Uploaded image for project: 'Red Hat Advanced Cluster Security'
  1. Red Hat Advanced Cluster Security
  2. ROX-30650

Support dynamic loading of Red Hat release key

    • Icon: Story Story
    • Resolution: Unresolved
    • Icon: Undefined Undefined
    • None
    • None
    • None
    • Quality / Stability / Reliability
    • False
    • Hide

      None

      Show
      None
    • False

      At the moment, the built-in Red Hat signature integration contains Red Hat's Release Key 3, which is hardcoded.

      When that key is rotated, the integration will become outdated and the built-in policy will report false positives for software signed by the rotated key.

      To avoid this, the key should be dynamically loaded during runtime.

      Considerations: when the key is rotated and the new key is loaded, the policy will trigger violations on all software signed by the old key: without any changes, a hypothetical cluster with 0 violations for this policy will suddenly show many. Should this be handled, and if so, how?

              Unassigned Unassigned
              rh-ee-gualvare Guzman Alvarez
              ACS Sensor & Ecosystem
              Votes:
              0 Vote for this issue
              Watchers:
              1 Start watching this issue

                Created:
                Updated: