Skip to content

Commit 6b73128

Browse files
Merge pull request #27400 from lsm5/cncf-self-assessment
cncf: self-assessment doc
2 parents 87b16eb + 41ff61a commit 6b73128

File tree

1 file changed

+277
-0
lines changed

1 file changed

+277
-0
lines changed

docs/cncf/self-assessment.md

Lines changed: 277 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,277 @@
1+
# Podman Self-assessment
2+
3+
## Table of contents
4+
5+
* [Metadata](#metadata)
6+
* [Security links](#security-links)
7+
* [Overview](#overview)
8+
* [Actors](#actors)
9+
* [Actions](#actions)
10+
* [Background](#background)
11+
* [Goals](#goals)
12+
* [Non-goals](#non-goals)
13+
* [Self-assessment use](#self-assessment-use)
14+
* [Security functions and features](#security-functions-and-features)
15+
* [Project compliance](#project-compliance)
16+
* [Secure development practices](#secure-development-practices)
17+
* [Security issue resolution](#security-issue-resolution)
18+
* [Appendix](#appendix)
19+
20+
## Metadata
21+
22+
|||| | \-- | \-- | | Assessment Stage | Incomplete | | Software | [https://github.com/containers/podman](https://github.com/containers/podman) | | Security Provider | No | | Languages | Go | | SBOM | [https://github.com/containers/podman/blob/main/go.mod](https://github.com/containers/podman/blob/main/go.mod) |
23+
24+
### Security links
25+
26+
| Doc | url |
27+
| :---- | :---- |
28+
| Security file | [https://github.com/containers/podman/blob/main/SECURITY.md](https://github.com/containers/podman/blob/main/SECURITY.md) |
29+
30+
## Overview
31+
32+
Podman (the POD MANager) is a daemonless container engine for developing, managing, and running OCI containers and pods. Podman emphasizes security by enabling rootless containers, providing fine-grained security controls, and operating without a daemon process.
33+
34+
### Background
35+
36+
Podman is a container management tool that provides a command-line interface for managing containers, images, and pods. Podman runs without a daemon and supports rootless containers, providing an additional layer of security for many use cases.
37+
38+
Key characteristics:
39+
40+
- **Daemonless**: No background daemon process, reducing attack surface
41+
- **Rootless**: Containers can run without root privileges
42+
- **Pod support**: Native support for Kubernetes-style pods
43+
- **Security-focused**: Built with security as a primary concern
44+
45+
Podman is part of the containers ecosystem and integrates with other tools like Buildah, Skopeo, and CRI-O.
46+
47+
### Actors
48+
49+
* **Podman CLI**: The main command-line interface that users interact with. It parses commands and coordinates with other components.
50+
51+
* **libpod library**: The core library that provides container lifecycle management APIs. It handles container creation, execution, and management.
52+
53+
* **Container runtime**: Interfaces with OCI-compliant runtimes (runc, crun) to actually run containers.
54+
55+
* **Image store**: Manages container images and their metadata. Images are stored in a local registry and can be verified for integrity.
56+
57+
* **Container storage**: Manages container filesystems and layers.
58+
59+
* **Network configuration**: Handles container networking, including rootless networking and port forwarding.
60+
61+
* **Systemd integration**: Provides systemd services and pod management.
62+
63+
* **Rootless mode**: Podman can be run in rootless mode, protecting against possible attacks like container escapes allowing control of the entire system.
64+
65+
### Actions
66+
67+
* **Container creation**:
68+
69+
- Validates container configuration and security options
70+
- Sets up namespaces and cgroups for isolation
71+
- Configures security policies (seccomp, SELinux, capabilities)
72+
- Creates rootless user namespace mapping
73+
74+
75+
* **Image pulling**:
76+
77+
- Verifies image signatures and checksums
78+
- Validates image layers and metadata
79+
- Stores images in a secure local registry
80+
81+
82+
* **Container execution**:
83+
84+
- Applies security policies (seccomp, SELinux, capabilities)
85+
- Sets up proper user namespaces for rootless operation
86+
- Monitors container process and resource usage
87+
88+
89+
* **Pod management**:
90+
91+
- Creates shared network namespace for pod containers
92+
- Manages pod-level security policies
93+
- Coordinates container lifecycle within pods
94+
95+
96+
* **Volume management**:
97+
98+
- Creates and mounts volumes with appropriate permissions
99+
- Handles rootless volume mounting
100+
- Applies SELinux labels to volumes
101+
102+
### Goals
103+
104+
* **Rootless operation**: Enable users to run containers without root privileges, reducing the attack surface and potential for privilege escalation.
105+
106+
* **Daemonless architecture**: Eliminate the daemon process to reduce attack surface and improve security posture.
107+
108+
* **Security by default**: Provide secure defaults for container execution, including appropriate seccomp profiles, SELinux policies, and capability restrictions.
109+
110+
* **OCI compliance**: Maintain compatibility with OCI specifications for containers and images to ensure interoperability.
111+
112+
* **Pod support**: Enable Kubernetes-style pod management with proper security isolation.
113+
114+
### Non-goals
115+
116+
* **Orchestration**: Podman does not provide cluster orchestration capabilities (that's handled by Kubernetes, OpenShift, etc.).
117+
118+
* **Image registry**: Podman does not operate as a centralized image registry, though it can interact with various registries.
119+
120+
* **Container runtime**: Podman does not implement the low-level container runtime (it uses crun, runc etc..).
121+
122+
* **Storage management**: Podman does not provide distributed storage solutions, only local container storage.
123+
124+
* **Security scanning**: While Podman can work with security scanning tools, it does not provide built-in vulnerability scanning.
125+
126+
## Self-assessment use
127+
128+
This self-assessment is created by the Podman team to perform an internal analysis of the project's security. It is not intended to provide a security audit of Podman, or function as an independent assessment or attestation of Podman's security health.
129+
130+
This document serves to provide Podman users with an initial understanding of Podman's security, where to find existing security documentation, Podman plans for security, and general overview of Podman security practices, both for development of Podman as well as security of Podman.
131+
132+
This document provides the CNCF TAG-Security with an initial understanding of Podman to assist in a joint-assessment, necessary for projects under incubation. Taken together, this document and the joint-assessment serve as a cornerstone for if and when Podman seeks graduation and is preparing for a security audit.
133+
134+
## Security functions and features
135+
136+
### Critical Security Components
137+
138+
* **Rootless containers**: Podman's core security feature that allows containers to run without root privileges, significantly reducing the attack surface and preventing privilege escalation attacks.
139+
140+
* **User namespaces**: Provides process isolation by mapping container user IDs to host user IDs, enabling secure rootless operation.
141+
142+
* **Seccomp profiles**: Default seccomp profiles restrict system calls available to containers, preventing many potential attack vectors.
143+
144+
* **SELinux integration**: Automatic SELinux labeling and enforcement for containers, volumes, and images to provide mandatory access control.
145+
146+
* **Capability dropping**: Removes unnecessary Linux capabilities from containers by default, following the principle of least privilege.
147+
148+
* **Daemonless architecture**: Eliminates the daemon process, reducing the attack surface and preventing daemon-based attacks.
149+
150+
### Security Relevant Components
151+
152+
* **Image signing and verification**: Support for container image signatures using GPG/Sequoia and other signing mechanisms.
153+
154+
* **Resource limits**: CPU, memory, and I/O limits to prevent resource exhaustion attacks.
155+
156+
* **Network policies**: Configurable network isolation and firewall rules for container networking.
157+
158+
* **Volume security**: Secure volume mounting with proper permissions and SELinux labels.
159+
160+
* **Pod security policies**: Pod-level security controls that apply to all containers within a pod.
161+
162+
163+
## Project compliance
164+
165+
* **OCI Compliance**: Podman is fully compliant with the Open Container Initiative (OCI) specifications for containers and images.
166+
167+
* **CIS Docker Benchmark**: Podman provides security benchmarking tools that align with the Center for Internet Security (CIS) Docker Benchmark.
168+
169+
* **FIPS 140-2**: Podman supports FIPS 140-2 compliant cryptographic modules when running on FIPS-enabled systems.
170+
171+
* **SELinux**: Full integration with SELinux for mandatory access control compliance.
172+
173+
* **AppArmor**: Support for AppArmor profiles for additional access control.
174+
175+
## Secure development practices
176+
177+
### Development Pipeline
178+
179+
* **Code Review Process**: All code changes typically require review by two maintainers before merging. Critical security changes may require multiple reviews. The project uses GitHub pull requests for all contributions.
180+
181+
* **Automated Testing**: Comprehensive test suite including unit tests, integration tests, and security-focused tests that run on every pull request. A comprehensive e2e and system test suite is run in CI on every PR and also on a nightly basis.
182+
183+
* **Security Scanning**: Automated vulnerability scanning of dependencies using tools like Dependabot and GitHub Security Advisories. All medium and higher severity exploitable vulnerabilities are fixed in a timely way after they are confirmed.
184+
185+
* **Static Analysis**: Code quality and security analysis using golangci-lint which is run on every PR, ensuring testing is done prior to merge.
186+
187+
* **OpenSSF Best Practices Compliance**: Podman has achieved a [passing OpenSSF Best Practices badge](https://www.bestpractices.dev/projects/10499), demonstrating adherence to security best practices including proper licensing, contribution guidelines, and security processes.
188+
189+
### Communication Channels
190+
191+
* Podman user room: [\#podman:fedoraproject.org](https://matrix.to/#/#podman:fedoraproject.org)
192+
193+
* Podman dev room: [\#podman-dev:matrix.org](https://matrix.to/#/#podman-dev:matrix.org)
194+
195+
* **Inbound**:
196+
197+
- GitHub Issues for bug reports and feature requests
198+
- GitHub Discussions for community questions
199+
- Security issues via the security mailing list
200+
- Mailing lists for formal discussions
201+
- Clear contribution guidelines documented in [CONTRIBUTING.md](https://github.com/containers/podman/blob/main/CONTRIBUTING.md)
202+
203+
* **Outbound**:
204+
205+
- Release announcements via the [official Podman website](https://podman.io), GitHub releases, and the Podman mailing list
206+
- Documentation updates and blog posts
207+
- Conference presentations and talks
208+
- Project website at [podman.io](https://podman.io) with comprehensive documentation
209+
210+
### Ecosystem
211+
212+
Podman is a critical component of the cloud-native ecosystem:
213+
214+
* **Container Ecosystem**: Integrates with Buildah for building containers, Skopeo for image and registry operations.
215+
216+
* **Development Tools**: Widely used in development environments as a secure alternative to Docker.
217+
218+
* **CI/CD Pipelines**: Used in CI/CD systems for testing containerized applications.
219+
220+
## Security issue resolution
221+
222+
### Responsible Disclosures Process
223+
224+
* **Reporting**: Security vulnerabilities should be reported by email as documented in the [SECURITY.md](https://github.com/containers/podman/blob/main/SECURITY.md) file.
225+
226+
* **Response Time**: The team commits to responding to vulnerability reports within 48 hours. All medium and higher severity exploitable vulnerabilities are prioritized as a matter of general practice.
227+
228+
* **Coordination**: For critical vulnerabilities, ct Security team coordinates with downstream projects to file bug trackers for downstreams (Fedora / RHEL).
229+
230+
* **Credit**: Security researchers who responsibly disclose vulnerabilities are credited in security advisories and release notes.
231+
232+
* **Public Disclosure**: Vulnerabilities are disclosed by the project maintainers with appropriate embargo periods for critical issues, following industry best practices for responsible disclosure.
233+
234+
### Vulnerability Response Process
235+
236+
* **Triage**: Security reports are triaged by the project maintainers and assigned severity levels (Critical, High, Medium, Low) using CVSS scoring where applicable.
237+
238+
* **Investigation**: The team investigates the vulnerability, determines impact, and develops fixes. All medium and higher severity exploitable vulnerabilities discovered through static or dynamic analysis are fixed in a timely way after they are confirmed.
239+
240+
* **Fix Development**: Security fixes for embargoed CVEs are developed in private repositories to prevent premature disclosure.
241+
242+
* **Disclosure**: Vulnerabilities are disclosed by the project maintainers with appropriate embargo periods for critical issues. The project follows industry best practices for coordinated vulnerability disclosure.
243+
244+
### Incident Response
245+
246+
* **Detection**: Tools like renovate automatically update dependencies, including fixes for security issues.
247+
248+
* **Containment**: Immediate steps are taken to contain and mitigate the impact of security incidents. If the system and e2e tests point out any issues in the development phase, those get fixed before any code is merged.
249+
250+
## Appendix
251+
252+
### Known Issues Over Time
253+
254+
* See [this NIST Vulnerability Database list](https://nvd.nist.gov/vuln/search#/nvd/home?vulnRevisionStatusList=published&offset=0&rowCount=50&keyword=podman&resultType=records) for CVEs to date. This includes issues in the Go toolchain and dependencies used by Podman.
255+
(Four of the entries as of the date of this writing aren't directly related to Podman but contain Podman in the search terms.)
256+
257+
### OpenSSF Best Practices
258+
259+
* **Current Status**: Podman has achieved a [passing OpenSSF Best Practices badge](https://www.bestpractices.dev/projects/10499) (100% compliance), demonstrating adherence to security best practices.
260+
261+
* **Key Achievements**:
262+
263+
- Comprehensive project documentation and contribution guidelines
264+
- Robust security testing and analysis processes
265+
- Clear vulnerability disclosure and response procedures
266+
- Strong development practices with code review and automated testing
267+
- Proper licensing and project governance
268+
269+
### Case Studies
270+
271+
* List of companies and organizations using / shipping Podman [https://github.com/containers/podman/blob/main/ADOPTERS.md](https://github.com/containers/podman/blob/main/ADOPTERS.md)
272+
273+
### Related Projects / Vendors
274+
275+
* **Buildah**: A tool that facitiliates building OCI container images.
276+
277+
* **Skopeo**: A command line utility to perform various operations on container images and image repositories like copying an image, inspecting a remote image, deleting an image from an image repository.

0 commit comments

Comments
 (0)