Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Incubation] Kubescape incubation application #1291

Open
28 of 32 tasks
craigbox opened this issue Apr 4, 2024 · 19 comments
Open
28 of 32 tasks

[Incubation] Kubescape incubation application #1291

craigbox opened this issue Apr 4, 2024 · 19 comments

Comments

@craigbox
Copy link
Contributor

craigbox commented Apr 4, 2024

Kubescape incubation application

Project points of contact:

  • Craig Box (craig.box @ gmail.com)
  • Ben Hirschberg (ben @ armosec.io)

Incubation Criteria Summary for Kubescape

Adoption Assertion

The project has been adopted by the following organizations in a testing and integration or production capacity:

See ADOPTERS.

Owing to the nature of security software, only a small subset are willing to be listed.

Our download numbers suggest Kubescape is used by thousands of end users, either directly, or as customers of commercial security solutions such as ARMO Platform and Jit.

Application Process Principles

Required

  • Give a presentation and engage with the domain specific TAG(s) to increase awareness

    Kubescape was presented to TAG Security in August 2022, with new features presented in December 2023 (video).

  • TAG provides insight/recommendation of the project in the context of the landscape

    To be completed by TAG Security. Presentation scheduled for 2024-07-10.

  • All project metadata and resources are vendor-neutral.

    Kubescape launched in September 2021 as a tool for validating a cluster against the NSA hardening guidance that had been issued under a month before.

    As Kubescape’s creators ARMO built out their hosted offering, the maintainers added features to Kubescape to support that product, including vulnerability scanning and analysis of access control rules. Much of that data was only available through ARMO’s commercial product, originally called Kubescape Cloud

    The Kubescape project joined the CNCF Sandbox in 2022. At that time, Kubescape Cloud was renamed to “ARMO Platform” to ensure vendor neutrality.

    Over the course of a year in the sandbox, the Kubescape maintainers have separated Kubescape from ARMO.

    • Data that was only available in the ARMO Platform is now available in-cluster.
    • The interface between Kubescape and ARMO Platform has been generalized into a provider interface, with documentation on how anyone can build their own provider
  • Review and acknowledgement of expectations for Sandbox projects and requirements for moving forward through the CNCF Maturity levels.

    Met during sandbox onboarding.

  • Due Diligence Review.

    To be completed by TOC sponsor.

  • Additional documentation as appropriate for project type, e.g.: installation documentation, end user documentation, reference implementation and/or code samples.

Governance and Maintainers

Required

  • Document complete list of current maintainers, including names, contact information, domain of responsibility, and affiliation.

  • A number of active maintainers which is appropriate to the size and scope of the project.

    The project has 9 maintainers, all of whom are active.

  • Code and Doc ownership in Github and elsewhere matches documented governance roles.

    https://github.com/orgs/kubescape/teams/maintainers reflects the maintainer lists.

  • Document agreement that project will adopt CNCF Code of Conduct.

    Adopted during Sandbox onboarding.

  • CNCF Code of Conduct is cross-linked from other governance documents.

    CODE_OF_CONDUCT.md

  • All subprojects, if any, are listed.

    n/a

Contributors and Community

Required

  • Clearly defined and discoverable process to submit issues or changes.

    CONTRIBUTING.md

  • Project must have, and document, at least one public communications channel for users and/or contributors.

  • List and document all project communication channels, including subprojects (mail list/slack/etc.). List any non-public communications channels and what their special purpose is.

    Our primary method of communication is GitHub.

    Real time communication is through #kubescape and #kubescape-dev on CNCF Slack

    We also have mailing lists available to us through lists.cncf.io, but these are not currently active.

    These are documented on our community page and GitHub project README.

  • Up-to-date public meeting schedulers and/or integration with CNCF calendar.

    We host a twice-monthly meeting, which is documented on our community page and announced in our Slack channels.

  • Documentation of how to contribute, with increasing detail as the project matures.

    CONTRIBUTING.md.

  • Demonstrate contributor activity and recruitment.

    73 committers have had PRs merged in the last 12 months and 224 contributors have interacted with the project on GitHub.

Engineering Principles

Required

  • Document project goals and objectives that illustrate the project’s differentiation in the Cloud Native landscape as well as outlines how this project fulfills an outstanding need and/or solves a problem differently.

  • Document what the project does, and why it does it - including viable cloud native use cases.

    Kubescape is a security posture management tool, designed to identify and resolve security, misconfiguration, and compliance issues in a Kubernetes environment.

    The project includes tools that can be run on a command line, or in a cluster, or integrated into many other popular tools allowing you to scan workload manifests while they are being developed or integrated, or after they are deployed.

    Kubescape was the first tool to automate checking against the NSA hardening guidance and has since added support for other frameworks (including MITRE ATT&CK® and the CIS Benchmark).

    It also includes comprehensive vulnerability scanning and reporting, allowing you to see the state of vulnerabilities detected in your containers.

  • Document and maintain a public roadmap or other forward looking planning document or tracking mechanism.

    ROADMAP.md

  • Document overview of project architecture and software design that demonstrates viable cloud native use cases, as part of the project's documentation.

    ARCHITECTURE.md

  • Document the project's release process.

    Building

Security

Required

  • Clearly defined and discoverable process to report security issues.

    Kubescape uses the GitHub security reporting process, with an SLO of 7 days for contact and 90 days for disclosure.

  • Enforcing Access Control Rules to secure the code base against attacks (Example: two factor authentication enforcement, and/or use of ACL tools.)

    Membership of the Kubescape organisation requires 2 factor authentication.

  • Document assignment of security response roles and how reports are handled.

    SECURITY.md

    Given that Kubescape is security software, security response is a responsibility of all project maintainers.

  • Document Security Self-Assessment.

    Underway.

  • Achieve the Open Source Security Foundation (OpenSSF) Best Practices passing badge.

    Best practices badge.

Ecosystem

Required

  • Publicly documented list of adopters, which may indicate their adoption level (dev/trialing, prod, etc.)

    ADOPTERS.md

  • Used in appropriate capacity by at least 3 independent + indirect/direct adopters, (these are not required to be in the publicly documented list of adopters)

    These will be provided to our TOC sponsor.

  • TOC verification of adopters.

    To be completed by the TOC

  • Clearly documented integrations and/or compatibility with other CNCF projects as well as non-CNCF projects.

    In order for cloud native computing to be ubiquitous, it must be secure. Kubescape exists solely to improve the security posture of workloads running on Kubernetes; it does not target workloads outside Kubernetes or Cloud Native.

    The ultimate goal of the Kubescape project is to provide coverage of the full space of Kubernetes administrative security concerns.

    Kubescape interacts with a number of CNCF projects:

    • Kubernetes: data source/operating environment
    • Helm: installation method
    • Open Policy Agent: rules engine
    • Inspektor Gadget: eBPF engine
    • Prometheus: metrics export
    • OpenTelemetry: telemetry engine

    The project also includes integrations for Argo, Backstage and Flux.

@PushkarJ
Copy link
Contributor

PushkarJ commented May 31, 2024

@craigbox as part of this task:

TAG provides insight/recommendation of the project in the context of the landscape

Can you please submit a "Presentation" Issue in https://github.com/cncf/tag-security so we can dive deeper into the project and give feedback ?

@craigbox
Copy link
Contributor Author

@slashben will lead that: if you have a chance, please do refer back to the linked meetings for occasions where he has presented Kubescape in the past.

@TheFoxAtWork TheFoxAtWork moved this from New to Assigned in CNCF TOC Board Jul 9, 2024
@TheFoxAtWork TheFoxAtWork self-assigned this Jul 9, 2024
@TheFoxAtWork
Copy link
Contributor

Hello! I'm your TOC Sponsor for Kubescape. I'll be closing #1209 in favor of this application but will refer back to the previous as needed.

What happens next:

  • Please confirm the points of contact for the project. @craigbox i have your email, are you still the primary for this application? are there others?
  • TOC will Schedule DD kick off meeting with project contacts

@TheFoxAtWork
Copy link
Contributor

#1209 has been closed: #1209 (comment)

@slashben
Copy link

Hey @TheFoxAtWork ,

We are super excited 😄

We have discussed who should lead this. We decided that the main point of contact would be @matthyx and myself. @craigbox will be CC-ed on the process, but he won't lead the process due to scheduling complexities.

I will share with you the e-mail addresses.

@TheFoxAtWork
Copy link
Contributor

@slashben Thank you!
The initial evaluation of the project has been completed. No items were found that could not be quickly resolved by the project (security self-assessment is the primary area, I'll request a status update on this in our kick-off). I've sent a Poll to find time for kick off meeting and discuss expectations.

@TheFoxAtWork
Copy link
Contributor

Kick off meeting schedule for July 23rd 2024. Invites have been sent.

@TheFoxAtWork TheFoxAtWork moved this from Assigned to In Due Diligence in CNCF TOC Board Jul 23, 2024
@TheFoxAtWork
Copy link
Contributor

Kick off meeting was held on July 23rd 2024. Received adopters listing from the project August 5th 2024. I've begun Due Diligence and have begun making notes of items needing updates/ corrections in the kick-off and ongoing notes document shared with the project maintainers. I've advised the project of my upcoming limited availability due to upcoming conference talks and travel between now and October. I'll begin reaching out for adopter interview scheduling when i am further along with the DD.

@TheFoxAtWork
Copy link
Contributor

I am parallelizing adopter interviews while i conduct the due diligence as adopters report availability for interviews.

I've completed 1 adopter interview thus far and am re-engaging with others to resume scheduling

@TheFoxAtWork
Copy link
Contributor

Still working through the DD - re-emailed adopters to check in on approvals to conduct the interview, reached out to more, put out a call for adopters with the TAB. (Security projects usually have this difficulty)

@TheFoxAtWork
Copy link
Contributor

Another Adopter is scheduled in October, I've reached out to one who appeared interested and allowable, but needed to follow up again with scheduling.

It is my hope that if i can get the third one scheduled, I'll have all the needed interviews and can wrap up the evaluation shortly after.

@matthyx
Copy link

matthyx commented Sep 30, 2024

Another Adopter is scheduled in October, I've reached out to one who appeared interested and allowable, but needed to follow up again with scheduling.

It is my hope that if i can get the third one scheduled, I'll have all the needed interviews and can wrap up the evaluation shortly after.

This is awesome 👍 thanks so much for your work Emily, we're blessed for having you!

@TheFoxAtWork
Copy link
Contributor

Second adopter interview completed and the summary has been sent for approval.
I will be on holiday next week without internet and will continue the DD when i am back in office. One more adopter is scheduled for later this month. It is my intent to have the DD ready for internal review and discussion by Nov. Sincere apologies for the delay here.

@TheFoxAtWork
Copy link
Contributor

Third adopter interview completed - need to summarize and send for approval.
Still working through the DD - this is the last outstanding item.

@TheFoxAtWork
Copy link
Contributor

The summary for the 3rd adopter interview has been sent for final approval.
I am now focused exclusively on completion of the DD.

@TheFoxAtWork
Copy link
Contributor

I've gotten final approval for the summary of the 3rd adopter interview. I've completed my first pass of the DD and re-engaged the project to address/resolve several questions/items that are less clear, or just need properly linked. Once I hear back from the project and verify completion and resolution of those items, this will be ready for internal TOC review.

@TheFoxAtWork
Copy link
Contributor

Quick update: met with Kubescape at KubeCon to discuss the status of a few recommendations. The project has been heads done on technical improvements to the project and is ready to start addressing these.

@TheFoxAtWork
Copy link
Contributor

Project has completed the outstanding items raised and it is on me to evaluate their completion, hoping to have that done before the new year.

@TheFoxAtWork TheFoxAtWork moved this from Adopter Interviews & Project Discussion to Public Comment in CNCF TOC Board Dec 19, 2024
@TheFoxAtWork
Copy link
Contributor

The Kubescape project has applied for Incubation and I have completed the Due Diligence as the project's TOC sponsor. Thank you to everyone who participated and assisted in completion of this due diligence, it is now ready for public comment:

Application issue: #1291
PR with the DD evaluation: #1513

Everyone is welcome to comment in the DD PR or in reply to this thread, before we move to a TOC vote. This period of public comment will last a minimum of two weeks closing 2 JAN 2025.

@TheFoxAtWork TheFoxAtWork moved this from TOC Review & Public Comment to Voting in CNCF TOC Board Jan 6, 2025
@angellk angellk moved this from Voting to In Press Coordination in CNCF TOC Board Jan 13, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
Status: In Press Coordination
Development

No branches or pull requests

6 participants