Skip to content

Commit f211ad7

Browse files
committed
add egress traffic filter
1 parent a1ab9cb commit f211ad7

File tree

1 file changed

+18
-1
lines changed

1 file changed

+18
-1
lines changed

data/Infrastructure.yml

Lines changed: 18 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
Infrastructure Hardening:
33
The cluster is hardened:
44
risk: Using default configurations for a cluster environment leads to potential risks.
5-
measure: Harden cluster environments according to best practices.
5+
measure: Harden cluster environments according to best practices. Level 1 and partiually level 2 from hardening practices like 'CIS Kubernetes Bench for Security' should considered.
66
difficultyOfImplementation:
77
knowledge: 4
88
time: 3
@@ -63,6 +63,23 @@ Infrastructure Hardening:
6363
iso27001-2017:
6464
- virtual environments are not explicitly covered by ISO 27001 - too specific
6565
- 13.1.3
66+
Filter for outcoing traffic:
67+
risk: A compromised infrastructure component might try to send out stolen data.
68+
measure: Having a whitelist and explizitly allowing egress traffic provides the ability to stop unauthorized data leackage.
69+
difficultyOfImplementation:
70+
knowledge: 3
71+
time: 3
72+
resources: 3
73+
usefulness: 2
74+
level: 2
75+
dependsOn: []
76+
implementation:
77+
- Open Policy Agent
78+
- firewalls
79+
samm2: o-environment-management|A|1
80+
iso27001-2017:
81+
- virtual environments are not explicitly covered by ISO 27001 - too specific
82+
- 13.1.3
6683
Infrastructure as Code:
6784
risk: No tracking of changes in systems might lead to errors in the configuration. In additions, it might lead to unauthorized changes. An examples is jenkins.
6885
measure: Systems are setup by code. A full environment can be provisioned. In addition, software like Jenkins 2 can be setup and configured in in code too. The code should be stored in a version control system.

0 commit comments

Comments
 (0)