You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The ArgoCD application is currently managed within the same cluster as the staging and production environments, which violates GitOps security practices regarding cluster separation. This configuration is unsafe and could potentially allow attackers to compromise the GitOps system through a compromised pod in one of the applications. Additionally, it may be misleading for users who fork the repository and use it out-of-the-box, as they could unknowingly adopt this insecure setup. We appreciate your attention to this matter and look forward to any improvements that can be made.
Follow the installation instructions to set up ArgoCD within the same namespace for both staging and production environments. This creates an insecure setup:
ArgoCD should be deployed in its own cluster, managing applications in separate clusters for both staging and production environments. This separation is crucial because it minimizes the risk of privilege escalation and unauthorized access, protecting the integrity of each environment. Failing to follow this best practice can lead to vulnerabilities that compromise the entire system, as highlighted in our article on revealing a critical vulnerability in Argo CD.
Thank you for taking the time to address this important issue. If there is anything else I can assist you with, please feel free to reach out. Your efforts to enhance the security of the Seldon Core project are greatly appreciated!
The text was updated successfully, but these errors were encountered:
Describe the bug
The ArgoCD application is currently managed within the same cluster as the staging and production environments, which violates GitOps security practices regarding cluster separation. This configuration is unsafe and could potentially allow attackers to compromise the GitOps system through a compromised pod in one of the applications. Additionally, it may be misleading for users who fork the repository and use it out-of-the-box, as they could unknowingly adopt this insecure setup. We appreciate your attention to this matter and look forward to any improvements that can be made.
Paths with Observed Behavior
We observed this behavior in the following paths:
Jenkins Classic Notebook
Jenkins Readme
To reproduce
Follow the installation instructions to set up ArgoCD within the same namespace for both staging and production environments. This creates an insecure setup:
Create ArgoCD projects for staging and production within the same namespace:
Expected behavior
ArgoCD should be deployed in its own cluster, managing applications in separate clusters for both staging and production environments. This separation is crucial because it minimizes the risk of privilege escalation and unauthorized access, protecting the integrity of each environment. Failing to follow this best practice can lead to vulnerabilities that compromise the entire system, as highlighted in our article on revealing a critical vulnerability in Argo CD.
The same is documented on ArgoCD Official Documentation
P.S
Thank you for taking the time to address this important issue. If there is anything else I can assist you with, please feel free to reach out. Your efforts to enhance the security of the Seldon Core project are greatly appreciated!
The text was updated successfully, but these errors were encountered: