Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: discover lenient whitelisting policies - Crown Jewel #715

Open
Ankurk99 opened this issue Apr 25, 2023 · 0 comments
Open

feat: discover lenient whitelisting policies - Crown Jewel #715

Ankurk99 opened this issue Apr 25, 2023 · 0 comments
Assignees
Labels
enhancement New feature or request

Comments

@Ankurk99
Copy link
Contributor

Ankurk99 commented Apr 25, 2023

Description
The current discovered security policies are not usable. It's because we are discovering least-permissive policies (for zero trust) by default and if the discovered policy miss any important binary, it can makes the application unusable or even crash.
The aim is to discover lenient whitelisting policies - starting with the policies based on mount points.

Working

  • Get all the used mounted mount points from the deployment
  • Check if the mount point is being accessed or not. If not, then deny access to that particular mount point.

cc: @nyrahul

@Ankurk99 Ankurk99 added the enhancement New feature or request label Apr 25, 2023
@Ankurk99 Ankurk99 self-assigned this Apr 25, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

1 participant