Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Create default k8s security policy for Turbinia #116

Open
wajihyassine opened this issue Jan 19, 2024 · 0 comments
Open

Create default k8s security policy for Turbinia #116

wajihyassine opened this issue Jan 19, 2024 · 0 comments
Labels
enhancement New feature or request help wanted Extra attention is needed turbinia

Comments

@wajihyassine
Copy link
Member

Name and Version

charts/turbinia

What is the problem this feature will solve?

Improves the security of the deployment / underlying containers

What is the feature you are proposing to solve the problem?

Configure and test a set of security policies for the Turbinia deployment.

This can include:

securityContext:
  readOnlyRootFilesystem: true
  runAsNonRoot: true
  allowPrivilegeEscalation: false
  runAsUser: <USER ID MAPPED IN CONTAINER>

Also by enabling the default seccomp profile: https://kubernetes.io/docs/tutorials/security/seccomp/

More guidance can be found here: https://kubernetes.io/docs/concepts/security/pod-security-standards/

The Turbinia Worker may also need to stay as privileged given the need of accessing the underlying raw disk attached to a given node/machine.

What alternatives have you considered?

No response

@wajihyassine wajihyassine added enhancement New feature or request help wanted Extra attention is needed turbinia labels Jan 19, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request help wanted Extra attention is needed turbinia
Projects
None yet
Development

No branches or pull requests

1 participant