Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

models: add lockdown default configuration files #1530

Merged
merged 2 commits into from
Apr 29, 2021

Conversation

arnaldo2792
Copy link
Contributor

@arnaldo2792 arnaldo2792 commented Apr 28, 2021

Issue number:
#813

Description of changes:

fc416bf1  docs: update security guidance document

This commit updates the security guidance document since the default kernel lockdown mode for newer variants is integrity

4e6b5a5f models: add lockdown default configuration files

This commit adds default configuration files for the different values that can be used for the kernel lockdown setting. It also changes the lockdown mode for the ECS variant from none to integrity.

Testing done:
In aws-dev, aws-ecs, k8s 1.16, 1.17, 1.18, 1.19 x86_64:

  • Launch nginx container/task/pod
  • Check systemctl status, no failing units
  • Check the expected values of /sys/kernel/security/lockdown in each variant:

AWS dev:

cat /sys/kernel/security/lockdown
[none] integrity confidentiality

AWS ECS:

cat /sys/kernel/security/lockdown
none [integrity] confidentiality

AWS k8s 1.19:

cat /sys/kernel/security/lockdown
[none] integrity confidentiality

AWS k8s 1.18:

cat /sys/kernel/security/lockdown
[none] integrity confidentiality

AWS k8s 1.17:

cat /sys/kernel/security/lockdown
[none] integrity confidentiality

AWS k8s 1.16:

cat /sys/kernel/security/lockdown
[none] integrity confidentiality

VMWare dev:

Screenshot from 2021-04-28 10-58-39

Terms of contribution:

By submitting this pull request, I agree that this contribution is dual-licensed under the terms of both the Apache License, version 2.0, and the MIT license.

@arnaldo2792 arnaldo2792 linked an issue Apr 28, 2021 that may be closed by this pull request
@arnaldo2792
Copy link
Contributor Author

  • Removed confidentiality default setting

@arnaldo2792
Copy link
Contributor Author

  • Fixed security guidance document

This commit adds default configuration files for the different values
that can be used for the kernel lockdown setting.
This commit updates the security guidance document since the default
kernel lockdown mode for newer variants is `integrity`
@arnaldo2792
Copy link
Contributor Author

  • Separated changes in two commits

@arnaldo2792 arnaldo2792 merged commit a24e048 into bottlerocket-os:develop Apr 29, 2021
@arnaldo2792 arnaldo2792 deleted the kernel-lockdown branch April 29, 2021 15:11
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

enable kernel lockdown in integrity mode
3 participants