ProficientNowTechRFCs

1. Introduction

RFC-TENANT-SECURITY-0001                                         Section 1
Category: Standards Track                                     Introduction

1. Introduction

← Index | Index | Next: Requirements →


1.1 Background

Modern cloud-native platforms face persistent threats from automated attacks, data exfiltration attempts, and abuse of exposed services. The OWASP Top 10 documents the most critical web application security risks, while the OWASP API Security Top 10 addresses API-specific threats. Protection against these risks requires multiple layers of defense operating at different points in the traffic flow.

Kubernetes environments introduce additional complexity through their multi-tenant nature. Multiple applications and teams share cluster resources, creating the need for strong isolation between tenants while maintaining operational efficiency. Without explicit network policies, Kubernetes allows unrestricted communication between all pods, violating the principle of least privilege.

The platform security architecture distributes responsibility across multiple RFCs, each governing a specific security domain:

DomainRFCFocus
Human IdentityRFC-IAM-0001Web UI authentication, application authorization
Secrets ManagementRFC-SECOPS-0001Vault-first secret lifecycle
Workload IdentityRFC-WORKLOAD-IDENTITYService-to-service authentication (East-West)
Privileged AccessRFC-PAM-0001SSH, database, kubectl access
Tenant SecurityThis RFCExternal traffic protection, tenant isolation (North-South)

This RFC addresses the gap in North-South traffic protection and tenant network isolation.


1.2 Current State

1.2.1 Ingress Infrastructure

The current ingress infrastructure relies on NGINX Ingress Controller, which has announced end-of-life for March 2026. This creates an imperative to evaluate replacement options that can provide both routing and security capabilities.

ComponentStateConcern
NGINX IngressDeployedEnd-of-life March 2026
TLS Terminationcert-managerFunctioning, continue pattern
WAFNoneNo OWASP protection currently deployed
Rate LimitingLimitedBasic NGINX rate limiting only

1.2.2 Network Policy Enforcement

Calico CNI is deployed and provides network policy enforcement capabilities. However, network policies are not systematically applied across namespaces.

AspectCurrent State
CNI ProviderCalico (deployed)
Default PolicyAllow-all (Kubernetes default)
Namespace IsolationInconsistent
Egress ControlsNot enforced

1.2.3 Threat Landscape

Without WAF protection, applications are exposed to common web attacks:

Threat CategoryCurrent MitigationGap
SQL InjectionApplication-level onlyNo network-level filtering
Cross-Site Scripting (XSS)Application-level onlyNo input validation at ingress
Brute Force AttacksLimited rate limitingInsufficient protection
Bot TrafficNoneNo challenge-based verification
DDoSInfrastructure-levelNo application-layer protection

1.3 Problem Statement

The platform lacks a unified approach to protecting tenant applications from external threats and isolating tenants from each other at the network layer.

1.3.1 Security Gaps

GapImpact
No WAFOWASP Top 10 attacks reach applications unfiltered
No systematic network policiesLateral movement possible between namespaces
No egress controlsData exfiltration paths exist
Limited rate limitingVulnerable to abuse and DDoS
No bot protectionAutomated attacks not mitigated

1.3.2 Operational Gaps

GapImpact
Ingress end-of-lifeNGINX Ingress requires replacement by March 2026
No centralized security managementSecurity configuration scattered
No visibility into blocked threatsIncident response hindered
Manual policy creationError-prone, inconsistent

1.3.3 Compliance Gaps

RequirementGap
SOC 2 CC6.6No documented WAF or rate limiting controls
PCI DSS 6.6WAF required for cardholder data environments
ISO 27001 A.13.1Network segmentation not systematically enforced

1.4 Motivation

This architecture addresses the identified gaps through a unified approach:

1.4.1 Unified Ingress and WAF

Deploying BunkerWeb as a combined ingress controller and WAF provides:

BenefitDescription
Single entry pointAll external traffic passes through one security layer
OWASP CRS protectionIndustry-standard rule set for common attacks
Bot mitigationChallenge-based verification (CAPTCHA, JavaScript challenges)
Rate limitingConnection and request limits per client
NGINX replacementAddresses ingress end-of-life requirement

1.4.2 Systematic Network Isolation

Implementing consistent network policies provides:

BenefitDescription
Default-deny postureTraffic must be explicitly allowed
Tenant isolationCross-namespace traffic blocked by default
Egress controlsOutbound traffic restricted
Platform guardrailsPolicies that tenants cannot override

1.4.3 Operational Improvements

BenefitDescription
Centralized managementWeb UI for WAF rule management
GitOps integrationPolicies defined in version control
ObservabilitySecurity events in monitoring stack
Compliance evidenceDocumented controls for auditors

1.5 Scope Statement

This RFC establishes the architecture for:

  1. Web Application Firewall — OWASP Top 10 protection using BunkerWeb with OWASP Core Rule Set
  2. Ingress Security — TLS termination, routing, request validation
  3. Rate Limiting — DDoS mitigation, abuse prevention
  4. Bot Mitigation — Challenge-based verification for automated threats
  5. Network Policies — Namespace isolation using Kubernetes NetworkPolicy
  6. Tenant Isolation — Multi-tenancy segmentation patterns
  7. Egress Controls — Controlled outbound traffic

This RFC does NOT establish architecture for:

  • Service-to-service authentication (see RFC-WORKLOAD-IDENTITY)
  • User authentication flows (see RFC-IAM-0001)
  • Secret management (see RFC-SECOPS-0001)
  • Privileged access management (see RFC-PAM-0001)

1.6 Success Criteria

The architecture will be considered successful when:

CriterionVerification
OWASP Top 10 protectionWAF blocks standard attack payloads in testing
Tenant isolationCross-namespace traffic denied by default
Certificate automationNo manual certificate operations required
ObservabilityAll security events visible in monitoring
GitOps complianceAll policies managed via Git
Compliance readinessControls documented for SOC 2, PCI DSS, ISO 27001

Document Navigation


End of Section 1