Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Guideline for Applying Secure Defaults #734

Closed
7 of 9 tasks
PushkarJ opened this issue Jul 16, 2021 · 14 comments · Fixed by #865
Closed
7 of 9 tasks

Guideline for Applying Secure Defaults #734

PushkarJ opened this issue Jul 16, 2021 · 14 comments · Fixed by #865
Assignees
Labels
proposal common precursor to project, for discussion & scoping

Comments

@PushkarJ
Copy link
Contributor

PushkarJ commented Jul 16, 2021

Description: As part of #480 , a discussion sparked about what does secure defaults and applying it to a project mean for us and for the community in general. This issue is an attempt to reasonably address that through community discussions

Impact: Identify state of the art and carve content to articulate this in a standalone doc, which could be adopted in other Security TAG deliverables

Some questions we can attempt to address:

  • How does secure defaults, impact new user experience, stability, backwards compatibility?
  • Is there a golden middle ground somewhere that can be articulated?
  • Which projects have done this well in the past?
  • Does transparent security mean the same as secure defaults?
  • Are there any case studies from end users (security conscious ones especially) that we could benefit from?
  • Is this even something that is theoretical possible but never realistically achievable?

TO DO

  • Security TAG Leadership Representative: @TheFoxAtWork
  • Project leader(s): @PushkarJ
  • Project Members: Authors and contributors to the guideline
  • Scope: Create a high level guideline to successfully enable a project to adopt secure defaults. Each guideline will be brief, with rationale, "how-to" and example
  • Deliverable(s): https://docs.google.com/document/d/1Y1OCgto48Woc0UsZHq7zHuYOFGYI_DTpC2o7k7KYeaA/edit#
  • Due date: 31 October 2021
  • Slack Channel (as needed): #tag-security
  • Meeting Time & Day: Regular meetings
  • Next Step: Decide where and how to publish and adop this guidance
@PushkarJ PushkarJ added proposal common precursor to project, for discussion & scoping triage-required Requires triage labels Jul 16, 2021
@lumjjb
Copy link
Contributor

lumjjb commented Jul 17, 2021

If worthwhile, we can also dedicate a meeting session to have a discussion around this.. However, it would be good for a discussion to have presentation to level-set and bring folks up to speed, so if someone can do a short 15 mins presentation on this, we can schedule it..

@TheFoxAtWork
Copy link
Contributor

@PushkarJ ?

@PushkarJ
Copy link
Contributor Author

Thanks for the ping! Been waiting to see if folks are interested in this, especially to present as @lumjjb suggested, since the scope really depends on how many contributors are interested in this. If there are handful of people willing to collaborate we could write a blog post or position paper on this. If not many contributors are interested, we could merge this as a separate section into #747

@TheFoxAtWork
Copy link
Contributor

@PushkarJ is this something we can float for today's meeting topic to at least walk through what a scope would look like and see if folks are interested?

@PushkarJ
Copy link
Contributor Author

PushkarJ commented Aug 25, 2021

We did bring it up last time. Happy to revisit today and then fold it into white paper, if there is not much interest to pursue this separately :)

@chubirka
Copy link

I recommend creating a statement/document that establishes "secure by default" as a specific guiding principle. Then create some patterns that illustrate that principle. I'm happy to be a contributor on this.

@lumjjb
Copy link
Contributor

lumjjb commented Sep 15, 2021

May be of relevance #176

@PushkarJ
Copy link
Contributor Author

Hi All, thanks for the interest in defining secure by default for cloud native community. To get things started today I documented some guiding principles for "secure by default" here: https://hackmd.io/byHwZ8WPTCaSHnXaosxVcQ

You will need to sign-in to hackmd to collaborate (edit, comment). Hope this triggers some ideas from you all. Happy to discuss this in one of our regular meetings as well especially the rationale and examples :)

@TheFoxAtWork TheFoxAtWork removed the triage-required Requires triage label Sep 23, 2021
@TheFoxAtWork
Copy link
Contributor

Call to action sent out: https://lists.cncf.io/g/cncf-tag-security/message/71

@TheFoxAtWork TheFoxAtWork added this to the STAG Rep: @TheFoxAtWork milestone Sep 23, 2021
@TheFoxAtWork
Copy link
Contributor

@PushkarJ Could you provide an updated issue description and timeline given the call to action sent out? I think resolution of the call to action is a good deliverable for this and we can then determine at final publication if/how we can integrate this with existing group processes (such as security reviews or security pals)

@PushkarJ PushkarJ changed the title [Proposal] Applying Secure Defaults Guideline for Applying Secure Defaults Sep 25, 2021
@PushkarJ
Copy link
Contributor Author

@TheFoxAtWork Done!

@PushkarJ
Copy link
Contributor Author

4 days remaining before the doc closes for public comment :) Link: https://docs.google.com/document/d/1Y1OCgto48Woc0UsZHq7zHuYOFGYI_DTpC2o7k7KYeaA/edit#

@stale
Copy link

stale bot commented Dec 28, 2021

This issue has been automatically marked as inactive because it has not had recent activity.

@stale stale bot added the inactive No activity on issue/PR label Dec 28, 2021
@PushkarJ
Copy link
Contributor Author

PushkarJ commented Jan 5, 2022

From today's meeting: Add a call out to https://web.mit.edu/Saltzer/www/publications/protection/ . Also add a note in whitepaper that it is assumed that the reader is already familiar with the terms mentioned in the paper, unless explicitly called out in the paper or CN Lexicon.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
proposal common precursor to project, for discussion & scoping
Projects
None yet
Development

Successfully merging a pull request may close this issue.

4 participants