Uploaded image for project: 'Red Hat Advanced Cluster Security'
  1. Red Hat Advanced Cluster Security
  2. ROX-29824

Host Path Activity Monitoring for Runtime Detection [File Activity Monitoring]

    • Product / Portfolio Work
    • XL
    • False
    • Hide

      None

      Show
      None
    • False
    • Green
    • 0% To Do, 0% In Progress, 100% Done
    • Tech Preview
    • Hide

      Jan 28 26
      Progress:

      • All functionality required for releasing the agent has been merged.
      • Actively working on getting the agent released as part of ACS in konflux.
      • Working on a road map of features for future releases.

      Problem:

      • There were bits missing for the konflux release which are being addressed now.

      Plan:

      • Wrap up the release.
      • Wrap up the road map.
      • Plan what will be implemented over the next release cycle.

       

      Dec 17 25
      Progress:

      • Implemented basic inode tracking as a replacement for filepath based resolution.
      • Working on documentation and testing.
      • Working on FIPS compliance.

      Problem:

      • Recently uncovered issues with the host filepath resolution require lots of efforts to implement correctly, see inode tracking.

      Plan:

      • Continue with testing
      • Stamp version 0.2
      • Work on inode bookkeeping.
      • Enhance performance testing with more workload for inode bookkeeping.
      Show
      Jan 28 26 Progress: All functionality required for releasing the agent has been merged. Actively working on getting the agent released as part of ACS in konflux. Working on a road map of features for future releases. Problem: There were bits missing for the konflux release which are being addressed now. Plan: Wrap up the release. Wrap up the road map. Plan what will be implemented over the next release cycle.   Dec 17 25 Progress: Implemented basic inode tracking as a replacement for filepath based resolution. Working on documentation and testing. Working on FIPS compliance. Problem: Recently uncovered issues with the host filepath resolution require lots of efforts to implement correctly, see inode tracking. Plan: Continue with testing Stamp version 0.2 Work on inode bookkeeping. Enhance performance testing with more workload for inode bookkeeping.
    • No

      *Requirements for this feature are found here: https://docs.google.com/document/d/1sR5jBQZtQTd1KjtoKTU7XhYEwBakvv95dOH1op4R7d8/edit?tab=t.0#heading=h.bcmrjlz7fh4w*

      CUSTOMER PROBLEM

      • As a customer in the financial sector, I need to pass PCI-DSS audit every year. One of the requirements is to have a File Integrity Monitoring tool for all critical files. As a customer the critical files mean to monitor a list of directories or files .
      • In order to investigate when an unexpected modification happens, I rely on the following data to be provided:
        • The complete command that modified the file
        • Indicator whether the process is being modified via SSH connection. This is the field isRunningInADifferentMountNamespace than the host or sensor of reference. This is important because: it allows us to identify modifications made outside of expected OpenShift processes, like direct SSH connections, and helps filter out noise from administrative actions such as machine config pool changes, which would otherwise generate thousands of alerts.
        • Type of operation (read, write, modify, delete)
        • Which object is modified
        • User that made the modification (human or service account)
        • Name of the node where the modification happened
        • Timestamp
      • As a customer with a LARGE cluster fleet, I need a single centralized alerting system for files monitored in my entire cluster fleet. 
      • Because of the large size of my cluster fleet, it is very important that the tool is able to raise alerts when something suspicious is happening and not every day tasks.
      • As a customer, I expect that that enabling the functionality affects performance in my clusters.
      • As a customer, I expect that I can decide which clusters of my fleet have this functionality enabled.

      Out of Scope: 

      Customer only needs the alert details with relevant arguments for analysis, and do not require an additional historical event database for investigation beyond what's in the alert

              rh-ee-masimonm Maria Simon Marcos
              rh-ee-masimonm Maria Simon Marcos
              Maria Simon Marcos Maria Simon Marcos
              ACS Collector
              Votes:
              1 Vote for this issue
              Watchers:
              5 Start watching this issue

                Created:
                Updated:
                Resolved: