-
Notifications
You must be signed in to change notification settings - Fork 197
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: built-in OPA Rego policy-based configuration audit scanner #971
Merged
danielpacak
merged 1 commit into
aquasecurity:main
from
danielpacak:poc/fast_configauditreport_reconciler
Mar 7, 2022
Merged
feat: built-in OPA Rego policy-based configuration audit scanner #971
danielpacak
merged 1 commit into
aquasecurity:main
from
danielpacak:poc/fast_configauditreport_reconciler
Mar 7, 2022
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
danielpacak
changed the title
poc: fast configuration audit scanner with admission control
poc: fast OPA Rego policy-based configuration audit scanner
Feb 18, 2022
Codecov Report
@@ Coverage Diff @@
## main #971 +/- ##
==========================================
+ Coverage 58.17% 58.60% +0.42%
==========================================
Files 62 65 +3
Lines 7866 8493 +627
==========================================
+ Hits 4576 4977 +401
- Misses 2826 3000 +174
- Partials 464 516 +52
Continue to review full report at Codecov.
|
danielpacak
changed the title
poc: fast OPA Rego policy-based configuration audit scanner
feat: built-in OPA Rego policy-based configuration audit scanner
Mar 2, 2022
chen-keinan
reviewed
Mar 6, 2022
chen-keinan
reviewed
Mar 6, 2022
chen-keinan
reviewed
Mar 6, 2022
chen-keinan
reviewed
Mar 6, 2022
1. Perform synchronous configuration audit within reconciliation loop instead of creating Kubernetes Job objects and associated Secrets. 2. Configuration audits at scale with build-in controller-runtime workers. 3. Support NetworkPolicies, PodSecurityPolicies, Ingress, ResourceQuota and possibly other resources. 4. Use OPA Go SDK to evaluate policies read from the `starboard-policy-config` ConfigMap, which is compatible with Conftest plugin and KubeEnforcer. This is just an MVP, but for production workloads OPA policies can be prepared for evaluation and cached similarly to what OPA server does. 5. Preinstall all Kubernetes policies from https://github.com/aquasecurity/defsec/tree/v0.14.0/rules/kubernetes 6. First step to deprecate and remove Polaris and Conftest plugins to streamline code, usages, and documentation. Resolves: #889 Signed-off-by: Daniel Pacak <pacak.daniel@gmail.com>
chen-keinan
approved these changes
Mar 7, 2022
dirien
pushed a commit
to dirien/starboard
that referenced
this pull request
Mar 8, 2022
…asecurity#971) 1. Perform synchronous configuration audit within reconciliation loop instead of creating Kubernetes Job objects and associated Secrets. 2. Configuration audits at scale with build-in controller-runtime workers. 3. Support NetworkPolicies, PodSecurityPolicies, Ingress, ResourceQuota and possibly other resources. 4. Use OPA Go SDK to evaluate policies read from the `starboard-policy-config` ConfigMap, which is compatible with Conftest plugin and KubeEnforcer. This is just an MVP, but for production workloads OPA policies can be prepared for evaluation and cached similarly to what OPA server does. 5. Preinstall all Kubernetes policies from https://github.com/aquasecurity/defsec/tree/v0.14.0/rules/kubernetes 6. First step to deprecate and remove Polaris and Conftest plugins to streamline code, usages, and documentation. Resolves: aquasecurity#889 Signed-off-by: Daniel Pacak <pacak.daniel@gmail.com>
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
creating Kubernetes Job objects and associated Secrets.
possibly other resources.
starboard-policy-config
ConfigMap, which is compatible with Conftest plugin and KubeEnforcer.
This is just an MVP, but for production workloads OPA policies can be
prepared for evaluation and cached similarly to what OPA server does.
https://github.com/aquasecurity/defsec/tree/v0.14.0/rules/kubernetes
code, usages, and documentation.
Resolves: #889
Signed-off-by: Daniel Pacak pacak.daniel@gmail.com