Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Keep policy information encrypted too #81

Open
v0lkan opened this issue Jan 10, 2025 · 0 comments
Open

Keep policy information encrypted too #81

v0lkan opened this issue Jan 10, 2025 · 0 comments
Labels

Comments

@v0lkan
Copy link
Contributor

v0lkan commented Jan 10, 2025

SPIKE's current trust model treats the backing store as "untrusted".

Which means anything in the backing store that is sensitive or can be used as an attack vector shall be encrypted.

We already encrypt secrets in the backing store;
however policies are stored in plain text.

The spiffe_id_pattern and path_pattern of a SPIKE policy (although much less sensitive than a secret) can be used by and adversary as a data point to devise attacks against SPIKE Nexus. Thus they should be encrypted too.

@v0lkan v0lkan added good first issue Good for newcomers security labels Jan 10, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

1 participant