Skip to content

Commit c9f1cd8

Browse files
committed
Updates based on feedback for the triage process
1 parent ab8ac51 commit c9f1cd8

File tree

4 files changed

+25
-7
lines changed

4 files changed

+25
-7
lines changed

sig-security/README.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -53,6 +53,7 @@ Development and Enhancements of Security Tooling
5353
- [kubernetes/community/sig-security/sig-security-tooling](https://github.com/kubernetes/community/blob/master/sig-security/sig-security-tooling/OWNERS)
5454
- **Contact:**
5555
- Slack: [#sig-security-tooling](https://kubernetes.slack.com/messages/sig-security-tooling)
56+
- [Mailing List]([email protected])
5657

5758
[subproject-definition]: https://github.com/kubernetes/community/blob/master/governance.md#subprojects
5859
<!-- BEGIN CUSTOM CONTENT -->

sig-security/sig-security-tooling/vulnerability-mgmt/build-time-dependencies.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -101,6 +101,10 @@ cat licenses-cves.json | jq '.vulnerabilities | .[] | select ((.type=="license")
101101

102102
### Example of filtered JSON scan result
103103

104+
__Note__: Results of the filtered scan are not printed as part of the CI job.
105+
However, the following historical scan result is mentioned here for
106+
reference purposes only:
107+
104108
<!-- markdownlint-disable MD033 -->
105109
<details><summary>Click to view result</summary>
106110
<!-- markdownlint-enable MD033 -->

sig-security/sig-security-tooling/vulnerability-mgmt/policy-for-vulnerability-resolution.md

Lines changed: 19 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -13,13 +13,25 @@ is triggered to apply the fix to kubernetes or document the cause for not fixing
1313

1414
## Triage process
1515

16-
|No. | Category | Definition | Resolution |
17-
|---|---|---|---|
18-
| 1 | False positive | k/k and vulnerable package is not impacted by this CVE | Open a Github issue and log the resolution |
19-
| 2 | True positive but no impact | Package version used in k/k is vulnerable, but k/k is not using the vulnerable code | Open a Github issue and a PR to bump the dependency to the version with a fix. This fix will go in subsequent release of k/k |
20-
| 3 | True positive with negligible impact | Package version used in k/k is vulnerable, but k/k is using the vulnerable code, but the vulnerability does not apply as per k/k threat model | Open a Github issue that describes why this will have negligible impact with relevant compensatory controls. Also, open a PR to bump the dependency to the version with a fix. This fix will go in subsequent release of k/k |
21-
| 4 | True positive with impact | Package version used in k/k is vulnerable, and k/k is using the vulnerable code | Open a Github issue, that assesses impact, modifies CVSS rating for k8s, if needed and suggest compensatory controls. Also, open a PR to bump the dependency and backport the fix up to n-2 k/k version |
22-
| 5 | Embargoed vulnerability | No CVE ID is assigned so scanners do not detect it | Product Security Committee / Security Response Committee triages and follows existing process for embargoed CVEs |
16+
- The vulnerabilities are triaged in private, by members of
17+
18+
- Membership to this group is restricted due to the confidential nature of the
19+
responsibilities
20+
- Once a vulnerability is found through automation, the group members get
21+
notified via an email about it
22+
- One of the group members then triages this vulnerability and classifies it
23+
into one of the following categories:
24+
25+
|No. | Category | Definition | Resolution |
26+
|---|---|---|---|
27+
| 1 | False positive | k/k and vulnerable package is not impacted by this CVE | Open a Github issue and log the resolution |
28+
| 2 | True positive but no impact | Package version used in k/k is vulnerable, but k/k is not using the vulnerable code | Open a Github issue and a PR to bump the dependency to the version with a fix. This fix will go in subsequent release of k/k |
29+
| 3 | True positive with negligible impact | Package version used in k/k is vulnerable, but k/k is using the vulnerable code, but the vulnerability does not apply as per k/k threat model | Open a Github issue that describes why this will have negligible impact with relevant compensatory controls. Also, open a PR to bump the dependency to the version with a fix. This fix will go in subsequent release of k/k |
30+
| 4 | True positive with impact | Package version used in k/k is vulnerable, and k/k is using the vulnerable code | Open a Github issue, that assesses impact, modifies CVSS rating for k8s, if needed and suggest compensatory controls. Also, open a PR to bump the dependency and backport the fix up to n-2 k/k version |
31+
| 5 | Embargoed vulnerability | No CVE ID is assigned so scanners do not detect it | Product Security Committee / Security Response Committee triages and follows existing process for embargoed CVEs |
32+
33+
- Once the category is identified, the resolution is triggered manually by the
34+
member triaging the vulnerability.
2335

2436
## Examples
2537

sigs.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2158,6 +2158,7 @@ sigs:
21582158
description: Development and Enhancements of Security Tooling
21592159
contact:
21602160
slack: sig-security-tooling
2161+
mailing_list: [email protected]
21612162
owners:
21622163
- https://raw.githubusercontent.com/kubernetes/community/master/sig-security/sig-security-tooling/OWNERS
21632164
- dir: sig-service-catalog

0 commit comments

Comments
 (0)