Skip to content

Commit 131f6d5

Browse files
JayBealemicahhauslernikhita
authored
Proposed charter for SIG Security (#4962)
* Proposed charter for SIG Security Letter to Steering committee to be linked later. * Update wg-security-audit/sig-security-charter-proposal.md Co-authored-by: Micah Hausler <[email protected]> * Accept nested list modification Co-authored-by: Micah Hausler <[email protected]> * Adding README created by community make. Adding sig-security to sigs.yaml Creating sig-security/ and moving proposed charter to that directory. * Proposed charter for SIG Security Letter to Steering committee to be linked later. * Update wg-security-audit/sig-security-charter-proposal.md Co-authored-by: Micah Hausler <[email protected]> * Accept nested list modification Co-authored-by: Micah Hausler <[email protected]> * Correct capitalization Co-authored-by: Nikhita Raghunath <[email protected]> * resolved merge conflict I don't think we need to use an entirely separate GOPATH, thus forcing us to re-download modules every time we run `make` This was causing verify-generated-docs to fail locally since go will set its modcache as readonly and thus cause the cleanup "rm -rf" in this script to fail. In go1.14 or later we could use "-modcacherw" to stop making the modcache readonly but that bring me back to.. why do need an entirely separate GOPATH in the first place? * Corrected employers Co-authored-by: Micah Hausler <[email protected]> Co-authored-by: Nikhita Raghunath <[email protected]>
1 parent ccea986 commit 131f6d5

File tree

6 files changed

+198
-3
lines changed

6 files changed

+198
-3
lines changed

OWNERS_ALIASES

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -72,6 +72,11 @@ aliases:
7272
sig-scheduling-leads:
7373
- Huang-Wei
7474
- ahg-g
75+
sig-security-leads:
76+
- aasmall
77+
- cji
78+
- jaybeale
79+
- joelsmith
7580
sig-service-catalog-leads:
7681
- jberkhahn
7782
- mszostok

sig-list.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,7 @@ When the need arises, a [new SIG can be created](sig-wg-lifecycle.md)
3939
|[Release](sig-release/README.md)|release|* [Stephen Augustus](https://github.com/justaugustus), VMware<br>* [Tim Pepper](https://github.com/tpepper), VMware<br>|* [Slack](https://kubernetes.slack.com/messages/sig-release)<br>* [Mailing List](https://groups.google.com/forum/#!forum/kubernetes-sig-release)|* Regular SIG Meeting: [Tuesdays at 14:30 UTC (biweekly)](https://zoom.us/j/327142148)<br>* (Release Engineering) Release Engineering: [Tuesdays at 14:30 UTC (biweekly)](https://zoom.us/j/240812475)<br>
4040
|[Scalability](sig-scalability/README.md)|scalability|* [Matt Matejczyk](https://github.com/mm4tt), Google<br>* [Shyam Jeedigunta](https://github.com/shyamjvs), AWS<br>|* [Slack](https://kubernetes.slack.com/messages/sig-scalability)<br>* [Mailing List](https://groups.google.com/forum/#!forum/kubernetes-sig-scale)|* Regular SIG Meeting: [Thursdays at 17:30 UTC (bi-weekly ([upcoming meeting dates](#upcoming-meeting-dates)))](https://zoom.us/j/989573207)<br>
4141
|[Scheduling](sig-scheduling/README.md)|scheduling|* [Wei Huang](https://github.com/Huang-Wei), IBM<br>* [Abdullah Gharaibeh](https://github.com/ahg-g), Google<br>|* [Slack](https://kubernetes.slack.com/messages/sig-scheduling)<br>* [Mailing List](https://groups.google.com/forum/#!forum/kubernetes-sig-scheduling)|* 10AM PT Meeting: [Thursdays at 17:00 UTC (biweekly starting Thursday June 7, 2018)](https://zoom.us/j/841218129)<br>
42+
|[Security](sig-security/README.md)|security|* [Aaron Small](https://github.com/aasmall), Invitae<br>* [Craig Ingram](https://github.com/cji), Stripe<br>* [Jay Beale](https://github.com/jaybeale), InGuardians<br>* [Joel Smith](https://github.com/joelsmith), Red Hat<br>|* [Slack](https://kubernetes.slack.com/messages/sig-security)<br>* [Mailing List](https://groups.google.com/forum/#!forum/kubernetes-sig-security)|* Regular SIG Meeting: [Mondays at 12:00 PT (Pacific Time) (biweekly)](https://zoom.us/j/8416212023)<br>
4243
|[Service Catalog](sig-service-catalog/README.md)|service-catalog|* [Jonathan Berkhahn](https://github.com/jberkhahn), IBM<br>* [Mateusz Szostok](https://github.com/mszostok), SAP<br>|* [Slack](https://kubernetes.slack.com/messages/sig-service-catalog)<br>* [Mailing List](https://groups.google.com/forum/#!forum/kubernetes-sig-service-catalog)|* Regular SIG Meeting: [Mondays at 13:00 PT (Pacific Time) (biweekly)](https://zoom.us/j/7201225346)<br>
4344
|[Storage](sig-storage/README.md)|storage|* [Saad Ali](https://github.com/saad-ali), Google<br>* [Xing Yang](https://github.com/xing-yang), VMware<br>|* [Slack](https://kubernetes.slack.com/messages/sig-storage)<br>* [Mailing List](https://groups.google.com/forum/#!forum/kubernetes-sig-storage)|* Regular SIG Meeting: [Thursdays at 9:00 PT (Pacific Time) (biweekly)](https://zoom.us/j/614261834)<br>
4445
|[Testing](sig-testing/README.md)|testing|* [Benjamin Elder](https://github.com/BenTheElder), Google<br>* [Aaron Crickenberger](https://github.com/spiffxp), Google<br>* [Steve Kuznetsov](https://github.com/stevekuznetsov), Red Hat<br>|* [Slack](https://kubernetes.slack.com/messages/sig-testing)<br>* [Mailing List](https://groups.google.com/forum/#!forum/kubernetes-sig-testing)|* SIG Testing Office Hours: [Tuesdays at 10:00 PT (Pacific Time) (bi-weekly starting Tuesday August 13, 2019)](https://zoom.us/j/135450138)<br>* (kind) sigs.k8s.io/kind bi-weekly meeting: [Mondays at 11:00 PT (Pacific Time) (bi-weekly)](https://zoom.us/j/960461819)<br>* (testing-commons) Testing Commons: [Fridays at 13:00 PT (Pacific Time) (bi-weekly)](https://zoom.us/j/790505720)<br>
@@ -60,7 +61,7 @@ When the need arises, a [new SIG can be created](sig-wg-lifecycle.md)
6061
|[Multitenancy](wg-multitenancy/README.md)|* API Machinery<br>* Auth<br>* Network<br>* Node<br>* Scheduling<br>* Storage<br>|* [Sanjeev Rampal](https://github.com/srampal), Cisco<br>* [Tasha Drew](https://github.com/tashimi), VMware<br>|* [Slack](https://kubernetes.slack.com/messages/wg-multitenancy)<br>* [Mailing List](https://groups.google.com/forum/#!forum/kubernetes-wg-multitenancy)|* Regular WG Meeting: [Tuesdays at 11:00 PT (Pacific Time) (biweekly)](https://zoom.us/my/k8s.sig.auth)<br>
6162
|[Naming](wg-naming/README.md)|* Architecture<br>* Contributor Experience<br>* Docs<br>|* [Celeste Horgan](https://github.com/celestehorgan), CNCF<br>* [Jaice Singer DuMars](https://github.com/jdumars), Apple<br>* [Stephen Augustus](https://github.com/justaugustus), VMware<br>* [Zach Corleissen](https://github.com/zacharysarah), Linux Foundation<br>|* [Slack](https://kubernetes.slack.com/messages/wg-naming)<br>* [Mailing List](https://groups.google.com/forum/#!forum/kubernetes-wg-naming)|
6263
|[Policy](wg-policy/README.md)|* Architecture<br>* Auth<br>* Multicluster<br>* Network<br>* Node<br>* Scheduling<br>* Storage<br>|* [Erica von Buelow](https://github.com/ericavonb), Red Hat<br>* [Howard Huang](https://github.com/hannibalhuang), Huawei<br>|* [Slack](https://kubernetes.slack.com/messages/wg-policy)<br>* [Mailing List](https://groups.google.com/forum/#!forum/kubernetes-wg-policy)|* Regular WG Meeting: [Wednesdays at 16:00 PT (Pacific Time) (weekly)](https://zoom.us/j/7375677271)<br>
63-
|[Security Audit](wg-security-audit/README.md)|* Auth<br>|* [Aaron Small](https://github.com/aasmall), Google<br>* [Craig Ingram](https://github.com/cji), Stripe<br>* [Jay Beale](https://github.com/jaybeale), InGuardians<br>* [Joel Smith](https://github.com/joelsmith), Red Hat<br>|* [Slack](https://kubernetes.slack.com/messages/wg-security-audit)<br>* [Mailing List](https://groups.google.com/forum/#!forum/kubernetes-wg-security-audit)|* Regular WG Meeting: [Mondays at 12:00 PT (Pacific Time) (weekly)](https://docs.google.com/document/d/1RbC4SBZBlKth7IjYv_NaEpnmLGwMJ0ElpUOmsG-bdRA/edit)<br>
64+
|[Security Audit](wg-security-audit/README.md)|* Auth<br>|* [Aaron Small](https://github.com/aasmall), Invitae<br>* [Craig Ingram](https://github.com/cji), Stripe<br>* [Jay Beale](https://github.com/jaybeale), InGuardians<br>* [Joel Smith](https://github.com/joelsmith), Red Hat<br>|* [Slack](https://kubernetes.slack.com/messages/wg-security-audit)<br>* [Mailing List](https://groups.google.com/forum/#!forum/kubernetes-wg-security-audit)|* Regular WG Meeting: [Mondays at 12:00 PT (Pacific Time) (weekly)](https://docs.google.com/document/d/1RbC4SBZBlKth7IjYv_NaEpnmLGwMJ0ElpUOmsG-bdRA/edit)<br>
6465

6566
### Master User Group List
6667

sig-security/README.md

Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
<!---
2+
This is an autogenerated file!
3+
4+
Please do not edit this file directly, but instead make changes to the
5+
sigs.yaml file in the project root.
6+
7+
To understand how this file is generated, see https://git.k8s.io/community/generator/README.md
8+
--->
9+
# Security Special Interest Group
10+
11+
Covers horizontal security initiatives for the Kubernetes project, including regular security audits, the vulnerability management process, cross-cutting security documentation, and security community management.
12+
13+
The [charter](charter.md) defines the scope and governance of the Security Special Interest Group.
14+
15+
## Meetings
16+
* Regular SIG Meeting: [Mondays at 12:00 PT (Pacific Time)](https://zoom.us/j/8416212023) (biweekly). [Convert to your timezone](http://www.thetimezoneconverter.com/?t=12:00&tz=PT%20%28Pacific%20Time%29).
17+
* [Meeting notes and Agenda](tba).
18+
* [Meeting recordings](tba).
19+
20+
## Leadership
21+
22+
### Chairs
23+
The Chairs of the SIG run operations and processes governing the SIG.
24+
25+
* Aaron Small (**[@aasmall](https://github.com/aasmall)**), Invitae
26+
* Craig Ingram (**[@cji](https://github.com/cji)**), Stripe
27+
* Jay Beale (**[@jaybeale](https://github.com/jaybeale)**), InGuardians
28+
* Joel Smith (**[@joelsmith](https://github.com/joelsmith)**), Red Hat
29+
30+
## Contact
31+
- Slack: [#sig-security](https://kubernetes.slack.com/messages/sig-security)
32+
- [Mailing list](https://groups.google.com/forum/#!forum/kubernetes-sig-security)
33+
- [Open Community Issues/PRs](https://github.com/kubernetes/community/labels/sig%2Fsecurity)
34+
35+
## Subprojects
36+
37+
The following [subprojects][subproject-definition] are owned by sig-security:
38+
### community-discussion-groups
39+
Community Discussion Groups
40+
- **Owners:**
41+
### security-audit
42+
Third Party Security Audit
43+
- **Owners:**
44+
- https://github.com/kubernetes/community/blob/master/wg-security-audit/OWNERS
45+
### security-documents
46+
Security Documents and Documentation.
47+
- **Owners:**
48+
49+
[subproject-definition]: https://github.com/kubernetes/community/blob/master/governance.md#subprojects
50+
<!-- BEGIN CUSTOM CONTENT -->
51+
52+
<!-- END CUSTOM CONTENT -->
Lines changed: 89 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,89 @@
1+
# SIG Security Charter
2+
3+
This charter adheres to the conventions described in the [Kubernetes Charter README] and uses the Roles and Organization Management outlined in [sig-governance].
4+
5+
## Scope
6+
7+
SIG Security covers horizontal security initiatives for the Kubernetes project, including regular security audits, the vulnerability management process, cross-cutting security documentation, and security community management. As a process-oriented SIG, it does not directly own Kubernetes component code. This SIG replaces the Security Audit Working Group. Instead, SIG Security focuses on improving the security of the Kubernetes project across all components.
8+
9+
This SIG grew out of the [Third-Party Security Audit Working Group](https://github.com/kubernetes/community/tree/master/wg-security-audit), which managed each recurrent Third-Party Security Audit over the course of the audit’s lifecycle. The Working Group worked closely with selected vendors, the Product Security Committee, and the CNCF. It created the RFP, selected the vendors, and managed the vendors’ engagement with other SIGs and subject matter experts.
10+
11+
SIG Security continues to manage the third-party security audits, while serving a wider mission of advocating for security-related structural or systemic issues and default configuration settings, managing the non-embargoed (public) vulnerability process, defining the bug bounty, creating official Kubernetes Hardening Guides and security documents, and serving as a public relations contact point for Kubernetes security.
12+
13+
### In scope
14+
15+
#### Vulnerability Management Process
16+
17+
Work with the Kubernetes [Product Security Committee (PSC)](https://github.com/kubernetes/security#product-security-committee-psc) to define the processes for fixing and disclosing vulnerabilities, as outlined in https://github.com/kubernetes/security. For example:
18+
19+
- When the private fix & release process is invoked
20+
- How vulnerabilities are rated
21+
- The scope of the bug bounty
22+
- Post-announcement follow-ups, such as additional fixes, mitigations, preventions or documentation after a vulnerability is made public
23+
- Distributor announcement policies, such as timelines, criteria for joining the list, etc.
24+
- How, when and where vulnerabilities are announced
25+
- Defining the criteria and process for supporting Kubernetes subprojects, such as the [dashboard](https://github.com/kubernetes/dashboard), [ingress-nginx](https://github.com/kubernetes/ingress-nginx), or [kops](https://github.com/kubernetes/kops).
26+
27+
#### Security Community Management and Outreach
28+
29+
Provide an entry point to the Kubernetes community for new security-minded contributors, as well as a meeting point to discuss security themes and issues within Kubernetes, including:
30+
31+
- Work with [SIG Contributor Experience](https://github.com/kubernetes/community/tree/master/sig-contributor-experience) to curate and staff security discussion channels (e.g. slack channel, mailing list, discourse, stack overflow, etc.).
32+
- Answer security questions from inexperienced users (that don't know what SIG to go to), and identify common questions or issues as areas for improvement.
33+
- Provide an "entry point" for new contributors interested in security. Route these new contributors to other SIGs when they have more specific goals (e.g. SIG Node for container isolation).
34+
35+
#### Horizontal Security Documentation
36+
37+
Author and maintain cross-cutting security documentation, such as hardening guides and security benchmarks. Seek out and coordinate with experts in other SIGs for input on the documentation (i.e. we go to them, they don't need to come to us). In-scope documentation includes:
38+
39+
- Hardening guides and best practices
40+
- Security benchmarks
41+
- Improving documentation to address common misunderstandings or questions
42+
- Threat models
43+
44+
#### Security Audit
45+
46+
Manage recurring security audits and follow up on issues. Coordinate vendors to perform the audit and publish the findings. Follow up on issues with the affected SIG and help coordinate resolution, which can include:
47+
48+
- Helping to prioritize the fixes, possibly by recruiting from SIG Security (while acknowledging that the ultimate authority in deciding whether and how to fix an issue lies with the responsible SIG).
49+
- Documenting mitigations, workarounds, or caveats, especially when the responsible SIG decides not to fix a reported issue.
50+
51+
### Out of scope
52+
53+
In contrast to SIG Auth, SIG Security does not own any Kubernetes cluster component code.
54+
55+
Further, SIG Security’s scope does not include:
56+
57+
- Kubernetes authentication, authorization, audit and security policy features. (SIG Auth)
58+
- Private vulnerability response (belongs to the PSC), including:
59+
- Embargoed vulnerability management
60+
- Bug bounty submission triage and management
61+
- Non-public vulnerability collection, triage, and disclosure
62+
- The mechanisms to protect confidentiality/integrity of API data (belongs to SIG API Machinery, SIG Auth or others)
63+
- Security audit for all other CNCF projects (e.g., etcd, CoreDNS, CRI-O, containerd) (Belongs to the CNCF’s SIG Security.)
64+
- Any projects outside of the Kubernetes project
65+
- Cloud provider-specific or distributor-specific hardening guides
66+
- Recommendations or endorsements of specific commercial product vendors or cloud providers.
67+
68+
69+
## Roles and Organization Management
70+
71+
This SIG adheres to the Roles and Organization Management outlined in [sig-governance] and opts-in to updates and modifications to [sig-governance].
72+
73+
### Additional responsibilities of Chairs
74+
75+
None defined at this time.
76+
77+
### Additional responsibilities of Tech Leads
78+
79+
- Security Documents and Documentation Tech Leads will be responsible for maintaining the official Kubernetes project Security Hardening Guide.
80+
81+
### Subproject Creation
82+
83+
SIG Security delegates subproject approval to SIG Technical Leads. See Subproject creation - Option 1.
84+
85+
SIG Security’s initial subprojects will be:
86+
87+
- Security Documents and Documentation
88+
- Third Party Security Audit
89+
- Community Discussion Groups

sigs.yaml

Lines changed: 49 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1937,6 +1937,54 @@ sigs:
19371937
- name: scheduler-plugins
19381938
owners:
19391939
- https://raw.githubusercontent.com/kubernetes-sigs/scheduler-plugins/master/OWNERS
1940+
- dir: sig-security
1941+
name: Security
1942+
mission_statement: >
1943+
Covers horizontal security initiatives for the Kubernetes project, including
1944+
regular security audits, the vulnerability management process, cross-cutting
1945+
security documentation, and security community management.
1946+
1947+
charter_link: charter.md
1948+
label: security
1949+
leadership:
1950+
chairs:
1951+
- github: aasmall
1952+
name: Aaron Small
1953+
company: Invitae
1954+
- github: cji
1955+
name: Craig Ingram
1956+
company: Stripe
1957+
- github: jaybeale
1958+
name: Jay Beale
1959+
company: InGuardians
1960+
- github: joelsmith
1961+
name: Joel Smith
1962+
company: Red Hat
1963+
meetings:
1964+
- description: Regular SIG Meeting
1965+
day: Monday
1966+
time: "12:00"
1967+
tz: PT (Pacific Time)
1968+
frequency: biweekly
1969+
url: https://zoom.us/j/8416212023
1970+
archive_url: tba
1971+
recordings_url: tba
1972+
contact:
1973+
slack: sig-security
1974+
mailing_list: https://groups.google.com/forum/#!forum/kubernetes-sig-security
1975+
subprojects:
1976+
- name: community-discussion-groups
1977+
description: "Community Discussion Groups \n"
1978+
owners: []
1979+
- name: security-audit
1980+
description: |
1981+
Third Party Security Audit
1982+
owners:
1983+
- https://github.com/kubernetes/community/blob/master/wg-security-audit/OWNERS
1984+
- name: security-documents
1985+
description: |
1986+
Security Documents and Documentation.
1987+
owners: []
19401988
- dir: sig-service-catalog
19411989
name: Service Catalog
19421990
mission_statement: >
@@ -2757,7 +2805,7 @@ workinggroups:
27572805
chairs:
27582806
- github: aasmall
27592807
name: Aaron Small
2760-
company: Google
2808+
company: Invitae
27612809
- github: cji
27622810
name: Craig Ingram
27632811
company: Stripe

wg-security-audit/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ Perform a security audit on k8s with a vendor and produce as artifacts a threat
1818

1919
## Organizers
2020

21-
* Aaron Small (**[@aasmall](https://github.com/aasmall)**), Google
21+
* Aaron Small (**[@aasmall](https://github.com/aasmall)**), Invitae
2222
* Craig Ingram (**[@cji](https://github.com/cji)**), Stripe
2323
* Jay Beale (**[@jaybeale](https://github.com/jaybeale)**), InGuardians
2424
* Joel Smith (**[@joelsmith](https://github.com/joelsmith)**), Red Hat

0 commit comments

Comments
 (0)