Uploaded image for project: 'OpenShift Image Registry'
  1. OpenShift Image Registry
  2. IR-536

[IR] Central TLS Profile consistency

XMLWordPrintable

    • Icon: Story Story
    • Resolution: Done
    • Icon: Major Major
    • None
    • None
    • Registry
    • None
    • Product / Portfolio Work
    • False
    • Hide

      None

      Show
      None
    • False
    • 5
    • None
    • None
    • None

      Injecting centralized TLS configuration from the cluster APIServer into scheduler pods is critical for maintaining consistent security posture across the entire OpenShift cluster. When administrators configure TLS security profiles at the cluster level (via the APIServer resource), these settings must be propagated to all control plane components, including the Image Registry, to ensure uniform enforcement of cryptographic standards.

      Without this propagation, the Image Registry could operate with weaker or inconsistent TLS settings compared to the rest of the cluster, creating security gaps where attackers could exploit older cipher suites or TLS protocol versions that have been intentionally disabled cluster-wide.

      The config observer pattern enables operators to automatically observe changes to cluster TLS policies and adjust the Image Registry configuration, ensuring that security policies are centrally managed, consistently applied, and automatically updated.

          There are no Sub-Tasks for this issue.

              rmarasch@redhat.com Ricardo Maraschini
              rmarasch@redhat.com Ricardo Maraschini
              None
              None
              None
              None
              Votes:
              0 Vote for this issue
              Watchers:
              1 Start watching this issue

                Created:
                Updated:
                Resolved: