Files
LogSeq/pages/security.md
2025-12-11 06:26:12 -08:00

24 lines
3.0 KiB
Markdown
Raw Blame History

This file contains invisible Unicode characters
This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.
- VME/Morpeus whitepapee
- Morning all,
- Currently there is no formal internal standard requiring a specific set of hardening guidelines (i.e. Guidance on which of these security features to enable)
- Informally the org has standardized on the CIS benchmarks (level 1 and 2) across all server OSs. These are very well regarded benchmarks in the industry and are widely used.
- These are currently implemented via the GLBP (GreenLake Image Build Pipeline - also called Zion) and this generates and validates images inline with the CIS L1 & L2 benchmarks.
- This build tool is current used for PCE, PCE-D, HMV, and starting to be used for PCAI.
- It builds RHEL, SLES, Ubuntu, etc to these same standards.
- It's unclear how rigorous the current implementation is (i.e. Are they failing all builds that do not meet the benchmark)
- To my knowledge Morpheus is shipped as a software package today and are not directly shipping OS images. OS hardening is managed via the downstream solutions (PCE, etc).
- https://pages.github.hpe.com/cloud/dream/docs/overview/strategic-direction.html
id:: 68168763-e33d-48a5-8e96-2e175f9e67d3
- Security Standards and ATA docs (from tracy)
id:: 681686ce-6f02-4405-84ab-6a0aa7ca92b7
- [HPE GreenLake Developer Standards Home Page | HPE GreenLake platform](https://developer.greenlake.hpe.com/docs/greenlake/standards/)
- Secure Architecture Design:  [Secure Architecture Design | HPE GreenLake Cloud Platform](https://developer.greenlake.hpe.com/docs/greenlake/standards/ratified/security/secure_design_and_architecture/)
- Secure Coding Policy:  [HPE GreenLake Development Standard for Secure Coding Overview | HPE GreenLake Cloud Platform](https://developer.greenlake.hpe.com/docs/greenlake/standards/policies/secure-coding/)
- Secure Coding Guide:  [HPE GreenLake Development Standard for Secure Coding | HPE GreenLake Cloud Platform](https://developer.greenlake.hpe.com/docs/greenlake/standards/ratified/secure_coding/secure_coding_and_reviews/)
- Architectural Threat Analysis
- Policy requiring ATA:  [HPE GreenLake Development Policy for Secure Architecture Design | HPE GreenLake Platform](https://developer.greenlake.hpe.com/docs/greenlake/standards/policies/secure_design_and_architecture_policy/)
- Template for ATA:   [Architecture Page Template - GreenLake Cloud Services - Confluence](https://hpe.atlassian.net/wiki/spaces/HCSS/pages/2936935232/Architecture+Page+Template)
- ATA Requirements:  [Architecture Page Requirements - GreenLake Cloud Services - Confluence](https://hpe.atlassian.net/wiki/spaces/HCSS/pages/2936930970/Architecture+Page+Requirements)
- ATA Review Details:  [Architecture Page Review - GreenLake Cloud Services - Confluence](https://hpe.atlassian.net/wiki/spaces/HCSS/pages/2936955734/Architecture+Page+Review)
- GLCSS security shartepoint https://hpe.sharepoint.com/sites/msteams_532f51/Shared%20Documents/Forms/AllItems.aspx?id=%2Fsites%2Fmsteams%5F532f51%2FShared%20Documents%2FGeneral%2FGLCS%20Security&viewid=62df5ef0%2Dfdf3%2D46e0%2Db120%2D5d69aacf0a36&FolderCTID=0x012000CDBE6F7A65C81A41A4258F91F273AC29
-