Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

D04 - Secure Defaults #2

Open
ghost opened this issue Dec 22, 2018 · 4 comments
Open

D04 - Secure Defaults #2

ghost opened this issue Dec 22, 2018 · 4 comments

Comments

@ghost
Copy link

ghost commented Dec 22, 2018

Am going to slowly add to this issue, and then eventually merge into repo:

  1. apt install apt-transport-https

I think it's important to use TLS for all package installations. You'll have to have to separate install statements, which can cause slight increase in image size but is worth it.

  1. apt-get --no-install-recommends -y install libtool

reduce surface area of attack by not installing extra packages during installation of packages too.

@drwetter
Copy link
Collaborator

Hi @danehrlich1,

in order to put the cart behind the horse, intended is to provide a structure first for each single D-point. Technical hints will go into one of the parts of the structure.

D04 is specific for not only for the container / pod but also and mostly host and container orchestration tool. That is why it is @ #4. The main threat is supposed to be avoid on the system side exposed or misconfigured interfaces from kubernetes and friends. On the host e.g. a ~Debian default where rpc services are offered or any other network based service.

For the container part, yes there might be something I could think of. Transport via https doesn't seem so relevant to me as Debian packages you are referring to a signed (do a apt-key list). And if retrieving the Debian keys come via HTTPS 1) apt-transport-https is a privacy improvement, not a security improvement.

1) I haven't researched this but I know other distros which don't do this either.

@ghost
Copy link
Author

ghost commented Dec 22, 2018 via email

@drwetter
Copy link
Collaborator

The slides of my talk in Brussels might be useful to understand what is supposed to be in the D sections.

Because I saw too often open APIs or dashboards and e.g. Kubernetes does not seem to be able to clean up their crap (open kubelet, CVE-2018-1002105, etc.) D9 moved to D4 though.

@drwetter
Copy link
Collaborator

No need to apologize, you probably can't read my thoughts

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant