Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Proposal] Guidance for projects on evaluation and tracking security dependencies #155

Closed
ultrasaurus opened this issue May 2, 2019 · 8 comments
Assignees
Labels
assessment-process proposed improvements to security assessment process project work of the group

Comments

@ultrasaurus
Copy link
Member

This has come up in discussions in meetings about whether we might help projects through the assessment process by recommending best practices or common techniques for projects to consider, evaluate and track security of their dependencies

@lumjjb comment

Within the ecosystem, is there a concern of delegation of security responsibilities from one project to another and vice versa? Perhaps a project is relying on security mechanisms of another CNCF technology which has not been reviewed yet? How would this affect the security posture of the project? I suppose that this would be a rare case that can be handled whenever it comes up.

@ultrasaurus ultrasaurus added the assessment-process proposed improvements to security assessment process label May 2, 2019
@ficcaglia
Copy link

ficcaglia commented May 2, 2019

Taking a cue from Ash's OPA write up he mentions the CII badge framework so I posted a "worksheet" in #153 (comment)

They don't explicitly talk of dependencies until the "beyond basics" level:
https://github.com/coreinfrastructure/best-practices-badge/blob/master/doc/other.md#externally-maintained-components

I added it - and the other Silver level items - to the worksheet.

@stale
Copy link

stale bot commented Mar 17, 2020

This issue has been automatically marked as inactive because it has not had recent activity.

@stale stale bot added the inactive No activity on issue/PR label Mar 17, 2020
@mattklein123 mattklein123 added the project work of the group label Mar 25, 2020
@stale stale bot removed the inactive No activity on issue/PR label Mar 25, 2020
@mattklein123
Copy link

FYI this is an issue we are planning on putting a considerable amount of effort into within Envoy. See envoyproxy/envoy#10471 for more information and discussion. From my perspective there is a lot of overlap between what we need to do for Envoy and what other projects also need, so it would be a shame to duplicate effort.

Is this worth a chat in one of the SIG meetings? cc @htuch @justincormack

@justincormack
Copy link
Contributor

Yes I think it would be a good discussion topic, with the aim of trying to set up a useful outcome for projects eg guidelines, working group, amendments for CII or whatever seems most useful.

@htuch
Copy link

htuch commented Mar 26, 2020

Please count me in on any meeting here. We are likely to formulate an Envoy-side policy as a starting point, but would like to ensure it has alignment with best practices across CNCF. Our main focus is in the C++ dependency space and establishing a consistent set of guidelines for when it is reasonable to add an additional dependency to Envoy. We are also interested in tooling that can allow us to propagate dependency information to determine the security posture of Envoy components such as extensions.

@anvega anvega changed the title guidance for projects on evaluation and tracking security dependencies [Proposal] Guidance for projects on evaluation and tracking security dependencies Feb 27, 2023
@anvega
Copy link
Contributor

anvega commented Feb 27, 2023

@mlieberman85 is currently reevaluating this proposal as part of the supply chain security workgroup

@mlieberman85
Copy link
Collaborator

mlieberman85 commented Feb 28, 2023

Will write something a bit more extensive up later but the gist of what some folks have been asking for is:

  • A self-assessment for supply chain security best practices with Guidance on how to hit the requirements, e.g. SSCP.
  • An automated assessment along with automated remediation of any gaps, e.g. OpenSSF Scorecard
  • Some sort of program sponsored through LF to help provide security help on certain CNCF projects that critically need it.

@anvega
Copy link
Contributor

anvega commented Jun 21, 2023

The scope of this proposal has been subsumed by the charter of the TAG's Supply Chain working group, and it's captured as an active effort that they are driving towards to. We'll close this proposal as this is now acted upon the workgroup's active efforts.

@anvega anvega closed this as completed Jun 21, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
assessment-process proposed improvements to security assessment process project work of the group
Projects
None yet
Development

No branches or pull requests

7 participants