Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Threat Modelling] Enforce encrypted communication with strict certificate validation to 3rd party services #51

Open
2 tasks
tobiscr opened this issue Nov 29, 2023 · 1 comment

Comments

@tobiscr
Copy link

tobiscr commented Nov 29, 2023

Description

To avoid spoofing attacks, any communication between the Compass Manager and 3rd party services has to be encrypted.. The Compass Manager has to enforce and strictly validate the TLS communication to 3rd party services (e.g. Compass Director GraphQL and access to Kubernetes API on KCP and SKR side).

AC:

  • Verify the communication to the Compass Director GraphQL service and enforce + validate the TLS communication used by the client API
  • Verify the communication to the KCP / SKR Kubernetes API and make sure an encrypted and validated communication is used by the Kubernetes Client API.

Steps to exploit

Attacker can use a man-in-the-middle attack to spoof network traffic.

Risk assessment

Part of the Threat Modelling workshop from 2023-11-29.

Proposed mitigation

Review the used source code and ensure that only encrypted communication to the 3rd party service (e.g. Kubernetes API, Compass Directory GraphQL) is possible and enforce a strict validation of the SSL certificate.

@tobiscr tobiscr changed the title [Thread Modelling] Enforce encrypted communication with strict certificate validation to 3rd party services [Threat Modelling] Enforce encrypted communication with strict certificate validation to 3rd party services Jan 2, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant