Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

security-vulnerabilities: add more info about base images #11236

Merged
merged 1 commit into from
Apr 28, 2022

Conversation

howardjohn
Copy link
Member

Please provide a description for what this PR is for.

And to help us figure out who should review this PR, please
put an X in all the areas that this PR affects.

  • Configuration Infrastructure
  • Docs
  • Installation
  • Networking
  • Performance and Scalability
  • Policies and Telemetry
  • Security
  • Test and Release
  • User Experience
  • Developer Infrastructure

@howardjohn howardjohn requested a review from a team as a code owner April 27, 2022 17:25
@istio-testing istio-testing added the size/S Denotes a PR that changes 10-29 lines, ignoring generated files. label Apr 27, 2022

Istio offers two sets of docker images, based on `ubuntu` (default) and based on `distroless` (see [Harden Docker Container Images](docs/ops/configuration/security/harden-docker-images/)).
These base images occasionally have CVEs.
The Istio security team has automated scanning to ensure base images are kept free of CVEs.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

product security?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

rest of page uses "Istio security team". Want me to change them all?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Nope. Sounds like that's been the norm, and I had missed that.


## Base Images

Istio offers two sets of docker images, based on `ubuntu` (default) and based on `distroless` (see [Harden Docker Container Images](docs/ops/configuration/security/harden-docker-images/)).
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Istio offers two sets of docker images, based on `ubuntu` (default) and based on `distroless` (see [Harden Docker Container Images](docs/ops/configuration/security/harden-docker-images/)).
Istio offers two sets of docker images, one based on `Ubuntu` (default) and another based on `distroless` (see [Harden Docker Container Images](docs/ops/configuration/security/harden-docker-images/)).

The Istio security team has automated scanning to ensure base images are kept free of CVEs.

When CVEs are detected in our images, new images are automatically built and used for all future builds.
Additionally, the security team analyzes the vulnerabilities to see if they are exploitable in Istio directly.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

product security

@ericvn
Copy link
Contributor

ericvn commented Apr 28, 2022

/retest

@istio-testing istio-testing merged commit 2d02dea into istio:master Apr 28, 2022
@ericvn
Copy link
Contributor

ericvn commented Apr 29, 2022

/cherry-pick release-1.13

@istio-testing
Copy link
Contributor

@ericvn: new pull request created: #11242

In response to this:

/cherry-pick release-1.13

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

dhawton pushed a commit to dhawton/istio.io that referenced this pull request May 6, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
size/S Denotes a PR that changes 10-29 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants