Please see the Minutes of Meetings and recording for the SECCOM meeting that was held on 5th of November 2019.
Jira No | Summary | Description | Status | Solution |
---|---|---|---|---|
OJSIs summary for El Alto release: | Krzysztof summarized projects and their attitude towards OJSIs security tickets handling: Still 38 OJSI tickets related to HTTP open while we expose only ~20 HTTP ports. We can close almost half as soon as we get the commit hash-id Worst performing projects
Could be improved
Please follow them
| |||
ONAP security maturity assessment | Discussion held at the last PTL call yesterday PTLs claim that are missing qualified security experts Idea of SECCOM badging provided per project and per release – discussion point SECCOM is perceived as group of people pushing PTLs and community to do some security related stuff while it should be the other way around: PTLs are asking SECCOM how they could improve their security. SECCOM is not about project management and motivating people to do the security. We should introduce security badging or levels for ONAP projects and sit down together and define what are the requirements for each and every elevel, present those requirements to the projects and at the end of each release to perform the asessment and publish on the release of the project page the list of the projects with their current security status. KPIs defined with release security maturity should be used. CII Badging combines multiple areas, including security. | It was agreed to continue discussion in 2 weeks time frame. SECCOM members are requested to provide their feedback. | ||
Increased tests code coverage for future ONAP releases | Pierre's proposal: -define, for each project, the core parts that need intensive testing (an API sensitive project might prioritize API testing so that all are covered, hardened, so that said APIs are robust) -concentrate coverage on those areas, even if coverage is lower on other parts, so critical parts are better covered and tested. This might improve OJSI resolution (and/or reduce findings), and better focuses the effort on testing based on available resources. This would be even better if we could tell Sonar which parts of the code are the critical ones | It was agreed to continue discussion in 2 weeks time frame. SECCOM members are requested to provide their feedback. | ||
Synch meeting with Architecture Subcommittee | The meeting is scheduled today (5th of November at 4 PM UTC+1). Scope for the discussion: -Ingress controller (Krzysztof) -Security architecture document (Hampus) -ISTIO/AAF discussion (Hampus/Srini) | As Natacha is not available, we will cover communication matrix topic for the next synch meeting. | ||
Vulnerability management update | Still waiting for inputs from some projects. Conclusion: in order to decrease the size of the vulnerabiliity tables, the easiest way is to keep the latest versions of components. | |||
Synch call with SDNC for OJSIs | It was agreed that organization of conf call should be more efficient - e-mail was sent to Dan to setup the call - waiting for his feedback. |