Hey there,

I've been looking for some ways to harden the systems that are deployed by 
os-ansible-deployment (soon to be openstack-ansible?) and I've been using the 
Center for Internet Security (CIS)[1] benchmarks as a potential pathway for 
that.  There are benchmarks available for various operating systems and 
applications there.

Many of the items shown there fall into a few different categories:

  1) things OSAD should configure
  2) things deployers should configure
  3) things nobody should configure (they break the deployment, for example)

#3 is often quite obvious, but #1 and #2 are a bit more nebulous.  For example, 
I opened a ticket[2] about getting auditd installed by default with 
openstack-ansible.  My gut says that many deployers could use auditd since it 
collects denials from AppArmor and that can help with troubleshooting broken 
policies.

Also, I opened another ticket[3] for compressing all logs by default.  This 
affects availability (part of the information security CIA triad[4]) in a 
fairly critical way in the long term.

My question is this: How should I go about determining which security changes 
should go upstream and which should go into documentation as things deployers 
should do locally?


[1] https://benchmarks.cisecurity.org/
[2] https://bugs.launchpad.net/openstack-ansible/+bug/1491915
[3] https://bugs.launchpad.net/openstack-ansible/+bug/1493981
[4] https://en.wikipedia.org/wiki/Information_security#Key_concepts

--
Major Hayden

__________________________________________________________________________
OpenStack Development Mailing List (not for usage questions)
Unsubscribe: openstack-dev-requ...@lists.openstack.org?subject:unsubscribe
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-dev

Reply via email to