-
Notifications
You must be signed in to change notification settings - Fork 1.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Complete Cluster API external security audit #4446
Comments
/assign @PushkarJ @randomvariable |
@neolit123: GitHub didn't allow me to assign the following users: PushkarJ. Note that only kubernetes-sigs members, repo collaborators and people who have commented on this issue/PR can be assigned. Additionally, issues/PRs can only have 10 assignees at the same time. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Just to clarify the options a bit more here for folks with limited context from my point of view :)
|
just to update from the various slack discussions:
Overall if we can drive this forward in the community --- then use funds to cross check our work with an external party --- I think that's going to deliver max value to the user community and build skills that transfer to other efforts. |
sent email to the k8s SIGs for more visibility: |
Thanks @neolit123 ! |
/milestone Next |
FYI, A new slack channel is created for focussed discussion on this topic in Kubernetes slack workspace: #sig-security-assess-capi |
Kubernetes SIG Security will perform a community-driven, security assessment of Cluster API |
@vincepri / @neolit123 probably okay to close this, as now we have a separate issue in k8s sig-security to track this effort? |
@PushkarJ better late than never ;) here's my first pass at the self-assessment outline structure, ie not the CAPI details themselves but the high level parts to be filled in (including a place for someone to fill in the CAPI-specific features and controls). this is meant to be both for CAPI and serve as a template for future subproject use. https://docs.google.com/document/d/1Fj_cLUN9kLruHbEgmYiEgoqZjf2rRuVOmQDGOKByaf4/edit?usp=sharing |
Thanks @rficcaglia for working on this :) I am thinking of creating two documents from the above:
Does that work for you? |
Great! No objections here
…On Mon, Jul 12, 2021 at 3:08 PM Pushkar Joglekar ***@***.***> wrote:
Thanks @rficcaglia <https://github.com/rficcaglia> for working on this :)
I am thinking of creating two documents from the above:
1. One for cluster-api with many blank spaces to fill in the details
as we learn more
2. One that can act as a template for future sub-projects
Does that work for you?
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub
<#4446 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAGENIU4BKGITVICMQ23HLLTXNRV5ANCNFSM42RH766A>
.
|
/lifecycle active |
/retitle Complete Cluster API external security audit |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
/remove-lifecycle stale |
As discussed in the backlog grooming on 11th February, this issue is ongoing we'll keep it in next as it's not related to a specific CAPI release. |
@PushkarJ Can you please keep this issue up-to-date if there is anything new. |
@sbueringer IMO, we can lessen the load on tracking this issue, by closing it since we have a duplicate issue kubernetes/sig-security#8 that we can all watch and follow the progress on. Does that work for you ? |
Good point. Sounds reasonable to me. Would like to have confirmation from e.g. @fabriziopandini |
+1 for me; in case we miss some update form the other issue @PushkarJ don't hesitate to ping us |
@fabriziopandini: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
https://groups.google.com/g/kubernetes-sig-cluster-lifecycle/c/Fi0UGzfbQfY
old OP:
as discussed with @randomvariable and @PushkarJ we can try requesting third party security audit for the Cluster API to ensure it is a secure project that can be safely consumed by the masses.
this can happen in two ways:
the fist action item here is to determine if we can proceed with option 1 and who can help.
@PushkarJ mentioned that he can bring this for discussion at CNCF SIG Security.
if we cannot find volunteers for such an audit we can proceed with option 2. for that we would need to research what company / private experts can do it. at that point we can request the funding from steering via https://github.com/kubernetes/funding
The text was updated successfully, but these errors were encountered: