forked from ComplianceAsCode/content
-
Notifications
You must be signed in to change notification settings - Fork 1
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
3 changed files
with
32 additions
and
6 deletions.
There are no files selected for viewing
25 changes: 25 additions & 0 deletions
25
applications/openshift/general/general_node_separation/rule.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,25 @@ | ||
documentation_complete: true | ||
|
||
title: 'Create Boundaries between Resources using Nodes or Clusters' | ||
|
||
description: |- | ||
Use Nodes or Clusters to isolate Workloads with high protection requirements. | ||
Run the following command and review the pods and how they are deployed on Nodes. <pre>$ oc get pod -o=custom-columns=NAME:.metadata.name,NAMESPACE:.metadata.namespace,APP:.metadata.labels.app\.kubernetes\.io/name,NODE:.spec.nodeName --all-namespaces | grep -v "openshift-" </pre> | ||
You can use labels or other data as custom field which helps you to identify parts of an application. | ||
Ensure that Applications with high protection requirements are not colocated on Nodes or in Clusters with workloads of lower protection requirements. | ||
rationale: |- | ||
Assigning workloads with high protection requirements to specific nodes creates and additional boundary (the node) between workloads of high protection requirements and workloads which might follow less strict requirements. An adversary which attacked a lighter protected workload now has additional obstacles for their movement towards the higher protected workloads. | ||
references: | ||
bsi: APP.4.4.A15 | ||
|
||
severity: medium | ||
|
||
ocil_clause: 'Application placement on Nodes and Clusters needs review' | ||
|
||
ocil: |- | ||
Run the following command and review the pods and how they are deployed on nodes. <pre>$ oc get pod -o=custom-columns=NAME:.metadata.name,NAMESPACE:.metadata.namespace,APP:.metadata.labels.app\.kubernetes\.io/name,NODE:.spec.nodeName --all-namespaces | grep -v "openshift-" </pre> | ||
You can use labels or other data as custom field which helps you to identify parts of an application. | ||
Ensure that applications with high protection requirements are not colocated on nodes or in clusters with workloads of lower protection requirements. |
2 changes: 2 additions & 0 deletions
2
applications/openshift/general/general_node_separation/tests/ocp4/e2e.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,2 @@ | ||
--- | ||
default_result: MANUAL |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters