-
Notifications
You must be signed in to change notification settings - Fork 276
Add security markdown #4121
Add security markdown #4121
Conversation
chore(pkg/envoy): log pod metadata always Signed-off-by: Phill Gibson <phillipgibson-github@outlook.com>
Signed-off-by: Phill Gibson <phillipgibson-github@outlook.com>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good, just 1 comment. Also please remember to use the Squash and Merge
option since you have merge commits in your PR.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thank you @phillipgibson.
- Since this doc is taken from the Helm project, could we add a line giving the Helm project attribution at the bottom of this doc?
- We don't at this time have a dedicated security team that is a subset of the maintainers so we may want to make sure there is one
- We don't at this time have guidance for the team on how to get CVE IDs. Do you know where we could get training for this from CNCF potentially? Is there a doc?
|
||
### When Not To Send A Report | ||
|
||
* If a vulnerability has been found in an application managed by OSM. Instead, contact the application maintainers |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm not sure "an application managed by OSM" is clear to me. Do we mean an application managed by an OSM control plane?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
* If a vulnerability has been found in an application managed by OSM. Instead, contact the application maintainers | |
* If a vulnerability has been found in a user application binary that does not belong to OSM, contact the application maintainers instead. |
Some questions that I have:
|
@@ -0,0 +1,76 @@ | |||
# OSM Security Process and Policy | |||
|
|||
This document provides the details on the OSM security policy and details the processes |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This document provides the details on the OSM security policy and details the processes | |
This document provides the details on the OSM security policy and processes |
Name | Key URL | Fingerprint | ||
------------------ | ---------------------------------------------------- | ----------- | ||
TBD | TBD | TBD | ||
TBD | TBD | TBD | ||
TBD | TBD | TBD |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Let's fill this list.
|
||
### When Not To Send A Report | ||
|
||
* If a vulnerability has been found in an application managed by OSM. Instead, contact the application maintainers |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
* If a vulnerability has been found in an application managed by OSM. Instead, contact the application maintainers | |
* If a vulnerability has been found in a user application binary that does not belong to OSM, contact the application maintainers instead. |
|
||
### Public Disclosure | ||
|
||
A public disclosure of security vulnerabilities is released alongside release updates or details that fix the vulnerability. We try to fully disclose vulnerabilities once a mitigation strategy is available. Our goal is to perform a release and public disclosure quickly and in a timetable that works well for users. For example, a release may be ready on a Friday but for the sake of users may be delayed to a Monday. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I didn't get the last part on why a security release could be delayed for users. Could you clarify how delaying a security patch helps?
|
||
New members are required to be active maintainers of OSM projects who are willing to perform the responsibilities outlined above. The security team is a subset of the maintainers. Members can step down at any time and may join at any time. | ||
|
||
From time to time, OSM projects are deprecated. If at any time a security team member is found to be no longer be an active maintainer on active OSM projects, this individual will be removed from the security team. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
What does OSM projects
refer to here? We should clarify this because to be the security doc refers to the OSM project
, so I am unsure why one would deprecate one or more OSM projects.
From time to time, OSM projects are deprecated. If at any time a security team member is found to be no longer be an active maintainer on active OSM projects, this individual will be removed from the security team. | |
From time to time, OSM projects may be deprecated. If at any time a security team member is found to be no longer be an active maintainer on active OSM projects, this individual will be removed from the security team. |
|
||
## Patch and Release Team | ||
|
||
When a vulnerability comes in and is acknowledged, a team - including maintainers of the OSM project affected - will assembled to patch the vulnerability, release an update, and publish the vulnerability disclosure. This may expand beyond the security team as needed but will stay within the pool of OSM project maintainers. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
When a vulnerability comes in and is acknowledged, a team - including maintainers of the OSM project affected - will assembled to patch the vulnerability, release an update, and publish the vulnerability disclosure. This may expand beyond the security team as needed but will stay within the pool of OSM project maintainers. | |
When a vulnerability comes in and is acknowledged, a team - including maintainers of the OSM project affected - will assemble to patch the vulnerability, release an update, and publish the vulnerability disclosure. This may expand beyond the security team as needed but will stay within the pool of OSM project maintainers. |
PR closed due to inactivity. |
Description: Add security markdown
Testing done: NA
Affected area:
Please answer the following questions with yes/no.
Does this change contain code from or inspired by another project? N/A
Is this a breaking change? No