Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Jira No
SummaryDescriptionStatusSolution

SeshuAs Seshu did not join us, next week slot will be provided (if needed).Guilin SECCOM priorities - review

P1:

-Updates of the languages (java from v8 -> 11 and Python 2.7 -> to 3.x) – Interns from LFN could be gained

-Updates of directly dependent software components (Here we are thinking about benefiting from LFN Interns that could support projects in their packages upgrades, in addition the new version of Nexus-IQ is able to display components with direct and indirect dependencies, we should define priorities, release manager should help in coordination between projects)

-Automated security testing – containers not running as root – SDNC example

P2:

-Secrets management

-No root access to the DB from main application container Currently we have some pods (i.e. OOF) that require root access to their mariadb-galera instance for main application to work. This is obviously a security issue. Each application should have its own DB account that allows to access only its own DB.

-All config files inside the main container should be ReadOnly There are some weird design like in APPC where main container modifies properties provided by the user at runtime. I believe that application configuration should be read only.

P3:

-Increase of code coverage (to be honest in Frankfurt release it seems that not that much happened – I am not sure if each project proposed % feasible for them and followed the actions to achieve this

-CII badging

P4:

-High Priority SECCOM initiative: service mesh recommendation

-SECCOM initiative: OJSIs to be solved

-SECCOM initiative: https communication

We shall continue efforts for projects ongoin e.g. connectivity matrix, VNF Security requirments, CMPv2 etc. 

Based on brainstorming session we agreed on the following list with topics grouped together. List List was already presented to PTLs, no specific feedback. Next to be presented to PTLs and TSC.

.

Efforts on service mesh to be continued to have a real alternative to AAF which is failing as of today. We hope AAF would be better with new PTL John but service mesh alernative should be explored with: certificates, mTLS, sidecar.


SECCOM chair and vice chair electionsConfirm that the correct voting member for your company is on the Security Sub-committee Members listWaiting Still waiting for Kenny's feedback Amy contacted Kenny to get information about process scheduling - February time frame?was asked to provide his feedback during the last PTL call - he promissed to respond. Once scheduling is known, will be sent to SECCOM distribution list

Secrets encryption

Exchanges Tony-Krzysztof were done around the documentation. There should be a documentation on OOM charts (from OOM team to the projects) - as of today there is no such documentation at all. This is the area for improvement in the next release.

In ProgressKrzysztof to document in OOM including master password that has to be set at the deployment time.AAF client certificate

Feedback that Ramesh has putted few certificates to OOM repo resources. why not used aitomated certificates generation by AAF - feedback that those are not SSL certificates and automated certificates generation is only on server side and client side certificates have to be hardcoded in the repo!.   

We should not have any single certificate within OOM repo or any container image.

Jonathan's responses for hardcoding passwords are not clear...

Jonathan to be addressed and John Freney - new AAF PTL with Amy's support to clarify - to be followed-up offline..It looks very weird - to be further investigated with AAF team. Mutual TLS = both sides can use the same certificate. 

Krzysztof shared his work on removing secrets for Mariadb-galera :

Mariadb-galera

In ProgressOngoing work with SO.

VNF Security RequirementsAmy asked for +2 for the reviewed items.Jiras to be updated with comments (+2s) from Pawel and Samuli.Amy will work on getting right privilege for gerrit.

Scripts for automatic Jira tickets creation for direct dependency components upgrades

PTL presentation on 10th of February. PTLs are concerned with many Jira tickets generated.

No news.

Meeting with

Ittay, Pierre and Pam to be organized. by Amy.
Bi-weekly meetings for security guidelinesThursday's meeting slot is finally valid for Harald and invitation was sent to SECCOM distribution list..Data proposal was sent by Harald to seccom distribution list.Upcoming F2F meetings

Decide which meeting(s) SECCOM wants to focus on

Start collecting topics for the meeting(s)

Pam was organized by Amy. The best it would be to work on the upgrades around M1 milestone of Guilin release. SECCOM could group vulnerabilities according to criticity into: critical, severe and other groups and provide recommended versions. Support from release manager for coordination between projects is vital. Process for exceptions is in place - in this case project must document why upgrade was not performed, 

In progress

https://lf-onap.atlassian.net/wiki/display/DW/Remediating+Known+Vulnerabilities+in+Third+Party+Packages


Upcoming F2F meetings

Topics proposal:

  • Service mesh
  • VNF security requirements
  • Package upgrade strategy
  • Communication matrix
  • Password removal continued

As Coronavirus threat is a serious concern, companies to protect their employees starting to ban participation in events like conferences

In Progress

 OUR NEXT SECCOM MEETING CALL WILL BE HELD ON 3RD 10TH OF MARCH'20


View file
name2020-03-03_SECCOM_week.mp4
height150

...