Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Please find below the Minutes of Meetings and recording for the SECCOM meeting that was held on 2th 27th of October 2020.

MVP definition – initial proposal for the run time shared with Architecture Subcommittee, and no specific comments received – only to take into account also new project: Configuration Persistence Service which was just approved by TSC.

Flow matrix is must have from SECCOM perspective.

Maintenance of the YAMLs:

Sylvain to be addressed.

Common repoto host YAML files:

Repo seems to be a better choice (as it has source control). Potential problem with synch between repo and Wiki.

Creating sub-wiki

Amy might help if Natacha has any problem. Impact of change of source YAML file and changes in documenattion - for a small change it is not the case.

Non functional requirements to be provided by 16th of October

RC0 - October 12th 

RC1 - October 22nd

Jira No
SummaryDescriptionStatusSolutionMVP definition for flow matrix ongoing

Pierre to check with Martial if we could work with CLAMP for flows documentation.

Tool (Cidium?) to get flow matrix information to be elaborated by Fabian.

To be checked with Eric and Catherine to get buyin from TSCs. Information to be provided by Fabian to Amy.

Harbor integration

Meeting with Jessica was organized to discuss next steps and explain activity goals. Key features of Harbor:

  • use of Trivi to san the images
  • sign the image with Notary
ongoing

Action point for Fabian to provide requirements for Harbor to Jessica and use Jenkins sandbox.

Fabian to run an internal meeting with his team and comeback to SECCOM with those 2 features utilization idea. 

vF2F summary

Multiple presentations provided:

  • SECCOM with packages upgrades, vulns management, Guilin restrospective and Honolulu non-functional requirements
  • Service Mesh update
  • Python migrations
  • AAI usage of Keycloak for RBAC
done

Honolulu non functional requirements - presentation to Requirements Subcommittee Known vulnerabilities analysis for Honolulu

Our and effort projects bring value in decreasing the rsecurity isks

  • Policy, Oparent, SDNC, UsecaseUI and CLAMP are the most advanced, well done!
  • Appreciated efforts on Portal, CCSDK, OOF, SDC side
  • Amir's suport very much appreciated!
ongoingHonolulu non functional requirements

SECCOM requirements were presented on 26th of  October. 

  • Continue packages upgrades in direct dependencies (REQ-439)
  • Continue Java (REQ-438) and Python migrations (REQ-437)
  • After Service Mesh PoC - new requirements might arrive.
  • Harbor requirement. In Harbor:
    • you can sign the image and you can share the key with an application that has an account to pull or to push the image
    • possibility to scan the image all the time and send warning
    • Harbor deployed in run time while Whitesource and Nexus-IQ during the development.
  • Logs management:
    • common place for data - all applications should generate logs that can be collected by Kubernetes (target for next release) – Honolulu requirement (REQ-441)
    • common format for data - format of minimum data that we want that is useful (target for Istambul release)
  • SIEM integration (REQ-464):
    • integration like for the other applications with SIEM, have the same protocol used
    • logs from ONAP to SIEM, falco tool to be considered (IDS for Kubernetes)
    • alarms when security issue
  • CII Badging: (REQ-443), Focus on Application Security questions:
    • Crypto Credentials Agility – ½ od apps in met and almost half not yet answered
    • Implement Secure Design – 1/3 of projects did not answer
    • Crypto Weaknesses – tests to be applied (3 including Morgan)
  • HELMv3 migration (REQ-442)
doneTest use cases and ac ceptance criteria shall be prepared for each requirement. ONAP Release milestonesdoneJava and Python upgradeFinal list of the projects that require upgrades to be created. Amy to check with Morgan and Sylvain.

Prioritization will be done by TSC.

With Fabian we made a SIEM requirement.  


CLAMP for flows documentation provided by Pierre.

It is clear for Fabian but insufficient.ongoingOffline exchanges to be organized next week  on (4th of November?) between Fabian and Fabien/Pierre.

Harbor integration

Requirements for Harbor to be provided to Jessica and use Jenkins sandbox.

Internal meetings to be organized by Fabian with his team and come back to SECCOM with 2 features utilization idea:

  • use of Trivi to san the images
  • sign the image with Notary
in standby

Java and Python upgrade

There is abuild time test that checks the images to see if they have Python 2 (interpreter) or Java 8 (runtime) included in the image. We still have lots of components that have those in their image. 

Problem statement:

It does not answer the question whether projects are using now only Python 3 and Java 11. In multiple cases people are using custom images and simply did not remove Python 2 and Java 8 as not used.

Standard image does not have old versions in it, we shall push projects to use standard image for Honolulu release and if from some reason they need to run custom image, they must remove what they do not use.


Amy will reach out Pawel W. to run some additional tests.

Synch on latest recommended versionsSome projects made a great job , some did nothing. We shall push TSC for prioritization of this task.ongoing

CII badging requirementRequirement to be updated.ongoingTony to update Jira Epic.

CII Dashboard3 projects that are silver now:, and even one of those projects is 65% of gold (VVP) and 2 other are at 57 % of gold (Policy) and AAF, CLAMP is 96% silver and over 40 % gold. ongoingProgress was made.

SIEM requirement

To be added as it is mature:

Implementation is done to identify events that compromise the system.

This information feedback is done because only an intervention can stop this risk.

The events are logged and according to rules have intervened according to the risks.

External system must be use to save and display the log

Secure protocol  must be use to transfert the log between ONAP and external system

done


OUR NEXT SECCOM MEETING CALL WILL BE HELD ON 27th 3rd OF OCTOBERNOVEMBER'20. 

Secrets management if possibleby Natacha.




Recording:

View file
name2020-10-2027_SECCOM_week.mp4
height150

...

SECCOM presentation:

View file
name2020-10-20 27 ONAP Security Meeting - AgendaAndMinutes.pptx
height150

...