Document a security issue reporting, response, and distribution process #14
Labels
help wanted
Denotes an issue that needs help from a contributor. Must meet "help wanted" guidelines.
kind/documentation
Categorizes issue or PR as related to documentation.
priority/important-longterm
Important over the long term, but may not be staffed and/or may need multiple releases to complete.
Is your feature request related to a problem? Please describe.
This came up in the community call today so I'm filing an issue for public tracking.
Tinkerbell does not have a documented security issue reporting or response procedure, and this would be beneficial to developers, distributors, and users alike.
@markyjackson-taulia also brought up the security review required for CNCF, and that has some interaction here
Relates to tinkerbell/tink#373
Describe the solution you'd like
Kubernetes has a more developed process for handling security issues including a response team, a bug bounty program, and a distributor list. Other CNCF projects such as CoreDNS have adopted the parts of the Kubernetes process that worked best for them, and I think Tinkerbell could do something similar.
I don't want to be prescriptive and impose too much process, but here are a few things I think could help
SECURITY_CONTACTS
file in the root of each repository to help the PSC identify owners for a fix. Reusing the rootOWNERS
file may be sufficient.Kubernetes is now a CVE Numbering Authority (CNA) because we have enough valid reports that it made sense. It may make sense to partner with the Kubernetes PSC for assigning CVE IDs for confirmed issues when you do have one given your low volume. You would handle the issue and disclosure yourself, but maybe just request a CVE ID from the Kubernetes PSC.I'd recommend just requesting CVD IDs from Mitre until we need a blockThese do not all need to happen at the same time, but they roughly do need to occur in sequence. For example, adding notices to READMEs and issue templates depends on a reporting process, but coming up with a CVE ID process doesn't have to block getting a distributor list going.
/kind feature
/kind documentation
cc @markyjackson-taulia
The text was updated successfully, but these errors were encountered: