Skip to content

Commit

Permalink
CMP-2460: Restrict IdP configurations
Browse files Browse the repository at this point in the history
The choice of which identity provider to use falls onto the payment
entity. But we already know that htpaswd cannot satisfy PCI-DSS's needs,
and LDAP provider needs to be restrained.

Restrict usage of htpasswd as the identity provider, it cannot provide
user lockout feature required by PCI-DSS.

Do not allow the LDAP provider to transmit clear text passwords.
  • Loading branch information
yuumasato committed Jul 19, 2024
1 parent 80eaadb commit c6eac49
Showing 1 changed file with 13 additions and 3 deletions.
16 changes: 13 additions & 3 deletions controls/pcidss_4_ocp4.yml
Original file line number Diff line number Diff line change
Expand Up @@ -2167,7 +2167,7 @@ controls:
title: Strong authentication for users and administrators is established and managed.
levels:
- base
status: not applicable
status: partial
notes: |-
For this control to be satisfiable an identity provider must be used and the kubeadmin user
needs to be removed.
Expand Down Expand Up @@ -2199,12 +2199,17 @@ controls:
interception of communications or from stored data.
levels:
- base
status: not applicable
status: partial
notes: |-
The protection of the authentication credentials such as rendering the passwords and
passphrases unreadable during transmission and the storage of credentials on system
components is the responsibility of the third-party identity provider.
If LDAP is used as the identity provider, we do not allow it to run with the
'insecure' flag on.
rules:
- ocp_no_ldap_insecure

- id: 8.3.3
title: User identity is verified before modifying any authentication factor.
description: |-
Expand All @@ -2227,13 +2232,18 @@ controls:
confirmed.
levels:
- base
status: not applicable
status: partial
notes: |-
Account lockout for failed attempts are managed by the identity provider as all
authentication attempts that occur prior to granting access from OpenShift.
Establishing a threshold for limiting repeated failed attempts are configured with
the chosen identity provider.
In this control we do not allow usage of htpasswd as the identity provider, as it
doesn't provide user lockout feature.
rules:
- ocp_idp_no_htpasswd

- id: 8.3.5
title: If passwords/passphrases are used as authentication factors to meet Requirement
8.3.1, they are set and reset for each user.
Expand Down

0 comments on commit c6eac49

Please sign in to comment.