https://github.com/googlecloudplatform/gatekeeper-securitycenter
Report OPA Gatekeeper audit violations in Security Command Center.
https://github.com/googlecloudplatform/gatekeeper-securitycenter
cloud-security-command-center gatekeeper gcp gke google-cloud google-cloud-platform kubernetes
Last synced: 5 months ago
JSON representation
Report OPA Gatekeeper audit violations in Security Command Center.
- Host: GitHub
- URL: https://github.com/googlecloudplatform/gatekeeper-securitycenter
- Owner: GoogleCloudPlatform
- License: apache-2.0
- Created: 2020-11-18T21:58:35.000Z (over 5 years ago)
- Default Branch: main
- Last Pushed: 2024-08-15T15:21:19.000Z (over 1 year ago)
- Last Synced: 2024-10-29T18:37:32.789Z (over 1 year ago)
- Topics: cloud-security-command-center, gatekeeper, gcp, gke, google-cloud, google-cloud-platform, kubernetes
- Language: Go
- Homepage:
- Size: 339 KB
- Stars: 42
- Watchers: 16
- Forks: 16
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
- Contributing: CONTRIBUTING.md
- License: LICENSE
Awesome Lists containing this project
README
# gatekeeper-securitycenter
`gatekeeper-securitycenter` allows you to use Security Command Center as a
dashboard for Kubernetes resource policy violations.
`gatekeeper-securitycenter` is:
- a Kubernetes controller that creates
[Security Command Center](https://cloud.google.com/security-command-center/docs)
[findings](https://cloud.google.com/security-command-center/docs/reference/rest/v1/organizations.sources.findings)
for violations reported by the
[audit controller](https://cloud.google.com/anthos-config-management/docs/how-to/auditing-constraints)
in
[Open Policy Agent (OPA) Gatekeeper](https://open-policy-agent.github.io/gatekeeper/website/).
- a command-line tool that creates Security Command Center
[sources](https://cloud.google.com/security-command-center/docs/reference/rest/v1/organizations.sources)
and manages the IAM policies of the sources.

`gatekeeper-securitycenter` works with both
[Security Command Center Standard tier](https://cloud.google.com/security-command-center/pricing#standard_tier_pricing)
and
[Security Command Center Premium tier](https://cloud.google.com/security-command-center/pricing#premium_tier_pricing).
If you use
[Policy Controller](https://cloud.google.com/anthos-config-management/docs/concepts/policy-controller)
from Google Cloud, consider using its
[in-built integration with Security Command Center](https://cloud.google.com/blog/products/identity-security/expanding-gke-posture-policy-controller-violations-now-in-security-command-center).
## Prerequisites
Before installing the `gatekeeper-securitycenter` controller, create all the
following resources:
- a Kubernetes cluster, for instance a Google Kubernetes Engine (GKE) cluster
- OPA Gatekeeper installed in the Kubernetes cluster
- a Security Command Center source
- a Google service account with the
[Security Center Findings Editor](https://cloud.google.com/security-command-center/docs/access-control)
role on the Security Command Center source.
To create these prerequisite resources, choose one of these options:
1. Use the shell scripts in the [`scripts`](scripts) directory. These scripts
create resources using the `gcloud` command-line tool from the
[Google Cloud SDK](https://cloud.google.com/sdk).
2. Follow the step-by-step instructions in the accompanying
[tutorial](https://github.com/GoogleCloudPlatform/gatekeeper-securitycenter/blob/main/docs/tutorial.md).
If you use Security Command Center Standard tier, you must have an appropriate
Cloud IAM role for Security Command Center at the organization level, such as
[Security Center Admin Editor](https://cloud.google.com/security-command-center/docs/access-control).
Your organization administrator can
[grant you this role](https://cloud.google.com/resource-manager/docs/access-control-org).
If your user account is not associated with an
[organization](https://cloud.google.com/resource-manager/docs/creating-managing-organization)
on Google Cloud, you can create an organization resource by signing up for
either [Cloud Identity](https://cloud.google.com/identity) or
[Google Workspace](https://workspace.google.com/) (formerly G Suite) using a
domain you own. Cloud Identity offers a
[free edition](https://gsuite.google.com/signup/gcpidentity/welcome).
## Downloading the `gatekeeper-securitycenter` command-line tool
Download the binary for your platform:
```sh
VERSION=v0.4.3
curl -Lo gatekeeper-securitycenter "https://github.com/GoogleCloudPlatform/gatekeeper-securitycenter/releases/download/${VERSION}/gatekeeper-securitycenter_$(uname -s)_$(uname -m)"
chmod +x gatekeeper-securitycenter
```
## Installing the `gatekeeper-securitycenter` controller
Install the `gatekeeper-securitycenter` controller in your cluster by following
the [documentation in the manifest directory](manifests/README.md).
## Documentation
- [Tutorial](https://github.com/GoogleCloudPlatform/gatekeeper-securitycenter/blob/main/docs/tutorial.md)
- [Building `gatekeeper-securitycenter`](docs/build.md)
- [Developing `gatekeeper-securitycenter`](docs/development.md)
- [Releasing `gatekeeper-securitycenter`](docs/release.md)
## Disclaimer
This is not an officially supported Google product.