Skip to content

Conversation

@OrlinVasilev
Copy link

K3s project is getting itself prepared for the Incubation phase. We are completing our first self-assessment.

@netlify
Copy link

netlify bot commented Nov 10, 2025

Deploy Preview for tag-security failed. Why did it fail? →

Name Link
🔨 Latest commit 539d6ff
🔍 Latest deploy log https://app.netlify.com/projects/tag-security/deploys/6911e8f3e9f6590008360a8e

Copy link
Collaborator

@JustinCappos JustinCappos left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I have a few minor requests. It looks good overall. Can you fix these and we'll merge?


### Background

K3s is a lightweight, opinionated Kubernetes distribution optimized for edge, IoT, and CI/CD environments. It achieves its small binary size by removing legacy or unnecessary components and replacing more resource-intensive ones with lightweight alternatives. K3s is secure by default, and operation of all Kubernetes control plane components is encapsulated in a single binary and process. K3s easily allows automation and management of complex cluster operations like distributing certificates.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can you be more quantitative / falsifiable and reduce the marketing speak?

For example,

"K3s is secure by default," -> "K3s is designed to provide secure default settings by ..."

"K3s easily allows automation and management of complex cluster operations like distributing certificates." -> "K3s has mechanisms to allow the automation and management of complex cluster operations like distributing certificates."

FYI: This comment applies later in the document as well.


| Component | Applicability | Description of Importance |
| --------- | ------------- | ------------------------- |
| Role-Based Access Control | Critical | RBAC is fundamental to Kubernetes security, enforcing the principle of least privilege. It strictly controls what users and service accounts can do, preventing unauthorized resource manipulation and reducing the blast radius of any compromised component. |
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is this different from what people expect from k8s RBAC in any way?

List of ADR (similiar to Kubernetes KEPs) here: https://github.com/k3s-io/k3s/tree/main/docs/adrs

## Secure Development Practices
Although the K3s project is still sandbox, we strive to implement the highest standard of secure development best practices, as noted below.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

OpenSSF has best practices and baseline. Can you map what you're doing to those?

(edit: I was surprised to see them referenced at the bottom of the document, but not here.)


### Responsible Disclosure Practice

The K3s project does not accept vulnerability reports through the [GitHub Vulnerability Reporting](htt‌ps://docs.github.com/en/code-security/security-advisories/guidance-on-reporting-and-writing/privately-reporting-a-security-vulnerability) tool. Users attempting to report an security issue via the Create Issue or Vulnerability Reporting workflows will be redirected to our security policy document, which requests that they make contact via e-mail.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Are these encrypted in any way?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants