Skip to main content Link Menu Expand (external link) Document Search Copy Copied

Ceph Hardening for DevSecOps

Table of contents

  1. Update Ceph to the latest version
  2. Enable SSL/TLS encryption for Ceph traffic
  3. Set secure file permissions for Ceph configuration files
  4. Limit access to the Ceph dashboard
  5. Configure Ceph to use firewall rules
  6. Implement network segmentation for Ceph nodes
  7. Configure Ceph to use encrypted OSDs
  8. Use SELinux or AppArmor to restrict Ceph processes

List of some best practices to harden Ceph for DevSecOps

Update Ceph to the latest version

sudo apt-get update && sudo apt-get upgrade ceph -y

Enable SSL/TLS encryption for Ceph traffic

ceph config set global network.ssl true

Set secure file permissions for Ceph configuration files

sudo chmod 600 /etc/ceph/*

Limit access to the Ceph dashboard

sudo ufw allow 8443/tcp && sudo ufw allow 8003/tcp && sudo ufw allow 8080/tcp

Configure Ceph to use firewall rules

sudo ceph config set global security firewall iptables

Implement network segmentation for Ceph nodes

sudo iptables -A INPUT -s <trusted network> -j ACCEPT

Configure Ceph to use encrypted OSDs

sudo ceph-osd --mkfs --osd-uuid <osd-uuid> --cluster ceph --osd-data <path to data directory> --osd-journal <path to journal directory> --osd-encrypted

Use SELinux or AppArmor to restrict Ceph processes

sudo setenforce 1 (for SELinux) or sudo aa-enforce /etc/apparmor.d/usr.bin.ceph-osd (for AppArmor)