-
Notifications
You must be signed in to change notification settings - Fork 110
chore: Add SECURITY.md for outlining security policy #4048
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
This document outlines Apache Texera's security model, deployment considerations, and procedures for reporting security vulnerabilities. Signed-off-by: Yicong Huang <[email protected]>
|
@Yicong-Huang Please check this wiki page (https://github.com/apache/texera/wiki/How-to-run-Texera-on-local-Kubernetes) and see if it can serve the purpose for this security document. It's for installing Texera on a local Kubernetes, not a cluster. |
Seems not enough. Per PJ's previous comment, it might be better to include recommendation on certain file permissions.
|
|
@aicam Can you check these instructions and improve the wiki page? |
I just updated the instructions to include a recommendation on preventing using root user (admin user) for containers. |
|
Thanks @aicam. I will mention this wiki in the security policy, as a reference. |
Added a reference to the wiki for local Kubernetes deployment. Signed-off-by: Yicong Huang <[email protected]>
Removed outdated deployment reference and updated section headers for clarity. Signed-off-by: Yicong Huang <[email protected]>
Signed-off-by: Yicong Huang <[email protected]>
|
@pjfanning Thanks for the comments. I have addressed them all, and added information and link to our deployment guide. Please kindly check again. |
What changes were proposed in this PR?
Adding SECURITY.md. This document outlines Apache Texera's security model, deployment considerations, and procedures for reporting security vulnerabilities.
Any related issues, documentation, discussions?
Private discussions.
closes #3807.
How was this PR tested?
N/A
Was this PR authored or co-authored using generative AI tooling?
No