Skip to content

TNBL265/spiresplash

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

STACK the Codes 2022

mTLS is a much needed baseline for Zero-Trust as a whole. However, its PKI setup requires heavy operational investment and resources from agencies which also includes the management of the key lifecycle from provisioning to renewal to revocation. If any of the stages are not handled timely, the impact is rippled to the web services and may bring down the business in worst case.

The emergence of SPIFFE issuing X.509 SVID also means that whole setup need some form of “transformation” into mesh network and sidecar driven setup (towards a K8 architecture). Challenge is whether there is an optimal (and yet secure) translation from existing PKI to SPIFFE or an alternative to achieve a reasonable identity-based attestation level.

Submission:

  • Walkthrough video
  • Overview: we demo a full transition from legacy PKI to mTLS with SPIFFE
  • Optimization consideration:
    • Using Ansible and Shell scripting to automate transition
  • Security consideration:
    • No hard-code of password required during the whole process
    • Manage file permission to avoid running command as sudo user
    • Use of Kubernetes secret for TLS during Stage 1 transitioning
    • Serve Tornjak GUI for SPIRE on HTTPS

Future work:

  • Setup Kubespray for multi-clusters deployment
  • Configure RBAC Authorization
  • SPIFFE use case for Unix and Docker workload attestor
  • Combine Unix, Docker and Kubernetes workload attestors by using a centralized SPIRE Server
  • Use an UpstreamAuthority plugin to integrate with existing PKI infrastructure
  • Manage PKI certificate and key lifecycle
  • MERN stack transition use case

Acknowledgment:

About

STACK the Codes 2022

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published