Uploaded image for project: 'Red Hat Advanced Cluster Management'
  1. Red Hat Advanced Cluster Management
  2. ACM-10001

MCH: Prohibit the use of wildcards when defining RBAC permissions in various YAML files to enforce precise access control

XMLWordPrintable

    • Icon: Story Story
    • Resolution: Unresolved
    • Icon: Normal Normal
    • Future
    • Future
    • Installer
    • None
    • False
    • None
    • False
    • Hide

      Provide the required acceptance criteria using this template.
      * ...
      Show
      Provide the required acceptance criteria using this template. * ...
    • No

      Value Statement

      By prohibiting the use of wildcards in RBAC permissions, we enhance security by enforcing precise access control and reducing the risk of unauthorized access to resources.

      Targeted Files:

      • [ ] pkg/.../cluster-backup/templates/clusterbackup-clusterrole.yaml
      • [ ] pkg/.../charts/toggle/grc/templates/grc-clusterrole.yaml
      • [ ] pkg/.../charts/toggle/grc/templates/grc-role.yaml
      • [ ] pkg/.../templates/multicluster-operators-clusterrole.yaml
      • [ ] pkg/.../templates/multicluster-observability-operator-clusterrole.yaml
      • [ ] pkg/templates/multiclusterhub/base/multicluster-applications-rbac-aggregate-admin.yaml
      • [ ] pkg/.../search-v2-operator/templates/search-v2-operator-clusterrole.yaml
      • [ ] pkg/.../search-v2-operator/templates/search-v2-operator-role.yaml

      Definition of Done for Engineering Story Owner (Checklist)

      • [ ] Wildcards are removed from RBAC permissions in various YAML files.
      • [ ] RBAC configurations are validated to ensure precise access control.

      Noncompliant code example

       

      apiVersion: rbac.authorization.k8s.io/v1
      kind: Role
      metadata:
        namespace: default
        name: example-role
      rules:
        - apiGroups: [""]
          resources: ["*"] # Noncompliant
          verbs: ["get", "list"]  

      Compliant solution

       

      apiVersion: rbac.authorization.k8s.io/v1
      kind: Role
      metadata:
        namespace: default
        name: example-role
      rules:
        - apiGroups: [""]
          resources: ["pods"]
          verbs: ["get", "list"]  

      Development Complete

      • The code is complete.
      • Functionality is working.
      • Any required downstream Docker file changes are made.

      Tests Automated

      • [ ] Unit/function tests have been automated and incorporated into the
        build.
      • [ ] 100% automated unit/function test coverage for new or changed APIs.

      Secure Design

      • [ ] Security has been assessed and incorporated into your threat model.

      Multidisciplinary Teams Readiness

      Support Readiness

      • [ ] The must-gather script has been updated.

            Unassigned Unassigned
            dbennett@redhat.com Disaiah Bennett
            Thuy Nguyen Thuy Nguyen
            Votes:
            0 Vote for this issue
            Watchers:
            1 Start watching this issue

              Created:
              Updated: