Closed TheFoxAtWork closed 1 year ago
I think folks from my end would like to attend. This is a big problem we're running into particularly in two spots:
Some prior art that has proven useful to us in our own work on the topic: https://osv.dev/ -- Google open source project around a database of vulnerabilities in OpenSSF vulnerability format.
I'm going to circulate this within Gitlab to identify the most relevant people which should attend
@oliverchang @inferno-chromium FYI...
Would love to attend from the Google Open Source Security team side (and OSV project in general, + @oliverchang)
Isaac from the GitLab Vulnerability Research Team here (handling CNA work), we would definitely be interested in attending this.
CSA checking in, we'll definitely be attending.
A good example of this problem and the kind of data we need is https://github.com/cloudsecurityalliance/gsd-database/blob/main/2021/1002xxx/GSD-2021-1002352.json aka cve-2021-44228 The GSD (GlobalSecurityDatabase) is our attempt to solve part of this problem (the security identifier/discoverability/publishing issue). As you can see from he GSD entry Twitter is by far the best source for real time vuln data now (detections, fixes, workarounds, etc. Tons of community work on this CVE is flying around, but none of it is mentioned in the CVE, and likely never will be). I'd like to have more structured data around workarounds/detection/exploitation (especially of services).
I think one major aspect is the ability to update information quickly, and update it in the format(s) needed by various organizations. To which GSD is supporting namespacing and multiple formats within our data (you want to use OSV? CVE? CSAF? custom JSON? XML? Sure. that's fine by us.).
As part of the VMware Secure Supply Chain Team, I'd love to attend and I am sure some of my teammates would join too.
Goals:
I will like to attend.
Wanted to provide everyone with a quick update. We will be pulling together a group to work thru logistics and planning around the middle of January to get this going. If there are specific goals and asks you want to get out of this please be sure you have them in your comment so they can be discussed as part of the planning for this event.
I'm interested in attending.
I would be interested in attending.
i am interested in attending the great work! thank you
A great idea - we would be interested in attending.
interested in this, great idea, also actionable and standardize way for vuln db and exploitation
I would be interested in attending.
Hey, great idea. The GitHub Security Lab is definitely interested! We are in charge of
And our Incident Response team is also interested.
I will also circulate this within OpenSSF
Reference: https://github.com/oasis-tcs/csaf/blob/master/csaf_2.0/prose/csaf-v2-editor-draft.md per @fkautz as possible discussion point during this.
@TheFoxAtWork: I'm happy to help here; just let me know what you need from me.
Since not everyone may be aware of what VEX is, I wrote about "Profile 5: VEX" at https://zt.dev/posts/what-is-vex/
There are also some efforts at NTIA and CISA on SBOMs, which include VEX in scope:
I am happy to discuss or facilitate these topics or how SBOMs and VEX integrate them into a Zero Trust environment.
I would like to be kept in the loop on this / would like to attend.
Hi, Fatih, from IBM T.J. Watson Research Center. I am interested in attending this.
Hi, this is Yu from IBM T.J. Watson Research Center. I am interested in attending this.
Sounds very interesting. I am interested to attend this event.
I am also interested in this.
I am interested in this as well
Interested and will attend.
Another post about this problem space: https://blog.wiz.io/security-industry-call-to-action-we-need-a-cloud-vulnerability-database/
Folks - wanted to provide a quick update here. Over the next two weeks we are giving everyone time to catch up after the holiday break. After which Jan 24th @lumjjb is going to begin running point. Some initial first steps already discussed:
I am interested in attending. What is the proper way to make sure I don't miss it? Will following this issue be sufficient?
If you are interested in this #835 summit, then you may also be interested in CISA #SBOM Cloud and online applications work-stream: https://www.linkedin.com/posts/allanafriedman_sbom-activity-6886338388639653888-TAXw
The VMware Tanzu Trust team has representatives interested in this
I see @xcorail from our team already commented here, but I'll chime in that I'm also interested in attending ✋. I'm the PM for Security Advisories at GitHub.
I would like to point out the Cloud Security Alliance has a kickoff meeting for their GSD vulnerability project next week https://twitter.com/cloudsa/status/1481296477188145153
I suspect anyone watching this issue will have an interest in what the CSA is doing
Rezilion Would love to contribute to this effort. I would love to attend.
Gardener security team has representatives interested in this.
Love the idea AppSec Phoenix would love to attend and contribute
Looking forward to joining the conversation today with @joshbressers @kurtseifried
January 18, 10am Pacific Time
https://cloudsecurityalliance.org/research/working-groups/global-security-database/
Meeting details are towards the bottom of the page.
Adam from the Semgrep team here, very interested in this! I'll attend!
Should this be closed now that the event has passed?
@szh Good question. Is there interest in doing another GSVS, and if so, should that be coordinated here or in another issue/forum?
This event is done. atm there is not current discussion going forward for doing the next iteration yet.
Description: Propose a two day virtual/hybrid/in-person summit to hack at the backlog and disconnect of CVEs, misconfigurations, software/hardware/cloud/services. Recommended minimums for representation: MITRE, GitHub, GitLab, OpenSSF, CSA, Security TAG, Linux Foundation, CISA. Requested attendee potentials: Security Researchers and Defenders
Impact: There is a very large backlog of CVEs and some CVEs are lacking actionable information. CVEs also do not encompass the vast amount of vulnerabilities and issues that exist in todays modern technical environments where hardware, software, and services are invisible to end users. SBoM is doing some good in this area by providing transparency but we still have lots of gaps and room for improvement.
Scope: Bring together recommended parties to meet and discuss the existing problem space, explore both researcher and defender workflow to identify existing gaps and improvements/optimizations, ascertain useful information in remediating vulnerabilities and applying fixes, and begin exploration of a global security database that ingests various non-pay sources of vuln information.
CC: @achetal01 @lumjjb @johnyeoh
TO DO
[X] Security TAG Leadership Representative: @lumjjb
[X] Project leader(s): @lumjjb , @TheFoxAtWork
[ ] Project Members:
[ ] Fill in addition TODO items here so the project team and community can see progress!
[x] Project Schedule: see Summit site
[ ] Slack Channel (as needed)
[x] Meeting Time & Day:
[x] Meeting Notes (link)
[x] Meeting Details (zoom or hangouts link)
[ ] Retrospective