Create RFP.md
The initial draft of the RFP for the Kubernetes Third-Party Security Audit.
This commit is contained in:
parent
3005cd4324
commit
4da4a63021
|
@ -0,0 +1,95 @@
|
|||
# Request for Proposal
|
||||
|
||||
## Kubernetes Third Party Security Audit
|
||||
|
||||
The Kubernetes Third-Party Audit Working Group (working group, henceforth) is soliciting proposals from select Information Security vendors for a comprehensive security audit of the Kubernetes Project.
|
||||
|
||||
### Eligible Vendors
|
||||
|
||||
Only the following vendors will be permitted to submit proposals:
|
||||
- NCC Group
|
||||
- Trail of Bits
|
||||
- Cure53
|
||||
- Bishop Fox
|
||||
- Insomnia
|
||||
- Atredis Partners
|
||||
|
||||
|
||||
### RPF Process
|
||||
|
||||
This RFP will be open between 2018/10/22 and 2019/11/18.
|
||||
|
||||
The working group will answer questions for the first two weeks of this period.
|
||||
|
||||
Questions can be submitted [here](https://docs.google.com/forms/d/e/1FAIpQLSd5rXSDYQ0KMjzSEGxv0pkGxInkdW1NEQHvUJpxgX3y0o9IEw/viewform?usp=sf_link). All questions will be answered publicly in this document.
|
||||
|
||||
Proposals must include CVs, resumes, and/or example reports from staff that will be working on the project.
|
||||
|
||||
- 2018/10/22: RFP Open, Question period open
|
||||
- 2018/11/05: Question period closes
|
||||
- 2018/11/19: RFP Closes
|
||||
- 2018/11/26: The working group will announce vendor selection
|
||||
|
||||
|
||||
|
||||
## Audit Scope
|
||||
|
||||
The scope of the audit is the 3 most recent releases (1.10, 1.11, 1.12) of the core [Kubernetes project](https://github.com/kubernetes/kubernetes).
|
||||
|
||||
- Findings within the [bug bounty program](https://github.com/kubernetes/community/blob/master/contributors/guide/bug-bounty.md) scope are in scope.
|
||||
|
||||
> We want the focus of the audit to be on bugs on Kubernetes. While Kubernetes relies upon a container runtimes such as Docker and CRI-O, we aren't looking for (for example) container escapes that rely upon bugs in the container runtime (unless, for example, the escape is made possible by a defect in the way that Kubernetes sets up the container).
|
||||
|
||||
### Focus Areas
|
||||
|
||||
The Kubernetes Third-Party Audit Working Group is specifically interested in the following areas. Proposals should indicate their level of expertise in these fields as it relates to Kubernetes.
|
||||
|
||||
- Networking
|
||||
- Cryptography
|
||||
- Authentication & Authorization (including Role Based Access Controls)
|
||||
- Secrets management
|
||||
- Multi-tenancy isolation along Kubernetes namespace boundaries
|
||||
|
||||
### Out of Scope
|
||||
|
||||
Findings specifically excluded from the [bug bounty program](https://github.com/kubernetes/community/blob/master/contributors/guide/bug-bounty.md) scope are out of scope.
|
||||
|
||||
## Methodology
|
||||
|
||||
We are allowing 8 weeks for the audit. Artifacts must be supplied to the working group by January 21, 2019.
|
||||
|
||||
The audit should not be treated as a penetration test, or red team exercise. The should be comprehensive and not end with the first successful exploit or critical vulnerability.
|
||||
|
||||
The vendor should preform both source code analysis as well as live evaluation of Kubernetes.
|
||||
|
||||
After vendor selection the working group will establish a 60 minute kick-off meeting to answer any initial questions and explain Kubernetes architecture.
|
||||
|
||||
The working group will be available weekly to meet with the selected vendor. And provide subject matter experts on requested components.
|
||||
|
||||
The vendor must report urgent security issues immediately to both the working group and security@kubernetes.io.
|
||||
|
||||
## Confidentiality and Embargo
|
||||
|
||||
All information gathered and artifacts created as a part of the audit must not be shared outside the vendor or the working group without the explicit consent of the working group.
|
||||
|
||||
## Artifacts
|
||||
|
||||
The audit should result in the following artifacts, which will be made public after any sensitive security issues are mitigated.
|
||||
|
||||
- Findings report, including and executive summary
|
||||
- Formal threat model
|
||||
- Any proof of concept exploits that we can use to investigate and fix defects
|
||||
|
||||
- Retrospective white paper(s) on important security considerations in Kubernetes
|
||||
|
||||
*This artifact can be provided up to 3 weeks after deadline for the others.*
|
||||
|
||||
- E.g. [NCC Group: Understanding hardening linux containers](https://www.nccgroup.trust/globalassets/our-research/us/whitepapers/2016/april/ncc_group_understanding_hardening_linux_containers-1-1.pdf)
|
||||
- E.g. [NCC Group: Abusing Privileged and Unprivileged Linux
|
||||
Containers](https://www.nccgroup.trust/globalassets/our-research/us/whitepapers/2016/june/container_whitepaper.pdf)
|
||||
|
||||
## Q & A
|
||||
|
||||
This section intentionally left empty until the question period opens.
|
||||
|
||||
|
Loading…
Reference in New Issue