* Replace k/security with k/committee-security-response Minor updates from PSC to SRC * Updated references from master to main branch |
||
---|---|---|
.. | ||
OWNERS | ||
README.md | ||
external-audit-roadmap.md |
README.md
SIG Security External Audit Subproject
Overview
The SIG Security External Audit subproject (subproject, henceforth) is responsible for coordinating regular, comprehensive, third-party security audits. The subproject publishes the deliverables of the audit after abiding to the Security Release Process and embargo policy.
RFP
The subproject produces a RFP for a third-party, comprehensive security audit. The subproject publishes the RFP in the
sig-security
folder in the kubernetes/community
repository. The subproject defines the scope, schedule,
methodology, selection criteria, and deliverables in the RFP.
Previous RFPs:
As efforts begin for the year's security audit, create a tracking issue for the security audit in
kubernetes/community
with the /sig security
label.
Security Audit Scope
The scope of an audit is the most recent release at commencement of audit of the core Kubernetes project and certain other code maintained by Kubernetes SIGs.
Core Kubernetes components remain as focus areas of regular audits. Additional focus areas are finalized by the subproject.
Vendor and Community Questions
Potential vendors and the community can submit questions regarding the RFP through a Google form. The Google form is linked in the RFP. Example from the 2021 audit.
The subproject answers questions publicly on the RFP with pull requests to update the RFP. Example from the 2021 audit.
The question period is typically open between the RFP's opening date and closing date.
Review of Proposals
Proposals are reviewed by the subproject proposal reviewers after the RFP closing date. An understanding of security audits is required to be a proposal reviewer.
All proposal reviewers must agree to abide by the
Security Release Process,
embargo policy,
and have no conflict of interest the tracking issue.
This is done by placing a comment on the issue associated with the security audit.
e.g. I agree to abide by the guidelines set forth in the Security Release Process, specifically the embargo on CVE communications and have no conflict of interest
Proposal reviewers are members of a private Google group and private Slack channel to exchange sensitive, confidential information and to share artifacts.
Conflict of Interest
There is a possibility of a conflict of interest between a proposal reviewer and a vendor. Proposal reviewers should not have a conflict of interest. Examples of conflict of interest:
- Proposal reviewer is employed by a vendor who submitted a proposal
- Proposal reviewer has financial interest directly tied to the audit
Should a conflict arise during the proposal review, reviewers should notify the subproject owner and SIG Security chairs when they become aware of the conflict.
The Conflict of Interest section is inspired by the CNCF Security TAG security reviewer process.
Vendor Selection
On the vendor selection date, the subproject will publish a the selected vendor in the 'sig-security' folder in the kubernetes/community
repository.
Example from the 2019 audit.
Deliverables
The deliverables of the audit are defined in the RFP e.g. findings report, threat model, white paper, audited reference architecture spec (with yaml manifests) and published in the 'sig-security' folder in the kubernetes/community
repository.
Example from the 2019 audit.
All information gathered and deliverables created as a part of the audit must not be shared outside the vendor or the subproject without the explicit consent of the subproject and SIG Security chairs.