tag-security icon indicating copy to clipboard operation
tag-security copied to clipboard

CNCF Cloud Native Security Map Vanilla

Open lumjjb opened this issue 3 years ago • 41 comments

CNCF Cloud Native Security Map Vanilla

For a much more detailed guide on this project and how to start contributing, please comment on the issue and take a look at https://docs.google.com/document/d/1ytshTEnoKqP0m0JFKO4IB2qEFaIAZc9jDet6VdeT3sE/

Description:

We have discussed the vision of the cloud native security map (#348), the ideas and discussions are available in this google doc. The eventual goal for the Cloud Native Security Map requires a HUGE effort. Therefore, we are breaking this down into a series of major contributions.

Therefore, the following proposes the initial version of the Cloud Native Security Map (CNSMAP), which is the bare content necessities and design principles required for the CNSMAP. The goal is to complete this effort for publicizing by the CNCF and TOC for Kubecon EU 2021 in May.

Impact:

Impact is documented in this google doc.

  • [x] SIG Representative - @lumjjb
  • [x] Project leader(s)
    • Brandon Lum (@lumjjb) (SIG TL)
    • Ash Narkar (@ashutosh-narkar) (SIG TL)
    • Diego Comas (@dcomas)

Contributors: Listed in https://docs.google.com/document/d/1HZPpzTc-OMDPbWu5PDPto5kym5ngPgQiwgk5My5X-GI/edit

Scope:

For the map, it will be a representation of the list of topics and navigating between the topics, this does not include links between topics and thematic aspects of the CNSMAP

Timeline:

  • Kickoff: 3 March
  • Content 1 (70%): 17 March
  • Content 2 (completion): 24 March
  • PROD ready Prototype: 24 March
  • Improvements to content + code: Finalize by Apr 16 for CNCF evaluation + marketing for kubecon EU

Dev info:

Latest stage: http://cnsmap.github.io/ , Code: https://github.com/lumjjb/cnsmap

Scoped Topics Tasks List - number is the count of topics per category.

  • Develop (3)
  • Distribute (3)
  • Distribute.Testing (3)
  • Distribute.Artifacts and Images (3)
  • Deploy (3)
  • Runtime.Compute.Orchestration (5)
  • Runtime.Compute.Containers (3)
  • Runtime.Compute (4 - 2 optional)
  • Runtime.Storage (4)
  • Runtime.Access (3)
  • Security Assurance and Controls (5 - 3 optional)
  • Compliance (2)

lumjjb avatar Feb 25 '21 16:02 lumjjb

@lumjjb I'm happy to volunteer to be one of the project leaders.

ashutosh-narkar avatar Feb 25 '21 17:02 ashutosh-narkar

I'm glad to help in this effort too.

freddyfernando avatar Mar 02 '21 02:03 freddyfernando

Just posted in Slack, but also interested. Been reading through the content as it currently is.

0x646e78 avatar Mar 02 '21 02:03 0x646e78

I am happy to volunteer to help with this effort.

mattj-io avatar Mar 03 '21 16:03 mattj-io

I'm happy to help with this effort!

ricard0ff avatar Mar 03 '21 17:03 ricard0ff

I'd love to support this effort!

willurbanski avatar Mar 03 '21 17:03 willurbanski

Hi all and welcome to the issue/channel (#sig-security-whitepaper-map)! We are starting the content contribution phase. The idea is that over the next 2 weeks we will be working on writing in the content in the google doc, and we will have an optional meeting occasionally to track our progress and answer any questions.

The next meeting is going to be next Wednesday 10 March at 9:30AM PST / 12:30 PM EST. Please send me your email address for an invite!

So what's next! To start getting involved!

Step 1: Go to the document, https://docs.google.com/document/d/1ytshTEnoKqP0m0JFKO4IB2qEFaIAZc9jDet6VdeT3sE/edit and go down to the Content Contribution Table section, then put your name in the table beside the topics that you would like to contribute to.

Step 2: Scroll down to the topic that you'd like to contribute to, and start filling up the sections. The goal is to provide additional content which can be pragmatically used by practitioners/learners...

The sections includes:

  • projects - CNCF/Open Source projects and their links that are relevant to the section, commercial projects are also valid, but should be marked explicitly
  • examples - what are some examples of implementing some of these security controls - be specific! The idea is to provide an illustration of topics in the whitepaper
  • links - Any other links that are relevant, blog posts, standards, etc. If there are doubts on what exactly this topic means, the topic titles contain links to the whitepaper. This should give you a better idea conceptually on what the topic is about.

And whenever in doubt, take a look at the Content Contribution section (which has a filled up content example), or you can ping @Ash, @Diego Comas, @Vinay Venkataraghavan, @Brandon Lum if you have questions or need further guidance!

lumjjb avatar Mar 04 '21 16:03 lumjjb

Hi @lumjjb @ashutosh-narkar and @dcomas I am happy to contribute on the Zero Trust part

fdicarlo avatar Mar 08 '21 12:03 fdicarlo

@fdicarlo thanks I will add your name in the table. You can join the discussion in the Slack channel where you can share with us your email to give you access to the doc . cloud-native.slack.com #sig-security-whitepaper-map

dcomas avatar Mar 08 '21 12:03 dcomas

I'm going to try to make the time to help with this.

whaber avatar Mar 09 '21 19:03 whaber

Hi All! We are going to be meeting an hour before the SIG meeting, not compulsory, but if you have any questions on contributing or like to get a bit more background on the project, do join in!

Time: 12pm-1pm EST, 9am-10am PST (This is 1 hour before regular SIG meeting) Meeting link: meet.google.com/goe-ehpx-ucy

lumjjb avatar Mar 10 '21 05:03 lumjjb

Would love to help. Have requested write access the doc.

binchenX avatar Mar 10 '21 10:03 binchenX

Would love to help. Have requested write access the doc.

You should have access now. Thanks

dcomas avatar Mar 10 '21 11:03 dcomas

@dcomas , I would like to contribute as well. I know there are some effort around adding hardware-based security using HSM/TPM. I think having configuration protection using a TPM is a great feature for Cloud based technologies. This just one of the solutions I have seen in Datacenters that I would love to see in Cloud environments. I will try to join for at least part of the call today.

tomoveu avatar Mar 10 '21 15:03 tomoveu

I'd like to help as well. Have requested write access to the doc now.

mtverraen avatar Mar 11 '21 08:03 mtverraen

Hi All, the doc looks awesome and is really shaping up! Love all the content so far! There's a couple topics that folks have signed up but haven't filled up yet, with that done, we should be on track to reaching our 70% content goal by Wednesday!

No meeting for this week, the next one will be on 24th March! But be sure to keep your calendars up to date with daylight savings in effect now!

lumjjb avatar Mar 15 '21 16:03 lumjjb

Hi, working on my part between this evening and tomorrow (so before deadline)

fdicarlo avatar Mar 15 '21 17:03 fdicarlo

I will add my first contributions tomorrow. Also before the deadline :) Thanks for the summary @lumjjb

UPDATE: first contributions added.

tomoveu avatar Mar 15 '21 17:03 tomoveu

Related #348

TheFoxAtWork avatar Mar 18 '21 13:03 TheFoxAtWork

@lumjjb, I am getting confused over here.

I added my contributions about "Signing, Integrity and Trust" to this document https://docs.google.com/document/d/1HZPpzTc-OMDPbWu5PDPto5kym5ngPgQiwgk5My5X-GI/edit#heading=h.lzd2ob2mrbjp

Afterwards, I saw "Signing, Integrity and Trust" mentioned here https://docs.google.com/document/d/1ytshTEnoKqP0m0JFKO4IB2qEFaIAZc9jDet6VdeT3sE/edit#heading=h.6ir79kvwirrt

Could you please tell me which document is primary and where I should make my contributions?

tomoveu avatar Mar 22 '21 13:03 tomoveu

@lumjjb , I also saw some overlap between "Image Trust and Content integrity" and "Signing, Trust and Integrity". Maybe some parts of them could be merged?

I added information about sigstore as one more solution. It is a new LinuxFoundation project. It offers what RedHat Simple Signing can do plus transparent log. Extra info: It does not yet have a TPM-backend.

tomoveu avatar Mar 22 '21 13:03 tomoveu

Hi All! We are in the last stretch of content creation, there are just a couple more topics which need additional information. Some of these only require examples to be added (with the -examples tag). Would be awesome if we can get a couple more contributions to round up this work!

Below is a copy of the table in the document: https://docs.google.com/document/d/1ytshTEnoKqP0m0JFKO4IB2qEFaIAZc9jDet6VdeT3sE/edit#heading=h.nx6klypo0kk2

@mtverraen is also helping out with the development of the map website. If you are interested in helping out with the dev on this, please let us know! We will show a prototype with the content in a week or two!

Here's a copy of the list from the doc!

Topic Assignees
Development of Tests  
Code Review  
Resource Requests and Limits  
Control Plane Authentication and Certificate Root of Trust  
Storage Stack  
Storage Encryption  
Persistent Volume Protection  
Availability  
Threat modeling  

lumjjb avatar Mar 24 '21 16:03 lumjjb

@tomoveu I saw your additions to the doc, there's some overlap with content because of the way the whitepaper is structured... so there is bound to be some overlap.. there are plans to help address this overlaps by linking the topics in the future. But saw you additions on sigstore! Thanks for contributing!

lumjjb avatar Mar 30 '21 14:03 lumjjb

@lumjjb - Ping me when you're ready for design help and I'll get you in the queues.

amye avatar Apr 01 '21 21:04 amye

@amye We are ready for design help! This is what we have today: https://cnsmap.vercel.app/ courtesy of @mtverraen :)

lumjjb avatar Apr 01 '21 22:04 lumjjb

LP-7305 is in with the design team

amye avatar Apr 01 '21 22:04 amye

@lumjjb I added a "special considerations" piece under the "Develop" ==> "Security Checks in Development" ==> "Examples" section (i.e. for corner cases where pods can't be locked-down as much as we'd ideally like). Is that OK, or is the section frozen? If so, I can yank it out.

Other than that, I'm further populating the "Zero Trust Architecture" and "Least Access" sections plus examples (topics I like to research in personal time).

Cheers!

-Edit: they are currently "suggestions", until they're approved/merged.

IAXES avatar Apr 02 '21 19:04 IAXES

Thanks @IAXES , all good we are still in content review!

lumjjb avatar Apr 06 '21 12:04 lumjjb

Thanks @IAXES , all good we are still in content review!

No prob!

By the way, are we removing the "least access principle" section? I see some related pieces with a strikethrough/crossed-out format applied to it.

Lastly, will the final document be a Google doc, or is it being converted to an ODT, or some markup based format (i.e. LaTeX, rST, MD, etc.)? If the latter, I've done a lot of work with these formats and can volunteer to "chop wood, carry water" with respect to those pieces (if needed).

Cheers!

IAXES avatar Apr 06 '21 12:04 IAXES

I have the design team on deck for whenever we have a final draft of text, that's the gateway here to get design involved.

amye avatar May 05 '21 20:05 amye