Uploaded image for project: 'Cloud Infrastructure Security & Compliance'
  1. Cloud Infrastructure Security & Compliance
  2. CMP-1042

[SC-12,SC-12(2),SC-12(3)]: External certificates

XMLWordPrintable

    • Icon: Story Story
    • Resolution: Done
    • Icon: Normal Normal
    • None
    • None
    • None
    • None
    • 1
    • False
    • False
    • Undefined
    • CMP Sprint 41, CMP Sprint 42

      This card is a continuation of CMP-942, covering external certificates. Please see CMP-942 for the full discussion. SC-12 as a whole is an organizational control (see e.g. this issue. However, we should still provide some guidance.

      For external certs, we should collect documentation on which certs can be manged by an external CA. A quick docs search shows that it's possible to set external certs for the api server or ingress operator.

      Then, Michael Epley suggested the following about external certs:

      We generally get systems accredited using internally self signed certs. It varies somewhat by customer, and the ability to use external certs is preferred. Note the requirement is " only approved trust anchors" (emphasis mine) – and the AO can approve self signed CAs for this purpose. Sefl-signed and self-managed PKI usually requires justification whereas pre-approved enterprise CAs and PKI do not and also don't have the burden of building your own PKI management and governance (though this can be susceptible to automation for OCP). Running your self managed PKI for internal certs may trigger more scrutiny and use of HSMs (I can cite specific examples of this being the case for certain customers).

      So knowing which certs can be issued by an external CA and which can't would be helpful in making sure the number of self-signed CAs is kept to a minimum.

              rhn-support-mrogers Matt Rogers (Inactive)
              jhrozek@redhat.com Jakub Hrozek (Inactive)
              Votes:
              0 Vote for this issue
              Watchers:
              5 Start watching this issue

                Created:
                Updated:
                Resolved: