Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

TELCODOCS#2004: Day 2 Operations - Security Doc #86603

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

sr1kar99
Copy link
Contributor

@sr1kar99 sr1kar99 commented Dec 24, 2024

Version(s):
4.16+

Issue:
TELCODOCS-2004

Link to docs preview:

QE review:

  • QE has approved this change.

SME and QE reviews completed - https://gitlab.cee.redhat.com/telco-day-2-ops/telco-security-docs/-/merge_requests/4

@openshift-ci openshift-ci bot requested a review from aireilly December 24, 2024 07:52
@openshift-ci openshift-ci bot added the size/L Denotes a PR that changes 100-499 lines, ignoring generated files. label Dec 24, 2024
@sr1kar99 sr1kar99 force-pushed the 2004-telco-sec-doc branch 2 times, most recently from e97f5b3 to 0bf4138 Compare December 24, 2024 11:01
@openshift-ci openshift-ci bot added size/XL Denotes a PR that changes 500-999 lines, ignoring generated files. and removed size/L Denotes a PR that changes 100-499 lines, ignoring generated files. labels Dec 24, 2024
Copy link

openshift-ci bot commented Dec 24, 2024

@sr1kar99: all tests passed!

Full PR test history. Your PR dashboard.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

@sr1kar99
Copy link
Contributor Author

sr1kar99 commented Jan 2, 2025

/label peer-review-needed

@openshift-ci openshift-ci bot added the peer-review-needed Signifies that the peer review team needs to review this PR label Jan 2, 2025
@xenolinux xenolinux added peer-review-in-progress Signifies that the peer review team is reviewing this PR branch/enterprise-4.16 branch/enterprise-4.17 branch/enterprise-4.18 and removed peer-review-needed Signifies that the peer review team needs to review this PR labels Jan 2, 2025
@xenolinux xenolinux added this to the Continuous Release milestone Jan 2, 2025
Copy link
Contributor

@xenolinux xenolinux left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Added some comments; nice job!!


toc::[]

Security is a critical component of telecommunications deployments on {product-title}, particularly when running containerized network functions (CNFs). This document provides an overview of security considerations for deploying {product-title} in telecommunications (telco) environments, with a focus on securing Containerized Network Functions (CNFs). It is aimed at organizations and users working with high-bandwidth network deployments.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Security is a critical component of telecommunications deployments on {product-title}, particularly when running containerized network functions (CNFs). This document provides an overview of security considerations for deploying {product-title} in telecommunications (telco) environments, with a focus on securing Containerized Network Functions (CNFs). It is aimed at organizations and users working with high-bandwidth network deployments.
Security is a critical component of telecommunications (telco) deployments on {product-title}, particularly when running Cloud-native Network Functions (CNFs). This document provides an overview of security considerations for deploying {product-title} in telco environments, with a focus on securing CNFs. It is aimed at organizations and users working with high-bandwidth network deployments.

Avoid self-referential language, such as "This topic covers…​" or "Use this procedure to…​".

I feel that sentence is redundant. Alternatively, you can consider removing it. If you chose to remove it then: ".....organizations and users working with high-bandwidth network deployments." can be combined in the first sentence. Up to you!

  • Repo search gave me -- "Cloud-native Network Functions (CNFs)"


Security is a critical component of telecommunications deployments on {product-title}, particularly when running containerized network functions (CNFs). This document provides an overview of security considerations for deploying {product-title} in telecommunications (telco) environments, with a focus on securing Containerized Network Functions (CNFs). It is aimed at organizations and users working with high-bandwidth network deployments.

The document consolidates key information from existing resources and highlights the most current security practices. It serves as a reference for understanding security standards and best practices for telco use cases.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

  • Same comment about self-reference and removing this sentence.

IMO, the sentence doesn't provide unique information hence can be removed. If you want to keep this sentence then you can mention something roughly like:
"Review the following security practices for telco use cases."

https://redhat-documentation.github.io/supplementary-style-guide/#shortdesc

Avoid self-referential language, such as "This topic covers…​" or "Use this procedure to…​".

Comment on lines +27 to +32
[role="_additional-resources"]
.Additional resources

include::modules/telco-security-identity-prov-config.adoc[leveloffset=+1]

xref:../../../authentication/understanding-identity-provider.adoc[Understanding identity provider configuration]
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
[role="_additional-resources"]
.Additional resources
include::modules/telco-security-identity-prov-config.adoc[leveloffset=+1]
xref:../../../authentication/understanding-identity-provider.adoc[Understanding identity provider configuration]
include::modules/telco-security-identity-prov-config.adoc[leveloffset=+1]
[role="_additional-resources"]
.Additional resources
* xref:../../../authentication/understanding-identity-provider.adoc[Understanding identity provider configuration]

To fix the preview rendering:
Screenshot 2025-01-02 at 1 58 16 PM

.Prerequisites

* You have created a user with `cluster-admin` privileges.
* You have installed `oc`.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
* You have installed `oc`.
* You have installed the OpenShift CLI (`oc`).

+
[NOTE]
====
Follow your organization's best practices for securing sensitive credentials.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Follow your organization's best practices for securing sensitive credentials.
Follow best practices of your organization for securing sensitive credentials.

+
[IMPORTANT]
====
The core user ID is initially given `sudo` privilege within the cluster.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is sudo privileges given automatically/by default? If yes, then ignore my comment. If it's something done by user, then the note can be revised.

"You must give sudo....."

+
[IMPORTANT]
====
The core user ID is initially given `sudo` privilege within the cluster.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
The core user ID is initially given `sudo` privilege within the cluster.
The core user ID is initially given `sudo` privileges within the cluster.

Replace singular/plural --- /privilege/privileges

You must set up a cron job to run frequently to pull any changes into the cluster.
====

By using an identity provider, you can manage the level of access for specific groups within your organization. Teams requiring cluster-level privileges can be assigned the `cluster-admin` role, while application administrators can be given specific privileges that allow them to manage only their respective projects. Additionally, operational teams can be granted `view` access across the cluster, allowing them to monitor without modifying anything.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Consider revising this in an active voice.

[id="telco-security-sec-considerations-telco_{context}"]
= Security considerations for telco CNFs

Telco workloads handle vast amounts of sensitive data and demand high reliability. A single security vulnerability can lead to broader cluster-wide compromises. With numerous components running on a {sno} cluster, each component must be secured to prevent any breach from escalating. Ensuring security across the entire infrastructure, including all components, is vital to maintaining the integrity of the Telco network and avoiding vulnerabilities.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Telco workloads handle vast amounts of sensitive data and demand high reliability. A single security vulnerability can lead to broader cluster-wide compromises. With numerous components running on a {sno} cluster, each component must be secured to prevent any breach from escalating. Ensuring security across the entire infrastructure, including all components, is vital to maintaining the integrity of the Telco network and avoiding vulnerabilities.
Telco workloads handle vast amounts of sensitive data and demand high reliability. A single security vulnerability can lead to broader cluster-wide compromises. With numerous components running on a {sno} cluster, each component must be secured to prevent any breach from escalating. Ensuring security across the entire infrastructure, including all components, is essential to maintaining the integrity of the telco network and avoiding vulnerabilities.

Mostly "telco" is starting with lower case throughout the PR. Assuming "Telco" should be replaced by "telco" here as well.

@@ -0,0 +1,96 @@
:_mod-docs-content-type: ASSEMBLY
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think you can consider creating a module for some of the info present in this assembly.

@xenolinux xenolinux added peer-review-done Signifies that the peer review team has reviewed this PR and removed peer-review-in-progress Signifies that the peer review team is reviewing this PR labels Jan 2, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
branch/enterprise-4.16 branch/enterprise-4.17 branch/enterprise-4.18 peer-review-done Signifies that the peer review team has reviewed this PR size/XL Denotes a PR that changes 500-999 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants