Closed pragashj closed 3 years ago
I propose adding "encouraging/fostering formal specification" to the list.
@rficcaglia can you elaborate on what you mean by "formal specification?"
There are a lot of different aspects of security, policy, compliance which have been discussed, including protocols and APIs. Some parts of the landscape are fairly mature and may have formal specification elsewhere, others may benefit from a new specification, and still more may have other pre-conditions will would need to be addressed in a roadmap first.
A specification using some notation that expresses behavior and/or state. Especially with respect to the security properties asserted/claimed.
Z, TLA+ are things I have used, but not advocating any particular language. one can find examples in crypto specifications (e.g. NIST publications) and other crypto publications that use mathematical notation or game models.
Indeed. Common use cases include Amazon's Zelkova. The formal specifications are written to https://en.wikipedia.org/wiki/Satisfiability_modulo_theories .
I'm curious, would you consider the work of SEL4 formal specification? It uses formal methods, but doesn't define it's software based on a proof system, but instead transitively proves it.
Yes absolutely i think it is a good example of a high assurance implementation
On Wed, Jul 10, 2019 at 7:13 PM Brandon Lum notifications@github.com wrote:
I'm curious, would you consider the work of SEL4 formal specification? It uses formal methods, but doesn't define it's software based on a proof system, but instead transitively proves it.
— You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub https://github.com/cncf/sig-security/issues/146?email_source=notifications&email_token=AAGENITHVAWN5J7FQHMT5ZLP62JOFA5CNFSM4HGBAVEKYY3PNVWWK3TUL52HS4DFVREXG43VMVBW63LNMVXHJKTDN5WW2ZLOORPWSZGODZVI5RA#issuecomment-510299844, or mute the thread https://github.com/notifications/unsubscribe-auth/AAGENIWIY7CDR3PYIJFZKCTP62JOFANCNFSM4HGBAVEA .
I think formal methods mention is worthy in security assessments in the case where a project uses formal methods - the information would be useful in that context. Perhaps a proposal to add a section of this to the assessment outline
Formal methods is a very niche topic, so probably if it goes on the roadmap it would have to be bundled with other similar verification techniques or safeguards like using strongly typed languages or sandboxing techniques.
Very few CNCF projects (any?) are using high assurance methods today...but that’s not true in other domains where formal methods are more widely used. I agree that introducing a menu of options over time, providing examples of how and where to use them, and then eventually ratcheting up the expectations is most likely to increase awareness and adoption in this particular community.
On Thu, Jul 11, 2019 at 6:14 AM Brandon Lum notifications@github.com wrote:
I think formal methods mention is worthy in security assessments in the case where a project uses formal methods - the information would be useful in that context. Perhaps a proposal to add a section of this to the assessment outline https://github.com/cncf/sig-security/blob/master/assessments/guide/outline.md
Formal methods is a very niche topic, so probably if it goes on the roadmap it would have to be bundled with other similar verification techniques or safeguards like using strongly typed languages or sandboxing techniques.
— You are receiving this because you were mentioned. Reply to this email directly, view it on GitHub https://github.com/cncf/sig-security/issues/146?email_source=notifications&email_token=AAGENIT7G6JXQL2ALK2R4VLP64W4FA5CNFSM4HGBAVEKYY3PNVWWK3TUL52HS4DFVREXG43VMVBW63LNMVXHJKTDN5WW2ZLOORPWSZGODZWU6JY#issuecomment-510480167, or mute the thread https://github.com/notifications/unsubscribe-auth/AAGENIWNTU6AVSX7TFLAKMTP64W4FANCNFSM4HGBAVEA .
This issue has been automatically marked as inactive because it has not had recent activity.
closing cuz it is now 2021 and work will be folded into https://github.com/cncf/sig-security/issues/414
Create a roadmap for SAFE (cloud-native-security) cc/ @lizrice
Original SAFE roadmap document: https://github.com/cncf/sig-security/blob/master/roadmap.md