From e7b5e2e6bdb0dff722b88f54271ba84a59b66497 Mon Sep 17 00:00:00 2001 From: haskojur Date: Wed, 24 Apr 2024 08:53:35 +0200 Subject: [PATCH] (WIP) Test: Verify if secrets are encrypted --- RATIONALE.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/RATIONALE.md b/RATIONALE.md index 61d577287..307715a4b 100644 --- a/RATIONALE.md +++ b/RATIONALE.md @@ -383,4 +383,4 @@ closing watches for ConfigMaps marked as immutable.*" > *Tiller, found in Helm v2, has known security challenges. It requires administrative privileges and acts as a shared resource accessible to any authenticated user. Tiller can lead to privilege escalation as restricted users can impact other users. It is recommend to use Helm v3+ which does not contain Tiller for these reasons #### *Check if secrets are encrypted on the plaform*: [Kubescape secret/etcd](docs/LIST_OF_TESTS.md#kubescape-secret-etcd) -> *Secret encryption is not enabled by default in kubernetes environment. As secrets contains sensitive information, it is recommended to encrypt these values. For encrypting secret in etcd, we are using encryption in rest, this will cause, that there wont be secret key value in plain text format anymore in etcd. +> *Secret encryption is not enabled by default in kubernetes environment. As secrets contains sensitive information, it is recommended to encrypt these values. For encrypting secret in etcd, we are using encryption in rest, this will cause, that there will not be secret key value in plain text format anymore in etcd.