7 Cloud Native Environment Security Recommendations and Procedures

After installation, the OC-CNE system security stance should be audited prior to placing the system into service. This primarily consists of changing credentials and sequestering SSH keys to trusted servers. The following table lists all the credentials that need to be checked, changed and retained:

Credential Name Deployment Type Associated Resource Initial Setting Credential Rotation
TOR Switch Bare Metal Only username and password Cisco Top or Rack Switch username and password from PreFlight Checklist Reset post-install
Enclosure Switch Bare Metal Only username and password HP Enclosure Switch username and password from PreFlight Checklist Reset post-install
OA Admin Bare Metal Only username and password On-board Administrator Console username and password from PreFlight Checklist Reset post-install
ILO Admin Bare Metal Only username and password HP Integrated Lights Out Manger username and password from PreFlight Checklist Reset post-install
Server Super User (root) All username and password Server Super User Set to well-known Oracle default during server installation Reset post-install
Server Admin User SSH All SSH Key Pair Server Admin User Key Pair generated at install time Can rotate keys at any time; key distribution manual procedure

If factory or Oracle defaults were used for any of these credentials, it must be changed prior to placing the system into operation. The customer must store these credentials in a safe and secure way offsite. It is recommended that the customer must plan a regular schedule for updating (rotating) these credentials. Specific procedures and recommendations for OC-CNE credential management are provided below.

1.1.Network Security Recommendations and Procedures

Recommendation: Review and Follow TOR installation procedures

The OC-CNE on-premise installation guide provides detailed procedures on how to configure the TOR switches and configure them for remote monitoring. Deviations from the standard installation time configurations are not recommended.

Credential Management Procedures

Procedure 1: Setting Top Of Rack Switch Credentials

This procedure is used to set the credentials on the Cisco TOR switch as deployed with the bare metal deployment option. Steps for creating and deleting accounts and for setting account passwords is given below.

Table 7-1 Setting Top Of Rack Switch Credentials

Step No. Description Est time
1. Login to the TOR switch (from the bastion host):

$ ssh <username>@<switchIP address> User Access Verification

Password: <password>

Cisco Nexus Operating System (NX-OS) Software

TAC support: www.cisco.com/tac

<switchname>#
1m
2. Change the password for <username>:

# configure

Enter configuration commands, one per line. End with CNTL/Z.

(config)# username <username> password<newpassword>

(config)#exit

1m
3. Create a new user (if desired):

# configureEnter configuration commands, one per line. End with CNTL/Z. (config)# username <newusername> password <newpassword> role [network-operator|network-admin|vdc-admin|vdc-operator] (config)#exit
1m
4. Verify the account changes by exiting the ssh session (type exit) and repeat step 1.

# exit

Connection to <switchIP address> closed.

$ $ ssh <newusername>@<switchIP address>

User Access Verification Password: <newpassword>

Cisco Nexus Operating System (NX-OS) SoftwareTAC support: www.cisco.com/tac

......

<switchname>#
1m
5. Delete an unneeded user account:

# configureEnter configuration commands, one per line. End with CNTL/Z.

(config)# no username <username>

(config)#exit
1m
6. Change the enable secret:

(config)# enable secret <newenablepassword>

(config)# exit
1m
7. Save the configuration changes: # copy running-config startup-config

100%

Copy complete, now saving to disk (please wait)...

Copy complete.
1m

Note:

Recommendation: Change TOR passwords before placing site into service. The TOR switch credentials show be changed prior to placing the site into service.

Note:

Recommendation: Use Strong Passwords.The Network Administrator must choose complex TOR Switch passwords as per their organization's security guidelines.

Procedure 2: Setting Enclosure Switch Credentials

This procedure is used to set the credentials on the HP enclosure switch as deployed with the bare metal deployment option. Steps for creating and deleting accounts and for setting account passwords is given below. For additional information, refer to: HP commands to configure enclosure switch username and password

Table 7-2 Setting Enclosure Switch Credentials

Step Description Est. Time
1. Login to the HP enclosure switch (from the bastion host): $ ssh <username>@< switchIP address>

Copyright (c)2010-2017Hewlett Packard Enterprise Development LP ** Without the owner's prior written consent, ** no decompiling or reverse-engineering shall be allowed.

<switchname>

<switchname>

sysSystem View:returnto User View with Ctrl+Z.

1m
2. Change the password for the current username: [switchname]local-user <username>class <currentclass>

[switchname-luser-manage-<username>]password simple <newpassword>

[switchname-luser-manage-<username>]quit

1m
3. Create a new user account: [switchname]local-user <newusername>class[manage|network]

New local user added

[switchname-luser-manage-<newusername>]password simple <newpassword>[switchname-luser-manage-<newusername>]quit
1m
4. Verify the account changes by exiting the ssh session (type exit) and repeat step 1. <switchname> quitConnection to <switchIP address>closed.

$

$ ssh <newusername>@< switchIP address> <newusername>@<switchIP address>'s password: <newpassword>

Copyright (c)2010-2017Hewlett Packard Enterprise Development LP *

* Without the owner's prior written consent, *

* no decompiling or reverse-engineering shall be allowed.

<switchname>

<switchname> sys

System View:returnto User View with Ctrl+Z.

1m
5. Delete an unneeded user account: [switchname]undo local-user <username>class <currentclass>

1m
6. Save the configuration changes:

[switchname]save

The current configuration will be written to the device. Are you sure? [Y/N]: y

Please input the file name(*.cfg)[flash:/<filename>]

(To leave the existing filename unchanged, press the enter key):

flash:/<filename> exists, overwrite? [Y/N]: yValidating file. Please wait...

Saved the current configuration to mainboard device successfully.

Slot1:

Save next configuration file successfully.

[switchname]

1

Note:

Recommendation: Set Enclosure Switch Credentials before Placing Into Service

The HP Enclosure switch credentials show be changed prior to placing the site into service.

Recommendation: Use Strong Passwords

The Network Administrator must choose complex Enclosure Switch passwords as per their organization's security guidelines.

1.2 Hosting Environment Security Recommendations and Procedures

The Oracle Linux 7 security guide is available at: https://docs.oracle.com/en/operating-systems/oracle-linux/7/security/E54670.pdf

This guide provides additional details for specific security procedures outlined below. However several of the procedures found in the general OL7 guide are not appropriate for the OC-CNE environment; contact Oracle Support before attempting any security related procedures which are not recommended below.

Repository Management Recommendations

System Update (YUM) Recommendations

Keep central repositories up-to date with latest yum packages; yum updates are performed on-site whenever a fresh install or upgrade is performed. An up-to date yum repository will help ensure that fixes for all publish vulnerabilities are applied.

Docker Repository Recommendations

Scan docker image repositories regularly: Scan your docker image repositories regularly using a tool such as clair or anchored-engine. All images are scanned and vulnerabilities assessed at product development time, but new exploits / vulnerabilities may be reported/fixed later. Scan tools typically use a database of known vulnerabilities - refer to tool vendor for instructions on creating off-line (internet isolated) vulnerability database

1.3 Credential Management Procedures

Procedure 1: Setting HP Onboard Administrator (OA) Credentials.

This procedure is used to set the credentials on the HP Onboard Administrator as deployed with the bare metal deployment option. Steps for creating and deleting accounts and for setting account passwords is shown. For additional information, please refer to: HP commands to configure OA username and password.

Table 7-3 Setting HP Onboard Administrator (OA) Credentials

Step Description Est Time
1 Login to the OA:

$ ssh <username>@<OA address>

-----------------------------------------------------------------------------

WARNING: This is aprivatesystem. Do not attempt to login unless you are anauthorized user. Any authorized or unauthorized access and use may be moni-tored and can result in criminal or civil prosecution under applicable law

.-----------------------------------------------------------------------------

Firmware Version:4.85

Built:04/06/2018@06:14OA

Bay Number:1

OA Role: Active

<username>@<OA address>'s password: <password>

HPE BladeSystem Onboard Administrator

(C) Copyright2006-2018Hewlett Packard Enterprise Development LP

Type'HELP'to display a list of valid commands.

Type'HELP <command>'to display detailed information about a specific command.

Type'HELP HELP'to display more detailed information about the help system.

OA-A45D36FD5FB1>

1m
2 Change the current password:

OA-A45D36FD5FB1> set password <newpassword>

Changed passwordforthe"<username>"user account.

OA-A45D36FD5FB1>

1m
3 Add new user:

OA-A45D36FD5FB1> add user <newusername>

New Password: <newpassword>

Confirm : <newpassword>

User"<newusername>"created.

You may set user privileges with the 'SET USER ACCESS' and 'ASSIGN' commands.

OA-A45D36FD5FB1> set user access <newusername> [ADMINISTRATOR|OPERATOR|USER]"<newusername>"has been given [administrator|operator|user] level privileges.

1m
4 Assign full access to the enclosure for the user:

OA-A45D36FD5FB1> assign server all <newusername>

<newusername> has been granted access to the valid requested bay(sOA-A45D36FD5FB1> assign interconnect all <newusername>

<newusername> has been granted access to the valid requested bay(s)OA-A45D36FD5FB1> assign oa <newusername>

<newusername> has been granted access to the OA.

1m
5 Verify the new account:

OA-A45D36FD5FB1> exit

Connection to <OA address> closed.[bastion host]# ssh <newusername>@<OA address>

-----------------------------------------------------------------------------

WARNING: This is a private system. Do not attempt to login unless you are unauthorized user. Any authorized or unauthorized access and use may be monitored and can result in criminal or civil prosecution under applicable law.

-----------------------------------------------------------------------------

Firmware Version:4.85

Built:04/06/2018@06:14

OA Bay Number:1

OA Role: Active

<newusername>@<OA address>'s password: <newpassword>

HPE BladeSystem Onboard Administrator

(C) Copyright2006-2018Hewlett Packard Enterprise Development LP

Type 'HELP' to display a list of valid commands.

Type 'HELP <command>' to display detailed information about a specific command.

Type 'HELP HELP' to display more detailed information about the help system. OA-A45D36FD5FB1>

1m
6 Delete an unneeded user account:

OA-A45D36FD5FB1> remove user <username>

Entering anything other than 'YES' will result in the command not executing.

Are you sure you want to remove testuser1? yes

User"<username>"removed.

1m

Procedure 2: Setting HP Integrated Lights Out Manger (ILO) Credentials

This procedure is used to set the credentials on the HP Integrated Lights Out Managers as deployed with the bare metal deployment option. Steps for creating and deleting accounts and for setting account passwords is shown.

Table 7-4 Setting HP Integrated Lights Out Manger (ILO) Credentials

Step Description Est Time
1 Login to the iLO:

$ ssh <username>@<iLO address>

<username>@<iLO address>'s password: <password>User:<username> logged-in to ...(<iLO address> / <ipv6 address>)

iLO Advanced2.61at Jul272018

Server Name: <server name>

Server Power: On

</>hpiLO->

1m
2 Change the current password:

</>hpiLO-> set /map1/accounts1/ <username> password= <newpassword>

status=0

status_tag=COMMAND COMPLETED

Tue Aug2013:27:082019

</>hpiLO->

1m
3 Create a new user account:

</>hpiLO-> create /map1/accounts1 username= <newusername> password= <newpassword> group=admin,config,oemHP_rc,oemHP_power,oemHP_vm

status=0

status_tag=COMMAND COMPLETED

Tue Aug2013:47:562019

User added successfully.

1m
4 Verify the new user account:

</>hpiLO-> exit

status=0

status_tag=COMMAND COMPLETED

Tue Aug2013:30:522019CLI session stoppedReceived disconnect from <iLO address> port22:11: Client Disconnect

Disconnected from <iLO address> port22

[bastion host]# ssh <newusername>@<iLO address>

<newusername>@<iLO address>'s password: <newpassword>

User:<newusername> logged-in to ...(<iLO address> / <ipv6 address>)

iLO Advanced2.61at Jul272018

Server Name: <server name>Server

Power: On</>hpiLO->

1m
5 Delete an unneeded account: </>hpiLO-> delete /map1/accounts1/ <username>

status=0

status_tag=COMMAND COMPLETED

Tue Aug2013:59:042019

User deleted successfully.

Procedure 3: Setting Root Passwords for All Cluster Nodes

The procedure to reset the root account required that the administrator login to each and every server.

To reset the root account ,for each and every server in the cluster perform the following steps:

Table 7-5 Setting Root Passwords for All Cluster Nodes

Step Description Est. time
1 Login to the next server:

$ ssh admusr @<cluster server IP>
1m
2 Perform the root password change:

$ sudo passwd root

New password: <new password>

Retype new password: <new password>

Retype new password:<new password>
1m
3 Repeat steps 1 - 2 for each and every server in the cluster.

Note:

The administrator (admusr) account is provided without a usable password hash. Thus requiring the use of SSH keys to access the account. The SUDO users access is configured without the requirement of a password. If you would like to enable the SUDO passwords for the administrator, you also need to assign a password to the administrator account using a procedure very similar to the one outlined above.