kubescape / regolibrary

The regolibrary package contains the controls Kubescape uses for detecting misconfigurations in Kubernetes manifests.
Apache License 2.0
120 stars 48 forks source link

add new attack paths for security risks #598

Closed YiscahLevySilas1 closed 8 months ago

YiscahLevySilas1 commented 8 months ago

User description

Overview


Type

enhancement


Description


Changes walkthrough

Relevant files
Enhancement
external-wl-unauthenticated.json
Add AttackTrack for Unauthenticated External Database Access

attack-tracks/external-wl-unauthenticated.json
  • Added a new AttackTrack for external databases without authentication.

  • +20/-0   
    external-wl-with-cluster-takeover-roles.json
    New AttackTrack for External Workloads with Cluster Takeover Roles

    attack-tracks/external-wl-with-cluster-takeover-roles.json
  • Introduced a new AttackTrack for external workloads with cluster
    takeover roles.
  • +20/-0   
    C-0256-exposuretointernet.json
    Update Control for Internet-Exposed Workloads with New Attack Tracks

    controls/C-0256-exposuretointernet.json
  • Linked new attack tracks to the control for detecting internet-exposed
    workloads.
  • +12/-0   
    C-0267-workloadwithclustertakeoverroles.json
    Enhance Workload with Cluster Takeover Roles Control         

    controls/C-0267-workloadwithclustertakeoverroles.json
  • Updated attributes to include security tags and linked the new attack
    track.
  • +13/-1   
    security.json
    Security Framework Update with New Controls                           

    frameworks/security.json
  • Added references to new controls and updated the security framework.
  • +18/-0   

    โœจ PR-Agent usage: Comment /help on the PR to get a list of all available PR-Agent tools and their descriptions

    codiumai-pr-agent-free[bot] commented 8 months ago

    PR Description updated to latest commit (https://github.com/kubescape/regolibrary/commit/ab5c9f6df690946f4981f7270e1ecf9270fd0930)

    codiumai-pr-agent-free[bot] commented 8 months ago

    PR Review

    โฑ๏ธ Estimated effort to review [1-5] 2, because the changes are mostly additions of new JSON configurations and updates to existing configurations. The structure of the changes is straightforward, focusing on enhancing security detection capabilities. The complexity is low, and understanding the impact of these changes requires familiarity with the security framework and Kubernetes security best practices.
    ๐Ÿงช Relevant tests No
    ๐Ÿ” Possible issues Possible Misconfiguration: Ensure that the new attack tracks ("external-database-without-authentication" and "external-workload-with-cluster-takeover-roles") are accurately detecting the intended security risks without false positives or negatives. Misconfiguration could lead to overlooking critical vulnerabilities or over-alerting, which can desensitize the response to alerts.
    Data Completeness: Verify that the "subSteps" within each new AttackTrack provide comprehensive coverage of the attack vectors they aim to detect. Incomplete or overly generic definitions might not offer the actionable insights needed for effective mitigation.
    ๐Ÿ”’ Security concerns No

    โœจ Review tool usage guide:
    **Overview:** The `review` tool scans the PR code changes, and generates a PR review. The tool can be triggered [automatically](https://github.com/Codium-ai/pr-agent/blob/main/Usage.md#github-app-automatic-tools) every time a new PR is opened, or can be invoked manually by commenting on any PR. When commenting, to edit [configurations](https://github.com/Codium-ai/pr-agent/blob/main/pr_agent/settings/configuration.toml#L19) related to the review tool (`pr_reviewer` section), use the following template: ``` /review --pr_reviewer.some_config1=... --pr_reviewer.some_config2=... ``` With a [configuration file](https://github.com/Codium-ai/pr-agent/blob/main/Usage.md#working-with-github-app), use the following template: ``` [pr_reviewer] some_config1=... some_config2=... ```
    Utilizing extra instructions
    The `review` tool can be configured with extra instructions, which can be used to guide the model to a feedback tailored to the needs of your project. Be specific, clear, and concise in the instructions. With extra instructions, you are the prompter. Specify the relevant sub-tool, and the relevant aspects of the PR that you want to emphasize. Examples for extra instructions: ``` [pr_reviewer] # /review # extra_instructions=""" In the 'possible issues' section, emphasize the following: - Does the code logic cover relevant edge cases? - Is the code logic clear and easy to understand? - Is the code logic efficient? ... """ ``` Use triple quotes to write multi-line instructions. Use bullet points to make the instructions more readable.
    How to enable\disable automation
    - When you first install PR-Agent app, the [default mode](https://github.com/Codium-ai/pr-agent/blob/main/Usage.md#github-app-automatic-tools) for the `review` tool is: ``` pr_commands = ["/review", ...] ``` meaning the `review` tool will run automatically on every PR, with the default configuration. Edit this field to enable/disable the tool, or to change the used configurations
    Auto-labels
    The `review` tool can auto-generate two specific types of labels for a PR: - a `possible security issue` label, that detects possible [security issues](https://github.com/Codium-ai/pr-agent/blob/tr/user_description/pr_agent/settings/pr_reviewer_prompts.toml#L136) (`enable_review_labels_security` flag) - a `Review effort [1-5]: x` label, where x is the estimated effort to review the PR (`enable_review_labels_effort` flag)
    Extra sub-tools
    The `review` tool provides a collection of possible feedbacks about a PR. It is recommended to review the [possible options](https://github.com/Codium-ai/pr-agent/blob/main/docs/REVIEW.md#enabledisable-features), and choose the ones relevant for your use case. Some of the feature that are disabled by default are quite useful, and should be considered for enabling. For example: `require_score_review`, `require_soc2_ticket`, and more.
    Auto-approve PRs
    By invoking: ``` /review auto_approve ``` The tool will automatically approve the PR, and add a comment with the approval. To ensure safety, the auto-approval feature is disabled by default. To enable auto-approval, you need to actively set in a pre-defined configuration file the following: ``` [pr_reviewer] enable_auto_approval = true ``` (this specific flag cannot be set with a command line argument, only in the configuration file, committed to the repository) You can also enable auto-approval only if the PR meets certain requirements, such as that the `estimated_review_effort` is equal or below a certain threshold, by adjusting the flag: ``` [pr_reviewer] maximal_review_effort = 5 ```
    More PR-Agent commands
    > To invoke the PR-Agent, add a comment using one of the following commands: > - **/review**: Request a review of your Pull Request. > - **/describe**: Update the PR title and description based on the contents of the PR. > - **/improve [--extended]**: Suggest code improvements. Extended mode provides a higher quality feedback. > - **/ask \**: Ask a question about the PR. > - **/update_changelog**: Update the changelog based on the PR's contents. > - **/add_docs** ๐Ÿ’Ž: Generate docstring for new components introduced in the PR. > - **/generate_labels** ๐Ÿ’Ž: Generate labels for the PR based on the PR's contents. > - **/analyze** ๐Ÿ’Ž: Automatically analyzes the PR, and presents changes walkthrough for each component. >See the [tools guide](https://github.com/Codium-ai/pr-agent/blob/main/docs/TOOLS_GUIDE.md) for more details. >To list the possible configuration parameters, add a **/config** comment.
    See the [review usage](https://github.com/Codium-ai/pr-agent/blob/main/docs/REVIEW.md) page for a comprehensive guide on using this tool.
    codiumai-pr-agent-free[bot] commented 8 months ago

    PR Code Suggestions

    CategorySuggestions                                                                                                                                                       
    Enhancement
    Enhance the description of attack steps for clarity and mitigation guidance. ___ **Consider adding more detailed descriptions for the attack track steps to provide clearer
    guidance on how the attack can be executed and detected. This will help in understanding
    the specific actions an attacker might take and how to mitigate them.** [attack-tracks/external-wl-unauthenticated.json [14-15]](https://github.com/kubescape/regolibrary/pull/598/files#diff-3f0ebdd52387a2a1a949e852340165014f778ba834160fd455eea3ed49732301R14-R15) ```diff { "name": "Unauthenticated Access", - "description": "An unauthenticated attacker can access resources." + "description": "An unauthenticated attacker can access Kubernetes resources such as pods or services without needing credentials. This could lead to unauthorized data access or denial of service." } ```
    Add potential impact details to the attack track description. ___ **It's recommended to include potential impact details in the description of the attack
    track to help stakeholders understand the severity and urgency of addressing this risk.** [attack-tracks/external-wl-with-cluster-takeover-roles.json [14-15]](https://github.com/kubescape/regolibrary/pull/598/files#diff-dc833275e2ae28e80d7f6952ab191c558d05bfe612fa2f820776a549be7a00e5R14-R15) ```diff { "name": "Cluster/Resources Access", - "description": "An attacker has access to sensitive information and can leverage them by creating pods in the cluster." + "description": "An attacker gains access to sensitive information and can exploit this by creating unauthorized pods in the cluster, potentially leading to data theft, service disruption, or further escalation of privileges." } ```
    Add more descriptive tags to "controlTypeTags" for precise categorization. ___ **For better alignment with security standards, consider adding more tags to
    "controlTypeTags" to categorize the control more precisely, such as "access control" or
    "privilege management".** [controls/C-0267-workloadwithclustertakeoverroles.json [4-6]](https://github.com/kubescape/regolibrary/pull/598/files#diff-7d83a784e1bf8b7e0e44825fd2baa508dd2ded8124b0f35f16b93c272758c278R4-R6) ```diff { "controlTypeTags": [ - "security" + "security", "access control", "privilege management" ] } ```
    Best practice
    Standardize the naming convention for "attackTrack" references. ___ **To ensure consistency and ease of automation, consider using a standardized naming
    convention for "attackTrack" references. This could involve using snake_case or camelCase
    consistently across all JSON files.** [controls/C-0256-exposuretointernet.json [21-23]](https://github.com/kubescape/regolibrary/pull/598/files#diff-bb4119d6c9aa609d437b062f4112e23a93c1a333009fe971f46d2ed4d9ffbd34R21-R23) ```diff { - "attackTrack": "external-workload-with-cluster-takeover-roles", + "attackTrack": "external_workload_with_cluster_takeover_roles", "categories": [ "Initial Access" ] } ```
    Maintainability
    Organize controls into categories or hierarchical structures for better maintainability. ___ **To improve the maintainability of the security framework configuration, consider grouping
    related "controlID" entries under a common category or using a hierarchical structure.
    This can help in organizing controls more logically and facilitate easier updates.** [frameworks/security.json [186-189]](https://github.com/kubescape/regolibrary/pull/598/files#diff-c88e59bbd8f153d854b49e17546ea6b8864bf2532f9be44e5d339f36f2658a9fR186-R189) ```diff { - "controlID": "C-0267", - "patch": { - "name": "Workload with cluster takeover roles" - } + "category": "Cluster Security", + "controls": [ + { + "controlID": "C-0267", + "patch": { + "name": "Workload with cluster takeover roles" + } + } + ] } ```

    โœจ Improve tool usage guide:
    **Overview:** The `improve` tool scans the PR code changes, and automatically generates suggestions for improving the PR code. The tool can be triggered [automatically](https://github.com/Codium-ai/pr-agent/blob/main/Usage.md#github-app-automatic-tools) every time a new PR is opened, or can be invoked manually by commenting on a PR. When commenting, to edit [configurations](https://github.com/Codium-ai/pr-agent/blob/main/pr_agent/settings/configuration.toml#L69) related to the improve tool (`pr_code_suggestions` section), use the following template: ``` /improve --pr_code_suggestions.some_config1=... --pr_code_suggestions.some_config2=... ``` With a [configuration file](https://github.com/Codium-ai/pr-agent/blob/main/Usage.md#working-with-github-app), use the following template: ``` [pr_code_suggestions] some_config1=... some_config2=... ```
    Enabling\disabling automation
    When you first install the app, the [default mode](https://github.com/Codium-ai/pr-agent/blob/main/Usage.md#github-app-automatic-tools) for the improve tool is: ``` pr_commands = ["/improve --pr_code_suggestions.summarize=true", ...] ``` meaning the `improve` tool will run automatically on every PR, with summarization enabled. Delete this line to disable the tool from running automatically.
    Utilizing extra instructions
    Extra instructions are very important for the `improve` tool, since they enable to guide the model to suggestions that are more relevant to the specific needs of the project. Be specific, clear, and concise in the instructions. With extra instructions, you are the prompter. Specify relevant aspects that you want the model to focus on. Examples for extra instructions: ``` [pr_code_suggestions] # /improve # extra_instructions=""" Emphasize the following aspects: - Does the code logic cover relevant edge cases? - Is the code logic clear and easy to understand? - Is the code logic efficient? ... """ ``` Use triple quotes to write multi-line instructions. Use bullet points to make the instructions more readable.
    A note on code suggestions quality
    - While the current AI for code is getting better and better (GPT-4), it's not flawless. Not all the suggestions will be perfect, and a user should not accept all of them automatically. - Suggestions are not meant to be simplistic. Instead, they aim to give deep feedback and raise questions, ideas and thoughts to the user, who can then use his judgment, experience, and understanding of the code base. - Recommended to use the 'extra_instructions' field to guide the model to suggestions that are more relevant to the specific needs of the project, or use the [custom suggestions :gem:](https://github.com/Codium-ai/pr-agent/blob/main/docs/CUSTOM_SUGGESTIONS.md) tool - With large PRs, best quality will be obtained by using 'improve --extended' mode.
    More PR-Agent commands
    > To invoke the PR-Agent, add a comment using one of the following commands: > - **/review**: Request a review of your Pull Request. > - **/describe**: Update the PR title and description based on the contents of the PR. > - **/improve [--extended]**: Suggest code improvements. Extended mode provides a higher quality feedback. > - **/ask \**: Ask a question about the PR. > - **/update_changelog**: Update the changelog based on the PR's contents. > - **/add_docs** ๐Ÿ’Ž: Generate docstring for new components introduced in the PR. > - **/generate_labels** ๐Ÿ’Ž: Generate labels for the PR based on the PR's contents. > - **/analyze** ๐Ÿ’Ž: Automatically analyzes the PR, and presents changes walkthrough for each component. >See the [tools guide](https://github.com/Codium-ai/pr-agent/blob/main/docs/TOOLS_GUIDE.md) for more details. >To list the possible configuration parameters, add a **/config** comment.
    See the [improve usage](https://github.com/Codium-ai/pr-agent/blob/main/docs/IMPROVE.md) page for a more comprehensive guide on using this tool.
    github-actions[bot] commented 8 months ago

    Summary:

    github-actions[bot] commented 8 months ago

    Summary: