Skip to content

Commit da79b18

Browse files
committed
Initial publication of 2021 third-party security audit RFP.
1 parent f58ed83 commit da79b18

File tree

1 file changed

+121
-0
lines changed
  • sig-security/security-audit-2021

1 file changed

+121
-0
lines changed
Lines changed: 121 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,121 @@
1+
# Request for Proposal
2+
3+
## Kubernetes Third-Party Security Audit
4+
5+
The Kubernetes Third-Party Audit Working Group (working group, henceforth) is soliciting proposals from Information Security vendors for a comprehensive security audit of the Kubernetes Project.
6+
7+
### Background
8+
9+
In August of 2019, the Kubernetes Security Audit working group, in concert with the CNCF, Trail of Bits, and Atredis Partners, completed the first comprehensive security audit of the Kubernetes project’s [codebase](https://github.com/kubernetes/kubernetes/), working from version 1.13.
10+
11+
These findings, below, paint a broad picture of Kubernetes security, as of version 1.13, and highlight some areas that warrant further, deeper, research.
12+
13+
* [Kubernetes Security Review](../security-audit-2019/findings/Kubernetes%20Final%20Report.pdf)
14+
* [Attacking and Defending Kubernetes Installations](../security-audit-2019/findings/AtredisPartners_Attacking_Kubernetes-v1.0.pdf)
15+
* [Whitepaper](../security-audit-2019/findings/Kubernetes%20White%20Paper.pdf)
16+
* [Threat Model](../security-audit-2019/findings/Kubernetes%20Threat%20Model.pdf)
17+
18+
### Project Goals and Scope
19+
20+
This subsequent audit is intended to be the second in a series of recurring audits, each focusing on a specific aspect of Kubernetes while maintaining coverage of all aspects that have changed since the previous audit ([1.13](../security-audit-2019/findings/)).
21+
22+
The scope of this audit is the most recent release (1.20) of the core [Kubernetes project](https://github.com/kubernetes/kubernetes).
23+
24+
This audit will focus on the following components of Kubernetes:
25+
26+
* kube-apiserver
27+
* kube-scheduler
28+
* etcd, Kubernetes use of
29+
* kube-controller-manager
30+
* cloud-controller-manager
31+
* kubelet
32+
* kube-proxy
33+
* secrets-store-csi-driver
34+
35+
Adjacent findings within the scope of the [bug bounty program](https://hackerone.com/kubernetes?type=team#scope) may be included, but are not the primary goal.
36+
37+
This audit is intended to find vulnerabilities or weaknesses in Kubernetes. While Kubernetes relies upon container runtimes such as Docker and CRI-O, we aren't looking for (for example) container escapes that rely upon bugs in the container runtime (unless, for example, the escape is made possible by a defect in the way that Kubernetes sets up the container).
38+
39+
The working group is specifically interested in the following aspects of the in-scope components. Proposals should indicate the specific proposed personnel’s level of expertise in these fields as it relates to Kubernetes.
40+
41+
* Golang analysis and fuzzing
42+
* Networking
43+
* Cryptography
44+
* Evaluation of component privilege
45+
* Trust relationships and architecture evaluation
46+
* Authentication & Authorization (including Role Based Access Controls)
47+
* Secrets management
48+
* Multi-tenancy isolation: Specifically soft (non-hostile co-tenants)
49+
50+
Personnel written into the proposal must serve on the engagement, unless explicit approvals for staff changes are made by the Security Audit Working Group.
51+
52+
#### Out of Scope
53+
54+
Findings specifically excluded from the [bug bounty program](https://hackerone.com/kubernetes?type=team#scope) scope are out of scope for this audit.
55+
56+
### Eligible Vendors
57+
58+
This RFP is open to proposals from all vendors.
59+
60+
#### Constraints
61+
62+
If your proposal includes subcontractors, please include relevant details from their firms such as CVs, past works, etc. The selected vendor will be wholly responsible for fulfillment of the audit and subcontractors must be wholly managed by the selected vendor.
63+
64+
### Anticipated Selection Schedule
65+
66+
This RFP will be open between 2021/01/25 and 2021/02/26.
67+
68+
The working group will answer questions for the first two weeks of this period.
69+
70+
Questions can be submitted [here](https://docs.google.com/forms/d/e/1FAIpQLScjApMDAJ5o5pIBFKpJ3mUhdY9w5s9VYd_TffcMSvYH_O7-og/viewform). All questions will be answered publicly in this document.
71+
72+
Proposals must include CVs, resumes, and/or example reports from staff that will be working on the project.
73+
74+
Proposals should be submitted to [email protected]
75+
76+
* 2021/01/25: RFP Open, Question period open
77+
* 2021/02/08: Question period closes
78+
* 2021/02/26: RFP Closes
79+
* 2021/03/09: The working group will announce vendor selection
80+
81+
## Methodology
82+
83+
We are allowing roughly 12 calendar weeks for this audit, start date can be negotiated after vendor selection.
84+
85+
The working group will establish a 60 minute kick-off meeting to answer any initial questions and discuss the Kubernetes architecture.
86+
87+
This is a comprehensive audit, not a penetration test or red team exercise. The audit does not end with the first successful exploit or critical vulnerability.
88+
89+
The vendor will document the Kubernetes configuration and architecture that they will audit and provide this to the working group. The cluster deployment assessed must not be specific to any public cloud. The working group must approve this configuration before the audit continues. This documented configuration will result in the "audited reference architecture specification" deliverable.
90+
91+
The vendor will perform source code analysis on the Kubernetes code base, finding vulnerabilities and, where possible and making the most judicious use of time, providing proof of concept exploits that the Kubernetes project can use to investigate and fix defects. The vendor will discuss findings on a weekly basis and, at the vendor’s discretion, bring draft write-ups to status meetings.
92+
93+
The working group will be available weekly to meet with the selected vendor and will provide subject matter experts as requested.
94+
95+
The vendor will develop and deliver a draft report, describing their methodology, how much attention the various components received (to inform future work), and the work’s findings. The working group will review and comment on the draft report, either requesting updates or declaring the draft final. This draft-review-comment-draft cycle may repeat several times.
96+
97+
## Expectations
98+
99+
The vendor must report urgent security issues immediately to both the working group and [email protected].
100+
101+
## Selection Criteria
102+
103+
To help us combine objective evaluations with the working group members’ individual past experiences and knowledge of the vendors’ work and relevant experience, the vendors will be evaluated against the following criteria. Each member of the working group will measure the RFP against the criteria on a scale of 1 to 5:
104+
105+
* Relevant understanding and experience in code audit, threat modeling, and related work
106+
* Relevant understanding and experience in Kubernetes, other orchestration systems, containers, Linux, hardening of distributed systems, and related work
107+
* Strength of the vendor’s proposal and examples of previous work product, redacted as necessary
108+
109+
A writeup which details our process and results of the last RFP is available [here](../security-audit-2019/RFP_Decision.md).
110+
111+
## Confidentiality and Embargo
112+
113+
All information gathered and deliverables created as a part of the audit must not be shared outside the vendor or the working group without the explicit consent of the working group.
114+
115+
## Deliverables
116+
117+
The audit should result in the following deliverables, which will be made public after any sensitive security issues are mitigated.
118+
119+
* Audited reference architecture specification. Should take the form of a summary and associated configuration YAML files.
120+
* Findings report including an executive summary.
121+
* Where possible and, in the vendor’s opinion makes the most judicious use of time, proof of concept exploits that the Kubernetes project can use to investigate and fix defects.

0 commit comments

Comments
 (0)