-
Notifications
You must be signed in to change notification settings - Fork 294
docs: Security model #6031
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
docs: Security model #6031
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks great!
|
||
- **Eavesdropping on any Boundary communication**. | ||
All communication between clients, controllers, and workers is protected by TLS or mutually authenticated TLS, ensuring confidentiality and integrity. | ||
- **Tamerping with data at rest or in transit**. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
- **Tamerping with data at rest or in transit**. | |
- **Tampering with data at rest or in transit**. |
- Boundary Client Agent specifics: | ||
- The Client Agent stores session credentials and related information in memory and in the user's OS-dependent keyring. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The client agent doesn't use the keyring, but the CLI does. The client agent only stores credentials in-memory, they are never persisted to anything.
- Brokered credentials may be returned to the user's device and displayed in plain text. | ||
- Boundary Client Agent specifics: | ||
- The Client Agent stores session credentials and related information in memory and in the user's OS-dependent keyring. | ||
Boundary persists auth tokens to platform-specific keyring storage. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Boundary persists auth tokens to platform-specific keyring storage. | |
Boundary CLI persists auth tokens to platform-specific keyring storage. |
- The Client Agent stores session credentials and related information in memory and in the user's OS-dependent keyring. | ||
Boundary persists auth tokens to platform-specific keyring storage. | ||
If an attacker can read the memory of the Client Agent process or has compromised the OS user account under which the Client Agent is running and authenticated, they may be able to access these active session credentials. | ||
- The Client Agent's security relies on the OS user context; an OS user can only connect to sessions managed by the Client Agent if they are the same OS user that authenticated the agent. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
- The Client Agent's security relies on the OS user context; an OS user can only connect to sessions managed by the Client Agent if they are the same OS user that authenticated the agent. | |
- The Client Agent's security relies on the OS user context; an OS user can only connect to sessions managed by the Client Agent if they are the same OS user that initiated the DNS lookup that created the session. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Technically, on MacOS, we use the most recently authenticated user, since we can't tell who is making the DNS request. We may want to differentiate between Windows and MacOS here to be explicit.
Description
This PR adds security model documentation to the Boundary docs to better explain what is and isn't considered part of the threat model. This information is documented for other HashiCorp products in a similar format.
This update also combines the HCP Boundary security model document with the more general Boundary information. Once this is published, we would remove the standalone HCP version.
View the preview deployment
PCI review checklist
Examples of changes to security controls include using new access control methods, adding or removing logging pipelines, etc.