You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 30 Next »

This is a wiki page that captures the intent and planned/ongoing actions for the support of security coordination in ONAP.

This covers both the organizational setup and the operations of the onap security subcommittee. 

ONAP security organization

The ONAP security work is split into two parts.  The management of identified vulnerabilities, which is handled by the vulnerability management sub-committee and the coordination and identification of necessary security related activities which is handled by the security sub-committee.

Vulnerability management. 

Vulnerability management covers how to handle the reception of an identified vulnerability through to solution and communication of the vulnerability.  The process is initiated by the reception of an email to security@lists.onap.org.  The vulnerability management procedures can be found here: ONAP Vulnerability Management.

The vulnerability management procedures are executed on by the vulnerability management sub-committee.

ONAP security sub-committee

The ONAP security sub-committee identifies and creates proposals related to security in ONAP.  As one example, it has created the proposal for the Vulnerability management procedures which are now in effect.  The ongoing efforts of the ONAP security sub-committee are now to explore more proactive security activities. 

The email address for the onap sub-committee is:onap-seccom@lists.onap.org with information on how to subscribe found here: onap security sub-committee email subscription.

The ONAP security sub-committee meeting logistics are:

------------------------------------------------------------------------------------------------------------------

ONAP Security sub-committee Operations

General Meeting Agenda:

  • Information Update
  • Topics to advance
    • Walkthrough identified items to suggest. 
  • Backlog update and review
    • Update or add item backlogs 
  • For coming meeting: 
    • Agree topics for the next meeting
  • AOB

Requested Agenda Items: Please feel free to add topics here that you would like to have on the agenda (or send an email to stephen.Terrill(at)ericsson.com).

  • item A 

Security sub-committee recommendations can be found here: Security Sub-Committee Recommendations 

Backlog

Identified activityActivity DescriptionStatus
Creation of a Vulnerability Response Team

Creation of a Vulnerability Management Procedures and Team.   

Done.  Activity Closed.

Identify an approach to manage and handle known vulnerabilities.  This is specific to the components or libraries that ONAP projects have brought in from external sources. 

Nexus IQ/Sonatype LCM has the ability to identify and display known vulnerabilities of used components.  These used components are in the end part of the ONAP release and it is not desirable to release with known vulnerabilities.

A proposal needs to be created to bring to the TSC to address how to work-through the known vulnerabilities and relate it to the project release plan.

Nexus IQ/Sonatype LCM is ready for use and the results can be made available.


Nex

Analyze and make recommendations to the CII badging program

https://github.com/linuxfoundation/cii-best-practices-badge  

This may identify good practices, which could include guidelines.  consider, Ensure least privilege by design), consider how to look at code scaning into the integration processes.

Also look at:

Done.

The security subcommittee recommends a gold level.

Included in the S3P recommendations.

Create CII Badging program ONAP support guide. As part of the S3P, the a number of projects will go into the CII badging program.  A guide to help the projects on common ONAP project issues would be useful. Identified 
 CII Badging program hackathone.Organize a hands-on starter session with the CII Badging programe for project memembers Identified 
Identity primary relevant legislation stds to be considered. Identify the main security standards etc that are related to regulatory requirements.  This would be for awareness.  
 Static Vulnerability Scans.

Identify and propose a process for static vulnerability scans 

Information can be found on: https://wiki.onap.org/display/DW/ONAP+security+Recomendation+Developement 

Started 
Credential Management 

 Proposed architecture and proposal for handling credentials in ONAP

Information can be found on: https://wiki.onap.org/display/DW/ONAP+security+Recomendation+Developement 

 Started

Need to comlete the requirements.


If you want to be involved, please contact Stephen.terrill@ericsson.com 


Note: if you would like to change the contents of this site, please contact Stephen Terrill.


  • No labels