Uploaded image for project: 'Cloud Infrastructure Security & Compliance'
  1. Cloud Infrastructure Security & Compliance
  2. CMP-982

[IA-5(7)]: Polish the response to unencrypted static authenticators

XMLWordPrintable

    • Icon: Story Story
    • Resolution: Done
    • Icon: Normal Normal
    • None
    • None
    • None
    • 1
    • False
    • False
    • OCPPLAN-6104 - FedRAMP moderate controls
    • Undefined
    • CMP Sprint 32

      The control says:

      The organization ensures that unencrypted static authenticators are not embedded in applications or access scripts or stored on function keys.

      Supplemental Guidance: Organizations exercise caution in determining whether embedded or stored authenticators are in encrypted or unencrypted form. If authenticators are used in the manner stored, then those representations are considered unencrypted authenticators. This is irrespective of whether that representation is perhaps an encrypted version of something else (e.g., a password).

       

      What we need to answer is:

      • given that this control is part of the IA-family, does just setting up an IDP that doesn't store the passwords satisfy the control?
      • if this control applies in a broader sense, we also need to include checking the keys' permissions
      • given that secrets are stored in etcd, we should mandate that etcd is encrypted
      • not mounting the SA access tokens in pods would help, too

            jhrozek@redhat.com Jakub Hrozek
            jhrozek@redhat.com Jakub Hrozek
            Votes:
            0 Vote for this issue
            Watchers:
            3 Start watching this issue

              Created:
              Updated:
              Resolved: