-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
TELCODOCS#2004: Day 2 Operations - Security Doc #86603
base: main
Are you sure you want to change the base?
Conversation
edge_computing/day_2_core_cnf_clusters/security/telco-security-host-sec.adoc
Outdated
Show resolved
Hide resolved
edge_computing/day_2_core_cnf_clusters/security/telco-security-host-sec.adoc
Outdated
Show resolved
Hide resolved
edge_computing/day_2_core_cnf_clusters/security/telco-security-sec-context-constraints.adoc
Outdated
Show resolved
Hide resolved
6f8ad61
to
c696219
Compare
edge_computing/day_2_core_cnf_clusters/security/telco-security-sec-context-constraints.adoc
Outdated
Show resolved
Hide resolved
edge_computing/day_2_core_cnf_clusters/security/telco-security-sec-context-constraints.adoc
Show resolved
Hide resolved
e97f5b3
to
0bf4138
Compare
edge_computing/day_2_core_cnf_clusters/security/telco-security-basics.adoc
Outdated
Show resolved
Hide resolved
edge_computing/day_2_core_cnf_clusters/security/telco-security-host-sec.adoc
Outdated
Show resolved
Hide resolved
edge_computing/day_2_core_cnf_clusters/security/telco-security-sec-context-constraints.adoc
Show resolved
Hide resolved
0bf4138
to
bff68ec
Compare
edge_computing/day_2_core_cnf_clusters/security/telco-security-host-sec.adoc
Outdated
Show resolved
Hide resolved
bff68ec
to
bef32eb
Compare
edge_computing/day_2_core_cnf_clusters/security/telco-security-host-sec.adoc
Show resolved
Hide resolved
bef32eb
to
69931a5
Compare
edge_computing/day_2_core_cnf_clusters/security/telco-security-basics.adoc
Outdated
Show resolved
Hide resolved
edge_computing/day_2_core_cnf_clusters/security/telco-security-basics.adoc
Outdated
Show resolved
Hide resolved
69931a5
to
e1dfe58
Compare
edge_computing/day_2_core_cnf_clusters/security/telco-security-basics.adoc
Show resolved
Hide resolved
edge_computing/day_2_core_cnf_clusters/security/telco-security-basics.adoc
Show resolved
Hide resolved
e1dfe58
to
d97a0cf
Compare
@sr1kar99: all tests passed! Full PR test history. Your PR dashboard. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
/label peer-review-needed |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Added some comments; nice job!!
|
||
toc::[] | ||
|
||
Security is a critical component of telecommunications deployments on {product-title}, particularly when running containerized network functions (CNFs). This document provides an overview of security considerations for deploying {product-title} in telecommunications (telco) environments, with a focus on securing Containerized Network Functions (CNFs). It is aimed at organizations and users working with high-bandwidth network deployments. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Security is a critical component of telecommunications deployments on {product-title}, particularly when running containerized network functions (CNFs). This document provides an overview of security considerations for deploying {product-title} in telecommunications (telco) environments, with a focus on securing Containerized Network Functions (CNFs). It is aimed at organizations and users working with high-bandwidth network deployments. | |
Security is a critical component of telecommunications (telco) deployments on {product-title}, particularly when running Cloud-native Network Functions (CNFs). This document provides an overview of security considerations for deploying {product-title} in telco environments, with a focus on securing CNFs. It is aimed at organizations and users working with high-bandwidth network deployments. |
- "This document provides an overview..." sentence needs to be revised as per the guideline: https://redhat-documentation.github.io/supplementary-style-guide/#shortdesc
Avoid self-referential language, such as "This topic covers…" or "Use this procedure to…".
I feel that sentence is redundant. Alternatively, you can consider removing it. If you chose to remove it then: ".....organizations and users working with high-bandwidth network deployments." can be combined in the first sentence. Up to you!
- Repo search gave me -- "Cloud-native Network Functions (CNFs)"
|
||
Security is a critical component of telecommunications deployments on {product-title}, particularly when running containerized network functions (CNFs). This document provides an overview of security considerations for deploying {product-title} in telecommunications (telco) environments, with a focus on securing Containerized Network Functions (CNFs). It is aimed at organizations and users working with high-bandwidth network deployments. | ||
|
||
The document consolidates key information from existing resources and highlights the most current security practices. It serves as a reference for understanding security standards and best practices for telco use cases. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
- Same comment about self-reference and removing this sentence.
IMO, the sentence doesn't provide unique information hence can be removed. If you want to keep this sentence then you can mention something roughly like:
"Review the following security practices for telco use cases."
https://redhat-documentation.github.io/supplementary-style-guide/#shortdesc
Avoid self-referential language, such as "This topic covers…" or "Use this procedure to…".
[role="_additional-resources"] | ||
.Additional resources | ||
|
||
include::modules/telco-security-identity-prov-config.adoc[leveloffset=+1] | ||
|
||
xref:../../../authentication/understanding-identity-provider.adoc[Understanding identity provider configuration] |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
[role="_additional-resources"] | |
.Additional resources | |
include::modules/telco-security-identity-prov-config.adoc[leveloffset=+1] | |
xref:../../../authentication/understanding-identity-provider.adoc[Understanding identity provider configuration] | |
include::modules/telco-security-identity-prov-config.adoc[leveloffset=+1] | |
[role="_additional-resources"] | |
.Additional resources | |
* xref:../../../authentication/understanding-identity-provider.adoc[Understanding identity provider configuration] |
.Prerequisites | ||
|
||
* You have created a user with `cluster-admin` privileges. | ||
* You have installed `oc`. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
* You have installed `oc`. | |
* You have installed the OpenShift CLI (`oc`). |
+ | ||
[NOTE] | ||
==== | ||
Follow your organization's best practices for securing sensitive credentials. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Follow your organization's best practices for securing sensitive credentials. | |
Follow best practices of your organization for securing sensitive credentials. |
+ | ||
[IMPORTANT] | ||
==== | ||
The core user ID is initially given `sudo` privilege within the cluster. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is sudo
privileges given automatically/by default? If yes, then ignore my comment. If it's something done by user, then the note can be revised.
"You must give sudo
....."
+ | ||
[IMPORTANT] | ||
==== | ||
The core user ID is initially given `sudo` privilege within the cluster. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The core user ID is initially given `sudo` privilege within the cluster. | |
The core user ID is initially given `sudo` privileges within the cluster. |
Replace singular/plural --- /privilege/privileges
You must set up a cron job to run frequently to pull any changes into the cluster. | ||
==== | ||
|
||
By using an identity provider, you can manage the level of access for specific groups within your organization. Teams requiring cluster-level privileges can be assigned the `cluster-admin` role, while application administrators can be given specific privileges that allow them to manage only their respective projects. Additionally, operational teams can be granted `view` access across the cluster, allowing them to monitor without modifying anything. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Consider revising this in an active voice.
[id="telco-security-sec-considerations-telco_{context}"] | ||
= Security considerations for telco CNFs | ||
|
||
Telco workloads handle vast amounts of sensitive data and demand high reliability. A single security vulnerability can lead to broader cluster-wide compromises. With numerous components running on a {sno} cluster, each component must be secured to prevent any breach from escalating. Ensuring security across the entire infrastructure, including all components, is vital to maintaining the integrity of the Telco network and avoiding vulnerabilities. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Telco workloads handle vast amounts of sensitive data and demand high reliability. A single security vulnerability can lead to broader cluster-wide compromises. With numerous components running on a {sno} cluster, each component must be secured to prevent any breach from escalating. Ensuring security across the entire infrastructure, including all components, is vital to maintaining the integrity of the Telco network and avoiding vulnerabilities. | |
Telco workloads handle vast amounts of sensitive data and demand high reliability. A single security vulnerability can lead to broader cluster-wide compromises. With numerous components running on a {sno} cluster, each component must be secured to prevent any breach from escalating. Ensuring security across the entire infrastructure, including all components, is essential to maintaining the integrity of the telco network and avoiding vulnerabilities. |
Mostly "telco" is starting with lower case throughout the PR. Assuming "Telco" should be replaced by "telco" here as well.
@@ -0,0 +1,96 @@ | |||
:_mod-docs-content-type: ASSEMBLY |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think you can consider creating a module for some of the info present in this assembly.
Version(s):
4.16+
Issue:
TELCODOCS-2004
Link to docs preview:
QE review:
SME and QE reviews completed - https://gitlab.cee.redhat.com/telco-day-2-ops/telco-security-docs/-/merge_requests/4