sig-security
sig-security copied to clipboard
Kubernetes Third-Party Security Audit for 2024 (tracking issue)
Tracking issue for the Kubernetes third-party security audit for 2024:
- [ ] Define audit scope
- [ ] Create RFP
- [ ] Finalize dates: RFP opening and closing dates, question period, vendor selection
- [ ] Complete question period and publish questions & replies to RFP
- [ ] Vendor assessment
- [ ] Assemble vendor assessment group
- [ ] Create private Google group
- [ ] Release vendor selection
- [ ] Coordinate SME as contacts for vendor
- [ ] Vendor conducts audit
- [ ] Send findings to SRC
- [ ] Findings review with SIG Security
- [ ] Publish findings
/sig security
@reylejano: The label(s) /label external-audit cannot be applied. These labels are supported: api-review, tide/merge-method-merge, tide/merge-method-rebase, tide/merge-method-squash, team/katacoda, refactor. Is this label configured under labels -> additional_labels or labels -> restricted_labels in plugin.yaml?
In response to this:
Tracking issue for the Kubernetes third-party security audit for 2023-2024:
- [ ] Create RFP
- [ ] Audit scope
- [ ] Finalize dates: RFP opening and closing dates, question period, vendor selection
- [ ] Complete question period and publish questions & replies to RFP
- [ ] Vendor assessment
- [ ] Assemble vendor assessment group
- [ ] Create private Google group
- [ ] Release vendor selection
- [ ] Coordinate SME as contacts for vendor
- [ ] Vendor conducts audit
- [ ] Send findings to SRC
- [ ] Findings review with SIG Security
- [ ] Publish findings
/sig security /label external-audit
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.
xref: https://github.com/kubernetes/sig-security/pull/105 add windows to scope
also include the new threat model refresh @raesene
Aside: how about adding /area audit (label and associated Prow command)?
The Kubernetes project currently lacks enough contributors to adequately respond to all issues.
This bot triages un-triaged issues according to the following rules:
- After 90d of inactivity,
lifecycle/staleis applied - After 30d of inactivity since
lifecycle/stalewas applied,lifecycle/rottenis applied - After 30d of inactivity since
lifecycle/rottenwas applied, the issue is closed
You can:
- Mark this issue as fresh with
/remove-lifecycle stale - Close this issue with
/close - Offer to help out with Issue Triage
Please send feedback to sig-contributor-experience at kubernetes/community.
/lifecycle stale
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues.
This bot triages un-triaged issues according to the following rules:
- After 90d of inactivity,
lifecycle/staleis applied - After 30d of inactivity since
lifecycle/stalewas applied,lifecycle/rottenis applied - After 30d of inactivity since
lifecycle/rottenwas applied, the issue is closed
You can:
- Mark this issue as fresh with
/remove-lifecycle rotten - Close this issue with
/close - Offer to help out with Issue Triage
Please send feedback to sig-contributor-experience at kubernetes/community.
/lifecycle rotten
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs.
This bot triages issues according to the following rules:
- After 90d of inactivity,
lifecycle/staleis applied - After 30d of inactivity since
lifecycle/stalewas applied,lifecycle/rottenis applied - After 30d of inactivity since
lifecycle/rottenwas applied, the issue is closed
You can:
- Reopen this issue with
/reopen - Mark this issue as fresh with
/remove-lifecycle rotten - Offer to help out with Issue Triage
Please send feedback to sig-contributor-experience at kubernetes/community.
/close not-planned
@k8s-triage-robot: Closing this issue, marking it as "Not Planned".
In response to this:
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs.
This bot triages issues according to the following rules:
- After 90d of inactivity,
lifecycle/staleis applied- After 30d of inactivity since
lifecycle/stalewas applied,lifecycle/rottenis applied- After 30d of inactivity since
lifecycle/rottenwas applied, the issue is closedYou can:
- Reopen this issue with
/reopen- Mark this issue as fresh with
/remove-lifecycle rotten- Offer to help out with Issue Triage
Please send feedback to sig-contributor-experience at kubernetes/community.
/close not-planned
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.