Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Run CIS Scans on EKS AMIs #3760

Open
4 tasks
nickumia-reisys opened this issue Mar 30, 2022 · 3 comments
Open
4 tasks

Run CIS Scans on EKS AMIs #3760

nickumia-reisys opened this issue Mar 30, 2022 · 3 comments

Comments

@nickumia-reisys
Copy link
Contributor

nickumia-reisys commented Mar 30, 2022

Purpose

We want to scan our EC2 nodes against CIS metrics, but we're not sure how to do that.

Given the above question, conducting investigation/prototyping is needed to provide factual knowledge on future steps.

2 Days of effort has been allocated and once compete, findings will be demonstrated and specific future actions will be decided.

Acceptance Criteria

[ACs should be clearly demo-able/verifiable whenever possible. Try specifying them using BDD.]

  • GIVEN a solution has been found to run CIS scans
    WHEN 2 Days expires
    THEN A proof-of-concept for how to run the CIS scans is demonstrated
    AND A path exists for adding that into the datagov-brokerpak-eks repo

Background

Discussion surrounding #3668 (comment)

Sketch

  • Investigate new ways of running scans in SSM
  • Cross-reference research with current SSM config in datagov-brokerpak-eks
  • Implement/Test scan procedure
@nickumia-reisys nickumia-reisys changed the title Run CIS Scans on EKS Container Images Run CIS Scans on EKS AMIs Mar 30, 2022
@hkdctol
Copy link
Contributor

hkdctol commented Oct 5, 2023

@nickumia-reisys will put in more context

@nickumia-reisys
Copy link
Contributor Author

I am currently investigating if AWS Fargate will accomplish everything we need. If this is successful, we don't technically need to support managed nodes (and, by extension, the GSA ISE AMI). However, which path to take will depend on the decision of the team and the integration with other GSA Teams. The GSA ISE AMI provides centralized security tooling, which would be an overall win (assuming no performance issues with using the AMI).

See the following PR for details on Fargate support

@hkdctol
Copy link
Contributor

hkdctol commented Oct 12, 2023

@btylerburton will handle categorizing these

@btylerburton btylerburton moved this to New Dev in data.gov team board Oct 13, 2023
@btylerburton btylerburton moved this from New Dev to 🧊 Icebox in data.gov team board Dec 14, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
Status: 🧊 Icebox
Development

No branches or pull requests

2 participants