Skip to content

Commit 983d915

Browse files
transfer security assessements (#1603)
Signed-off-by: Riaan Kleinhans <[email protected]>
1 parent a3d3cf4 commit 983d915

File tree

137 files changed

+21173
-0
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

137 files changed

+21173
-0
lines changed

projects/antrea/security-assessment/self-assessment.md

Lines changed: 527 additions & 0 deletions
Large diffs are not rendered by default.
Lines changed: 54 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,54 @@
1+
# Cloud Native Buildpacks Joint Security Assessment
2+
3+
Date completed: Sep 7, 2021
4+
5+
Security reviewers: Andres Vega, Adith Sudhakar, Cole Kennedy, Daniel Papandrea, Daniel Tobin, Magno Logan, Matthew Giasa, Matt Jarvis.
6+
7+
Buildpacks team: Stephen Levine, Sambhav Kothari.
8+
9+
Project Web site: [buildpacks.io](https://buildpacks.io/)
10+
11+
Source code repository: [github.com/buildpacks](https://github.com/buildpacks)
12+
13+
Core implementation: https://github.com/buildpacks/lifecycle
14+
15+
Specification: https://github.com/buildpacks/spec
16+
17+
Project Web site: [buildpacks.io](https://buildpacks.io/)
18+
19+
20+
## Background
21+
22+
The Cloud Native Buildpacks project provides tooling to transform source code into container images using modular, reusable build functions called _buildpacks_. The project takes advantage of advanced features in the OCI image standard that are underutilized in the Dockerfile model.
23+
24+
The project’s advanced maturity and adoption is showcased by its maintainers adherence to secure software development best practices.
25+
26+
## Maturity and ecosystem adoption
27+
28+
Buildpacks can build container images that can be deployed in Kubernetes and all other container orchestation platforms that are conformant with OCI standards. Notably, Buildpacks can be configured to execute securely on such platforms. The thriving ecosystem surrounding the project evidences ease of extensibility and integration.
29+
30+
Known vendors that provide buildpacks include Paketo, Heroku, and Google Cloud. Individual communities and vendors can provide buildpacks, which they may publish to the Buildpack Registry. This is not an exclusive list and it’s likely that there are other vendors that also publish Buildpacks.
31+
32+
Buildpacks is used by numerous other projects and services. This includes Kubernetes Native Container Build Service (kpack), VMware Tanzu Build Service, Weave FireKube, Azure Spring Cloud, Project Riff, Azure Container Registry, Salesforce Evergreen, Google Cloud Run Button, Google kf, Google Skaffold, Spring Boot, Heroku, Gitlab, Dokku, Deft, and Porter.
33+
34+
## Summary
35+
36+
**Design**: The design of Cloud Native Buildpacks exhibits evidence that the project has been architected from the ground up with special consideration to security aspects.
37+
38+
Covering many use cases of platform operation and application development, buildpacks tooling manages to abstract unnecesary complexity away from its users while managing to impart a number of security guarantees. Buildpacks ensures that container images generated using its tooling meet a minimum security standard; (1) All processes must use a non-root UID/GID, (2)Build-time and runtime base images are always specified separately, so that build-time dependencies such as compilers are not included in the image, (3) Build-time and runtime environment variables are always specified separately, so that sensitive build-time configuration is not included in the image (4). Container images generated by CNB tooling must contain metadata for auditing. Also, where reproducibility is supported, build packs ensures bit-by-bit reproducibility.
39+
40+
**Analysis**: The project has done due diligence in security and threat modeling. The security workflow is evidently rigorous. During the assessment process, the project attained a CII Best Practices badge by meeting all the passing criteria. Recently the project team has started signing lifecycle images using [sigstore Cosign](https://github.com/sigstore/cosign) and generating CycloneDX SBoMs for their releases.
41+
42+
All questions from reviewers were addressed in [self-assessment](self-assessment.md) with non-critical issues or concerns.
43+
44+
## Recommendations
45+
46+
### Recommendations to the project team
47+
48+
Continue to work towards the next level (silver) Core Infrastructure Best Practices badge.
49+
50+
### Recommendations to the CNCF
51+
52+
Buildpacks possess stronger security guarantees when compared to ecosystem alternatives. Additionally, given buildpacks “in-place upgrade capabilities”, CNB can shorten the time to patch bugs and address security issues across large fleets of images exponentially faster. The assessment team strongly suggests elevating awareness of the project. The assessment team also determines the project is in good position to benefit from a formal third party security audit.
53+
54+

projects/buildpacks/security-assessment/self-assessment.md

Lines changed: 500 additions & 0 deletions
Large diffs are not rendered by default.
113 KB
Loading

projects/cert-manager/security-assessment/self-assessment.md

Lines changed: 305 additions & 0 deletions
Large diffs are not rendered by default.
87 KB
Loading
73.7 KB
Loading
26.8 KB
Loading
26 KB
Loading
Lines changed: 1 addition & 0 deletions
Loading

0 commit comments

Comments
 (0)