Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/googlecloudplatform/gatekeeper-securitycenter
Report OPA Gatekeeper audit violations in Security Command Center.
https://github.com/googlecloudplatform/gatekeeper-securitycenter
cloud-security-command-center gatekeeper gcp gke google-cloud google-cloud-platform kubernetes
Last synced: 4 months ago
JSON representation
Report OPA Gatekeeper audit violations in Security Command Center.
- Host: GitHub
- URL: https://github.com/googlecloudplatform/gatekeeper-securitycenter
- Owner: GoogleCloudPlatform
- License: apache-2.0
- Created: 2020-11-18T21:58:35.000Z (about 4 years ago)
- Default Branch: main
- Last Pushed: 2024-04-10T22:52:19.000Z (10 months ago)
- Last Synced: 2024-04-14T02:21:41.778Z (10 months ago)
- Topics: cloud-security-command-center, gatekeeper, gcp, gke, google-cloud, google-cloud-platform, kubernetes
- Language: Go
- Homepage:
- Size: 410 KB
- Stars: 40
- Watchers: 6
- Forks: 18
- Open Issues: 2
-
Metadata Files:
- Readme: README.md
- Contributing: CONTRIBUTING.md
- License: LICENSE
Awesome Lists containing this project
README
# gatekeeper-securitycenter
`gatekeeper-securitycenter` allows you to use Security Command Center as a
dashboard for Kubernetes resource policy violations.`gatekeeper-securitycenter` is:
- a Kubernetes controller that creates
[Security Command Center](https://cloud.google.com/security-command-center/docs)
[findings](https://cloud.google.com/security-command-center/docs/reference/rest/v1/organizations.sources.findings)
for violations reported by the
[audit controller](https://cloud.google.com/anthos-config-management/docs/how-to/auditing-constraints)
in
[Open Policy Agent (OPA) Gatekeeper](https://open-policy-agent.github.io/gatekeeper/website/).- a command-line tool that creates Security Command Center
[sources](https://cloud.google.com/security-command-center/docs/reference/rest/v1/organizations.sources)
and manages the IAM policies of the sources.![Architecture](docs/architecture.svg)
`gatekeeper-securitycenter` works with both
[Security Command Center Standard tier](https://cloud.google.com/security-command-center/pricing#standard_tier_pricing)
and
[Security Command Center Premium tier](https://cloud.google.com/security-command-center/pricing#premium_tier_pricing).If you use
[Policy Controller](https://cloud.google.com/anthos-config-management/docs/concepts/policy-controller)
from Google Cloud, consider using its
[in-built integration with Security Command Center](https://cloud.google.com/blog/products/identity-security/expanding-gke-posture-policy-controller-violations-now-in-security-command-center).## Prerequisites
Before installing the `gatekeeper-securitycenter` controller, create all the
following resources:- a Kubernetes cluster, for instance a Google Kubernetes Engine (GKE) cluster
- OPA Gatekeeper installed in the Kubernetes cluster
- a Security Command Center source
- a Google service account with the
[Security Center Findings Editor](https://cloud.google.com/security-command-center/docs/access-control)
role on the Security Command Center source.To create these prerequisite resources, choose one of these options:
1. Use the shell scripts in the [`scripts`](scripts) directory. These scripts
create resources using the `gcloud` command-line tool from the
[Google Cloud SDK](https://cloud.google.com/sdk).2. Follow the step-by-step instructions in the accompanying
[tutorial](https://github.com/GoogleCloudPlatform/gatekeeper-securitycenter/blob/main/docs/tutorial.md).If you use Security Command Center Standard tier, you must have an appropriate
Cloud IAM role for Security Command Center at the organization level, such as
[Security Center Admin Editor](https://cloud.google.com/security-command-center/docs/access-control).
Your organization administrator can
[grant you this role](https://cloud.google.com/resource-manager/docs/access-control-org).If your user account is not associated with an
[organization](https://cloud.google.com/resource-manager/docs/creating-managing-organization)
on Google Cloud, you can create an organization resource by signing up for
either [Cloud Identity](https://cloud.google.com/identity) or
[Google Workspace](https://workspace.google.com/) (formerly G Suite) using a
domain you own. Cloud Identity offers a
[free edition](https://gsuite.google.com/signup/gcpidentity/welcome).## Downloading the `gatekeeper-securitycenter` command-line tool
Download the binary for your platform:
```sh
VERSION=v0.4.2
curl -Lo gatekeeper-securitycenter "https://github.com/GoogleCloudPlatform/gatekeeper-securitycenter/releases/download/${VERSION}/gatekeeper-securitycenter_$(uname -s)_$(uname -m)"
chmod +x gatekeeper-securitycenter
```## Installing the `gatekeeper-securitycenter` controller
Install the `gatekeeper-securitycenter` controller in your cluster by following
the [documentation in the manifest directory](manifests/README.md).## Documentation
- [Tutorial](https://github.com/GoogleCloudPlatform/gatekeeper-securitycenter/blob/main/docs/tutorial.md)
- [Building `gatekeeper-securitycenter`](docs/build.md)
- [Developing `gatekeeper-securitycenter`](docs/development.md)
- [Releasing `gatekeeper-securitycenter`](docs/release.md)
## Disclaimer
This is not an officially supported Google product.