Spike - investigate SSL termination in the sidecar

Description

Overview

One requirement for FedRAMP compliance is end-to-end encryption using FIPS 140-2 compliant cryptography algorithms/etc.  The FIPS 140-2 compliant bouncy castle library has already been incorporated into the sidecars, but we now need to allow for optional SSL termination at the sidecar for ingress requests.

Scope

  • Investigate how to setup SSL termination in the sidecar (quarkus)

    • Configuration

    • System operator/automation/hosting concerns (e.g. certificate management, etc.)

  • Document potential pitfalls, e.g. potentially related to use of cloud-generated hostnames not aligning with the certificate's domain, etc.

Acceptance Criteria

  • Spike findings are documented on the wiki and presented to the team/SAs.

  • Pros/Cons and relative effort and complexity are identified for each option/approach

  • After discussion with the team/SAs, the preferred approach is identified and a decision is logged on the wiki

Environment

None

Potential Workaround

None

Checklist

hide

TestRail: Results

Activity

Show:
Done

Details

Assignee

Reporter

Priority

Story Points

Sprint

Development Team

Eureka

TestRail: Cases

Open TestRail: Cases

TestRail: Runs

Open TestRail: Runs

Created January 23, 2024 at 10:53 PM
Updated March 8, 2024 at 10:48 PM
Resolved March 8, 2024 at 10:48 PM
TestRail: Cases
TestRail: Runs