@@ -58,7 +58,7 @@ If none of those approvers are still appropriate, then changes to that list
58
58
should be approved by the remaining approvers and/or the owning SIG (or
59
59
SIG Architecture for cross-cutting KEPs).
60
60
-->
61
- # KEP-3027: SLSA Compliance in the Kubernetes Release Process
61
+ # KEP-3027: SLSA Level 3 Compliance in the Kubernetes Release Process
62
62
63
63
<!--
64
64
This is the title of your KEP. Keep it short, simple, and descriptive. A good
@@ -374,18 +374,13 @@ when drafting this test plan.
374
374
375
375
### Graduation Criteria
376
376
377
- This KEP can be considered complete when one of two scenarios is reached:
377
+ This KEP can be considered complete when the Kubernetes release process can
378
+ be certified to be SLSA level 3 compliant.
378
379
379
- 1 . All SLSA levels have been successfully complied with
380
- 1 . The community determines one of the levels as not implementable. This
381
- may be concluded if the nature of necessary changes proves to be too
382
- disruptive or implies altering aspects of technical environments
383
- and/or systems, contributor experience, policy, and other domains beyond what
384
- deems to be acceptable.
385
-
386
- Tracking issues will be opened to track and discuss the viability of the
387
- required enhancements to reach each SLSA level while the SIG Release
388
- rodamap will be constantly updated to reflect the state of the project.
380
+ Tracking issues and follow-up KEPs will be opened to track and discuss the
381
+ viability of the required enhancements to reach each SLSA level. The
382
+ [ SIG Release rodamap] ( https://github.com/kubernetes/sig-release/blob/master/roadmap.md )
383
+ will be kept in sync, to reflect the state of the project.
389
384
390
385
### Graduation Milestones
391
386
@@ -453,6 +448,21 @@ guarantees provided by SLSA. This is mostly true at the moment but more
453
448
transparency is needed to ensure risks and policies are understood by the
454
449
community.
455
450
451
+ This KEP currently considers SLSA level 4 unimplementable. While the community
452
+ has made great strides to move workloads to infrstructure under its control,
453
+ the GCP projects that control the build process and artifact storage are not
454
+ fully managed by relevant community groups (ie SIG K8s Infra). This makes it
455
+ impossible to provide the access control and superuser guarantees required to
456
+ reach SLSA level 4:
457
+
458
+ > All physical and remote access must be rare, logged, and gated behind
459
+ > multi-party approval[ ^ 1 ] .
460
+
461
+ > Only a small number of platform admins may override the guarantees
462
+ > listed here. Doing so MUST require approval of a second platform admin[ ^ 2 ] .
463
+
464
+ [ ^ 1 ] : https://slsa.dev/requirements#access
465
+ [ ^ 2 ] : https://slsa.dev/requirements#superusers
456
466
457
467
<!--
458
468
**Note:** *Not required until targeted at a release.*
@@ -864,6 +874,7 @@ For each of them, fill in the following information by copying the below templat
864
874
865
875
- 2021-10-31 Initial Draft
866
876
- 2021-11-17 Broader descriptions of required work for each SLSA level
877
+ - 2021-12-07 Scoped the KEP to SLSA3 and removed dual graduation criteria
867
878
868
879
<!--
869
880
Major milestones in the lifecycle of a KEP should be tracked in this section.
0 commit comments