Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Cloud Native Security Whitepaper #138

Closed
14 tasks done
ultrasaurus opened this issue Mar 23, 2019 · 28 comments
Closed
14 tasks done

Cloud Native Security Whitepaper #138

ultrasaurus opened this issue Mar 23, 2019 · 28 comments
Assignees
Labels
project work of the group whitepaper Related to discussion of white papers

Comments

@ultrasaurus
Copy link
Member

ultrasaurus commented Mar 23, 2019

In 2018, SAFE WG focused on understand security, given modern (cloud native) enterprise infra, and synthesized into a common understanding; however, much of what we have learned is buried in meeting notes and presentations.

We would like to now communicate what we’ve understood to the rest of the world. One step will be to draft a SAFE whitepaper that covers over-arching concerns. Some of us met (march 22, 2019) to brainstorm a whitepaper outline:

Outline:

  • Objective
  • Audience
  • Intro
    • Goals
    • Scope
    • Assumptions
  • Cloud Native Layers
    • Environments
    • Lifecycle
  • Personas & Use cases
  • Security, Compliance & Auditing
  • Security Stack
  • Evolution
  • References

Current Whitepaper Work in progress:

Whitepaper ready for review Comments are turned on so please comment!

TO DO

  • SIG Chair support: @pragashj
  • Project leader: @TheFoxAtWork
  • small group to review next iteration of outline & define terms starting 7/29 9AM Pacific
  • create schedule
  • Create Outline
  • present draft to SIG (including goals, target audience, in scope / out of scope)
  • Solicit intended audience cursory review

Proposed Schedule:

  • Due AUG 12 2020
  • Tasking Assignment - group members interested in content generation for a particular topic area at the numeric alpha level (1.b for instance) members should place their names in parenthesis next to the title with . Members with subject matter expertise in areas below numeric alpha and wishing to contribute to that sub-section should include it by their name for the topic area.
  • AUG 12 thru SEP 02 2020 - Content rough-in
  • Content Rough-in - group members should begin generating content for the respective areas of assignment. Cohesive sentences, concepts, phrasing, etc. should be placed in quotations ("") for later review as whole content.
  • Meeting on AUG 26
  • Content rough-in will be pulled into clean working doc after meeting on AUG 26 and shared with group.
  • SEP 02 thru SEP 23 2020 - Collaborative review
  • Collaborative review - group members will comment and review initial draft content on clean doc.
  • Meeting on SEP 09 - get a feel for where we are at, add't time needed, any questions, etc. , identify presenters for SEPT 23rd SIG meeting on CNSWP content draft.
  • Link to the Working Draft
  • SEP 23 2020 thru OCT 07 2020 - executive summary and content wrap up

  • ~OCT 07 thru OCT 19 2020 Narrative Voice

  • Narrative Voice and content level - limited review to provide singular narrative voice and ensure content level is in keeping with goals, audience and scope
  • no meeting
  • SIG Security presentation and overview - unassigned
  • ~OCT 19 thru OCT 27 2020 Final Group Review
  • Final Review - final review by group, with selected "intended audience"
  • Post content to the repo after reviewed?
  • CNCF Editorial Assistance - @dshaw @pragashj

  • [ ]~DUE NOV 04 2020 (subject to CNCF timeline) Final adjudication

  • Final adjudication

Meeting notes for WG syncs

Meeting note and agenda

@ultrasaurus
Copy link
Member Author

@pragashj @dshaw @ultrasaurus, Jessica Walker and Sara Dornsife met to discuss white paper content - see 3/22/2018 meeting notes

@ultrasaurus
Copy link
Member Author

ultrasaurus commented Mar 23, 2019

Moved outline into separate doc where we can elaborate into a full whitepaper.

[OUTDATED]NOTE: As of July 2020, we have moved to a new document: Cloud Native Security Whitepaper - @dshaw]

EDIT (@lumjjb): New document is at https://docs.google.com/document/d/1MEeqWvUavXK5TkuFIfoJbtxCT-2FdTw7jgYP3kxtbmk/edit?usp=sharing

@rficcaglia
Copy link
Contributor

just a process question - is it more desirable to use Google Docs vs. markdown docs that can be PR'd? is the idea to minimize git activity until there is a solid draft document rather than have the full "sausage making" process clutter up the git stream?

@pragashj
Copy link
Collaborator

That is the idea, please feel free to chime in on the doc and help shape it.

@lumjjb lumjjb added the whitepaper Related to discussion of white papers label May 30, 2019
@ultrasaurus ultrasaurus added the project work of the group label Jul 2, 2019
ultrasaurus added a commit that referenced this issue Jul 2, 2019
@TheFoxAtWork
Copy link
Collaborator

related #405

@whaber
Copy link
Contributor

whaber commented Jul 22, 2020

I would like to participate. Please include me in future discussions on it.

@vinayvenkat
Copy link
Contributor

+1 @vinayvenkat

@PushkarJ
Copy link
Collaborator

+1 please include me

@tabbysable
Copy link
Contributor

+1

1 similar comment
@trishankatdatadog
Copy link
Contributor

+1

@dshaw dshaw changed the title security overview whitepaper Cloud Native Security Whitepaper Jul 22, 2020
@dshaw
Copy link
Collaborator

dshaw commented Jul 22, 2020

@vinayvenkat @whaber @PushkarJ @tabbysable @trishankatdatadog I have added you all to the new working group Slack channel.

For any other members of SIG-Security who may want to join us, add yourself here then please also ping me on Slack.

@chasemp
Copy link
Contributor

chasemp commented Jul 22, 2020

Please add me at your convenience to the slack channel. Thanks @dshaw.

@gadinaor
Copy link
Contributor

@dshaw - can you add me to the slack channel please

@sublimino
Copy link
Member

@dshaw me too please 🙏

@TheFoxAtWork
Copy link
Collaborator

@gadinaor - i don't see you in the members listing or in the existing slack to add you

@gadinaor
Copy link
Contributor

@gadinaor - i don't see you in the members listing or in the existing slack to add you

@TheFoxAtWork true // I'm part of it now

@IAXES
Copy link
Contributor

IAXES commented Jul 29, 2020

May I please be added as well? Thank you @dshaw

@kapilt
Copy link

kapilt commented Jul 29, 2020

I'm also interested re slack and discussion on this topic, thanks @dshaw

@TheFoxAtWork
Copy link
Collaborator

@kapilt i DM'd u in slack, need ur email to get u access, updates are in the channel

@rowan-baker
Copy link

May I please be added to the slack channel, I am looking to help @sublimino with his contribution. Also raising a PR to join as a member shortly. Thanks @dshaw / @TheFoxAtWork

@TheFoxAtWork
Copy link
Collaborator

Updated with new schedule to allow more time for content generation

@TheFoxAtWork
Copy link
Collaborator

Team is moving forward! extended the collaborative review by a week to accommodate busy schedules

@TheFoxAtWork
Copy link
Collaborator

@SaadUSheikh
Copy link

@ultrasaurus please can you add me to Security white paper i want to give some inputs specially for Telecom perspective , thanks

@fctoibm
Copy link

fctoibm commented Sep 16, 2020

Enterprise
Core areas of concern for Enterprise to adopt a cloud-native model are maintaining the current process and procedures while meeting the business objective. Keeping the interoperability, data loss or leakage, and security risk exposure at a minimum when new standards and practices are introduced throughout the organization.
Microbusiness
Small businesses tend to focus on short term goals and innovation to meet intense competition. The lack of resources, budget, technology depth, and best practice hinders their ability to adapt to cloud-native solutions. Small business requires repeatable patterns and small IT footprint to solve the challenges.
Finance
Core areas of concern for financial industries essential to successful cloud-native adoption are unauthorized disclosure of information, fraud, and fund availability. Fraud can directly impact fund availability, making the integrity of financial transactions of paramount importance.
Healthcare
Core areas of concern for healthcare industries essential to successful cloud-native adoption are unauthorized disclosure of information, timeliness, availability of records, and records accuracy. Due to the nature and practices of the healthcare industry, the availability of records and their associated content is how medical decisions are made. In the absence of such information, new records are developed.
Academia and education
Core areas of concern for educational institutions for successful cloud-native adoption can depend upon the intended end user. Institutions catering to minors may have additional legal requirements to protect minors’ confidentiality, thereby making access control critical. Beyond this, institutions should focus on the availability of educational content to end-users.
Public Sector
Core areas of concern for Public Sector organizations to implement cloud-native adoptions are security, data sovereignty, compliances, and vendor lock-in. The barriers emerge from agencies placing regulations to protect the public interest. In the public sector, it is essential to maintain harmony and trust between public and government entities.

@lumjjb
Copy link
Collaborator

lumjjb commented Sep 16, 2020

Thanks Harmeet, i'll add them into the doc

@vinayvenkat
Copy link
Contributor

@TheFoxAtWork
Copy link
Collaborator

Thanks to everyone who helped make this possible. The Cloud Native Security Whitepaper now lives in the repo as Markdown. As significant changes occur, we will republish the PDF by major version.

Project Tracking Board for items not committed to Roadmap automation moved this from In progress to Done Dec 4, 2020
TheFoxAtWork added a commit that referenced this issue Jul 9, 2021
Why:

* #138 detailed a need for this and was reiterated at a recent mtg.

This change addresses the need by:

* creating a project resources directory
* linking to existing CNCF resources
* pulling in content from @annabellegoth2boss recommendation
lumjjb pushed a commit that referenced this issue Aug 3, 2021
* What: Initial set of project security resources

Why:

* #138 detailed a need for this and was reiterated at a recent mtg.

This change addresses the need by:

* creating a project resources directory
* linking to existing CNCF resources
* pulling in content from @annabellegoth2boss recommendation

* What: fix spelling issues.

* What: correcting the rest of the spelling issues

* What: last two fixes

* What: Updating with GitHub CNA info

Why:

* CNCF/LF is not a CNA because GitHub is a CNA

This change addresses the need by:

* modifying the incident response template to call out the portion of GitHub docs.

* What: Adding dependabot info & maintenance

Why:

* dependabot is a ideal option when enbaled for security updates and configured for versions.

* @lumjjb suggested a maintenance section in the readme and that is always smart.

This change addresses the need by:

* added details to the readme
* testing spelling

* What: adding disclaimer.

* What: Updates per review

Why:

* @lumjjb brought up some valid items
* @jlk correctly pointed out the overuse of the word "issue" and potential confusion

This change addresses the need by:

* added in @lumjjb's suggestions
* swapped `issue` for `problem` where appropriate
* improved readability in README.md for maintenance
* added disclaimer

* What: spelling update

* What: Updates per latest review

Why:

* nits found

This change addresses the need by:

* resolving nits

* What: more nits.
Michael-Susu12138 pushed a commit to Michael-Susu12138/tag-security that referenced this issue Dec 12, 2023
Michael-Susu12138 pushed a commit to Michael-Susu12138/tag-security that referenced this issue Dec 12, 2023
* What: Initial set of project security resources

Why:

* cncf#138 detailed a need for this and was reiterated at a recent mtg.

This change addresses the need by:

* creating a project resources directory
* linking to existing CNCF resources
* pulling in content from @annabellegoth2boss recommendation

* What: fix spelling issues.

* What: correcting the rest of the spelling issues

* What: last two fixes

* What: Updating with GitHub CNA info

Why:

* CNCF/LF is not a CNA because GitHub is a CNA

This change addresses the need by:

* modifying the incident response template to call out the portion of GitHub docs.

* What: Adding dependabot info & maintenance

Why:

* dependabot is a ideal option when enbaled for security updates and configured for versions.

* @lumjjb suggested a maintenance section in the readme and that is always smart.

This change addresses the need by:

* added details to the readme
* testing spelling

* What: adding disclaimer.

* What: Updates per review

Why:

* @lumjjb brought up some valid items
* @jlk correctly pointed out the overuse of the word "issue" and potential confusion

This change addresses the need by:

* added in @lumjjb's suggestions
* swapped `issue` for `problem` where appropriate
* improved readability in README.md for maintenance
* added disclaimer

* What: spelling update

* What: Updates per latest review

Why:

* nits found

This change addresses the need by:

* resolving nits

* What: more nits.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
project work of the group whitepaper Related to discussion of white papers
Development

No branches or pull requests