Project

General

Profile

Actions

action #87805

closed

coordination #87853: [epic][brainstorming]

Investigate security test cases for automation

Added by ybonatakis over 3 years ago. Updated about 1 year ago.

Status:
Rejected
Priority:
Low
Assignee:
Target version:
-
Start date:
2021-01-15
Due date:
% Done:

0%

Estimated time:

Description

Main concern on Containers is the security.
We lack automation on this field against our base images.

Goal is to research common security concerns for sle base image and create the tasks for their automation


Related issues 2 (0 open2 closed)

Related to Containers - action #94132: Test running container networking with firewallResolvedpdostal2021-06-17

Actions
Related to Containers - action #108233: container scanning servicesRejectedrbranco2022-03-11

Actions
Actions #1

Updated by jlausuch over 3 years ago

  • Parent task set to #87853
Actions #2

Updated by ybonatakis over 3 years ago

  • Status changed from New to In Progress
  • Assignee set to ybonatakis
Actions #3

Updated by ybonatakis over 3 years ago

i investigated two security scanners which both are open source,fast and easy to be used straight away.

dockerbench

trivy

[0] https://github.com/docker/docker-bench-security
[1] https://github.com/aquasecurity/trivy

Actions #4

Updated by jlausuch about 3 years ago

  • Assignee deleted (ybonatakis)
Actions #5

Updated by jlausuch about 3 years ago

  • Status changed from In Progress to Workable

Moving to workable as there is no activity on this and there are more urgent things to do now.

Actions #6

Updated by jlausuch almost 3 years ago

  • Priority changed from High to Low
  • Parent task deleted (#87853)
Actions #7

Updated by jlausuch almost 3 years ago

  • Status changed from Workable to New
Actions #8

Updated by jlausuch almost 3 years ago

  • Related to action #94132: Test running container networking with firewall added
Actions #9

Updated by jlausuch over 2 years ago

  • Status changed from New to Workable
  • Parent task set to #87853
Actions #10

Updated by jlausuch over 2 years ago

  • Subject changed from [timebox] Investigate security test cases for automation to Investigate security test cases for automation
Actions #11

Updated by jlausuch over 1 year ago

Actions #12

Updated by rbranco over 1 year ago

Some registries have security scanners for Docker images. Quay.io uses Clair and GitHub Actions allows to use any scanner.

Another tool is Dockle which also runs a CIS benchmark, much better than the dockerbench shell script:
https://github.com/goodwithtech/dockle

The deprecated https://github.com/Azure/container-scan used both Trivy and Dockle.

Actions #13

Updated by rbranco over 1 year ago

  • Status changed from Workable to Rejected
  • Assignee set to rbranco

I asked in #team-buildops about the issue of scanning containers and their approach is to release a new image when a new package is released, and that they tried NeuVector in IBS/OBS and failed. I also asked in #discuss-neuvector and they have their own team to test the product.

https://suse.slack.com/archives/C02BX1X92HM/p1676280368655279

Actions #14

Updated by pdostal over 1 year ago

  • Status changed from Rejected to New

I asked in #team-buildops about the issue of scanning containers and their approach is to release a new image when a new package is released, and that they tried NeuVector in IBS/OBS and failed. I also asked in #discuss-neuvector and they have their own team to test the product.
That's why I would simple add those tests to our openQA.

Actions #15

Updated by rbranco over 1 year ago

pdostal wrote:

That's why I would simple add those tests to our openQA.

Fair point, but those tests are security checks and openQA is not the best tool for this, IMHO. I think this kind of security checks should be done by the Security team on every image, not just base images. It's also the BuildOps team's responsibility to finally integrate NeuVector in IBS/OBS.

Let's escalate this so a decision is made at a higher level. As the priority for this issue is low, I'd wait for BuildOps to see if they finally integrate NeuVector. Otherwise we'll have to decide which images to scan and which tool to use (and what to do with the false positives & false negatives inherent with these tools). Ideally, it should've been SUSE's NeuVector but I asked in #discuss-neuvector about their QE processes and repositories and didn't get an answer.

Actions #16

Updated by jsegitz over 1 year ago

If NeuVector gets integrated into IBS/OBS then duplicating this in openQA doesn't make sense. But if they didn't integrate it then this would be my first choice.

The security team doesn't scan every image. We mostly work on lower layers to ensure that the input for the images is proper. Having this scanning ability in openQA would be great from our POV

Actions #17

Updated by rbranco over 1 year ago

We would waste time doing it in openQA if IBS/OBS eventually implements it.

Actions #18

Updated by jlausuch about 1 year ago

  • Status changed from New to Rejected

This has been hanging for too long without any progress. I am closing this with an action point on me to find out how we could do this. If applicable to us, I will create another ticket with concrete task.

Actions

Also available in: Atom PDF