Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/inspektor-dev/inspektor
Inspektor is a protocol-aware proxy that is used to enforce access policies👮
https://github.com/inspektor-dev/inspektor
access-control acl authorization go iam openpolicyagent permissions rbac rust security vuejs
Last synced: about 1 month ago
JSON representation
Inspektor is a protocol-aware proxy that is used to enforce access policies👮
- Host: GitHub
- URL: https://github.com/inspektor-dev/inspektor
- Owner: inspektor-dev
- License: apache-2.0
- Created: 2021-10-30T15:22:38.000Z (about 3 years ago)
- Default Branch: main
- Last Pushed: 2022-07-15T05:32:30.000Z (over 2 years ago)
- Last Synced: 2024-10-28T18:36:29.544Z (about 1 month ago)
- Topics: access-control, acl, authorization, go, iam, openpolicyagent, permissions, rbac, rust, security, vuejs
- Language: Rust
- Homepage: https://inspektor.cloud
- Size: 22.1 MB
- Stars: 282
- Watchers: 5
- Forks: 12
- Open Issues: 18
-
Metadata Files:
- Readme: README.md
- License: LICENSE
- Code of conduct: CODE_OF_CONDUCT.md
Awesome Lists containing this project
- awesome-rust - Inspektor - A database protocol-aware proxy that is used to enforce access policies 👮 (Applications / Security tools)
- awesome-rust-cn - Inspektor - 一个数据库协议感知代理,用于执行访问策略👮。 (应用程序 Applications / 安全工具 Security tools)
- awesome-rust - Inspektor - A database protocol-aware proxy that is used to enforce access policies 👮 (Applications / Security tools)
- fucking-awesome-rust - Inspektor - A database protocol-aware proxy that is used to enforce access policies 👮 (Applications / Security tools)
- fucking-awesome-rust - Inspektor - A database protocol-aware proxy that is used to enforce access policies 👮 (Applications / Security tools)
README
Inspektor
Inspektor is a protocol-aware proxy that is used to enforce access policies👮
## What is Inspektor?
Inspektor is a protocol-aware proxy that is used to enforce access policies. It helps organizations in securing their data assets and obtaining data compliance.Inspektor is designed to work with all databases such as Postgres, MySQL, and MongoDB.
The access policies are defined using OPA (open policy agent). Since policies are written in OPA, you can write policies such as granting access to the support engineer only if a support ticket is assigned.Go to the [official documentation](https://www.openpolicyagent.org/docs/latest/) to learn more about OPA.
## Slack Integration Demo
## Use Cases
- standardise your ad hoc data access
- Create access credentials in no time for your dev team to debug
- Manage all your data policies in a centralized place and avoid managing data policies in silos
- Protect PPI data of your customers while collaborating
- Avoid dangerous commands like `DELETE`,`UPDATE` accidentally.## The OPA(Open-Policy-Agent).
OPA is used for a unified toolset and framework for policy across the cloud-native stack. Use OPA to release, analyze, and review policies without sacrificing availability or performance.
Here is the example policy, written using rego. This example policy allows users with ‘support’ roles to modify the shipped column of the claimed_items table and hides the email column of the customer table from the users with the ‘support’ role.
```rego
package inspektor.resource.acldefault allow = false
default protected_attributes = []
default allowed_attributes = []
role_permission := {
"support": [{"postgres-prod": {# insert is not allowed for the support roles.
"insert": {"allowed": false, "allowed_attributes": {}},
# shipped column of claimed_items only allowed to update
"update": {"allowed": true, "allowed_attributes": {"prod.public.claimed_items.shipped"}},# copy is not allowed
"copy": {"allowed": false, "allowed_attributes": {}, "protected_attributes":{}},
# support role can view every columns of the database except email column of customers table.
"view": {"allowed": true, "protected_attributes": {"prod.public.customers.email"}}, }}],
}# retrive all the resources that can be accessible by the
# incoming groups. eg: support, admin, dev
resources[resource] {
resource = role_permission[input.groups[_]][_]
}# retrive all the permissions for the given datasource and
# action. eg: view, update
permission = resources[_][input.datasource][input.action]# this permission is allowed.
allow {
permission. allowed
}# what are the attributes that are allowed to
# modify
allowed_attributes = intersection(attributes) {
attributes := {attribute | attribute := permission.allowed_attributes}
}# attributes that needs to be hidden
# to the user.
protected_attributes = intersection(attributes) {
attributes := {attributes | attributes := permission.protected_attributes}
}
```## Architecture
Inspektor comprises 2 main components.
1. The Control Plane
2. The Data Plane
### The Control Plane:
The control plane acts as a management service that dynamically configures your data plane in order to enforce policies.It is like a control center where an admin can configure and access all the roles of a particular employee or a user.
### The Data Plane:
The data plane is deployed along with your data service. Dataplane enforces the access policies on all the queries that are coming to your database by intercepting the network traffic.## Supported Data Source
- Postgres
## Planned Data Sources
- Snowflake
- MongoDB
- MYSQL
- S3## Join Us!
*Inspektor is an open-source project. If you have some more amazing ideas to improve Inspektor or if you find some bugs or critical errors in the current code, then please let us know by joining the [Inspektor Discord](https://discord.gg/YxZbDJHTxf). You can also visit the Github Discussion.*