cncf / tag-app-delivery

📨🚚CNCF App Delivery TAG
https://tag-app-delivery.cncf.io
Apache License 2.0
788 stars 205 forks source link

[Platforms] Managing service bindings and secrets #322

Closed joshgav closed 4 months ago

joshgav commented 1 year ago

:exclamation: If you're interested in supporting and driving this work please respond to this issue. Once we have enough interest we'll schedule an initial meeting to review current ideas and proposals.


Background

The Platforms group is going deep into capability domains for platforms to seek ways to reduce complexity and increase synergies and standardization across related projects, vendors and users.

One of the domains which many find hard to rationalize today is how to seamlessly bind workloads to the capabilities or services they rely on. That is, workloads must be able to authenticate and connect to databases, object stores, message brokers, observability systems and more and there are many different ways to accomplish this.

At a high level this binding is typically accomplished by 1) getting a credential and URL from the service; 2) securely storing that info in a secure store like Hashicorp Vault; and 3) injecting that info into workloads in specific formats and locations. However, it seems every service, every platform, every secure store and every workload type has a different way to accomplish these steps.

This leads to difficulty, confusion and delay for cloud developers and lots of discomfort and concern to cloud security practitioners about how secrets are managed. For example, many folks may not realize that some projects write secret data in Kubernetes secrets as it's transferred to the workload, a practice some enterprises don't allow.

We've jumpstarted discussion about projects and ideas to address this in this Google doc. I'll copy the two main sections here to continue discussion.

Please share other projects and ideas with us and if/how you can contribute. Thanks!

Related Projects and Services

Ideas

cc @monadic @raffaelespazzoli @sttts @sabre1041 @hiddeco @cmoulliard

jkleinlercher commented 1 year ago

What about bitnami sealed-secret?

joshgav commented 1 year ago

This is still a domain we're looking to simplify. Our next step is to set initial goals and activities and gather stakeholders to discuss. Let's keep working on this Google doc: https://docs.google.com/document/d/1-9ZU7yRB3oVKozIDO5FkkZQc1svvBj4ME8pUOqN9Mjw/

Wanted to add a couple other items that have come up recently:

cmoulliard commented 1 year ago

Many thanks @joshgav to take the time to grab projects/ideas and to highlight many of the points that we should improve around the binding which is a simple concept that all of us we understand but which is complex to implement and support as many systems/actors are involved :-)

The action to bind requires under the hood to perform the following actions that we are trying to support part of the Primaza project:

Remark: Different strategies should be reviewed in order to find the best approach(es) to pass the information in a more flexible way or less-locked model:

szh commented 1 year ago

I'm interested in potentially helping out with this. I'm a member of TAG Security and a maintainer of Conjur Open Source.

abangser commented 4 months ago

In trying to get alignment on current WG priorities, I am going to suggest we close this topic. But before doing so, I want to give 1 week for anyone who is interested to revive the focus on this, else we can reopen in the future when we have the right people/energies to commit to this topic.

Thanks!

abangser commented 4 months ago

Per my last message, I am closing for now but am happy to reopen this conversation if it becomes higher priority / has a sponsor to drive it!

cmoulliard commented 4 months ago

Instead of closing it, it should be better to move the request/issue to a future milestone