusion, this CVE has been a long standing issue for the Kubernetes project, which was fixed in OpenShift Container Platform 3.11 and addressed in OpenShift Container Platform 4. Fortunately, the open-cluster-management community policy, policy-gatekeeper-allowed-external-ips.yaml can be used to help address the CVE. Check out the open source community, open-cluster-management for other policies that can be applied to enhance the security of your managed clusters, and help you meet your governance, risk, and compliance requirements.
저자 소개
유사한 검색 결과
Introducing OpenShift Service Mesh 3.2 with Istio’s ambient mode
From if to how: A year of post-quantum reality
Data Security 101 | Compiler
AI Is Changing The Threat Landscape | Compiler
채널별 검색
오토메이션
기술, 팀, 인프라를 위한 IT 자동화 최신 동향
인공지능
고객이 어디서나 AI 워크로드를 실행할 수 있도록 지원하는 플랫폼 업데이트
오픈 하이브리드 클라우드
하이브리드 클라우드로 더욱 유연한 미래를 구축하는 방법을 알아보세요
보안
환경과 기술 전반에 걸쳐 리스크를 감소하는 방법에 대한 최신 정보
엣지 컴퓨팅
엣지에서의 운영을 단순화하는 플랫폼 업데이트
인프라
세계적으로 인정받은 기업용 Linux 플랫폼에 대한 최신 정보
애플리케이션
복잡한 애플리케이션에 대한 솔루션 더 보기
가상화
온프레미스와 클라우드 환경에서 워크로드를 유연하게 운영하기 위한 엔터프라이즈 가상화의 미래