-
Notifications
You must be signed in to change notification settings - Fork 55
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Umbrella] Security Assessment Process for Kubernetes sub-projects #2
Comments
|
/transfer sig-security |
|
/area security-assessment (Trying out the new label that was merged today) |
|
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
|
/remove-lifecycle stale |
|
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
|
/remove-lifecycle stale |
|
/unassign |
|
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
|
/remove-lifecycle stale |
|
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
|
/remove-lifecycle stale |
|
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
|
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
|
/remove-lifecycle rotten |
|
@aladewberry I updated the description to cover links to all the tasks in the list and marked them as done. Since we have a new sub-project that is going places and making things secure, the issue has served its purpose. So, I am closing this issue since we can track future self-assessments through their own issues like you are already doing for vsphere-csi-driver #21 and #40 for cluser-api Feel free to re-open if you disagree :) (Just doing this as part of backlog clearing on my end) |
Goal: Define, execute and improve on a community driven security assessment process for kubernetes sub-projects, which is self-service and welcomes beginners without prior security background to engage and contribute
Background
CNCF TAG Security has a well established process for project maintainers to engage them in a security review process. However, typically the scope is limited to CNCF projects not sub-projects of graduated projects like Kubernetes. In case of Kubernetes, SIG Security is taking up this responsibility to work within the project community through self-assessments as a partnership between maintainers and SIG Security Members
Scope
kubernetes/sig-securityarea/security-assessmentto allow filtering of these requests (Add new label for security assessments test-infra#23070)Related Issues
Cluster API pilot discussion: cncf/tag-security#603
Cluster API tracker: https://github.com/kubernetes/community/issues/5814
Admission controller: cncf/tag-security#731
/assign @PushkarJ
cc @rficcaglia @reylejano @savitharaghunathan @kubernetes/sig-security-leads
/sig security
The text was updated successfully, but these errors were encountered: