community/sig-security/sig-security-external-audit
Pushkar Joglekar 9d04571580
Replace k/security with k/committee-security-response in k/community/sig-security (#6008)
* Replace k/security with k/committee-security-response

Minor updates from PSC to SRC

* Updated references from master to main branch
2021-09-24 16:10:21 -07:00
..
OWNERS Update sig security external audit subgroup chair to Rey Lejano 2021-03-31 14:44:28 -07:00
README.md Replace k/security with k/committee-security-response in k/community/sig-security (#6008) 2021-09-24 16:10:21 -07:00
external-audit-roadmap.md add draft external audit roadmap 2021-06-09 12:47:49 -07:00

README.md

SIG Security External Audit Subproject

Overview

The SIG Security External Audit subproject (subproject, henceforth) is responsible for coordinating regular, comprehensive, third-party security audits. The subproject publishes the deliverables of the audit after abiding to the Security Release Process and embargo policy.

RFP

The subproject produces a RFP for a third-party, comprehensive security audit. The subproject publishes the RFP in the sig-security folder in the kubernetes/community repository. The subproject defines the scope, schedule, methodology, selection criteria, and deliverables in the RFP.

Previous RFPs:

As efforts begin for the year's security audit, create a tracking issue for the security audit in kubernetes/community with the /sig security label.

Security Audit Scope

The scope of an audit is the most recent release at commencement of audit of the core Kubernetes project and certain other code maintained by Kubernetes SIGs.

Core Kubernetes components remain as focus areas of regular audits. Additional focus areas are finalized by the subproject.

Vendor and Community Questions

Potential vendors and the community can submit questions regarding the RFP through a Google form. The Google form is linked in the RFP. Example from the 2021 audit.

The subproject answers questions publicly on the RFP with pull requests to update the RFP. Example from the 2021 audit.

The question period is typically open between the RFP's opening date and closing date.

Review of Proposals

Proposals are reviewed by the subproject proposal reviewers after the RFP closing date. An understanding of security audits is required to be a proposal reviewer.

All proposal reviewers must agree to abide by the Security Release Process, embargo policy, and have no conflict of interest the tracking issue. This is done by placing a comment on the issue associated with the security audit. e.g. I agree to abide by the guidelines set forth in the Security Release Process, specifically the embargo on CVE communications and have no conflict of interest

Proposal reviewers are members of a private Google group and private Slack channel to exchange sensitive, confidential information and to share artifacts.

Conflict of Interest

There is a possibility of a conflict of interest between a proposal reviewer and a vendor. Proposal reviewers should not have a conflict of interest. Examples of conflict of interest:

  • Proposal reviewer is employed by a vendor who submitted a proposal
  • Proposal reviewer has financial interest directly tied to the audit

Should a conflict arise during the proposal review, reviewers should notify the subproject owner and SIG Security chairs when they become aware of the conflict.

The Conflict of Interest section is inspired by the CNCF Security TAG security reviewer process.

Vendor Selection

On the vendor selection date, the subproject will publish a the selected vendor in the 'sig-security' folder in the kubernetes/community repository. Example from the 2019 audit.

Deliverables

The deliverables of the audit are defined in the RFP e.g. findings report, threat model, white paper, audited reference architecture spec (with yaml manifests) and published in the 'sig-security' folder in the kubernetes/community repository. Example from the 2019 audit.

All information gathered and deliverables created as a part of the audit must not be shared outside the vendor or the subproject without the explicit consent of the subproject and SIG Security chairs.