Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

security pass for secret access #325

Open
26 tasks
jessebot opened this issue Nov 12, 2023 · 0 comments
Open
26 tasks

security pass for secret access #325

jessebot opened this issue Nov 12, 2023 · 0 comments
Assignees
Labels

Comments

@jessebot
Copy link
Contributor

jessebot commented Nov 12, 2023

Description

Before we get into actual production, we need to do a security pass. We've already ensured secure database connections everywhere. The next step is taking a look at what prevents other connected users from viewing secrets such as:

  • root credentials
  • postgres certs

Not sure if RBAC makes the most sense here... like restricting access to a specific cluster role or service account?

Needs to be reviewed (and possibly updated for) the following apps.

nextcloud

  • nextcloud config
  • minio tenant secret config
  • postgresql certs
    • server-certs
    • client-certs
    • keypair-server-certs
    • keypair-client-certs

zitadel

  • minio tenant
  • postgresql certs
    • server-certs
    • client-certs
    • keypair-server-certs
    • keypair-client-certs

mastodon

  • minio tenant secret config
  • mastodon secret config
  • mastodon default config configmap while we're at it
  • postgresql certs
    • server-certs
    • client-certs
    • keypair-server-certs
    • keypair-client-certs

matrix

  • matrix secret config
  • minio tenant secret config
  • postgresql certs
    • server-certs
    • client-certs
    • keypair-server-certs
    • keypair-client-certs

bitwarden eso provider

  • credentials secret

argocd

  • oidc secret
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

2 participants