Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Retrospective of the Security Self-Assessment Subproject Pilot #957

Closed
6 tasks
Tracked by #603
PushkarJ opened this issue Jul 15, 2022 · 9 comments
Closed
6 tasks
Tracked by #603

Retrospective of the Security Self-Assessment Subproject Pilot #957

PushkarJ opened this issue Jul 15, 2022 · 9 comments
Assignees
Labels
assessment-process proposed improvements to security assessment process inactive No activity on issue/PR suggestion New suggestion for the CNCF sig-security group that don't fall into an existing category

Comments

@PushkarJ
Copy link
Contributor

PushkarJ commented Jul 15, 2022

Description: With kubernetes/sig-security#8 completed it is a good idea to perform a retrospective on what we learnt from the the pilot and how the lessons learnt could improve the overall security assessments process for CNCF TAG Security. This is also one of the pending tasks from #603

Impact: Idea would be to meet and document lessons learnt from participants in the pilot and then update the relevant documentation found here: https://github.com/cncf/tag-security/tree/main/assessments/guide

Scope: Assignee of this issue could do the following:

  • Setup a meeting or async communication feedback loop from participants in the pilot across Kubernetes community
  • Gather and compile the feedback for following sections: "What worked?", "What didn't work well?", "What could be improved?", "What should we do more?", "What should we do less?"
  • Present the results to CNCF TAG Security in one of our meetings
  • Evaluate potential changes to be made to self-assessment guidance for CNCF TAG Security
  • Make a PR to add those changes
  • Address PR feedback and then merge

Optionally, make retrospective as one of the last step post any completion of security self-assessment

@PushkarJ PushkarJ added suggestion New suggestion for the CNCF sig-security group that don't fall into an existing category triage-required Requires triage labels Jul 15, 2022
@PushkarJ PushkarJ added assessment-process proposed improvements to security assessment process and removed triage-required Requires triage labels Jul 15, 2022
@PushkarJ PushkarJ added this to the STAG Rep: @PushkarJ milestone Jul 15, 2022
@aladewberry
Copy link

I volunteer to do this! Sounds like a perfect learning opportunity as I get up to speed. Assign me at your leisure!

@stale
Copy link

stale bot commented Sep 21, 2022

This issue has been automatically marked as inactive because it has not had recent activity.

@stale stale bot added the inactive No activity on issue/PR label Sep 21, 2022
@aladewberry
Copy link

In progress! Rounding up folks in Slack to see what we can get done at Kubecon

@stale stale bot removed the inactive No activity on issue/PR label Oct 20, 2022
@aladewberry
Copy link

Retro done! https://kubernetes.slack.com/archives/C022K4F2W4W/p1667582978251009

Now to present at a TAG meeting!

@stale
Copy link

stale bot commented Jan 7, 2023

This issue has been automatically marked as inactive because it has not had recent activity.

@stale stale bot added the inactive No activity on issue/PR label Jan 7, 2023
@PushkarJ PushkarJ removed the inactive No activity on issue/PR label Feb 27, 2023
@PushkarJ
Copy link
Contributor Author

@aladewberry can I help move the retrospective from slack to markdown page in this repo? If you have presented this already in a TAG meeting I may have missed it. So happy to reuse that content as well if needed

@aladewberry
Copy link

@PushkarJ Sorry for the slow reply here! Yes, I was able to present the CAPI retro highlights at a TAG security meeting a few months back. When you say "move the retrospective from slack to markdown page in this repo", are you referring to the TAG Security/Assessments repo?

@stale
Copy link

stale bot commented May 21, 2023

This issue has been automatically marked as inactive because it has not had recent activity.

@stale stale bot added the inactive No activity on issue/PR label May 21, 2023
@anvega anvega closed this as completed Jun 20, 2023
@PushkarJ
Copy link
Contributor Author

PushkarJ commented Aug 4, 2023

Moving the retro highlights from slack compiled by @aladewberry as a comment so it is not lost somewhere in slack.

Highlights

  • What went well - The overall process is sustainable - we got some actionable results without a ton of effort. Also, the fuzzing report we did was well scoped, and was useful as well.

  • What was difficult - While some results were actionable at the code level, the core CAPI team is small, so items like documenting threat models and other larger tasks are difficult to accomplish. Priorities can be unclear because understanding what things are actually exposing users can be hard when you don't have security expertise. Likewise, when no one is specifically asking for the security issues to be addressed, it is hard to make priority calls. Setting up the process for reporting a security issue and also for monitoring that channel is time consuming.

  • What can we do differently going forward/wishlist - We need more resources (or to become familiar with existing resources) for initial triage and monitoring of security issues. Then we need people like @PushkarJ who can help a team evaluate their security posture and prioritize things in a way that works from a security perspective and from a feature priority/normal work perspective - aka if there's something on fire we should drop everything, but otherwise how can we weave security improvements into normal ebbs and flows of work. For that matter, it sounds like there's also an opportunity to socialize findings (as is appropriate given sensitivity) to get community input/build consensus on priorities with the findings to help guide the team.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
assessment-process proposed improvements to security assessment process inactive No activity on issue/PR suggestion New suggestion for the CNCF sig-security group that don't fall into an existing category
Projects
None yet
Development

No branches or pull requests

3 participants