The CNCF Security Technical Advisory Group facilitates collaboration to exchange and produce knowledge and resources for building security in the cloud native ecosystem.
Cloud Native involves building, deploying, and operating modern applications in cloud computing environments, typically using open source. This complex ecosystem presents a technology risk landscape that demands rethinking application and information security through the lens of developer experience.
We aim to significantly reduce the probability and impact of attacks, breaches, and compromises. By empowering developers and operators to understand and manage the security posture of their systems, we strive to fulfill the promise of enhanced productivity and operational efficiency.
- System Security Architectures: Frameworks to protect resources and data.
- Common Lexicon, Templates & Libraries: Tools for developers to create secure apps.
- Heuristics and Models: Approaches for reasoning about system security.
Below is a list of publications by TAG Security. For a comprehensive collection of our works in various formats, please visit the publications directory.
Publication | Date |
---|---|
Formal Verification for Policy Configurations | August, 2019 |
Catalog of Supply Chain Compromises | November 2019 - Present |
Software Supply Chain Best Practices | May, 2021 |
Evaluating your Supply Chain Security | May, 2021 |
Cloud Native Security Lexicon | August, 2021 |
Cloud Native Security Whitepaper | May, 2022 |
Cloud Native Security Controls Catalog | May, 2022 |
Handling Build-time Dependency Vulnerabilities | June, 2022 |
Secure Software Factory: A Reference Architecture to Securing the Software Supply Chain | May, 2022 |
Secure Defaults | February, 2022 |
Open and Secure - A Manual for Practicing Threat Modeling to Assess and Fortify Open Source Security | November, 2023 |
Refer to the Security TAG charter for our governance process.
Join our open discussions and share news:
- Email list
- CNCF Slack #tag-security channel (Refer to the contributing guidelines for posting and participation details.)
- Americas: Weekly on Wednesdays at 10 am (UTC-7). Zoom link, Meeting ID: 923 4036 9657.
- EMEA: Bi-weekly on Wednesdays at 1 pm UTC+0 (adjusts for daylight saving). Zoom link, Meeting ID: 983 4873 8138.
- APAC: Bi-weekly on Wednesdays at 11 am (UTC+9). Zoom link, Meeting ID: 943 1550 8827.
Check your local timezone here. Meetings are listed on the CNCF calendar and the TAG Security Calendar.
To add a topic to the agenda, review our process.
If you are new to the group, we encourage you to check out our contributing guidelines.
Explore groups affiliated with or relevant to Security TAG here
Details about the TAG Chairs, Tech Leads, and TOC Liaisons can be found on the CNCF Technical Advisory Groups (TAGs) information page
Thank you to all the tag emeritus leaders for your contributions to the success of this community.
The TAG's working groups focus on specific areas and organize most community activities, including weekly meetings. These groups facilitate discussions, engagement, and publications with key stakeholders, operating differently based on their needs. Each group, led by a responsible leader, reaches consensus on issues and manages logistics. All materials, such as reports, white papers, documents, and reference architectures, are in the repository's /community directory.
Project | Leads | STAG Rep |
---|---|---|
Automated Governance | Brandt Keller | Matthew Flannery |
Catalog of Supply Chain Compromises | Santiago Arias Torres | Marina Moore |
Commons | Eddie Knight | Marco De Benedictis |
Compliance | Anca Sailer, Robert Ficcaglia | Brandt Keller |
Controls | Jon Zeolla | Brandt Keller |
Security Assessments | Justin Cappos | Eddie Knight |
Software Supply Chain | Michael Lieberman, John Kjell | Marina Moore |
For CNCF project proposal process create a new security assessment issue with a self-assessment.