Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Explore options for controlling policy and workload associations #32

Open
elevran opened this issue Sep 21, 2023 · 1 comment
Open

Explore options for controlling policy and workload associations #32

elevran opened this issue Sep 21, 2023 · 1 comment
Labels
enhancement New feature or request policies Issues related to policies and policy engine

Comments

@elevran
Copy link
Collaborator

elevran commented Sep 21, 2023

Explore how to better control who can set policies on workloads. In k8s the network policy selects Pods within the same namespace only. With ClusterLink the policies can have arbitrary from and to fields.

In addition, some users may want to create the notion of "buckets/containers" for policies and workloads and then ensure that the scope of influence is only within the same bucket/container. For example, one could envisage the use of a "network segment" as the container of everything else. We can then have special rules within the same "segment" and rules for governing cross segment access. Everything (policies, workload) are defined at the segment level. A segment can be (e.g., in k8s) a set of namespace, or (e.g., in VPC) subnets.

@elevran elevran added enhancement New feature or request policies Issues related to policies and policy engine labels Sep 21, 2023
@zivnevo
Copy link
Collaborator

zivnevo commented Apr 30, 2024

Currently, for a given connection, all PrivilegedAccessPolicies are considered, and only AccessPolicies in the namespace of the relevant Import/Export are considered.

@elevran , do you think more investment is required in this direction?
Should we leave a more coarse bucketing to a future management app?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request policies Issues related to policies and policy engine
Projects
None yet
Development

No branches or pull requests

2 participants