feat: harden gateway with policy engine, secure tools, and governance docs
This commit is contained in:
24
docs/hardening.md
Normal file
24
docs/hardening.md
Normal file
@@ -0,0 +1,24 @@
|
||||
# Hardening
|
||||
|
||||
## Application Hardening
|
||||
|
||||
- Secure defaults: localhost bind, write mode disabled, policy-enforced writes.
|
||||
- Strict config validation at startup.
|
||||
- Redacted secret handling in logs and responses.
|
||||
- Policy deny/allow model with path restrictions.
|
||||
- Non-leaking production error responses.
|
||||
|
||||
## Container Hardening
|
||||
|
||||
- Non-root runtime user.
|
||||
- `no-new-privileges` and dropped Linux capabilities.
|
||||
- Read-only filesystem where practical.
|
||||
- Explicit health checks.
|
||||
- Separate dev and production compose profiles.
|
||||
|
||||
## Operational Hardening
|
||||
|
||||
- Rotate API keys regularly.
|
||||
- Minimize Gitea bot permissions.
|
||||
- Keep policy file under change control.
|
||||
- Alert on repeated policy denials and auth failures.
|
||||
Reference in New Issue
Block a user