community/sig-auth
Rita Zhang f2550643ea
Add secrets store csi meeting info (#5394)
* Add secrets store csi meeting info

Signed-off-by: Rita Zhang <rita.z.zhang@gmail.com>

* Run make

Signed-off-by: Rita Zhang <rita.z.zhang@gmail.com>

* Move meeting info to the top

Signed-off-by: Rita Zhang <rita.z.zhang@gmail.com>

* Apply suggestions from code review

Co-authored-by: Anish Ramasekar <anish.ramasekar@gmail.com>

* Address comment

Signed-off-by: Rita Zhang <rita.z.zhang@gmail.com>

Co-authored-by: Anish Ramasekar <anish.ramasekar@gmail.com>
2021-01-12 17:32:36 -08:00
..
archive Archive SIG-Auth 2019 meeting notes 2020-01-14 10:06:31 -08:00
OWNERS Updated OWNERS files to include link to docs 2019-01-30 19:37:21 +01:00
README.md Add secrets store csi meeting info (#5394) 2021-01-12 17:32:36 -08:00
charter.md Rename Product Security Team to Committee 2019-03-04 11:47:21 -07:00

README.md

Auth Special Interest Group

Covers improvements to Kubernetes authorization, authentication, and cluster security policy.

"All I want is a secure system where it's easy to do anything I want. Is that so much to ask?" - xkcd

The charter defines the scope and governance of the Auth Special Interest Group.

Meetings

Leadership

Chairs

The Chairs of the SIG run operations and processes governing the SIG.

Technical Leads

The Technical Leads of the SIG establish new subprojects, decommission existing subprojects, and resolve cross-subproject technical issues and decisions.

Emeritus Leads

Contact

Subprojects

The following subprojects are owned by sig-auth:

audit-logging

Kubernetes API support for audit logging.

authenticators

Kubernetes API support for authentication.

authorizers

Kubernetes API support for authorization.

certificates

Certificates APIs and client infrastructure to support PKI.

encryption-at-rest

API storage support for storing data encrypted at rest in etcd.

multi-tenancy

Proposals and prototypes for introducing tenant model to enable multi-tenant cluster

node-identity-and-isolation

Node identity management (co-owned with sig-lifecycle), and authorization restrictions for isolating workloads on separate nodes (co-owned with sig-node).

policy-management

API validation and policies enforced during admission, such as PodSecurityPolicy. Excludes run-time policies like NetworkPolicy and Seccomp.

secrets-store-csi-driver

Integrates secrets stores with Kubernetes via a CSI volume.

service-accounts

Infrastructure implementing Kubernetes service account based workload identity.