Skip to content

Security Recommendations #100

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
theobjectivedad opened this issue Feb 28, 2025 · 0 comments
Open

Security Recommendations #100

theobjectivedad opened this issue Feb 28, 2025 · 0 comments

Comments

@theobjectivedad
Copy link

I've successfully setup the Synology CSI driver on my Microk8s cluster to primarily provision iSCSI - thank you for providing a CSI driver.

I do however have a few security-related enhancement aside from adding CHAP support (#63). IMO mutual CHAP, least-privileged service accounts, TLS verification, and network binding control would make the Synology CSI driver much more viable in a corporate setting.

Enable iSCSI Management From Lower Privilege Group

As mentioned in #62, there isn't clear documentation on how to properly setup a service account user. The configuration that worked for me was to (a) disable 2FA and (b) add the user to the administrators group. While disabling 2FA is reasonable there really should be a lower privilege group the service account can be a member of.

Add TLS Verification

The CSI driver does not verify the certificate of the DiskStation, see pkg/dsm/webapi/dsmwebapi.go. Ideally a path to a CA trust should be read from a user-specified environment variable.

Network Binding Control

When the CSI driver provisions new iSCSI targets, it would be good to be able to control network binding restrictions as a first-layer security measure. Perhaps these could be quickly added as additional parameters to the StorageClass.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant