Uploaded image for project: 'OpenShift Request For Enhancement'
  1. OpenShift Request For Enhancement
  2. RFE-6762

Identify malware in images and RHCOS nodes

XMLWordPrintable

    • None
    • Product / Portfolio Work
    • None
    • False
    • Hide

      None

      Show
      None
    • None
    • None
    • None
    • None

      Update: Until this capability is available, use this KCS and the attached whitepaper to share with the customer inquiring about Malware detection: https://access.redhat.com/solutions/7049002

      --------------------------------

      CUSTOMER PROBLEM

      Customers who must comply with PCI-DSS regulations work with auditors who take the PCI-DSS requirements for antimalware scanning literally. To comply with their auditors requirements, they must demonstrate use of a malware scanning solution. Customers would like to have malware scanning added to RHACS capabilities.

      The solution must address the following PCI-DSS v4 requirements. The following is extracted from the PCI-DSS v4 requirements document, requirement 5, page 111.

      • 5.2 Malicious software (malware) is prevented, or detected and addressed.
      • 5.3 Anti-malware mechanisms and processes are active, maintained, and monitored.

      Screenshots from the document are attached for additional detail.

      USERS
      End-users are RHACS users / cluster admins / security teams and compliance teams.

      ACCEPTANCE CRITERIA
      MVP Solution - Phase 1

      • The solution can be deployed on one or more OpenShift clusters.
      • The solution can evaluate images deployed on OpenShift
      • The solution can evaluate RHCOS nodes
      • The solution performs periodic scans on a running cluster at a pre-defined interval (Daily , weekly, monthly)
      • A real-time scan can be initiated by the end user
      • The solution reports its results in a human readable format. Options for the MVP can include a .csv file.
      • A log of scans run with timestamps and links to output is maintained
      • The solution can be kept current with updated malware data (e.g. malware signatures)

      Improvements - Phase 2

      • Policies can be defined for solution results
      • Alerts can be fired on solutions results
      • Malware updates can be automated and scheduled on a regular basis
      • Solution results are visible in the RHACS console and can be filtered and sorted
      • A report in .csv format can be exported from the RHACS console
      • End-users are able to configure the scan interval

      Improvements - Phase 3

      • Solution results can be leveraged in an overall risk calculation

      CI - MUST be running successfully with tests automated

      Release Technical Enablement

        • End-user documentation must be available
        • Slides for CEE enablement must exist and a training session must be scheduled
        • Slides for field enablement must exist and be shared with the field

      QUESTIONS

      This section should specify what questions we are trying to answer for the customer with this set of features.

      ACTIONS

      Enable customers to provide a regular malware scanning report to their compliance auditors.

      CONSIDERATIONS

      In the future, we may want to offer malware scanning at build time and enable deploy-time policies.

      UX/UI

      Generally mocks should be attached to individual stories. However, if mocks combine multiple individual stories in order to enable the best user interaction, then the mocks should be linked here and this section should denote which stories are encompassed by the mocks.

      DELIVERY PRIORITY

      This section should outline the desired order of delivery for stories comprising this epic.

              sbadve@redhat.com Shubha Badve
              dcaspin@redhat.com Doron Caspin
              None
              Votes:
              6 Vote for this issue
              Watchers:
              24 Start watching this issue

                Created:
                Updated:
                None
                None