Skip to content

Commit bad6a4b

Browse files
committed
Create table and directories for working groups and
- Create community/working-groups directory - Adds table of active working groups to readme
1 parent 267cf6e commit bad6a4b

File tree

6 files changed

+115
-0
lines changed

6 files changed

+115
-0
lines changed
+28
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
# Automated Governance
2+
3+
The TAG has advanced secure software practices with the Secure Software Factory Reference Architecture Paper. Building on this, the new initiative will provide guidelines for automated governance in cloud-native environments, focusing on integrating security, compliance, and auditability into CI/CD pipelines to automate and operationalize governance and compliance practices.
4+
5+
## Goals
6+
7+
- Provide guidelines and best practices for implementing automated governance processes in cloud native environments.
8+
- Integrate security, compliance, and auditability into CI/CD pipelines.
9+
- Streamline compliance processes and enhance the overall security posture of cloud native applications.
10+
11+
## Scope
12+
13+
The scope of this project includes:
14+
15+
- Research and analysis of current automated governance practices.
16+
- Development of a comprehensive reference architecture.
17+
- Creation of best practice guidelines and documentation.
18+
- Potential development of tooling or integration patterns for common CI/CD platforms.
19+
20+
## Meeting Information
21+
22+
- **Meeting:** Every 2 weeks on Tuesday at 2:00 PM Pacific Time (US and Canada) ([Calendar Invite](https://zoom.us/meeting/tJUtduGoqz4qGddkUvgs3jVjzUEY6Y8MEcT6/ics?icsToken=98tyKuCprjoiGtGQsBqERowcAoj4WfTwmCVfjadZlyrzBDMAaDX8LNdnC-RGSPX1))
23+
- **Meeting Notes:** [Google Docs](https://docs.google.com/document/d/1sa_dBQifM8Fbp1tmNEkdoZKYXMw4pCPv_TcGBy6M4O0/)
24+
25+
## Contact
26+
27+
- **Lead:** Andrés Vega, Brandt Keller
28+
- **Slack Channel:** [Link](https://cloud-native.slack.com/archives/C06B26A12AF)

community/catalog/README.md

+9
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
# Catalog of Supply Chain Compromises
2+
3+
The Catalog of Supply Chain Compromises provides real-world examples that help raise awareness and provide detailed information that lets us understand attack vectors and consider how to mitigate potential risk.
4+
5+
For information on how to contribute, check the [catalog](/supply-chain-security/compromises) directly.
6+
7+
## Contact
8+
9+
- **Lead:** Santiago Arias Torres

community/compliance/README.md

+35
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
Compliance Working Group
2+
3+
Cloud Native systems shift technical and human workflows. The community has researched cloud native security, tackling software vulnerabilities, risk management, dependencies, GitOps, supply chain provenance, malicious attacks, threat models, and security assessments. Organizations must comply with privacy and data protection laws, ensuring compute and data integrity. These concerns require both technical configurations and complex human orchestration, especially for audits needing reviewable artifacts.
4+
5+
Bridging technical issues with legal and regulatory workflows, the aim to prevent system breaches while addressing supply chain, operator, data, and AI failures. Focusing on auditability, non-repudiation, and forensic evidence, it plans to curate vendor-neutral tools for evidence collection, chain-of-custody in audits, and automated workflows for continuous compliance.
6+
7+
The key focus areas include:
8+
9+
Creating a knowledge base and case studies on operating a cloud native environment within legal and regulatory requirements. These requirements encompass not just technical security but also human activities, system availability, continuity of operations, and data location, sovereignty, and provenance.
10+
11+
Generating compliance as code examples, templates, and tools for automating both technical and non-technical requirements, control assessment, data analysis, audit, and compliance remediation workflows benefiting CNCF projects and their users.
12+
13+
Reviewing industry and governmental standards (e.g., NIST, PCI, HIPAA) from a cloud native perspective and advising the CNCF community on implementing and supporting these compliance requirements to enable best practice adoption by various organizations.
14+
15+
## Responsibilities
16+
17+
- Users/personas/needs/customer demands for industry and regulatory compliance (both human and technical)
18+
- Identifications of areas of focus e.g. human workflows, automated workflows, analytical tools, audit and assessment tools, technical security controls that cut across components and systems and clouds, etc
19+
- Framework for evaluation, audit and reporting - how do products and tools demonstrate compliance?
20+
- Training and automation - what is missing, what is difficult to understand, what knowledge gaps are there?
21+
- Work on integrating common tooling across different projects, particularly where that tooling is a CNCF project (but the targets may not be)
22+
- Cross project focus on the projects and efforts the CNCF is funding, helping projects identify needs and providing subject matter expertise to assist
23+
- Recommendations of integrating security tooling with compliance tooling and processes - making both the synergies and unique separations of concern explicit and achieving community consensus.
24+
- Growing CNCF external relationships with interested parties, e.g. NIST and other compliance standards bodies such as FINOS, OSCAL, OpenSSF
25+
26+
## Meeting Information
27+
28+
- **Weekly Meetings:** 10:00 AM Eastern Time (US and Canada)
29+
- **Meeting Link:** [Zoom Meeting](https://zoom.us/j/92729235315?pwd=ZFIxU3RSanlVODh4a1g2SFdJOGpoZz09)
30+
- **Meeting Notes:** [Meeting Notes Link](https://docs.google.com/document/d/1z9xvt-Z97j4CtEH1-nR9sMWul7jQkUi_fNY7BdMPgxM/edit#heading=h.88owgl3gm8w4)
31+
- **Calendar Invite:** See [CNCF calendar](https://calendar.google.com/calendar/u/0/embed?src=0b8u5el8ta4s93t2cm72tuvhhk@group.calendar.google.com&ctz=America/Los_Angeles) for invite
32+
33+
## Contact
34+
35+
- **Leads:** Anca Sailer (@ancatri), Robert Ficcaglia (@rficcaglia)

community/controls/README.md

+18
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
# Controls
2+
3+
## Overview
4+
5+
The controls catalog ensures the usability of CNCF deliverables by GRC professionals and Auditors of Cloud Native systems. The primary goal is to support quickly identifying the controls status of cloud-native environments, and methods to share the output of those assessments in machine readable formats (OSCAL, JSON, etc.). These outputs should also map to existing frameworks and regulations (CSA, NIST, FedRAMP, SOX, GDPR, etc.), and provide guidance to properly validate and verify administrative and technical controls.
6+
7+
## Impact
8+
9+
This initiative aims to provide a method for assessing environments against a standardized set of controls mapped to relevant frameworks and regulations, enabling easier compliance and security assessments in cloud native environments.
10+
11+
## Meeting Information
12+
13+
- **Meeting Notes:** [Google Docs](https://docs.google.com/document/d/1ARLHrZ4SKIEwnSKgDaa39vS19dVIH45RjfERBaJ1vlg/edit?usp=sharing)
14+
15+
## Contact
16+
17+
- **Lead:** Jon Zeolla
18+
- **Slack Channel:** [Link](https://cloud-native.slack.com/archives/C023TTU27KN)

community/research/README.md

+11
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
# Security TAG Research
2+
3+
The Security TAG (STAG) group members often have good ideas they want to get out to the broader community. We've started to write up blog entries, etc. It may be useful to have a process to have them come out from STAG and be marketed as such.
4+
5+
## Example Article
6+
7+
- [Security of Software Update Systems in 2023](https://thenewstack.io/security-of-software-update-systems-in-2023/)
8+
9+
This will help others get security awareness and bring in new contributors to TAG Security.
10+
11+
It will take a week to a month for the authors of each post depending on the content. There will be some minor work for the organizers to choose the topics and coordinate logistics. Most likely, the group will publish 3-4 of these a year, so that work will not be onerous.
+14
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
# Software Supply Chain Security
2+
3+
Software Supply Chain attacks have come to the wider community's attention following a recent high-profile attack, but have been an ongoing threat for a long time. With the ever-growing importance of free and open source software, software supply chain security is crucial, particularly in cloud native environments where everything is software-defined.
4+
5+
## Meeting Information
6+
7+
- **Weekly Meetings:** 8:00 AM Pacific Time (US and Canada)
8+
- **Meeting Link:** See CNCF calendar for invite
9+
- **Meeting Notes:** [Google Docs](https://docs.google.com/document/d/170y5biX9k95hYRwprITprG6Mc9xD5glVn-4mB2Jmi2g/edit#heading=h.xkkh09c7ni6)
10+
11+
## Contact
12+
13+
- **Lead:** Marina Moore, Michael Lieberman, John Kjell
14+
- **Slack Channel:** [Link](https://cloud-native.slack.com/archives/C01KL0B4LKC)

0 commit comments

Comments
 (0)