Skip to content

Commit

Permalink
Merge 2d29022 into backport/net-6203-default-intention-policy-docs/fa…
Browse files Browse the repository at this point in the history
…irly-amazing-ferret
  • Loading branch information
hc-github-team-consul-core authored Mar 22, 2024
2 parents 5f96131 + 2d29022 commit 33ac3fb
Showing 1 changed file with 12 additions and 4 deletions.
16 changes: 12 additions & 4 deletions website/content/docs/connect/security.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -26,12 +26,20 @@ of Consul.

## Checklist

### Default Intention Policy Set

Consul should be configured with a default deny intention policy. This forces
all service-to-service communication to be explicitly
allowed via an allow [intention](/consul/docs/connect/intentions).

In the absence of `default_intention_policy` Consul will fall back to the ACL
default policy when determining whether to allow or deny communications without
an explicit intention.

### ACLs Enabled with Default Deny

Consul must be configured to use ACLs with a default deny policy. This forces
all requests to have explicit anonymous access or provide an ACL token. The
configuration also forces all service-to-service communication to be explicitly
allowed via an allow [intention](/consul/docs/connect/intentions).
all requests to have explicit anonymous access or provide an ACL token.

To learn how to enable ACLs, please see the
[tutorial on ACLs](/consul/tutorials/security/access-control-setup-production).
Expand Down Expand Up @@ -100,7 +108,7 @@ will not be encrypted or authorized via service mesh.

Envoy exposes an **unauthenticated**
[administration interface](https://www.envoyproxy.io/docs/envoy/latest/operations/admin)
that can be used to query and modify the proxy. This interface
that can be used to query and modify the proxy. This interface
allows potentially sensitive information to be retrieved, such as:

* Envoy configuration
Expand Down

0 comments on commit 33ac3fb

Please sign in to comment.