|
| 1 | +# Jupyter Security Bi-weekly Meeting |
| 2 | + |
| 3 | +## May 2, 2023 |
| 4 | + |
| 5 | +| Name | affiliation| username | |
| 6 | +| -------------------| -----------| -----------------| |
| 7 | +| Jason Weill | AWS | @JasonWeill | |
| 8 | +| Rick Wagner | UCSD | @rpwagner | |
| 9 | +| Matthias Bussonnier| Quansight | @Carreau | |
| 10 | +| Jason Grout | Databricks | @jasongrout | |
| 11 | +| Rollin Thomas | NERSC | @rcthomas | |
| 12 | +| Steve Silvester | MongoDB | @blink1073 | |
| 13 | + |
| 14 | + |
| 15 | +* Joe Lucas OOTO for this meeting. See you in Paris. |
| 16 | +* https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/about-security-hardening-with-openid-connect |
| 17 | +* PyPI Organizations ([ticket](https://github.com/jupyter/security/issues/61)) |
| 18 | + * Key: Delegation to subprojects and keeping subprojects from hitting barriers to prevent fracture? |
| 19 | + * 4 teams set up as 1 per GitHub org plus JupyterHub |
| 20 | + * Experiment, on JupyterLab made Federic an owner, moved hatch-jupyter under that |
| 21 | + * RBAC, OIDC could allow trusted publishers and bots go away |
| 22 | + * PyPI vs GitHub |
| 23 | + * Jupyter is subprojects in GitHub but not a perfect mapping |
| 24 | + * PyPI packages are tied to repos, not GitHub orgs |
| 25 | + * Flexibility in delegating who can manage releases, doesn't have to be SSC rep |
| 26 | + * New feature: PyPI products can be linked to GitHub on PyPI `/manage/project/{repo}/settings/publishing` |
| 27 | + * On GitHub required reviewers provide additional gating to publish |
| 28 | + * Yanking from PyPI? Needs PyPI account? |
| 29 | + * Who should be top-level owners? EC |
| 30 | + * May be a good choice for now until an official delegation |
| 31 | + * Q on asset inventory and privileged roles; is there an audit / sec team to be able to see into things? |
| 32 | + * Rick doesn't want that at the moment |
| 33 | + * Related: NPM provenance |
| 34 | +* Security Subproject Update during SSC/EC meeting |
| 35 | + * Intigriti Bug Bounty |
| 36 | + * Vulnerability handling across projects |
| 37 | + * 2FA requirement |
| 38 | + * Security workshop |
| 39 | + * Auditing privileged access for Jupyter assets (github orgs/repos, pypi, DNS, etc. See notes from last time) |
0 commit comments