cncf / tag-security

🔐CNCF Security Technical Advisory Group -- secure access, policy control, privacy, auditing, explainability and more!
https://tag-security.cncf.io
Other
2k stars 502 forks source link

[Proposal] Global Security Vulnerability Summit #835

Closed TheFoxAtWork closed 1 year ago

TheFoxAtWork commented 2 years ago

Description: Propose a two day virtual/hybrid/in-person summit to hack at the backlog and disconnect of CVEs, misconfigurations, software/hardware/cloud/services. Recommended minimums for representation: MITRE, GitHub, GitLab, OpenSSF, CSA, Security TAG, Linux Foundation, CISA. Requested attendee potentials: Security Researchers and Defenders

Impact: There is a very large backlog of CVEs and some CVEs are lacking actionable information. CVEs also do not encompass the vast amount of vulnerabilities and issues that exist in todays modern technical environments where hardware, software, and services are invisible to end users. SBoM is doing some good in this area by providing transparency but we still have lots of gaps and room for improvement.

Scope: Bring together recommended parties to meet and discuss the existing problem space, explore both researcher and defender workflow to identify existing gaps and improvements/optimizations, ascertain useful information in remediating vulnerabilities and applying fixes, and begin exploration of a global security database that ingests various non-pay sources of vuln information.

CC: @achetal01 @lumjjb @johnyeoh

TO DO

mlieberman85 commented 2 years ago

I think folks from my end would like to attend. This is a big problem we're running into particularly in two spots:

  1. How can we parse vulnerability information in an automated way to trigger automation or provide easier to understand insight, e.g. this vuln is interactive/non-interactive, uses this attack vector, etc.
  2. How do we apply this to the supply chain such that we can build a graph of understanding. For example, a lot of things use log4j but as a dependency and it can often be embedded really deep. Is there a good way in making this vuln information available such that someone can easily associate log4j with the record of its vulnerability. Not to get too deep, but it's an issue because depending on where you get log4j from the hash of it could be different.

Some prior art that has proven useful to us in our own work on the topic: https://osv.dev/ -- Google open source project around a database of vulnerabilities in OpenSSF vulnerability format.

marco-lancini commented 2 years ago

I'm going to circulate this within Gitlab to identify the most relevant people which should attend

naveensrinivasan commented 2 years ago

@oliverchang @inferno-chromium FYI...

inferno-chromium commented 2 years ago

Would love to attend from the Google Open Source Security team side (and OSV project in general, + @oliverchang)

idawson-gl commented 2 years ago

Isaac from the GitLab Vulnerability Research Team here (handling CNA work), we would definitely be interested in attending this.

kurtseifried commented 2 years ago

CSA checking in, we'll definitely be attending.

A good example of this problem and the kind of data we need is https://github.com/cloudsecurityalliance/gsd-database/blob/main/2021/1002xxx/GSD-2021-1002352.json aka cve-2021-44228 The GSD (GlobalSecurityDatabase) is our attempt to solve part of this problem (the security identifier/discoverability/publishing issue). As you can see from he GSD entry Twitter is by far the best source for real time vuln data now (detections, fixes, workarounds, etc. Tons of community work on this CVE is flying around, but none of it is mentioned in the CVE, and likely never will be). I'd like to have more structured data around workarounds/detection/exploitation (especially of services).

I think one major aspect is the ability to update information quickly, and update it in the format(s) needed by various organizations. To which GSD is supporting namespacing and multiple formats within our data (you want to use OSV? CVE? CSAF? custom JSON? XML? Sure. that's fine by us.).

hectorj2f commented 2 years ago

As part of the VMware Secure Supply Chain Team, I'd love to attend and I am sure some of my teammates would join too.

Goals:

achetal01 commented 2 years ago

I will like to attend.

TheFoxAtWork commented 2 years ago

Wanted to provide everyone with a quick update. We will be pulling together a group to work thru logistics and planning around the middle of January to get this going. If there are specific goals and asks you want to get out of this please be sure you have them in your comment so they can be discussed as part of the planning for this event.

coderpatros commented 2 years ago

I'm interested in attending.

naveensrinivasan commented 2 years ago

I would be interested in attending.

ycaihua commented 2 years ago

i am interested in attending the great work! thank you

cory-at-confluent commented 2 years ago

A great idea - we would be interested in attending.

franksec42 commented 2 years ago

interested in this, great idea, also actionable and standardize way for vuln db and exploitation

maorkuriel commented 2 years ago

I would be interested in attending.

xcorail commented 2 years ago

Hey, great idea. The GitHub Security Lab is definitely interested! We are in charge of

And our Incident Response team is also interested.

I will also circulate this within OpenSSF

TheFoxAtWork commented 2 years ago

Reference: https://github.com/oasis-tcs/csaf/blob/master/csaf_2.0/prose/csaf-v2-editor-draft.md per @fkautz as possible discussion point during this.

fkautz commented 2 years ago

@TheFoxAtWork: I'm happy to help here; just let me know what you need from me.

fkautz commented 2 years ago

Since not everyone may be aware of what VEX is, I wrote about "Profile 5: VEX" at https://zt.dev/posts/what-is-vex/

There are also some efforts at NTIA and CISA on SBOMs, which include VEX in scope:

I am happy to discuss or facilitate these topics or how SBOMs and VEX integrate them into a Zero Trust environment.

JasonKeirstead commented 2 years ago

I would like to be kept in the loop on this / would like to attend.

bulutmf commented 2 years ago

Hi, Fatih, from IBM T.J. Watson Research Center. I am interested in attending this.

dengy2016 commented 2 years ago

Hi, this is Yu from IBM T.J. Watson Research Center. I am interested in attending this.

ragashreeshekar commented 2 years ago

Sounds very interesting. I am interested to attend this event.

adammontville commented 2 years ago

I am also interested in this.

nadgowdas commented 2 years ago

I am interested in this as well

zmanion commented 2 years ago

Interested and will attend.

TheFoxAtWork commented 2 years ago

Another post about this problem space: https://blog.wiz.io/security-industry-call-to-action-we-need-a-cloud-vulnerability-database/

TheFoxAtWork commented 2 years ago

Folks - wanted to provide a quick update here. Over the next two weeks we are giving everyone time to catch up after the holiday break. After which Jan 24th @lumjjb is going to begin running point. Some initial first steps already discussed:

  1. Identify additional co-chairs for this project
  2. Identify program committee members (some of these are already selected due to their area of responsibility for the topic at hand)
  3. Coordinate an official event sponsor to assist in the logistics for the virtual event.
  4. Plan solicitation of proposals, discussion, panels, etc.
  5. Define non-conflicting dates for CFP and event (cannot be the week before, of, or after KCCN EU)
sparrell commented 2 years ago

I am interested in attending. What is the proper way to make sure I don't miss it? Will following this issue be sufficient?

sparrell commented 2 years ago

If you are interested in this #835 summit, then you may also be interested in CISA #SBOM Cloud and online applications work-stream: https://www.linkedin.com/posts/allanafriedman_sbom-activity-6886338388639653888-TAXw

captainarcher commented 2 years ago

The VMware Tanzu Trust team has representatives interested in this

KateCatlin commented 2 years ago

I see @xcorail from our team already commented here, but I'll chime in that I'm also interested in attending ✋. I'm the PM for Security Advisories at GitHub.

joshbressers commented 2 years ago

I would like to point out the Cloud Security Alliance has a kickoff meeting for their GSD vulnerability project next week https://twitter.com/cloudsa/status/1481296477188145153

I suspect anyone watching this issue will have an interest in what the CSA is doing

pyotam commented 2 years ago

Rezilion Would love to contribute to this effort. I would love to attend.

ThormaehlenFred commented 2 years ago

Gardener security team has representatives interested in this.

franksec42 commented 2 years ago

Love the idea AppSec Phoenix would love to attend and contribute

johnyeoh commented 2 years ago

Looking forward to joining the conversation today with @joshbressers @kurtseifried

January 18, 10am Pacific Time

https://cloudsecurityalliance.org/research/working-groups/global-security-database/

Meeting details are towards the bottom of the page.

TheFoxAtWork commented 2 years ago

https://events.linuxfoundation.org/open-source-summit-north-america/about/global-security-vulnerability-summit/

adamberman commented 2 years ago

Adam from the Semgrep team here, very interested in this! I'll attend!

szh commented 1 year ago

Should this be closed now that the event has passed?

joshbuker commented 1 year ago

@szh Good question. Is there interest in doing another GSVS, and if so, should that be coordinated here or in another issue/forum?

lumjjb commented 1 year ago

This event is done. atm there is not current discussion going forward for doing the next iteration yet.