Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

💡 [REQUEST] - Enabling automatic disarming via KMS integration for Nebula Authorities #178

Open
1 task done
john-cremit opened this issue Dec 10, 2024 · 0 comments
Open
1 task done
Assignees
Labels
authority enhancement New feature or request

Comments

@john-cremit
Copy link
Contributor

Is there an existing issue for this?

  • I have searched the existing issues

Reference Issues

No response

Problem

Disarming an authority instance within Nebula relies on embedding disarm key shares directly into configuration files. This approach introduces several security and operational challenges:

  1. it requires hard-coding sensitive key material, increasing the risk of accidental disclosure, theft, or misuse. As organizations scale or rotate keys, maintaining and updating these embedded secrets becomes labor-intensive and prone to human error.

  2. Relying on static, file-based configurations limits the system’s ability to dynamically adapt to changing environments and complicates cloud-native deployments.

Describe the solution you'd like

This feature request proposes integrating Nebula's authority disarming process with a trusted Key Management Service (KMS) for secure, automated key retrieval – mirroring the "auto unsealing" capabilities popularized by HashiCorp Vault.

Instead of embedding disarm key shares directly into configuration files, the authority would be configured to securely fetch and decrypt these shares at runtime, utilizing a KMS such as AWS KMS or GCP KMS. Access to these keys would be governed by robust IAM policies and role-based access controls, ensuring that disarm operations can only be performed by authorized entities.

Additional context

No response

@john-cremit john-cremit added enhancement New feature or request authority labels Dec 10, 2024
@john-cremit john-cremit self-assigned this Dec 10, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
authority enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

1 participant