diff options
| author | k8s-ci-robot <k8s-ci-robot@users.noreply.github.com> | 2018-07-30 13:07:56 -0700 |
|---|---|---|
| committer | GitHub <noreply@github.com> | 2018-07-30 13:07:56 -0700 |
| commit | 8bbdc3345bdf610e3ef04e498bcd26bedcb32228 (patch) | |
| tree | 4f6821d32811121a7734f2735cd2098c83e84435 | |
| parent | afcc37186a32cc92b24e99e27089d10ae48ed0cf (diff) | |
| parent | 41a89550ca154dbb936193f59ff53efa7d117a9b (diff) | |
Merge pull request #2431 from tallclair/sig-auth-charter-v2
sig-auth charter (v2)
| -rw-r--r-- | sig-auth/README.md | 2 | ||||
| -rw-r--r-- | sig-auth/charter.md | 69 | ||||
| -rw-r--r-- | sigs.yaml | 2 |
3 files changed, 72 insertions, 1 deletions
diff --git a/sig-auth/README.md b/sig-auth/README.md index 0ba6d2a1..6befa9b4 100644 --- a/sig-auth/README.md +++ b/sig-auth/README.md @@ -10,6 +10,8 @@ To understand how this file is generated, see https://git.k8s.io/community/gener Covers improvements to Kubernetes authorization, authentication, and cluster security policy. +The [charter](charter.md) defines the scope and governance of the Auth Special Interest Group. + ## Meetings * Regular SIG Meeting: [Wednesdays at 11:00 PT (Pacific Time)](https://docs.google.com/document/d/1FQx0BPlkkl1Bn0c9ocVBxYIKojpmrS1CFP5h0DI68AE/edit) (biweekly). [Convert to your timezone](http://www.thetimezoneconverter.com/?t=11:00&tz=PT%20%28Pacific%20Time%29). * [Meeting notes and Agenda](https://docs.google.com/document/d/1woLGRoONE3EBVx-wTb4pvp4CI7tmLZ6lS26VTbosLKM/edit#). diff --git a/sig-auth/charter.md b/sig-auth/charter.md new file mode 100644 index 00000000..541c854e --- /dev/null +++ b/sig-auth/charter.md @@ -0,0 +1,69 @@ +# SIG Auth Charter + +This charter adheres to the conventions described in the [Kubernetes Charter README] and uses +the Roles and Organization Management outlined in [sig-governance]. + +## Scope + +SIG Auth is responsible for the design, implementation, and maintenance of features in +Kubernetes that control and protect access to the API and other core components. This includes +authentication and authorization, but also encompasses features like auditing and some security +policy (see below). + +### In scope + +Link to SIG section in [sigs.yaml] + +#### Code, Binaries and Services + +- Kubernetes authentication, authorization, audit and security policy features. Examples + include: + - Authentication, authorization and audit interfaces and extension points + - Authentication implementations (service accounts, OIDC, authenticating proxy, webhook, + ...) + - Authorizer implementations (RBAC + default policy, Node + default policy, webhook, ...) + - Security-related admission plugins (NodeRestriction, ServiceAccount, PodSecurityPolicy, + ImagePolicy, etc) +- The mechanisms to protect confidentiality/integrity of API data. Examples include: + - Capability for encryption at rest + - Capability for secure communication between components + - Ensuring users and components can operate with appropriately scoped permissions + +#### Cross-cutting and Externally Facing Processes + +- Consult with other SIGs and the community on how to apply mechanisms owned by SIG + Auth. Examples include: + - Review privilege escalation implications of feature and API designs + - Core component authentication & authorization (apiserver, kubelet, controller-manager, + and scheduler) + - Local-storage volume deployment authentication + - Cloud provider authorization policy + - Container runtime streaming (exec/attach/port-forward) authentication + - Best practices for hardening add-ons or other external integrations + +### Out of scope + +- Reporting of specific vulnerabilities in Kubernetes. Please report using these instructions: + https://kubernetes.io/security/ +- General security discussion. Examples of topics that are out of scope for SIG-auth include: + - Protection of volume data, container ephemeral data, and other non-API data (prefer: sig-storage + and sig-node) + - Container isolation (prefer: sig-node and sig-networking) + - Bug bounty (prefer: product security team) + - Resource quota (prefer: sig-scheduling) + - Resource availability / DOS protection (prefer: sig-apimachinery, sig-network, sig-node) + +## Roles and Organization Management + +This sig follows adheres to the Roles and Organization Management outlined in [sig-governance] +and opts-in to updates and modifications to [sig-governance]. + +### Subproject Creation + +SIG Auth delegates subproject approval to Technical Leads. See [Subproject creation - Option 1]. + + +[sig-governance]: https://github.com/kubernetes/community/blob/master/committee-steering/governance/sig-governance.md +[sigs.yaml]: https://github.com/kubernetes/community/blob/master/sigs.yaml#L250 +[Kubernetes Charter README]: https://github.com/kubernetes/community/blob/master/committee-steering/governance/README.md +[Subproject creation - Option 1]: https://github.com/kubernetes/community/blob/master/committee-steering/governance/sig-governance.md#subproject-creation @@ -252,7 +252,7 @@ sigs: mission_statement: > Covers improvements to Kubernetes authorization, authentication, and cluster security policy. - charter_link: + charter_link: charter.md label: auth leadership: chairs: |
