Skip to content

Commit 2cb0f9c

Browse files
committed
rename product security committee to security response committee
1 parent 750d424 commit 2cb0f9c

File tree

4 files changed

+9
-9
lines changed

4 files changed

+9
-9
lines changed

SECURITY_CONTACTS

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# Defined below are the security contacts for this repo.
22
#
3-
# They are the contact point for the Product Security Committee to reach out
3+
# They are the contact point for the Security Response Committee to reach out
44
# to for triaging and handling of incoming issues.
55
#
66
# The below names agree to abide by the

content/en/docs/reference/issues-security/security.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ To make a report, submit your vulnerability to the [Kubernetes bug bounty progra
2929

3030
You can also email the private [[email protected]](mailto:[email protected]) list with the security details and the details expected for [all Kubernetes bug reports](https://git.k8s.io/kubernetes/.github/ISSUE_TEMPLATE/bug-report.md).
3131

32-
You may encrypt your email to this list using the GPG keys of the [Product Security Committee members](https://git.k8s.io/security/README.md#product-security-committee-psc). Encryption using GPG is NOT required to make a disclosure.
32+
You may encrypt your email to this list using the GPG keys of the [Security Response Committee members](https://git.k8s.io/security/README.md#product-security-committee-psc). Encryption using GPG is NOT required to make a disclosure.
3333

3434
### When Should I Report a Vulnerability?
3535

@@ -47,13 +47,13 @@ You may encrypt your email to this list using the GPG keys of the [Product Secur
4747

4848
## Security Vulnerability Response
4949

50-
Each report is acknowledged and analyzed by Product Security Committee members within 3 working days. This will set off the [Security Release Process](https://git.k8s.io/security/security-release-process.md#disclosures).
50+
Each report is acknowledged and analyzed by Security Response Committee members within 3 working days. This will set off the [Security Release Process](https://git.k8s.io/security/security-release-process.md#disclosures).
5151

52-
Any vulnerability information shared with Product Security Committee stays within Kubernetes project and will not be disseminated to other projects unless it is necessary to get the issue fixed.
52+
Any vulnerability information shared with Security Response Committee stays within Kubernetes project and will not be disseminated to other projects unless it is necessary to get the issue fixed.
5353

5454
As the security issue moves from triage, to identified fix, to release planning we will keep the reporter updated.
5555

5656
## Public Disclosure Timing
5757

58-
A public disclosure date is negotiated by the Kubernetes Product Security Committee and the bug submitter. We prefer to fully disclose the bug as soon as possible once a user mitigation is available. It is reasonable to delay disclosure when the bug or the fix is not yet fully understood, the solution is not well-tested, or for vendor coordination. The timeframe for disclosure is from immediate (especially if it's already publicly known) to a few weeks. For a vulnerability with a straightforward mitigation, we expect report date to disclosure date to be on the order of 7 days. The Kubernetes Product Security Committee holds the final say when setting a disclosure date.
58+
A public disclosure date is negotiated by the Kubernetes Security Response Committee and the bug submitter. We prefer to fully disclose the bug as soon as possible once a user mitigation is available. It is reasonable to delay disclosure when the bug or the fix is not yet fully understood, the solution is not well-tested, or for vendor coordination. The timeframe for disclosure is from immediate (especially if it's already publicly known) to a few weeks. For a vulnerability with a straightforward mitigation, we expect report date to disclosure date to be on the order of 7 days. The Kubernetes Security Response Committee holds the final say when setting a disclosure date.
5959

content/en/releases/patch-releases.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ Towards the end of the twelve month, the following will happen:
5959
During the two-month maintenance mode period, Release Managers may cut
6060
additional maintenance releases to resolve:
6161

62-
- CVEs (under the advisement of the Product Security Committee)
62+
- CVEs (under the advisement of the Security Response Committee)
6363
- dependency issues (including base image updates)
6464
- critical core component issues
6565

content/en/releases/release-managers.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ The responsibilities of each role are described below.
2727
| --- | --- | --- | --- | --- |
2828
| [[email protected]](mailto:[email protected]) | [#release-management](https://kubernetes.slack.com/messages/CJH2GBF7Y) (channel) / @release-managers (user group) | Public | Public discussion for Release Managers | All Release Managers (including Associates, Build Admins, and SIG Chairs) |
2929
| [[email protected]](mailto:[email protected]) | N/A | Private | Private discussion for privileged Release Managers | Release Managers, SIG Release leadership |
30-
| [[email protected]](mailto:[email protected]) | [#security-release-team](https://kubernetes.slack.com/archives/G0162T1RYHG) (channel) / @security-rel-team (user group) | Private | Security release coordination with the Product Security Committee | [[email protected]](mailto:[email protected]), [[email protected]](mailto:[email protected]) |
30+
| [[email protected]](mailto:[email protected]) | [#security-release-team](https://kubernetes.slack.com/archives/G0162T1RYHG) (channel) / @security-rel-team (user group) | Private | Security release coordination with the Security Response Committee | [[email protected]](mailto:[email protected]), [[email protected]](mailto:[email protected]) |
3131

3232
### Security Embargo Policy
3333

@@ -79,7 +79,7 @@ Release Managers are responsible for:
7979
answering questions and suggesting appropriate work for them to do
8080

8181
This team at times works in close conjunction with the
82-
[Product Security Committee][psc] and therefore should abide by the guidelines
82+
[Security Response Committee][src] and therefore should abide by the guidelines
8383
set forth in the [Security Release Process][security-release-process].
8484

8585
GitHub Access Controls: [@kubernetes/release-managers](https://github.com/orgs/kubernetes/teams/release-managers)
@@ -215,6 +215,6 @@ Example: [1.15 Release Team](https://git.k8s.io/sig-release/releases/release-1.1
215215
[handbook-patch-release]: https://git.k8s.io/sig-release/release-engineering/role-handbooks/patch-release-team.md
216216
[k-sig-release-releases]: https://git.k8s.io/sig-release/releases
217217
[patches]: /patch-releases.md
218-
[psc]: https://git.k8s.io/community/committee-product-security/README.md
218+
[src]: https://git.k8s.io/community/committee-product-security/README.md
219219
[release-team]: https://git.k8s.io/sig-release/release-team/README.md
220220
[security-release-process]: https://git.k8s.io/security/security-release-process.md

0 commit comments

Comments
 (0)