|
1 | 1 | # Vulnerability Management
|
2 |
| -Covers Kubernetes wide vulnerability management process, policies and workflows |
3 |
| -that tackle known vulnerabilities in kubernetes artifacts |
| 2 | + |
| 3 | +Covers Kubernetes wide vulnerability management process, policies and workflows |
| 4 | +that tackle *known* vulnerabilities in Kubernetes artifacts that can be found |
| 5 | +via automation |
4 | 6 |
|
5 | 7 | ## Goals
|
6 | 8 |
|
7 |
| -1. Identify known vulnerabilities in Kubernetes artifacts by scanning them periodically |
8 |
| -2. Leverage the existing triage and resolution process (i.e. Github issues, PRs) |
| 9 | +1. Identify known vulnerabilities in Kubernetes artifacts by scanning them |
| 10 | + periodically |
| 11 | +2. Leverage the existing triage and resolution process (i.e. Github issues, PRs) |
9 | 12 | to document and resolve any vulnerabilities that impact Kubernetes
|
10 |
| -3. Create community driven awareness and documentation around known |
11 |
| - CVEs in Kubernetes related artifacts |
12 |
| - |
| 13 | +3. Create community driven awareness and documentation around known CVEs in |
| 14 | + Kubernetes related artifacts |
| 15 | + |
| 16 | +### Vulnerability Triage and Resolution Process |
| 17 | + |
| 18 | +Leverage community driven triage and impact assessment to resolve known |
| 19 | +vulnerabilities in Kubernetes artifacts. More details can be |
| 20 | +found [here](process-for-vulnerability-triage-and-resolution.md) |
| 21 | + |
13 | 22 | ### Build Time Dependencies
|
14 | 23 |
|
15 |
| -A tool agnostic periodic scanning of build time dependencies |
16 |
| -(typically dependencies found in `go.mod` file) of Kubernetes. |
17 |
| -More details can be found [here](build-time-dependencies.md) |
| 24 | +A tool agnostic periodic scanning of build time dependencies |
| 25 | +(typically dependencies found in `go.mod` file) of Kubernetes. More details can |
| 26 | +be found [here](build-time-dependencies.md) |
| 27 | + |
| 28 | +This track is a partnership between SIG |
| 29 | +Architecture's [Code Organization](https://github.com/kubernetes/community/tree/master/sig-architecture#code-organization) |
| 30 | +sub-project and SIG Security's Tooling sub-project |
| 31 | + |
| 32 | +### Container Images |
18 | 33 |
|
19 |
| -### Vulnerability Resolution Policy |
| 34 | +Automating triage and resolution of vulnerabilities as it relates to container |
| 35 | +images in Kubernetes Github Org. This effort is beginning to take form and is being tracked in |
| 36 | +[Issue #5920](https://github.com/kubernetes/community/issues/5920) |
20 | 37 |
|
21 |
| -Leveraging community driven triage and impact assessment to resolve known |
22 |
| -vulnerabilities in Kubernetes artifacts. More details can be found [here](policy-for-vulnerability-resolution.md) |
| 38 | +This track is a partnership |
| 39 | +between [SIG Release](https://github.com/kubernetes/sig-release) |
| 40 | +and SIG Security's Tooling sub-project |
23 | 41 |
|
24 |
| -*NOTE*: Artifacts here refer to code, images and binaries |
| 42 | +**Note**: Artifacts here refer to code, images and binaries |
25 | 43 |
|
26 | 44 | ## Non-Goals
|
27 | 45 |
|
28 | 46 | 1. **Responsible disclosure of vulnerabilities**: This will continue to be the
|
29 | 47 | responsibility
|
30 |
| - of [Product Security Committee / Security Response Committee](../../../committee-product-security/README.md) |
| 48 | + of [Security Response Committee](https://github.com/kubernetes/community/tree/master/committee-product-security/README.md) |
31 | 49 | 2. **Runtime dependencies**: Triaging of vulnerabilities found in components
|
32 |
| - that are runtime dependencies for an on-premises or _* |
33 |
| - -as-a-service_ |
| 50 | + that are runtime dependencies for an on-premises or *-as-a-service* |
34 | 51 | Kubernetes deployment. Examples include but are not limited to container
|
35 | 52 | runtimes, container registries, Node OS
|
36 | 53 | 3. **Resolving license violations**: Allowed third party license policy can be
|
37 |
| - found here: |
38 |
| - https://github.com/cncf/foundation/blob/master/allowed-third-party-license-policy.md#approved-licenses-for-allowlist |
39 |
| - |
40 |
| -## Upcoming work |
41 |
| - |
42 |
| -Although, more items will be added through community feedback and organic growth of |
43 |
| -security needs of the project, currently identified work includes automating |
44 |
| -triage and resolution of vulnerabilities as it relates to container |
45 |
| -images in Kubernetes repo |
46 |
| - |
47 |
| -### Container Images |
48 |
| - |
49 |
| -The effort is beginning to take form and is being |
50 |
| -tracked [Issue #1833](https://github.com/kubernetes/release/issues/1833) |
| 54 | + found [here](https://github.com/cncf/foundation/blob/master/allowed-third-party-license-policy.md#approved-licenses-for-allowlist) |
51 | 55 |
|
52 |
| -*NOTE*: If you have a topic that you think is missing, please hop on over to our |
| 56 | +**Note**: If you have a topic that you think is missing, please hop on over to |
| 57 | +our |
53 | 58 | [slack channel](https://kubernetes.slack.com/messages/sig-security-tooling)
|
54 |
| -to discuss more |
| 59 | +to discuss more :-) |
0 commit comments