-
Epic
-
Resolution: Done
-
Major
-
None
-
None
-
Service Binding Security
-
Done
-
QE Needed, Docs Needed, TE Needed, Customer Facing
-
0% To Do, 0% In Progress, 100% Done
Why
Assuming the user gets to create a ServiceBinding CR, how do we avoid letting the user execute an escalation of privilege.
- John doesn't have view on Secrets.
- John creates a ServiceBinding, which leads to a backing service's secret being read, and contents written into a binding secret.
- ServiceBinding controller injects the binding secret into the application workload.
- If John has the privileges to print the environment variables in the Deployment's container, John gets access to secret's contents which were otherwise was not visible to John.(escalation of privilege)
- If John was otherwise not allowed to modify a Deployment, John gets to do that as well (escalation of privilege)
How
To avoid this, we need to implement a validating webhook to verify
- Does John have reasonable access to the backing services ( and it's sub-resources )?
- Does John have reasonable access to the application ?
A validating webhook "validates" conditions before an object is accepted. In this case, subject access reviews could be made of use of, to validate specific user privileges.
- blocks
-
APPSVC-759 Service Binding GA release
- Closed