Skip to content

Commit f66799d

Browse files
authored
Create 2023-05-02.md
Notes for May 2
1 parent c90308b commit f66799d

File tree

1 file changed

+39
-0
lines changed

1 file changed

+39
-0
lines changed

meetings/2023-05-02.md

Lines changed: 39 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,39 @@
1+
# Jupyter Security Bi-weekly Meeting
2+
3+
## May 2, 2023
4+
5+
| Name | affiliation| username |
6+
| -------------------| -----------| -----------------|
7+
| Jason Weill | AWS | @JasonWeill |
8+
| Rick Wagner | UCSD | @rpwagner |
9+
| Matthias Bussonnier| Quansight | @Carreau |
10+
| Jason Grout | Databricks | @jasongrout |
11+
| Rollin Thomas | NERSC | @rcthomas |
12+
| Steve Silvester | MongoDB | @blink1073 |
13+
14+
15+
* Joe Lucas OOTO for this meeting. See you in Paris.
16+
* https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/about-security-hardening-with-openid-connect
17+
* PyPI Organizations ([ticket](https://github.com/jupyter/security/issues/61))
18+
* Key: Delegation to subprojects and keeping subprojects from hitting barriers to prevent fracture?
19+
* 4 teams set up as 1 per GitHub org plus JupyterHub
20+
* Experiment, on JupyterLab made Federic an owner, moved hatch-jupyter under that
21+
* RBAC, OIDC could allow trusted publishers and bots go away
22+
* PyPI vs GitHub
23+
* Jupyter is subprojects in GitHub but not a perfect mapping
24+
* PyPI packages are tied to repos, not GitHub orgs
25+
* Flexibility in delegating who can manage releases, doesn't have to be SSC rep
26+
* New feature: PyPI products can be linked to GitHub on PyPI `/manage/project/{repo}/settings/publishing`
27+
* On GitHub required reviewers provide additional gating to publish
28+
* Yanking from PyPI? Needs PyPI account?
29+
* Who should be top-level owners? EC
30+
* May be a good choice for now until an official delegation
31+
* Q on asset inventory and privileged roles; is there an audit / sec team to be able to see into things?
32+
* Rick doesn't want that at the moment
33+
* Related: NPM provenance
34+
* Security Subproject Update during SSC/EC meeting
35+
* Intigriti Bug Bounty
36+
* Vulnerability handling across projects
37+
* 2FA requirement
38+
* Security workshop
39+
* Auditing privileged access for Jupyter assets (github orgs/repos, pypi, DNS, etc. See notes from last time)

0 commit comments

Comments
 (0)