Skip to content

Latest commit

 

History

History
125 lines (87 loc) · 5.55 KB

EARLY-DISCLOSURE.md

File metadata and controls

125 lines (87 loc) · 5.55 KB

Early Disclosure of Security Vulnerabilities

When an Istio security vulnerability is discovered we follow the process outlined in Security Vulnerabilities in order to resolve the issue in a prompt and responsible manner.

The Istio project maintains a mailing list for private early disclosure of security vulnerabilities. The list is used to provide actionable information to close Istio partners. The list is NOT intended for individuals to find out about security issues.

Istio has upstream dependencies of its own. In certain situations, we may need to make emergency Istio releases to address vulnerabilities in these upstream dependencies. Due to embargo policies of these dependencies, we may not be allowed to share any details about the vulnerabilities. In that case, Istio's early disclosure will be strictly focused on the mechanics of an upcoming patch release, rather than on the details of the discovered vulnerabilities.

Embargo policy

The information members receive from the mailing list must not be made public, shared, nor even hinted at anywhere beyond the need-to-know within your specific team except with the list's explicit approval. This holds true until the public disclosure date/time that was agreed upon by the list. Members of the list and others may not use the information for anything other than getting the issue fixed for your respective distribution's users.

Before any information from the list is shared with respective members of your team required to fix said issue, they must agree to the same terms and only find out information on a need-to-know basis.

In the unfortunate event you share the information beyond what is allowed by this policy, you must urgently inform the mailing list by replying to the initial disclosure email. The email should specify exactly what information leaked and to whom. A retrospective will take place after the leak so we can assess how to not make the same mistake in the future.

If you continue to leak information and break the policy outlined here, you will be removed from the early disclosure list.

Membership

Email Organization
tanzu.psirt@broadcom.com Broadcom
istio-security-reports@f5.com F5 Networks
istio-security-vulnerability-notifications@google.com Google
argoprod@us.ibm.com IBM
kube-security@microsoft.com Microsoft
istio-security@redhat.com RedHat
cve@solo.io Solo.io
istio-security@tetrate.io Tetrate

Membership criteria

To be eligible for the early disclosure mailing list, your organization must:

  1. Have an actively monitored security email alias for our project. This cannot be a personal email address, it must be a corporate address owned by the organization.
  2. Be involved in redistributing Istio or have a product with close coupling to Istio.
  3. Have a user base not limited to your own organization.
  4. Be a participant and active contributor in the Istio community.
  5. Accept the Embargo Policy that is outlined above.

Additional membership criteria (Feb 14, 2022)

As of February 14, 2022 there are additional criteria to be a member of the early disclosure list:

  1. Be a member of the Envoy early disclosure list.
  2. Have a member of your organization be a participant in the Istio Product Security Working Group. This is a private meeting held alternating Wednesdays at 11am Pacific or 3pm Pacific to accommodate a world-wide community.

Removal: If your organization stops meeting one or more of these criteria after joining the list then you will be unsubscribed.

Request to join

New membership requests should be emailed to istio-security-vulnerability-reports@googlegroups.com

In the body of your email please specify how you qualify and fulfill each criterion listed in Membership criteria.

Here is an example:

To: istio-security-vulnerability-reports@googlegroups.com
Subject: Seven-Corp Membership to Early Disclosure Mailing List

Below are each criterion and why I think we, Seven-Corp, qualify.

> 1. Have an actively monitored security alias email for our project.

Yes, please subscribe istio-security-team@example.com to the early disclosure
list.

> 2. Be involved in redistributing Istio or have a product with close coupling to Istio.

We distribute the "Seven" distribution of Istio [link]. We have been doing
this since 2017.

> 3. Have a user base not limited to your own organization.

Our user base spans of the extensive "Seven" community. We have a slack and
GitHub repos and mailing lists where the community hangs out. [links]

> 4. Be a participant and active contributor in the Istio community.

Our members, Acidburn, Cereal, and ZeroCool are outstanding members and are well
known throughout the Istio community. Especially for their contributions
in hacking the Gibson.

> 5. Accept the Embargo Policy that is outlined above.

We accept.

> 6. Be a member of the [Envoy Early Disclosure list](https://github.com/envoyproxy/envoy/blob/main/SECURITY.md#members).

We are listed in the Envoy early disclosure membership program.

> 7. Have a member of your organization be a participant in the Istio Product Security Working Group

John/Jane Doe (Email: person@myorganization.com, Istio Slack username: person) will represent our company in the Istio Product Security Working Group.

Final approval is required from the Istio TOC pending a formal request from the PSWG.