Open jflowers opened 5 months ago
So would this ask all CNCF projects to produce OSCAL components + an SSP (+ maybe CIS/CRM?)
No, at least that has not been in my mind.
Hey @brian-comply0, would love if you could join us on this project!
Discussion captured at todays STAG Meeting:
Broad Objective - “This is how we should be able to exchange information in OSCAL”
Q: “How can we address the ambiguity within the scope of the deliverables?” Action item: conduct more discovery to dissect and determine what will be done
“The OSCAL norms seeks to provide clarity through opinionated standard use of OSCAL“
Q: What is the alternative? What Problem can we point to for the specific pain points? A: Project to consider the consequences of not performing this activity.
Q: How do we get there? A: Experimentation
Q: What is the intended deliverable medium? (WP, diagram, artifact?) A:TBD on what this guidance artifact format is.
Q: What level of sponsorship is the project requesting? A: Official Project Status
STAG Sponsorship - Eddie Knight Needs a new name (shorter)
Project Lead (Jay Flowers) accepts the initial step in the process for group formalization .
Feel free to comment if I missed anything or we want to clarify any points.
I concur with the general approach being taken with metadata. If I can be of assistance with this facet of the issue, let me know.
-Chair, IEEE P2957 Big Data Interoperability and Metadata Management
On Thu, Jun 13, 2024 at 11:01 AM Jay Flowers @.***> wrote:
Problem: Today, open source projects do not have a consistent mechanism to publish compliance and regulatory details about what the project does in a machine readable format and to enable assessment activities to occur in an automated manner. Adopters do not have a way to understand what capabilities and controls projects have in place and what their responsibilities as consumers are as defined by the leveraged project.
Adopters today have to manually review a given software project, understand based on existing documentation if it can meet a compliance or regulatory requirement, and then determine if it does it already or if it's configurable by the adopter. They have to do this with every release. If 1 project decides to express this in one manner, another may choose a very different one and the adopter now has two ways in which they can’t reason about the compliance properties of both projects. We need a specification and guidance to allow projects to consistently and uniformly express their compliance capabilities and posture for adopters to act on.
Other areas:
- Project to project dependencies for compliance requirements
- Consumption of compliance metadata/information
- Standardization on language for expression (OSCAL recommended)
- Has the needed evidence and the reporting for what auditors need alongside evidence
- Tie in with policy engines in a consistent way to avoid vendor lock-in
Impact: Depending on the shape and nature of this project, the desired experience by adopters of cloud native projects is that when they deploy a given project the project contains sufficient metadata that in combination with a policy engine allows for decisions on whether a piece of software is permitted to be deployed in the target environment.
Such metadata shows how the project can achieve compliance (with configurations) and how it HAS achieved compliance (based on its design and operation in a given deployment environment). The evidence can also be turned over to auditors in an automated fashion to enable reasoning about system properties and conformance with regulatory requirements on a continual and ongoing basis driven by deployment frequency thereby reducing the manual audit (internal and external) activities performed by covering the technical control elements (roughly 30% of a given framework like NIST))
A lot of organizations just use hundreds of spreadsheets with 1 compliance engineer to automate. Spot checking is not good enough here.
Scope: How much effort will this take? ok to provide a range of options if or "not yet determined" for initial proposals. Feel free to include proposed tasks below or link a Google doc
Intent to lead:
- I volunteer to be a project lead on this proposal if the community is interested in pursing this work. This statement of intent does not preclude others from co-leading or becoming lead in my stead.
Proposal to Project:
- Added to the planned meeting template for mm dd
- Raised in a Security TAG meeting to determine interest - mm dd
- Collaborators comment on issue for determine interest and nominate project lead
- Scope determined via meeting mm dd and/or shared document add link with call for participation in #tag-security slack channel thread add link and mailing list email add link
- Scope presented to Security TAG leadership and Sponsor is assigned
TO DO
- Security TAG Leadership Representative:
- Project leader(s):
- Issue is assigned to project leaders and Security TAG Leadership Representative
- Project Members:
Fill in addition TODO items here so the project team and community can see progress!
- Scope
- Deliverable(s)
- Project Schedule
- Slack Channel (as needed)
- Meeting Time & Day:
- Meeting Notes (link)
- Meeting Details (zoom or hangouts link)
- Retrospective
GDoc Draft https://docs.google.com/document/d/1uZ1qSVAGoRL117JDdTO4KSQWwNsHUnjxwTfg1N7HaW4/edit
— Reply to this email directly, view it on GitHub https://github.com/cncf/tag-security/issues/1277, or unsubscribe https://github.com/notifications/unsubscribe-auth/ABG5HAL3UIPRARR7TJWOW4DZHGX4LAVCNFSM6AAAAABJIS6BYGVHI2DSMVQWIX3LMV43ASLTON2WKOZSGM2TCMZYGI4DOMA . You are receiving this because you are subscribed to this thread.Message ID: @.***>
-- Mark Underwood Linkedin https://linkedin.com/in/knowlengr
@jflowers will be opening a PR with a project charter, and I will submit a request for a community calendar entry so that calls are hosted and recorded via LFX.
Per today's project call, the next project meeting will be focused on ways of working with a focus on research / experimentation.
Problem
Today, open source projects do not have a consistent mechanism to publish compliance and regulatory details about what the project does in a machine readable format and to enable assessment activities to occur in an automated manner. Adopters do not have a way to understand what capabilities and controls projects have in place and what their responsibilities as consumers are as defined by the leveraged project.
Adopters today have to manually review a given software project, understand based on existing documentation if it can meet a compliance or regulatory requirement, and then determine if it does it already or if it's configurable by the adopter. They have to do this with every release. If 1 project decides to express this in one manner, another may choose a very different one and the adopter now has two ways in which they can’t reason about the compliance properties of both projects. We need a specification and guidance to allow projects to consistently and uniformly express their compliance capabilities and posture for adopters to act on.
Other areas
Impact
Depending on the shape and nature of this project, the desired experience by adopters of cloud native projects is that when they deploy a given project the project contains sufficient metadata that in combination with a policy engine allows for decisions on whether a piece of software is permitted to be deployed in the target environment.
Such metadata shows how the project can achieve compliance (with configurations) and how it HAS achieved compliance (based on its design and operation in a given deployment environment). The evidence can also be turned over to auditors in an automated fashion to enable reasoning about system properties and conformance with regulatory requirements on a continual and ongoing basis driven by deployment frequency thereby reducing the manual audit (internal and external) activities performed by covering the technical control elements (roughly 30% of a given framework like NIST))
A lot of organizations just use hundreds of spreadsheets with 1 compliance engineer to automate. Spot checking is not good enough here.
Deliverables
The project will deliver the following artifacts:
Scope
The project encompasses the following activities:
By delivering these artifacts, the project aims to establish a robust foundation for standardized communication and automation of compliance and regulatory processes within the cloud-native ecosystem, with explicit support for the flexible and granular exchange of compliance information through OSCAL fragments.
Intent to lead:
Proposal to Project:
[x] Added to the planned meeting template for 10/16
[x] Raised in a Security TAG meeting to determine interest - 10/09
[x] Collaborators comment on issue for determine interest and nominate project lead: @jflowers
[X] Scope determined via meetings, slack, and document
[X] Call for participation in #tag-security slack channel thread and mailing list email
[x] Scope presented to Security TAG leadership and Sponsor is assigned
Slack Channel
Meeting Recordings
Google Group
TO DO
If you prefer to access the existing Miro diagram anonymously use this link. GDoc Draft