All Projects → cncf → Sig Security

cncf / Sig Security

Licence: apache-2.0
🔐CNCF Special Interest Group on Security -- secure access, policy control, privacy, auditing, explainability and more!

Projects that are alternatives of or similar to Sig Security

opentelemetry-js-api
OpenTelemetry Javascript API
Stars: ✭ 75 (-88.67%)
Mutual labels:  cncf, cloud-native
landscape
🌄The Cloud Native Interactive Landscape filters and sorts hundreds of projects and products, and shows details including GitHub stars, funding or market cap, first and last commits, contributor counts, headquarters location, and recent tweets.
Stars: ✭ 8,067 (+1118.58%)
Mutual labels:  cncf, cloud-native
gryllidae
Opinionated CNCF-based, Docker Compose setup for everything needed to develop a 12factor app
Stars: ✭ 18 (-97.28%)
Mutual labels:  cncf, cloud-native
Nexclipper
Metrics Pipeline for interoperability and Enterprise Prometheus
Stars: ✭ 533 (-19.49%)
Mutual labels:  cloud-native, cncf
Kubeedge
Kubernetes Native Edge Computing Framework (project under CNCF)
Stars: ✭ 4,582 (+592.15%)
Mutual labels:  cloud-native, cncf
inclavare-containers
A novel container runtime, aka confidential container, for cloud-native confidential computing and enclave runtime ecosystem.
Stars: ✭ 510 (-22.96%)
Mutual labels:  cncf, cloud-native
siddhi-operator
Operator allows you to run stream processing logic directly on a Kubernetes cluster
Stars: ✭ 16 (-97.58%)
Mutual labels:  cncf, cloud-native
meshery-adapter-library
Library of common functionality for Meshery Adapters
Stars: ✭ 20 (-96.98%)
Mutual labels:  cncf, cloud-native
Falco
Cloud Native Runtime Security
Stars: ✭ 4,340 (+555.59%)
Mutual labels:  cncf, cloud-native
Ckss Certified Kubernetes Security Specialist
This repository is a collection of resources to prepare for the Certified Kubernetes Security Specialist (CKSS) exam.
Stars: ✭ 333 (-49.7%)
Mutual labels:  cloud-native, cncf
service-mesh-performance
Standardizing Service Mesh Value Measurement
Stars: ✭ 234 (-64.65%)
Mutual labels:  cncf, cloud-native
Dragonfly
Dragonfly is an intelligent P2P based image and file distribution system.
Stars: ✭ 5,720 (+764.05%)
Mutual labels:  cloud-native, cncf
meshery
Meshery, the cloud native manager
Stars: ✭ 1,587 (+139.73%)
Mutual labels:  cncf, cloud-native
meshery.io
Site for Meshery, the cloud native management plane
Stars: ✭ 135 (-79.61%)
Mutual labels:  cncf, cloud-native
glossary
The CNCF Cloud Native Glossary Project aims to define cloud native concepts in clear and simple language, making them accessible to anyone — whether they have a technical background or not (https://glossary.cncf.io).
Stars: ✭ 442 (-33.23%)
Mutual labels:  cncf, cloud-native
pixie
Instant Kubernetes-Native Application Observability
Stars: ✭ 3,238 (+389.12%)
Mutual labels:  cncf, cloud-native
kubernetes-cncf-pune
This is a repo to maintain artefacts and meetup logistics for Kubernetes & Cloud Native Computing Pune Meetup (https://www.meetup.com/Kubernetes-Pune/)
Stars: ✭ 11 (-98.34%)
Mutual labels:  cncf, cloud-native
meetups
Repository to gather all presentations from all Nordic Cloud Native meetups
Stars: ✭ 43 (-93.5%)
Mutual labels:  cncf, cloud-native
Chaos Mesh
A Chaos Engineering Platform for Kubernetes.
Stars: ✭ 4,265 (+544.26%)
Mutual labels:  cloud-native, cncf
Networkservicemesh
The Hybrid/Multi-cloud IP Service Mesh
Stars: ✭ 456 (-31.12%)
Mutual labels:  cloud-native, cncf

CNCF Special Interest Group for Security (SIG-Security)

Quick links

Objective

SIG-Security facilitates collaboration to discover and produce resources that enable secure access, policy control, and safety for operators, administrators, developers, and end-users across the cloud native ecosystem.

Background

“Cloud Native” is open source cloud computing for applications — a complete trusted toolkit for modern architectures. There are multiple projects which address key parts of the problem of providing access controls and addressing safety concerns. Each of these adds value, yet for these technical solutions to be capable of working well together and manageable to operate they will need a minimal shared context of what defines a secure system architecture.

Vision

There is a future where operators, administrators and developers feel confident creating new cloud native applications. They use cloud technologies with clear understanding of risks and the ability to validate that their security policy decisions are reflected in deployed software.

We envision that there could exist an ecosystem of tools that can simplify the experience of cloud native operators, administrators and developers, including:

  1. System security architecture that understands and accommodates the ever growing heterogeneity of systems and provides a framework to protect resources and data while servicing their users.
  2. Common vocabulary and open source libraries that make it easy for developers to create and deploy apps that meet system security requirements.
  3. Common libraries and protocols that enable people to reason about the security of the system, such as auditing and explainability features.

Governance

SIG-Security charter outlines the scope of our group activities, as part of our governance process which details how we work.

Communications

Anyone is welcome to join our open discussions of SIG-Security projects and share news related to the group's mission and charter. Much of the work of the group happens outside of SIG-Security meetings and we encourage project teams to share progress updates or post questions in these channels:

Meeting times

Group meeting times are listed below:

  • US: Weekly on Wednesdays at 10:00am GMT-7 (see your timezone here)
  • APAC: Bi-weekly on Tuesdays at 1:00pm GMT+11 (see your timezone here)

See the CNCF Calendar for calendar invites.

Meeting minutes and agenda

Zoom Details

Meeting Link: zoom.us/my/cncfsigsecurity (Passcode: 77777)

One tap mobile:

  • +16465588656,,7375677271# US (New York)
  • +16699006833,,7375677271# US (San Jose)

Dial by your location:

  • +1 646 558 8656 US (New York)
  • +1 669 900 6833 US (San Jose)
  • 877 369 0926 US Toll-free
  • 855 880 1246 US Toll-free
  • 1800 945 157 Australia Toll-free
  • Find your local number

Meeting ID: 737 567 7271

Gatherings

Please let us know if you are going and if you are interested in attending (or helping to organize!) a gathering. Create a github issue for an event and add to list below:

  • KubeCon + CloudNativeCon, EU - May 4 - 7, 2021 - [issue#454]

Past events

New members

If you are new to the group, check out our New Members Page and submit a PR to add yourself to the members list.

Related groups

History

Members

SIG Chairs

  • Emily Fox (@TheFoxAtWork), National Security Agency, U.S.A. [Chair - term: 9/28/2020 - 9/27/2022]
  • Sarah Allen (@ultrasaurus), [Chair - term: 6/3/2019 - 6/3/2021]
  • Jeyappragash JJ (@pragashj), Tetrate.io [Chair - term: 6/3/2019 - 6/3/2021]

Tech Leads

SIG Chairs Emeritus

  • Dan Shaw (@dshaw), PayPal [Chair - term: 6/3/2019 - 9/3/2020]

On-going projects

Policy team

Policy is an essential component of a secure system.

Bi-weekly meetings at 3:00pm PT focus on policy concerns and initiatives.

Co-leads

  • Howard Huang (@hannibalhuang), Huawei [Kubernetes Policy WG co-chair]
  • Erica von Buelow (@ericavonb), Red Hat [Kubernetes Policy WG]

Co-chair representative: @pragashj

Security assessments

Security assessments are a collaborative process for the benefit of cloud native projects and prospective users by creating a consistent overview of the project and its risk profile.

Facilitator: Justin Cappos (@JustinCappos), New York University

Co-chair representative: @ultrasaurus

SIG members

Membership governance can be viewed here. If you are new, check out the New Members Page.

Click to view list

JOIN OUR MEETINGS REGULARLY, THEN ADD YOURSELF VIA PULL REQUEST

Additional information

CNCF sig assessments

As part of the CNCF project proposal process, projects should create a new assessment issue with a self-assessment.

Past events and meetings

For more details on past events and meetings, please see our past events page

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].