-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Alerting on Root CA key access #3224
Comments
Regarding possible ways to trigger an alert based on messages logged by Falco - there are several ways. The most straightforward one is to expose the Falco logs as metrics in Prometheus. This can be achieved by installing and running Falco Exporter next to Falco. The main downside of this approach is that Prometheus metrics created from Falco logs sometimes do not contain all details available in the log messages, and therefore it may not be possible to filter out legitimate access to the root CA key based on data available in the Prometheus metrics. Another way to trigger alerts could be to send the log messages from Falco to Loki, and trigger the alerts from there. It should be possible to get logs with full details from Falco to Loki, so more data should be available to compose rules for the alerts. It is also possible to filter out the legitimate access directly in Falco. That way Falco would only log a message in case it detects an illegitimate access to the CA file, and therefore all log messages could safely trigger an alert. So, if the filter is defined in the Falco rule, the straightforward way to fire alerts can be used. |
Another thing to consider is performance. So, we can take the straightforward approach to alerting and go with Prometheus, and in case we encounter performance issues we can change to Loki. |
As an initial solution metrics will be exposed to Prometheus via Falco Exporter (which is enabled by default). Later on we may switch to firing alerts based on logs. |
Gathering info about processes that require legitimate access to the root CA private key, so that they can be filtered out in the Falco rule. |
Tried a few ways to force legitimate access to the root CA private key, but none was logged so far. |
Tested a few more things and still did not manage to trigger a legitimate access to the root CA key file. |
Trigger and alert and possible also a page in case Falco logs an unauthorized access to the root CA key files.
In case the root CA key is accessed, the root CA (an all certificates signed by it) needs to be rotated. That is not a trivial process, especially since the CA is also stored in a secret on the MC, so it needs to be rotated both in the WC and the MC.
The best course of action to replace the leaked CA key is yet to be determined, It is possible that a new WC will have to be created and all data and workloads will need to be migrated from the old WC to the new one.
The text was updated successfully, but these errors were encountered: