tag-app-delivery
sig-security
tag-app-delivery | sig-security | |
---|---|---|
4 | 21 | |
728 | 1,956 | |
2.2% | 1.4% | |
9.4 | 9.7 | |
5 days ago | 3 days ago | |
HTML | HTML | |
Apache License 2.0 | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
tag-app-delivery
-
Ask Me Anything!
The review cycle has nearly wrapped up in time to publish for KubeCon EU. Here is a GH issue that points at the current draft: https://github.com/cncf/tag-app-delivery/issues/316
- New Issue · cncf/tag-app-delivery
- CNCF Operator White Paper
- Operator Design Pattern
sig-security
-
Introduction to the Kubernetes ecosystem
It is also interesting to meet the community : the TAGs (Tech Advisor Group) which provide strategic guidance and advice on technical issues, as well as the SIGs (Special Interest Group) which focuses on areas of interest or specific expertise within the Kubernetes community to drive development and innovation. The TAGs are specialized by areas, for example on security or environmental sustainability.
- Practicing Threat Modeling to Assess and Fortify Open Source Security [pdf]
-
Cloud Native Applications - Part 2: Security
Cloud Native Security Whitepaper
-
Does Kubernetes support SELinux?
As Daniel Walsh himself wrote in a blog post, CRI-O integrates very well with SELinux and prevents dangerous actions like a container loading an old, unmaintained and therefore potentially vulnerable kernel module and breaking out of the isolation. Additionally, the Kubernetes API itself contains resources to specifically configure SELinux labels for containers. Doesn't sound like something they would do for a tool that "doesn't work with Kubernetes", according to some. Also, the CNCF security whitepaper mentions SELinux as a tool that can be used to provide isolation and limit privileges, which is as much as we could expect from an high-level, architecturally-minded document.
- Cloud Native Security Whitepaper v2
- Cloud Native Security Whitepaper [pdf]
- Catalog of Supply Chain Compromises
- tag-security/supply-chain-security/compromises at main · cncf/tag-security
- supply-chain-security - Catalog of Supply Chain Compromises
What are some alternatives?
cool-system - The Cloud Optimized Operational Lab (COOL) system
mkosi - 💽 Build Bespoke OS Images
slsa - Supply-chain Levels for Software Artifacts
spack - A flexible package manager that supports multiple versions, configurations, platforms, and compilers.
badPods - A collection of manifests that will create pods with elevated privileges.
cyclonedx-gomod - Creates CycloneDX Software Bill of Materials (SBOM) from Go modules
sample-tf-opa-policies
ostree - Operating system and container binary deployment and upgrades
vscode-datree - Simple VSCode Extension that allows you to run Datree tests on Kubernetes configurations.
Ansible - Ansible is a radically simple IT automation platform that makes your applications and systems easier to deploy and maintain. Automate everything from code deployment to network configuration to cloud management, in a language that approaches plain English, using SSH, with no agents to install on remote systems. https://docs.ansible.com.
ESPKey - Wiegand data logger, replay device and micro door-controller
ua-parser-js - UAParser.js - Free & open-source JavaScript library to detect user's Browser, Engine, OS, CPU, and Device type/model. Runs either in browser (client-side) or node.js (server-side).