@@ -30,25 +30,25 @@ performance:
30
30
- Depletion as denial of service
31
31
- PVC
32
32
- Ephemeral
33
- - Networking
34
- - Encryption (mTLS)
35
- - Certificates
36
- - TLS certificates presented by ` coderd `
37
- - TLS certificats presented by the applications with which Coder
38
- interacts
39
- - Boundaries (e.g., network policies)
40
- - External interactions (ingress and egress)
41
- - IP address depletion as denial of service
42
- - Each workspace gets an IP address in the ` pod ` subset
43
- - Each dev URL gets an IP address in the ` services ` subnet
44
- - Kubernetes roles
45
- - Service accounts for Coder to create pods
46
- - Cluster admins (use of cluster admins can pose a security risk)
47
- - Cloud access to the control plane
48
- - Node security
49
- - Upgrades to keep up with Kubernetes
50
- - Access to node user accounts
51
- - Cloud access to nodes
33
+ - Networking
34
+ - Encryption (mTLS)
35
+ - Certificates
36
+ - TLS certificates presented by ` coderd `
37
+ - TLS certificats presented by the applications with which Coder
38
+ interacts
39
+ - Boundaries (e.g., network policies)
40
+ - External interactions (ingress and egress)
41
+ - IP address depletion as denial of service
42
+ - Each workspace gets an IP address in the ` pod ` subset
43
+ - Each dev URL gets an IP address in the ` services ` subnet
44
+ - Kubernetes roles
45
+ - Service accounts for Coder to create pods
46
+ - Cluster admins (use of cluster admins can pose a security risk)
47
+ - Cloud access to the control plane
48
+ - Node security
49
+ - Upgrades to keep up with Kubernetes
50
+ - Access to node user accounts
51
+ - Cloud access to nodes
52
52
53
53
### Recommendations
54
54
@@ -72,14 +72,14 @@ deploying security controls:
72
72
- Site admins could convert a user authenticating via OIDC to built-in,
73
73
allowing the admin to impersonate the user
74
74
- Container registry
75
- - The registry account used to add the registry should be a specific
75
+ - The registry account used to access images should be a specific
76
76
Coder-only account so that Coder users can only pull approved images
77
77
- CVMs can only pull unauthenticated containers, which means that any user can
78
78
reference any container within the registry
79
79
- Git provider
80
80
- OAuth linkage allows Coder admins to perform actions as the linked Git user
81
81
- SSH keys generated by Coder and added to workspaces can be used to
82
- facilitate 2FA to Coder via GitLab
82
+ circumvent 2FA to GitLab via Coder
83
83
- Git integration request both SSH and HTTPS access to function
84
84
- Access to all user repos must be added to a Coder workspace to clone private
85
85
dotfiles repos
0 commit comments