UNCLASSIFIED - NO CUI

Skip to content

Resolve "Egress Whitelist - Fortify" | SKIP UPGRADE

Stephen Galamb requested to merge 88-egress-whitelist-fortify into main

General MR

Summary

This MR introduces a Sidecar and a set of ServiceEntries for Fortify when istio.enabled: true and istio.hardened.enabled: true. This is in support of big-bang&160.

Relevant logs/screenshots

(Include any relevant logs/screenshots)

Linked Issue

#88 (closed)

Upgrade Notices

A Sidecar resource has been added to the fortify namespace that disallows egress to endpoints that are not part of the Istio service registry (a.k.a REGISTRY_ONLY). The outboundTrafficPolicy.mode in the Sidecar can be configured, however, to be something other than REGISTRY_ONLY if desired by setting istio.hardened.outboundTrafficPolicyMode. This provides a redundant layer of network security in addition to NetworkPolicies. This Sidecar is disabled by default but can be enabled by setting istio.enabled: true and istio.hardened.enabled: true.

Additional custom ServiceEntries can be created by populating the istio.hardened.customServiceEntries list.

Edited by Samuel Sarnowski

Merge request reports