-
Notifications
You must be signed in to change notification settings - Fork 61
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Cluster API Security Self Assessment #40
Cluster API Security Self Assessment #40
Conversation
@PushkarJ: The label(s) In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
@PushkarJ: GitHub didn't allow me to request PR reviews from the following users: Ankitasw. Note that only kubernetes members and repo collaborators can review this PR, and authors cannot review their own PRs. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
I'll try to find some time to go over the doc. (/cc @fabriziopandini fyi) |
i already provided feedback on some of these while there were in google docs form, i believe. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@PushkarJ this is great work! thank you!
If I can give a small suggestion is to improve a little bit the report/accompany it with a google sheet or something where it will be easier to have a quick glance at the list of things to do.
Expanding this a little bit, ideally required actions should be prioritized, so we can start planning how to improve CAPI security posture incrementally.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thank you again for the exhaustive feedback Stefan, Fabrizio, Lubomir !! Tried to address most comments. Will update the doc soon with relevant changes where needed
Hi @sbueringer @fabriziopandini 👋🏼 Just did another walkthrough on the comments and resolved a few with updates. Next step: Out of total 58 recommendations, we need to still update status of about 31 of them. Best way to find those 31 would be to:
Once you find them please update select one of the options from:
Let me know if doing this together in a working session would be helpful and I would be happy to set it up!! |
4fea35b
to
0816a3a
Compare
cd6cae1
to
552493a
Compare
Add reviewers name and handles Updates to resolve review feedback Further updates to status of recommended mitigations
552493a
to
eed0b78
Compare
We are now ready for review. Let me know if I missed linking a tracking issue to any of the threats in the doc. |
/assign aladewberry (For review / feedback and overall structure as new lead of security self-assessments) |
@PushkarJ Ack! WIll try and get this read through before I'm off next week. |
/lgtm I like the layout with the description of the project, personas, main flows, and then the security examination. I imagine we'll iterate incrementally as we continue assessing other projects, but this seems like an excellent place to start. |
/label tide/merge-method-squash |
/approve |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: aladewberry, PushkarJ The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/lgtm |
/approve |
Description
SIG Cluster Lifecycle and SIG Security worked together over several months, inspired from https://github.com/cncf/tag-security self-assessment process to write this self-assessment that identifies feature and documentation that needs work to improve the security posture of the sub-project.
Note
This is the first of it's kind effort at CNCF where a sub-project of a graduated project was assessed via collaboration between Security experts and maintainers of this sub-project. Past self-assessments via CNCF TAG Security have been focussed on graduating projects.
If you would like to request self-assessment for your sub-project, please create an issue by clicking on this link
Fixes #8
xref cncf/tag-security#603 and kubernetes-sigs/cluster-api#4446
Project Tracker
All the issues that are an outcomes of the self-assessment are tracked here: https://github.com/orgs/kubernetes/projects/83/views/1
/sig security cluster-lifecycle
/area security
/kind feature
/cc @sbueringer @Ankitasw @rficcaglia @randomvariable
/hold for #48