Skip to content

Commit 28708ae

Browse files
author
Brian Tray
committed
init
1 parent ec54bc6 commit 28708ae

File tree

3 files changed

+57
-6
lines changed

3 files changed

+57
-6
lines changed

articles/operator-nexus/concepts-security.md

Lines changed: 57 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "Azure Operator Nexus: Security concepts"
3-
description: Security overview for Azure Operator Nexus
4-
author: scottsteinbrueck
3+
description: Security overview for Azure Operator Nexus
4+
author: scottsteinbrueck
55
ms.author: ssteinbrueck
66
ms.service: azure-operator-nexus
77
ms.topic: conceptual
@@ -11,13 +11,13 @@ ms.custom: template-concept
1111

1212
# Azure Operator Nexus security
1313

14-
Azure Operator Nexus is designed and built to both detect and defend against
15-
the latest security threats and comply with the strict requirements of government
16-
and industry security standards. Two cornerstones form the foundation of its
14+
Azure Operator Nexus is designed and built to both detect and defend against
15+
the latest security threats and comply with the strict requirements of government
16+
and industry security standards. Two cornerstones form the foundation of its
1717
security architecture:
1818

1919
* **Security by default** - Security resiliency is an inherent part of the platform with little to no configuration changes needed to use it securely.
20-
* **Assume breach** - The underlying assumption is that any system can be compromised, and as such the goal is to minimize the impact of a security breach if one occurs.
20+
* **Assume breach** - The underlying assumption is that any system can be compromised, and as such the goal is to minimize the impact of a security breach if one occurs.
2121

2222
Azure Operator Nexus realizes the above by leveraging Microsoft cloud-native security tools that give you the ability to improve your cloud security posture while allowing you to protect your operator workloads.
2323

@@ -50,3 +50,54 @@ You have the option to enable Defender for Containers protection within Defender
5050
It is important to understand that in a cloud environment, security is a [shared responsibility](../security/fundamentals/shared-responsibility.md) between you and the cloud provider. The responsibilities vary depending on the type of cloud service your workloads run on, whether it is Software as a Service (SaaS), Platform as a Service (PaaS), or Infrastructure as a Service (IaaS), as well as where the workloads are hosted – within the cloud provider’s or your own on-premises datacenters.
5151

5252
Azure Operator Nexus workloads run on servers in your datacenters, so you are in control of changes to your on-premises environment. Microsoft periodically makes new platform releases available that contain security and other updates. You must then decide when to apply these releases to your environment as appropriate for your organization’s business needs.
53+
54+
## Kubernetes Security Benchmark Scanning
55+
56+
Industry standard security benchmarking tools are used to scan the Azure Operator Nexus platform for security compliance. These tools include [OpenSCAP](https://public.cyber.mil/stigs/scap/), to evaluate compliance with Kubernetes Security Technical Implementation Guide (STIG) controls, and Aqua Security’s [Kube-Bench](https://github.com/aquasecurity/kube-bench/tree/main), to evaluate compliance with the Center for Internet Security (CIS) Kubernetes Benchmarks.
57+
58+
Some controls are not technically feasible to implement in the Azure Operator Nexus environment, and these excepoted controls are documented below for the applicable Nexus layers.
59+
60+
Environmental controls such as RBAC and Service Account tests are not evaluated by these tools, as they may be differ based on customer requirements.
61+
62+
**NTF = Not Technically Feasible**
63+
64+
### OpenSCAP STIG
65+
66+
*Undercloud*
67+
68+
:::image type="content" source="media/security/undercloud-openscap.png" alt-text="Screenshot of OpenSCAP STIG exceptions" lightbox="media/security/media/security/undercloud-openscap.png":::
69+
70+
| STIG ID | Recommendation description|Status|Issue|
71+
|---|---|---|---|
72+
|V-242386|The Kubernetes API server must have the insecure port flag disabled|NTF|This check is deprecated in v1.24.0 and greater|
73+
|V-242397|The Kubernetes kubelet staticPodPath must not enable static pods|NTF|Only enabled for control nodes, required for kubeadm|
74+
|V-242403|Kubernetes API Server must generate audit records that identify what type of event has occurred, identify the source of the event, contain the event results, identify any users, and identify any containers associated with the event|NTF|Certain API requests and responses contain secrets and therefore are not captured in the audit logs|
75+
|V-242424|Kubernetes Kubelet must enable tlsPrivateKeyFile for client authentication to secure service|NTF|Kubelet SANS contains hostname only|
76+
|V-242425|Kubernetes Kubelet must enable tlsCertFile for client authentication to secure service.|NTF|Kubelet SANS contains hostname only|
77+
|V-242434|Kubernetes Kubelet must enable kernel protection.|NTF|Enabling kernel protection is not applicable for kubeadm in Nexus|
78+
79+
*Nexus Kubernetes/NAKS*
80+
81+
*Cluster Manager - Azure Kubernetes*
82+
83+
### Aquasec Kube-Bench
84+
85+
*Undercloud*
86+
87+
:::image type="content" source="media/security/undercloud-kubebench.png" alt-text="Screenshot of Kube-Bench exceptions" lightbox="media/security/media/security/undercloud-kubebench.png":::
88+
89+
| CIS ID | Recommendation description|Status|Issue|
90+
|---|---|---|---|
91+
|1|Control Plane Components|||
92+
|1.1|Control Plane Node Configuration Files|||
93+
|1.1.12|Ensure that the etcd data directory ownership is set to etcd:etcd|NTF|Nexus is root:root, etcd user is not configured for kubeadm|
94+
|1.2|API Server||||
95+
|1.1.12|Ensure that the --kubelet-certificate-authority argument is set as appropriate|NTF|Kubelet SANS includes hostname only|
96+
97+
98+
*Nexus Kubernetes/NAKS*
99+
100+
*Cluster Manager*
101+
102+
The Operator Nexus Cluster Manager is an AKS implementation. The CIS benchmark report for AKS can be found [here](https://learn.microsoft.com/en-us/azure/aks/cis-kubernetes) to review the tested controls and results.
103+
76.1 KB
Loading
218 KB
Loading

0 commit comments

Comments
 (0)