# Security Details
# CVE Patching
Fairwinds uses a variety of methods, including Fairwinds Insights, to detect emerging CVEs in our agent Helm charts and source code. We use common alerting techniques through feeds, as well as scanning in our CI/CD process and clusters in which we run the agent ourselves.
When CVEs are discovered, we make a best-effort to remediate the vulnerability following the objectives below.
# Affected Items
- Code Libraries (e.g. golang module)
- Base Images - (e.g. alpine)
- Third-Party Docker Images (e.g. kube-hunter)
# Response Times
All objectives are from the date that a patched version becomes available. Fairwinds relies on third parties to patch the underlying code to fix vulnerabilities. Once this fix is released, Fairwinds aligns to the following timeframes for upgrading various dependencies:
- Low (CVSS v3.x 0.1-3.9) - During Next Upgrade Cycle
- Medium (CVSS v3.x 4.0-6.9) - 5 Business Days
- High (CVSS v3.x 7.0-8.9) - 3 Business Days
- Critical (CVSS v3.x 9.0-10.0) - One Business Day
# RBAC Requirements
Each Fairwinds Insights plugin requires a unique set of permissions in order to do its job. Here we provide a list of permissions requested by each plugin. You can also review the Helm chart (opens new window) to see the exact RBAC configurations for each plugin.
Notably, some plugins require read access to secrets. This is because they examine Helm 3
releases, which store metadata inside of a Secret
object.
If a particular plugin requires permissions that you're uncomfortable with, you can disable it
in the Helm chart by adding --set $plugin.enabled=false
.
# Permission List
Plugin | View Secrets | View Resources (non-secrets) | Other/Notes |
---|---|---|---|
kube-bench | |||
kube-hunter | |||
Polaris | ✅ | ||
RBAC reporter | ✅ | ||
Trivy | ✅ | ||
Workloads | ✅ | ||
Goldilocks | ✅ | Create/Delete VPAs | |
Release Watcher | ✅ | ✅ | Needs secrets to view Helm releases |
Pluto | ✅ | ✅ | Needs secrets to view Helm releases |
# Network Egress
The Fairwinds Insights agent needs egress to the following URLs:
# API (all methods)
- insights.fairwinds.com/*
# Docker Images (pull only)
- quay.io/fairwinds/*
- us-docker.pkg.dev/fairwinds-ops/*
- index.docker.io/aquasec/*
- index.docker.io/curlimages/*
# Supplementary Data (GET only)
- raw.githubusercontent.com/FairwindsOps/* (goldilocks)
- github.com/aquasecurity/* (trivy)
- artifacthub.io/api/v1/* (nova)