mojaloop / design-authority-project

This is the Issue and Decision Log for tracking mojaloop and related Designs
1 stars 2 forks source link

DA Needs briefing about Mojaloop security review #107

Open tdaly61 opened 9 months ago

tdaly61 commented 9 months ago

Request Summary:

It seems to be in the scope and charter of the DA to be kept appraised of any significant changes or projects that concern security of the Mojaloop code or environment. So the DA should request a briefing on the current security project being undertaken by Cylab. This seems to be very much consistent with Sections 2.1b and 2.2E of the DA Charter.

Request Details:

Some discussion from slack is inserted here for reference:

  1. from James: regarding CVE's etc : https://vuls.cert.org/confluence/display/CVD
  2. from James: in this case, MLF believes the core team are the "relevant stakeholders" who are given the results and coordinate fixes, release and sharing of results after the fact.
  3. From James: note that there may be other "relevant stakeholders"...e.g. anyone using Mojaloop in situations where vulnerabilities may be significant. We are discussing this internally (input welcome), but my general feeling so far is that means folks using it in PoCs and/or production)
  4. from Tom: no problems with the vulnerability disclosures from this being kept closer to chest and again very glad this is happening and happening by someone like Cylab. All that is good and encouraging as you and Sam are aware and as anyone who listened to my cloud native deployment work-stream presentation at the last convening will know security is something I am urging both the foundation and the community to focus a LOT more on. So far so good. Let me leave this thread here and raise this more generally as a DA ticket as , now that I know we (collectively) are starting to pay this area more attention I think that it is something that the DA should also be contributing to and I will see if others at the DA feel similarly. Cheers James.
  5. from Tom: looking at the doc you linked above 2.1 Reduce harm bullet #1: "Publishing vulnerability information. Providing high-quality, timely, targeted, automated dissemination of vulnerability information enables defenders to make informed decisions and take action quickly." 2.3 Avoid Surprise : As with most situations in which multiple parties are engaged in a potentially stressful and contentious negotiation, surprise tends to increase the risk of a negative outcome. The importance of clearly communicating expectations across all parties involved in a CVD process cannot be overemphasized. I still have no issue with keeping the new discovered actual vulnerabilities close but the doc you linked seems to support a much more open collaborative approach for example look at section #4.2. Anyhow I will desist here and move to DA.

(James please feel free to add more if I have lost any context from the slack conversation)

Artifacts:

Dependencies:

Accountability:

Decision(s):

- **Approved By:** ### Details - [ ] Actual decision made as a result of discussion ## **Follow-up**: - [ ] Actions to implement the decisions