-
Notifications
You must be signed in to change notification settings - Fork 526
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
first 5 security assessments (before process review/improvement) #167
Comments
I'll be on the Harbor assessment (non-lead). Daniel Iziourov volunteers to participate in the Falco assessment. |
I can help with keycloak assessment - I can lead this as well. |
happy to assist with Harbor. |
I would be happy to partner with another member to perform an audit (Jonathan Meadows) |
I would be happy to assist with keycloak assessment |
@JustinCappos I see you added Istio. I had assumed that our "first five" would all be CNCF projects. What's your thinking on adding Istio to the list? |
@ultrasaurus you beat me to it, exactly my thinking as well. Suggest to do Envoy instead, which is a CNCF project and used in service mesh data planes, including Istio. |
Did we have discussions with anyone from keycloak about security reviews yet? if not i will reach out to them to gauge interest and timeline. |
@lumjjb looped you into an email thread from a few months ago (cc'd @JustinCappos) -- we said we'd get back to them when we were further along in our process... so I think it would be a great time to reconnect. Thank you! |
@nickolaev @fkautz @haiodo - Adding the other Network Service Mesh maintainers here. Happy to engage when you guys are ready :) |
Hi, is this the right place to say we would like and are ready for a security audit for kubeadm? kubeadm is the recommended bootstrapper for Kubernetes and is consumed by a lot of other Kubernetes infrastructure bootstrappers such as Kubespray and Kubernetes Cluster API. cc @timothysc |
Just an aside wrt projects that had a prior audit... I feel previous audits are good inputs but are just one of many inputs into what should be a consistently applied process. Certainly for practical reasons deferring those until later makes sense. But they should be scheduled for a later assessment IMO. In short every CNCF project should go through the same assessment process eventually and consistently. |
I'm looking forward to the security audit for NSM. Once we are more established, I am also going to approach multiple companies who are depending on NSM to see if we can get them to provide independent security audits. The more eyes the better. |
@fkautz I see you have mostly completed the CII best practices: Any particular reason this could not be pushed to 100%? Happy to help. |
I would be happy to assist with KeyCloak. |
@cloudsriseup @harche Awesome, I think we almost have a full group for KeyCloak. We had a chat with the maintainers and this is slated for sometime in August! |
if you still need an extra person for KeyCloak, feel free to add me to it. |
Not sure if I am helpful or less than, but I would be happy to be at least a ride-along on any remaining assessment. |
@ficcaglia we're a relatively new project, we're getting to these tasks. :) If you have any suggestions or would like to help, let me know. Ping us on slack.cncf.io on #nsm or me directly under the fkautz username. Cheers! |
@fkautz sure! it would be a good example of "assessment readiness" since you are engaging so soon! I'll ping you on slack next week. @randomvariable I'm not speaking "officially", but my guess is that given the load of CNCF projects queued up...it might be awhile before we have bandwidth to cover non-CNCF projects...I defer to @ultrasaurus on that. (note also the discussion around Istio above) However, I think a huge benefit of the open process here is that individual (non-CNCF) projects can take all the work product and process templates here, then reach out to their own community and organize a "self-assessment" following the exact same methodology. (once it's defined sufficiently!) Then assuming the project is ultimately accepted for CNCF Sandbox, you would be that much more ahead of the curve! It is also a good test of whether the methodology and process is usable by others...is it well defined? does it make sense across domains? do other assessment teams hit the same or different bottlenecks? are the results similar? etc. Just to codify the project queue, I have added a draft overview table here: #241 |
I'd like to volunteer to observe and learn more about the process so that I can |
@danmx most definitely, I think we will have space for keycloak. |
Happy to join this effort regarding assessment process improvement. |
Happy to join the security assessment improvement process |
Interested to help in the WG |
Comment on this thread if you'd like to be part of the working group to improve security assessment process! Just comment on the thread and we will invite everyone to a new slack channel for this discussion! |
Count me in. My day job constraints (unforecasted day job Outlook bookings) are considerable, hence noon (except Wed) is good and I'm willing to do earlier or later outside the normal workday if needed. Having a specific day of the month, or biweekly, for instance, that I can block out would help facilitate my regular participation. (Apologies for this self-centered tone here.) In fact, if we have a straw man slot, I'd love to block it today. I'm on eastern time. |
I would be interested to join this effort. Thanks. |
Falco is not active - we should take that off the list. |
@sunstonesecure-robert done. I will create a slack channel shortly! Look out for it and get on slack (if you aren't already on the CNCF slack!) |
Can someone add me? Thanks.
Regards,
Michele
…On Wed, Sep 23, 2020 at 1:45 PM Brandon Lum ***@***.***> wrote:
Comment on this thread if you'd like to be part of the working group to
improve security assessment process! Just comment on the thread and we will
invite everyone to a new slack channel for this discussion!
—
You are receiving this because you commented.
Reply to this email directly, view it on GitHub
<#167 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AHR3BAILJVWAQ5C75ZIWMH3SHIX4LANCNFSM4HOBWDTQ>
.
|
At the kick-off meeting, we went through the process of improving the security assessment process! We are trying something new that some of us have had success with in the past. We are going to use a Mural board to brainstorm on the ideas. This will allow collaboration in a fairly asynchronous way. Also a remind we are on CNCF slack channel: #sig-security-secassess-wg The phases of the process is going to be:
Next Steps & Action Items: Let's fill this up by Oct 15 to stay on schedule!
The boxes on the top and bottom are the individual brainstorming boxes. The task for now is to:
You can create more sticky notes by right clicking on a sticky note and duplicating it! |
Next meeting is currently scheduled for 15 Oct 10am-11am PST. details are in the slack channel. |
Hi All! Reminder that we are meeting today at 10-11am PST! Looking forward to seeing everyone! |
Hi All! Last Thursday, we went through the mural board and grouped up some of the suggestions that people wrote into different categories, I will be going through them and defining some issues for folks to take the lead on. If you haven't had the chance to put in any suggestions, please do so now! Put them in one of the sub-categories or create a new category (circle) if it doesn't fit! I will be going through these tomorrow to start organizing them.. so please put in your suggestions by tomorrow (10/20)! |
Next Steps: Synthesized IssuesHi All! The following are the list of subcategories that we came up with, as well as the ideas and premises organized accordingly! I think it looks like we have a pretty good list of things with pretty well defined scopes. The cochairs and TLs would like to encourage members to take the lead on some of these issues. Please comment if you find a topic interesting that you'd like to work on! Provide some consistency across reviewsPremise:
Ideas:
Naming and Scope of assessmentsPremise:
Ideas:
Additional suggestion of scope to include related to security testing
Benefits of a Security Assessment for ProjectsPremise:
Ideas:
Time and EffortPremise:
Ideas:
Additional Context:
Getting more reviewersPremise:
Ideas:
Mapping to TOC ProcessPremise
Ideas
Process Improvement/ChangesProcess documentation
Tracking issue:
Self-assessment:
Reviewing process
Feedback and post review
Misc:
|
Hi All - the issues for each of the topics have been created! Please go through and sign up for ones that you would like to be involved with! |
First five are complete -- closing this issue! |
We have a target of 5 security assessments, before doing a retrospective on process and addressing (most of) open issues/questions
This was the initial set of security-related projects, initially identified by TOC for our SIG: SPIFFE, SPIRE, Open Policy Agent, Notary, TUF, Falco. We omitted those that had already had a formal audit or TOC contributor assessment.
Done:
In Progress
Considered:
Note: of the CNCF security-related projects identified by the TOC, some have already received a prior assessment or audit
Project lead: @JustinCappos
SIG Chair: @ultrasaurus
The text was updated successfully, but these errors were encountered: