Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Lightweight Threat Modelling Guidance for CNCF Projects #903

Closed
sublimino opened this issue May 17, 2022 · 8 comments
Closed

Lightweight Threat Modelling Guidance for CNCF Projects #903

sublimino opened this issue May 17, 2022 · 8 comments
Labels
assessment-process proposed improvements to security assessment process audit-process discussion / proposed improvements to CNCF audit process project work of the group

Comments

@sublimino
Copy link
Member

sublimino commented May 17, 2022

Description: A lightweight threat modelling framework can help to increase the STAG's security review velocity. Also provides maintainers with an effective mechanism to drive secure feature development.

Impact: Reduce the time investment for STAG reviewers, lower the barrier to entry for new contributors, and widen the pool of individuals that can participate in the threat modelling process.

Scope: To generate a checklist for threat modelling, some recommended tooling, and distilled bullet points to help guide the process.

Prior art:

Docs:
-https://docs.google.com/document/d/1tuGtKrjcreDFlHcXYCTjLvy3mjyamdQzwCZr6uqFcR4/edit#heading=h.hc3y1ed9v90a

General timeline:

@sublimino sublimino added suggestion New suggestion for the CNCF sig-security group that don't fall into an existing category triage-required Requires triage assessment-process proposed improvements to security assessment process audit-process discussion / proposed improvements to CNCF audit process labels May 17, 2022
@lumjjb lumjjb removed the triage-required Requires triage label May 17, 2022
@ragashreeshekar
Copy link
Contributor

I'm interested to join.

@izar-sqsp
Copy link

Another quick, lightweight framework: https://github.com/Autodesk/continuous-threat-modeling

@lojikil
Copy link

lojikil commented Jun 22, 2022

We used a modified RRA process when we did the threat model for Kubernetes itself; you can see my notes in the repo. We modified these to include the controls we had agreed upon with the k8s audit team at the time, and it worked quite well.

I'd definitely be interested in helping as well!

@nyrahul
Copy link

nyrahul commented Jul 28, 2022

We had used STRIDE analysis for threat modelling a CNCF Sandbox project - Kubearmor (i am one of the maintainer) and built a generic k8s threat modelling tool. Few points to note,

  1. the tool used in the context was Microsoft TMT
  2. We created a k8s template for the tool (available in public).
  3. Here is the Medium blog for the same.

Would love to be part of this.

@sublimino
Copy link
Member Author

Thanks to everybody for contributing, we've put together a lightweight questionnaire based on the template @lojikil shared that was used for the Kubenretes assessment, along with some extra wording to encourage diagrams — the main difference being reviewers in TAG Security won't have the wealth of documentation Kubernetes provides — and reduce the scope to "less classified systems at runtime". There's an outstanding question of scoping the supply chain that's worthy of some discussion, comments and suggestions open on the doc:

https://docs.google.com/document/d/1tuGtKrjcreDFlHcXYCTjLvy3mjyamdQzwCZr6uqFcR4/edit#heading=h.hc3y1ed9v90a

Thoughts welcome, and I'll present an update in the US-timezone TAG Security meeting.

@sunstonesecure-robert
Copy link
Contributor

we recently finished the K8s external audit - awaiting release of report for community review - and are folding methodological lessons learned into a threat modeling HOWTO for K8s sub-projects with the goal of in-person intensive sub-project support at KKs and ongoing security support for ongoing triage . Happy to have eyes and feedback on the process and outputs to cross pollinate!

@sublimino
Copy link
Member Author

Thanks to everybody that contributed, we ran the first trial with this template and got through some of the Flux assessment.

We're going to run an in-person session at Cloud Native Security Con next month, if you're in town please join us! After that session we'll look to publish the doc, and integrate with the security assessments guide based on feedback 🙏

@anvega anvega changed the title [Suggestion] Lightweight Threat Modelling Guidance for CNCF Projects Lightweight Threat Modelling Guidance for CNCF Projects Jan 9, 2023
@lumjjb lumjjb added project work of the group and removed suggestion New suggestion for the CNCF sig-security group that don't fall into an existing category labels Feb 27, 2023
@anvega
Copy link
Contributor

anvega commented Aug 1, 2023

Chairs and TLs unanimously agreed to converge the lightweight threat modeling practice as part of future security assessments whenever feasible. The assets linked in the issue can be reused as later time as guidance, but would encourage to merge those assets into the assessments directory for discoverability a supplementary documentation (in particular the template).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
assessment-process proposed improvements to security assessment process audit-process discussion / proposed improvements to CNCF audit process project work of the group
Projects
None yet
Development

No branches or pull requests

8 participants