(https://gvisor.dev/docs/architecture_guide/security/)
A sandbox is not a substitute for a secure architecture.
save-cloud services should either be able to authorize against each other (including agent), or the tested tool should have restricted network access (i.e. being able to communicate only with targets outside of cluster IP range)
Plan:
(https://gvisor.dev/docs/architecture_guide/security/)
save-cloud services should either be able to authorize against each other (including agent), or the tested tool should have restricted network access (i.e. being able to communicate only with targets outside of cluster IP range)
Plan:
NetworkPolicyto allow access from save-agent pods only to main ports of backend, orchestrator and sandbox ([WIP] Authenticated agent #1247)/actuatorand/swagger-uito a separate management port ([Helm] Set another port as a management port for all JVM services #1342)ServiceAccounttokens ([WIP] authenticated microservices #1238)