buerokratt / POC-DMR.Cross-functional-requirements

Cross-functional requirements to take into account when developing or planning to develop Bürokratt's custom base components
MIT License
1 stars 1 forks source link

Security: Tighten Security Measures for Communication #74

Closed guypritchard closed 2 years ago

guypritchard commented 2 years ago

AS AN Architect I WANT TO Ensure that Communications are as Secure as possible by using recommended standards and versions SO THAT the opportunity for exploit is reduced

Acceptance Criteria

decodingahmed commented 2 years ago

We may want to reconsider this ticket (or maybe part of it).

Acceptance Criteria Comment
Ensure HTTPS is used wherever possible 1. Ingress for all the applications already force HTTPS.
2. NGINX ingress controller on AKS also redirects to HTTPS.
3. The dotnet apps should ideally communicate of HTTP as HTTPS is not necessary for communications between apps within the cluster
TLS 1.2 as a bare minimum Our cluster supports TLS 1.3. See the SSL Server Test report showing this: byk-dev-aks-ingress.westeurope.cloudapp.azure.com
Look at AKS control plane access At the moment, the AKS control plane is protected with RBAC and AAD and any Contributor on the Byrokratt subscription can access the control plan. We could try creating a specific security group and control who has access. Otherwise, the next step would be to wrap the cluster in a vNET
User APIs implement CORS This needs to be implemented on CentOps API