[Openstack-security] Security Analysis for new Blueprints
David Chadwick
d.w.chadwick at kent.ac.uk
Thu Mar 27 17:32:54 UTC 2014
All Internet RFCs have to have a Security Considerations section, even
if they say nothing. If we could get something similar added to
blueprints and code changes by all the different OpenStack projects,
this would be a good first step. Even if initially their content was
only added on a best efforts basis by the author, and there was not any
requirement for them to be checked by the OSSG, nevertheless it would
establish a security conscious mode of working by authors, and would
make it easier to introduce checking and sign off by the OSSG at a later
stage.
This could be a topic for discussion in Atlanta.
regards
David
On 27/03/2014 15:21, Bryan D. Payne wrote:
> I would love to get to the point where we could do the following:
>
> 1) flag a blueprint or code change as having a security impact
> 2) have gerrit gate on accepting that artifact until a designated
> security person performs the review and provides a +1
>
> (1) is pretty straightforward to setup. (2) is harder. Not so much
> because of gerrit (although I don't know how possible that would be with
> gerrit), but because we would really need a set of core security
> reviewers for each project taking this approach. I think this is
> achievable, but the timeline is less clear to me. Part of it will
> depend on the project's willingness to go down this path, of course. If
> Nova wants to explore this, I'd be happy to have that discussion. If
> not, doing (1) still does provide some value as it allows people to at
> least stay aware of the security relevant changes in the system (of
> course with the restriction that these are largely self-reported).
>
> -bryan
>
>
>
> On Thu, Mar 27, 2014 at 8:09 AM, David Chadwick <d.w.chadwick at kent.ac.uk
> <mailto:d.w.chadwick at kent.ac.uk>> wrote:
>
> Hi Cristian
>
> I think it is a very good idea to have a security impact section as part
> of all Blueprints, but I am not sure how this procedure would work in
> practise, since anyone can write a Blueprint, and there is no vetting of
> them before they are published. I think some revised procedures would
> need to be agreed as a minimum before this could become a reality
>
> regards
>
> David
>
> On 27/03/2014 13:26, Fiorentino, Cristian wrote:
> > Dear All,
> >
> >
> >
> > Probably you are already aware that Nova is moving towards reviewing
> > Blueprints using Gerrit, and proposing a new template with several
> > sections as you can find here:
> >
> > https://github.com/openstack/nova-specs/blob/master/specs/template.rst
> >
> >
> >
> > On the other side, currently there is the effort being held by
> OSSG for
> > performing a threat model analysis for OpenStack, which is great in my
> > opinion and would lead to a baseline threat model analysis.
> >
> > But new features/Blueprints are being integrated all the time, and
> with
> > them new potential Security risks at design time.
> >
> > (Please let me know if I am wrong, but I am not aware of required
> > Security analysis for new Blueprints besides what the reviewers may
> > identify during the approval process.)
> >
> >
> >
> > That said, I was wondering if it would be worth to push the
> inclusion of
> > a “Security impact” section as part of the Blueprints definitions; and
> > probably to start with the new Nova template approach.
> >
> > I am not talking about requesting a detailed threat model analysis at
> > the Blueprint definition stage, but to document at least high level
> > Security implications that the Blueprint owner could identify for
> > leveraging Security analysis/reviews in earlier stages of
> > features/components definitions.
> >
> >
> >
> > Any thoughts appreciated.
> >
> >
> >
> > Thanks and Regards.
> >
> > Cristian.
> >
> >
> >
> > _______________________________________________
> > Openstack-security mailing list
> > Openstack-security at lists.openstack.org
> <mailto:Openstack-security at lists.openstack.org>
> > http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-security
> >
>
> _______________________________________________
> Openstack-security mailing list
> Openstack-security at lists.openstack.org
> <mailto:Openstack-security at lists.openstack.org>
> http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-security
>
>
More information about the Openstack-security
mailing list