Skip to content

Commit 20527f7

Browse files
amolnar-ghlcavalle
authored andcommitted
TELCODOCS-2171#Remove refs to telco in Day2Ops Security files and file names
1 parent 76489fe commit 20527f7

20 files changed

+157
-158
lines changed

_topic_maps/_topic_map.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3590,11 +3590,11 @@ Topics:
35903590
Dir: security
35913591
Topics:
35923592
- Name: Security basics
3593-
File: telco-security-basics
3593+
File: security-basics
35943594
- Name: Host security
3595-
File: telco-security-host-sec
3595+
File: security-host-sec
35963596
- Name: Security context constraints
3597-
File: telco-security-sec-context-constraints
3597+
File: security-sec-context-constraints
35983598
---
35993599
Name: Specialized hardware and driver enablement
36003600
Dir: hardware_enablement
Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
:_mod-docs-content-type: ASSEMBLY
2+
[id="security-basics"]
3+
= Security basics
4+
include::_attributes/common-attributes.adoc[]
5+
:context: security-basics
6+
7+
toc::[]
8+
9+
Security is a critical component of {product-title} deployments, particularly when running cloud-native applications.
10+
11+
You can enhance security for high-bandwidth network deployments by following key security considerations. By implementing these standards and best practices, you can strengthen security in most use cases.
12+
13+
include::modules/security-rbac-overview.adoc[leveloffset=+1]
14+
15+
[role="_additional-resources"]
16+
.Additional resources
17+
18+
* xref:../../../authentication/using-rbac.adoc#authorization-overview_using-rbac[Using RBAC to define and apply permissions]
19+
20+
include::modules/security-sec-accounts-overview.adoc[leveloffset=+1]
21+
22+
[role="_additional-resources"]
23+
.Additional resources
24+
25+
* xref:../../../authentication/understanding-and-creating-service-accounts.adoc#understanding-and-creating-service-accounts[Understanding and creating service accounts]
26+
27+
include::modules/security-identity-prov-config.adoc[leveloffset=+1]
28+
29+
[role="_additional-resources"]
30+
.Additional resources
31+
32+
* xref:../../../authentication/understanding-identity-provider.adoc#understanding-identity-provider[Understanding identity provider configuration]
33+
34+
include::modules/security-replacing-kubeadmin-user.adoc[leveloffset=+1]
35+
36+
[role="_additional-resources"]
37+
.Additional resources
38+
39+
* xref:../../../authentication/identity_providers/configuring-htpasswd-identity-provider.adoc#identity-provider-htpasswd-about_configuring-htpasswd-identity-provider[Configuring an htpasswd identity provider]
40+
41+
include::modules/security-sec-considerations-telco.adoc[leveloffset=+1]
42+
43+
include::modules/security-pod-sec-in-kub-and-ocp.adoc[leveloffset=+1]
44+
45+
include::modules/security-infra.adoc[leveloffset=+1]
46+
47+
include::modules/security-lifecycle-mgmnt.adoc[leveloffset=+1]
48+
49+
[role="_additional-resources"]
50+
.Additional resources
51+
52+
* xref:../../../edge_computing/day_2_core_cnf_clusters/updating/telco-update-welcome.adoc#[Upgrading a telco core CNF clusters]
Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,27 +1,27 @@
11
:_mod-docs-content-type: ASSEMBLY
2-
[id="telco-security-host-sec"]
2+
[id="security-host-sec"]
33
= Host security
44
include::_attributes/common-attributes.adoc[]
5-
:context: telco-security-host-sec
5+
:context: security-host-sec
66

77
toc::[]
88

9-
include::modules/telco-security-rhcos-overview.adoc[leveloffset=+1]
9+
include::modules/security-rhcos-overview.adoc[leveloffset=+1]
1010

1111
[role="_additional-resources"]
1212
.Additional resources
1313

1414
* xref:../../../architecture/architecture-rhcos.adoc#rhcos-about_architecture-rhcos[About RHCOS]
1515
16-
* xref:../../../architecture/architecture-rhcos.adoc[Red Hat Enterprise Linux CoreOS (RHCOS)].
16+
* xref:../../../architecture/architecture-rhcos.adoc[Red Hat Enterprise Linux CoreOS (RHCOS)]
1717
18-
* xref:../../../edge_computing/day_2_core_cnf_clusters/security/telco-security-host-sec.adoc#telco-security-linux-capabilities-overview_telco-security-host-sec[Linux capabilities].
18+
* xref:../../../edge_computing/day_2_core_cnf_clusters/security/security-host-sec.adoc#security-linux-capabilities-overview_security-host-sec[Linux capabilities]
1919
20-
include::modules/telco-security-command-line-host-access.adoc[leveloffset=+1]
20+
include::modules/security-command-line-host-access.adoc[leveloffset=+1]
2121

2222
[role="_additional-resources"]
2323
.Additional resources
2424

25-
* xref:../../../support/troubleshooting/investigating-pod-issues.adoc#starting-debug-pods-with-root-access_investigating-pod-issues[Starting debug pods with root access].
25+
* xref:../../../support/troubleshooting/investigating-pod-issues.adoc#starting-debug-pods-with-root-access_investigating-pod-issues[Starting debug pods with root access]
2626
27-
include::modules/telco-security-linux-capabilities-overview.adoc[leveloffset=+1]
27+
include::modules/security-linux-capabilities-overview.adoc[leveloffset=+1]
Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
:_mod-docs-content-type: ASSEMBLY
2-
[id="telco-security-sec-context-constraints"]
2+
[id="security-sec-context-constraints"]
33
= Security context constraints
44
include::_attributes/common-attributes.adoc[]
5-
:context: telco-security-sec-context-constraints
5+
:context: security-sec-context-constraints
66
:imagesdir: images
77

88
toc::[]
@@ -43,10 +43,13 @@ You can use the following basic SCCs:
4343
The `restricted-v2` SCC is the most restrictive SCC provided by a new installation and is used by default for authenticated users. It aligns with Pod Security Admission (PSA) restrictions and improves security, as the original `restricted` SCC is less restrictive. It also helps transition from the original SCCs to v2 across multiple releases. Eventually, the original SCCs get deprecated. Therefore, it is recommended to use the `restricted-v2` SCC.
4444

4545
You can examine the `restricted-v2` SCC by running the following command:
46+
+
4647
[source,terminal]
4748
----
4849
$ oc describe scc restricted-v2
4950
----
51+
52+
+
5053
.Example output
5154
[source,terminal]
5255
----

edge_computing/day_2_core_cnf_clusters/security/telco-security-basics.adoc

Lines changed: 0 additions & 56 deletions
This file was deleted.

edge_computing/day_2_core_cnf_clusters/telco-day-2-welcome.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,4 +18,4 @@ As an administrator, you can use tools to collect and analyze the available data
1818
For more information, see xref:../day_2_core_cnf_clusters/observability/telco-observability.adoc#telco-observability[Observability in telco core CNF clusters].
1919

2020
Security:: You can enhance security for high-bandwidth network deployments in telco environments by following key security considerations.
21-
For more information, see xref:../day_2_core_cnf_clusters/security/telco-security-basics.adoc#telco-security-basics[Security basics].
21+
For more information, see xref:../day_2_core_cnf_clusters/security/security-basics.adoc#security-basics[Security basics].

modules/telco-security-command-line-host-access.adoc renamed to modules/security-command-line-host-access.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
// Module included in the following assemblies:
22
//
3-
// * edge_computing/day_2_core_cnf_clusters/security/telco-security-host-sec.adoc
3+
// * edge_computing/day_2_core_cnf_clusters/security/security-host-sec.adoc
44

55
:_mod-docs-content-type: CONCEPT
6-
[id="telco-security-command-line-host-access_{context}"]
6+
[id="security-command-line-host-access_{context}"]
77
= Command-line host access
88

99
Direct access to a host must be restricted to avoid modifying the host or accessing pods that should not be accessed. For users who need direct access to a host, it is recommended to use an external authenticator, like SSSD with LDAP, to manage access. This helps maintain consistency across the cluster through the Machine Config Operator.

modules/telco-security-identity-prov-config.adoc renamed to modules/security-identity-prov-config.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
// Module included in the following assemblies:
22
//
3-
// * edge_computing/day_2_core_cnf_clusters/security/telco-security-basics.adoc
3+
// * edge_computing/day_2_core_cnf_clusters/security/security-basics.adoc
44

55
:_mod-docs-content-type: CONCEPT
6-
[id="telco-security-identity-prov-config_{context}"]
6+
[id="security-identity-prov-config_{context}"]
77
= Identity provider configuration
88

99
Configuring an identity provider is the first step in setting up users on the cluster. You can manage groups at the organizational level by using an identity provider.

modules/security-infra.adoc

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
// Module included in the following assemblies:
2+
//
3+
// * edge_computing/day_2_core_cnf_clusters/security/security-basics.adoc
4+
5+
:_mod-docs-content-type: CONCEPT
6+
[id="security-infra_{context}"]
7+
= Bare-metal infrastructure
8+
9+
Hardware requirements:: In several industries, such as telco and finance, clusters are primarily built on bare-metal hardware. This means that the (op-system-first) operating system is installed directly on the physical machines, without using virtual machines. This reduces network connectivity complexity, minimizes latency, and optimizes CPU usage for applications.
10+
11+
Network requirements:: Networks in these industries sometimes require much higher bandwidth compared to standard IT networks. For example, Telco networks commonly use dual-port 25 GB connections or 100 GB network interface cards (NICs) to handle massive data throughput. Security is critical, requiring encrypted connections and secure endpoints to protect sensitive personal data.
Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
// Module included in the following assemblies:
22
//
3-
// * edge_computing/day_2_core_cnf_clusters/security/telco-security-basics.adoc
3+
// * edge_computing/day_2_core_cnf_clusters/security/security-basics.adoc
44

55
:_mod-docs-content-type: CONCEPT
6-
[id="telco-security-lifecycle-mgmnt_{context}"]
6+
[id="security-lifecycle-mgmnt_{context}"]
77
= Lifecycle management
88

99
Upgrades are critical for security. When a vulnerability is discovered, it is patched in the latest z-stream release. This fix is then rolled back through each lower y-stream release until all supported versions are patched. Releases that are no longer supported do not receive patches. Therefore, it is important to upgrade {product-title} clusters regularly to stay within a supported release and ensure they remain protected against vulnerabilities.
1010

11-
For more information about lifecycle management and upgrades, see "Upgrading a telco core CNF clusters".
11+
For more information about lifecycle management and upgrades, see "Upgrading {product-title} clusters".

0 commit comments

Comments
 (0)