summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authork8s-ci-robot <k8s-ci-robot@users.noreply.github.com>2018-07-30 13:07:56 -0700
committerGitHub <noreply@github.com>2018-07-30 13:07:56 -0700
commit8bbdc3345bdf610e3ef04e498bcd26bedcb32228 (patch)
tree4f6821d32811121a7734f2735cd2098c83e84435
parentafcc37186a32cc92b24e99e27089d10ae48ed0cf (diff)
parent41a89550ca154dbb936193f59ff53efa7d117a9b (diff)
Merge pull request #2431 from tallclair/sig-auth-charter-v2
sig-auth charter (v2)
-rw-r--r--sig-auth/README.md2
-rw-r--r--sig-auth/charter.md69
-rw-r--r--sigs.yaml2
3 files changed, 72 insertions, 1 deletions
diff --git a/sig-auth/README.md b/sig-auth/README.md
index 0ba6d2a1..6befa9b4 100644
--- a/sig-auth/README.md
+++ b/sig-auth/README.md
@@ -10,6 +10,8 @@ To understand how this file is generated, see https://git.k8s.io/community/gener
Covers improvements to Kubernetes authorization, authentication, and cluster security policy.
+The [charter](charter.md) defines the scope and governance of the Auth Special Interest Group.
+
## Meetings
* Regular SIG Meeting: [Wednesdays at 11:00 PT (Pacific Time)](https://docs.google.com/document/d/1FQx0BPlkkl1Bn0c9ocVBxYIKojpmrS1CFP5h0DI68AE/edit) (biweekly). [Convert to your timezone](http://www.thetimezoneconverter.com/?t=11:00&tz=PT%20%28Pacific%20Time%29).
* [Meeting notes and Agenda](https://docs.google.com/document/d/1woLGRoONE3EBVx-wTb4pvp4CI7tmLZ6lS26VTbosLKM/edit#).
diff --git a/sig-auth/charter.md b/sig-auth/charter.md
new file mode 100644
index 00000000..541c854e
--- /dev/null
+++ b/sig-auth/charter.md
@@ -0,0 +1,69 @@
+# SIG Auth Charter
+
+This charter adheres to the conventions described in the [Kubernetes Charter README] and uses
+the Roles and Organization Management outlined in [sig-governance].
+
+## Scope
+
+SIG Auth is responsible for the design, implementation, and maintenance of features in
+Kubernetes that control and protect access to the API and other core components. This includes
+authentication and authorization, but also encompasses features like auditing and some security
+policy (see below).
+
+### In scope
+
+Link to SIG section in [sigs.yaml]
+
+#### Code, Binaries and Services
+
+- Kubernetes authentication, authorization, audit and security policy features. Examples
+ include:
+ - Authentication, authorization and audit interfaces and extension points
+ - Authentication implementations (service accounts, OIDC, authenticating proxy, webhook,
+ ...)
+ - Authorizer implementations (RBAC + default policy, Node + default policy, webhook, ...)
+ - Security-related admission plugins (NodeRestriction, ServiceAccount, PodSecurityPolicy,
+ ImagePolicy, etc)
+- The mechanisms to protect confidentiality/integrity of API data. Examples include:
+ - Capability for encryption at rest
+ - Capability for secure communication between components
+ - Ensuring users and components can operate with appropriately scoped permissions
+
+#### Cross-cutting and Externally Facing Processes
+
+- Consult with other SIGs and the community on how to apply mechanisms owned by SIG
+ Auth. Examples include:
+ - Review privilege escalation implications of feature and API designs
+ - Core component authentication & authorization (apiserver, kubelet, controller-manager,
+ and scheduler)
+ - Local-storage volume deployment authentication
+ - Cloud provider authorization policy
+ - Container runtime streaming (exec/attach/port-forward) authentication
+ - Best practices for hardening add-ons or other external integrations
+
+### Out of scope
+
+- Reporting of specific vulnerabilities in Kubernetes. Please report using these instructions:
+ https://kubernetes.io/security/
+- General security discussion. Examples of topics that are out of scope for SIG-auth include:
+ - Protection of volume data, container ephemeral data, and other non-API data (prefer: sig-storage
+ and sig-node)
+ - Container isolation (prefer: sig-node and sig-networking)
+ - Bug bounty (prefer: product security team)
+ - Resource quota (prefer: sig-scheduling)
+ - Resource availability / DOS protection (prefer: sig-apimachinery, sig-network, sig-node)
+
+## Roles and Organization Management
+
+This sig follows adheres to the Roles and Organization Management outlined in [sig-governance]
+and opts-in to updates and modifications to [sig-governance].
+
+### Subproject Creation
+
+SIG Auth delegates subproject approval to Technical Leads. See [Subproject creation - Option 1].
+
+
+[sig-governance]: https://github.com/kubernetes/community/blob/master/committee-steering/governance/sig-governance.md
+[sigs.yaml]: https://github.com/kubernetes/community/blob/master/sigs.yaml#L250
+[Kubernetes Charter README]: https://github.com/kubernetes/community/blob/master/committee-steering/governance/README.md
+[Subproject creation - Option 1]: https://github.com/kubernetes/community/blob/master/committee-steering/governance/sig-governance.md#subproject-creation
diff --git a/sigs.yaml b/sigs.yaml
index 1145bedf..d863a0a9 100644
--- a/sigs.yaml
+++ b/sigs.yaml
@@ -252,7 +252,7 @@ sigs:
mission_statement: >
Covers improvements to Kubernetes authorization, authentication, and
cluster security policy.
- charter_link:
+ charter_link: charter.md
label: auth
leadership:
chairs: