first commit
This commit is contained in:
24
pages/security.md
Normal file
24
pages/security.md
Normal file
@@ -0,0 +1,24 @@
|
||||
- VME/Morpeus whitepapee
|
||||
- Morning all,
|
||||
- Currently there is no formal internal standard requiring a specific set of hardening guidelines (i.e. Guidance on which of these security features to enable)
|
||||
- Informally the org has standardized on the CIS benchmarks (level 1 and 2) across all server OSs. These are very well regarded benchmarks in the industry and are widely used.
|
||||
- These are currently implemented via the GLBP (GreenLake Image Build Pipeline - also called Zion) and this generates and validates images inline with the CIS L1 & L2 benchmarks.
|
||||
- This build tool is current used for PCE, PCE-D, HMV, and starting to be used for PCAI.
|
||||
- It builds RHEL, SLES, Ubuntu, etc to these same standards.
|
||||
- It's unclear how rigorous the current implementation is (i.e. Are they failing all builds that do not meet the benchmark)
|
||||
- To my knowledge Morpheus is shipped as a software package today and are not directly shipping OS images. OS hardening is managed via the downstream solutions (PCE, etc).
|
||||
- https://pages.github.hpe.com/cloud/dream/docs/overview/strategic-direction.html
|
||||
id:: 68168763-e33d-48a5-8e96-2e175f9e67d3
|
||||
- Security Standards and ATA docs (from tracy)
|
||||
id:: 681686ce-6f02-4405-84ab-6a0aa7ca92b7
|
||||
- [HPE GreenLake Developer Standards Home Page | HPE GreenLake platform](https://developer.greenlake.hpe.com/docs/greenlake/standards/)
|
||||
- Secure Architecture Design: [Secure Architecture Design | HPE GreenLake Cloud Platform](https://developer.greenlake.hpe.com/docs/greenlake/standards/ratified/security/secure_design_and_architecture/)
|
||||
- Secure Coding Policy: [HPE GreenLake Development Standard for Secure Coding Overview | HPE GreenLake Cloud Platform](https://developer.greenlake.hpe.com/docs/greenlake/standards/policies/secure-coding/)
|
||||
- Secure Coding Guide: [HPE GreenLake Development Standard for Secure Coding | HPE GreenLake Cloud Platform](https://developer.greenlake.hpe.com/docs/greenlake/standards/ratified/secure_coding/secure_coding_and_reviews/)
|
||||
- Architectural Threat Analysis
|
||||
- Policy requiring ATA: [HPE GreenLake Development Policy for Secure Architecture Design | HPE GreenLake Platform](https://developer.greenlake.hpe.com/docs/greenlake/standards/policies/secure_design_and_architecture_policy/)
|
||||
- Template for ATA: [Architecture Page Template - GreenLake Cloud Services - Confluence](https://hpe.atlassian.net/wiki/spaces/HCSS/pages/2936935232/Architecture+Page+Template)
|
||||
- ATA Requirements: [Architecture Page Requirements - GreenLake Cloud Services - Confluence](https://hpe.atlassian.net/wiki/spaces/HCSS/pages/2936930970/Architecture+Page+Requirements)
|
||||
- ATA Review Details: [Architecture Page Review - GreenLake Cloud Services - Confluence](https://hpe.atlassian.net/wiki/spaces/HCSS/pages/2936955734/Architecture+Page+Review)
|
||||
- GLCSS security shartepoint https://hpe.sharepoint.com/sites/msteams_532f51/Shared%20Documents/Forms/AllItems.aspx?id=%2Fsites%2Fmsteams%5F532f51%2FShared%20Documents%2FGeneral%2FGLCS%20Security&viewid=62df5ef0%2Dfdf3%2D46e0%2Db120%2D5d69aacf0a36&FolderCTID=0x012000CDBE6F7A65C81A41A4258F91F273AC29
|
||||
-
|
||||
Reference in New Issue
Block a user