-
Notifications
You must be signed in to change notification settings - Fork 107
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Ensure High/Critical vulnerabilities in Managed Node Groups are mitigated ASAP #3752
Comments
A nice example module for doing this: |
If we do end up having to define a policy for the task, there's an example of what it needs to look like here; |
Iterated a bit on an SSM-focused IAM policy in the AWS Console (GSA/datagov-ssb#133) and tag-based target selection (GSA-TTS/datagov-brokerpak-eks#85) until the branch that @nickumia-reisys pushed was working locally. |
@hkdctol: This is the issue where we set up automatic remediation of Critical and High vulnerabilities detected in our managed nodes, in which EKS runs. (The initial scans turned up just one CVE, which has already been remediated.) Since we never install custom code on these nodes, we expect that AWS' continuing release of patches and our ongoing adoption of new AMI baselines (which we will also automate) mean we may never have to touch them beyond this. |
@nickumia-reisys on Bret's points in the above comments -- do you have screenshots or something else to export that I can set to Ryan? |
@mogul does Ryan need anything else from us before we cut over catalog to cloud.gov version? |
He wants to see us use the GSA CIS-hardened machine images for our clusters. He's also asking about container-scanning, but AFAIK he grudgingly agrees that was not part of the original ATO conditions. I've copied you on those DMs privately. |
@mogul I think you indicated that you were going to use the hardened images provided by ISE. Container scanning isn't part of original ATO conditions, but its not a sustainable gap long term. |
@rpalmer-gsa we've done that at #3668 and will cut over to cloud.gov unless we hear otherwise. Thanks! |
Note: a copy of the findings closed from this issue were exported via the process outlined here. |
User Story
In order to ensure that High or Critical findings on live EC2 instances are addressed, the data.gov team want to automatically install patched packages that address findings whenever they are available.
Acceptance Criteria
[ACs should be clearly demoable/verifiable whenever possible. Try specifying them using BDD.]
AND I am looking at AWS Inspector
AND I see a CVE detected for which an updated package is available
WHEN the next maintenance window passes
THEN I see that the CVE is no longer detected
Background
Amazon periodically releases new AWS Linux 2 AMIs for EKS that incorporate updates. However, some updates may be available between AMI versions that address CVEs, etc. We want to make sure that these updates, if they address a High or Critical finding, are installed on running instances even between the AMI update schedule. AWS Systems Manager provides a subset of functionality called Patch Manager that does this. We just need to turn it on and make sure it's running the update task on all of our EC2 instances.
Out of scope:
Security Considerations (required)
This work will make our compliance with the SI family of controls much tighter. No real downside identified.
Sketch
datagov-brokerpak-eks
aws_ssm_maintenance_window_target
aws_ssm_maintenance_window_task
that will run the default patch baseline task provided by AWS SSM Patch Manager on all images tagged witheks:cluster-name
equal to the cluster name during that windowThe text was updated successfully, but these errors were encountered: