tag-security
🔐CNCF Security Technical Advisory Group -- secure access, policy control, privacy, auditing, explainability and more!
Top Related Projects
Kubernetes community content
Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
Cloud Native Runtime Security
Open Policy Agent (OPA) is an open source, general-purpose policy engine.
Snyk CLI scans and monitors your projects for security vulnerabilities.
A vulnerability scanner for container images and filesystems
Quick Overview
The CNCF TAG-Security (Technical Advisory Group - Security) repository is a collaborative space for cloud-native security initiatives. It focuses on developing best practices, guidelines, and resources for securing cloud-native applications and infrastructure within the Cloud Native Computing Foundation (CNCF) ecosystem.
Pros
- Provides comprehensive security guidance for cloud-native technologies
- Fosters collaboration among industry experts and practitioners
- Offers valuable resources and documentation for implementing security best practices
- Aligns with CNCF projects and ecosystem, ensuring relevance and applicability
Cons
- May require frequent updates to keep pace with rapidly evolving cloud-native technologies
- Could be overwhelming for newcomers due to the breadth of information and topics covered
- Might not address specific implementation details for all cloud platforms or environments
- Relies on community contributions, which can lead to varying levels of depth across different topics
Competitor Comparisons
Kubernetes community content
Pros of community
- Larger and more active community with frequent updates and contributions
- Broader scope covering all aspects of Kubernetes, not just security
- More comprehensive documentation and guides for contributors
Cons of community
- Can be overwhelming for newcomers due to its size and complexity
- Less focused on security-specific topics and discussions
- May have slower response times for security-related issues due to broader focus
Code comparison
community:
sig-list:
- name: sig-architecture
dir: sig-architecture
- name: sig-auth
dir: sig-auth
- name: sig-autoscaling
dir: sig-autoscaling
tag-security:
working-groups:
- name: Policy
- name: Supply Chain Security
- name: Security Assessments
- name: Security Tooling
- name: Secure Software Factory
The community repo uses a structure focused on Special Interest Groups (SIGs), while tag-security organizes its content around specific security-related working groups. This reflects the broader scope of community compared to the more focused approach of tag-security.
Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
Pros of Trivy
- Comprehensive vulnerability scanning for containers, filesystems, and Git repositories
- Fast and easy-to-use command-line interface
- Regularly updated vulnerability database
Cons of Trivy
- Focused primarily on vulnerability scanning, lacking broader security governance features
- May require additional tools for complete cloud-native security coverage
Code Comparison
Trivy:
trivy image alpine:3.10
trivy fs /path/to/project
trivy repo https://github.com/knqyf263/trivy-ci-test
TAG-Security:
# No direct code comparison available
# TAG-Security focuses on security best practices and guidelines
# rather than providing a specific tool or codebase
Key Differences
- Trivy is a specific security scanning tool, while TAG-Security is a CNCF working group focused on cloud-native security standards and best practices
- Trivy provides immediate, actionable results for vulnerability scanning, whereas TAG-Security offers broader guidance and recommendations for secure cloud-native implementations
- Trivy is maintained by Aqua Security, while TAG-Security is a collaborative effort within the CNCF community
Use Cases
- Use Trivy for quick and efficient vulnerability scanning of containers, filesystems, and Git repositories
- Refer to TAG-Security for comprehensive cloud-native security guidelines, best practices, and industry standards
Cloud Native Runtime Security
Pros of Falco
- Focused runtime security tool for cloud-native environments
- Provides real-time threat detection and alerting
- Extensive rule set for detecting various security threats
Cons of Falco
- Narrower scope compared to TAG-Security's broader security guidelines
- Requires more setup and configuration for specific environments
- May have a steeper learning curve for non-security specialists
Code Comparison
TAG-Security (policy example):
apiVersion: constraints.gatekeeper.sh/v1beta1
kind: K8sRequiredLabels
metadata:
name: require-team-label
spec:
match:
kinds:
- apiGroups: [""]
kinds: ["Namespace"]
Falco (rule example):
- rule: Detect Outbound Connection to C2 Servers
desc: Detect outbound connection to known C2 servers
condition: outbound and dest.ip in (known_c2_servers)
output: "Outbound connection to C2 server detected"
priority: CRITICAL
While TAG-Security focuses on broader security policies and guidelines, Falco provides specific runtime security rules and detection capabilities. TAG-Security's policies are often implemented at the cluster level, while Falco operates at the system call level for real-time threat detection.
Open Policy Agent (OPA) is an open source, general-purpose policy engine.
Pros of OPA
- Mature, production-ready policy engine with wide adoption
- Flexible, declarative policy language (Rego) for expressing complex rules
- Extensive integrations with various cloud-native technologies
Cons of OPA
- Steeper learning curve for Rego language
- Focused solely on policy enforcement, not broader security guidance
- Requires additional tooling for policy management at scale
Code Comparison
TAG-Security (example security checklist item):
- name: Use secure protocols
description: Ensure that only secure protocols are used for communication
mitigation:
- Disable insecure protocols (e.g., HTTP, FTP)
- Implement TLS for all network communications
OPA (example policy in Rego):
package httpapi
deny[msg] {
input.protocol = "http"
msg := "HTTP protocol is not allowed, use HTTPS instead"
}
While TAG-Security provides high-level security guidance and checklists, OPA offers a concrete policy implementation mechanism. TAG-Security focuses on broader security practices, while OPA specializes in enforcing specific policies across various systems and applications.
Snyk CLI scans and monitors your projects for security vulnerabilities.
Pros of Snyk CLI
- Provides a comprehensive command-line interface for vulnerability scanning and management
- Offers integration with various CI/CD pipelines and development workflows
- Supports multiple programming languages and package managers
Cons of Snyk CLI
- Requires a Snyk account and API token for full functionality
- May have limitations on free tier usage compared to open-source alternatives
- Focuses primarily on dependency vulnerabilities rather than broader security concerns
Code Comparison
TAG-Security (example of a security policy):
apiVersion: security.policy.v1beta1
kind: SecurityPolicy
metadata:
name: example-policy
spec:
rules:
- name: restrict-privileged-containers
match:
resources:
kinds:
- Pod
Snyk CLI (example of running a vulnerability scan):
snyk test --all-projects
snyk monitor --all-projects
While TAG-Security focuses on defining security policies for Kubernetes environments, Snyk CLI provides direct vulnerability scanning and monitoring capabilities for various projects and dependencies.
A vulnerability scanner for container images and filesystems
Pros of Grype
- Focused specifically on vulnerability scanning for container images and filesystems
- Provides a command-line interface for easy integration into CI/CD pipelines
- Regularly updated vulnerability database for timely security checks
Cons of Grype
- Limited scope compared to TAG-Security's broader security focus
- Lacks the extensive community backing and resources of a CNCF project
- May not cover all aspects of cloud-native security that TAG-Security addresses
Code Comparison
TAG-Security (example policy):
apiVersion: constraints.gatekeeper.sh/v1beta1
kind: K8sRequiredLabels
metadata:
name: require-team-label
spec:
match:
kinds:
- apiGroups: [""]
kinds: ["Namespace"]
parameters:
labels: ["team"]
Grype (example usage):
grype alpine:latest
grype dir:./path/to/project
grype sbom:./path/to/sbom.json
While TAG-Security focuses on broader security policies and best practices, Grype provides a specific tool for vulnerability scanning. TAG-Security's code often involves policy definitions, while Grype's usage is more command-line oriented for direct scanning operations.
Convert designs to code with AI
Introducing Visual Copilot: A new AI model to turn Figma designs to high quality code using your components.
Try Visual CopilotREADME
Security Technical Advisory Group
Quick links
About Us
The CNCF Security Technical Advisory Group facilitates collaboration to exchange and produce knowledge and resources for building security in the cloud native ecosystem.
Cloud Native involves building, deploying, and operating modern applications in cloud computing environments, typically using open source. This complex ecosystem presents a technology risk landscape that demands rethinking application and information security through the lens of developer experience.
We aim to significantly reduce the probability and impact of attacks, breaches, and compromises. By empowering developers and operators to understand and manage the security posture of their systems, we strive to fulfill the promise of enhanced productivity and operational efficiency.
Key Focus Areas
- System Security Architectures: Frameworks to protect resources and data.
- Common Lexicon, Templates & Libraries: Tools for developers to create secure apps.
- Heuristics and Models: Approaches for reasoning about system security.
Publications
Below is a list of publications by TAG Security. For a comprehensive collection of our works in various formats, please visit the publications directory.
Publication | Date |
---|---|
Formal Verification for Policy Configurations | August, 2019 |
Catalog of Supply Chain Compromises | November 2019 - Present |
Software Supply Chain Best Practices | May, 2021 |
Evaluating your Supply Chain Security | May, 2021 |
Cloud Native Security Lexicon | August, 2021 |
Cloud Native Security Whitepaper | May, 2022 |
Cloud Native Security Controls Catalog | May, 2022 |
Handling Build-time Dependency Vulnerabilities | June, 2022 |
Secure Software Factory: A Reference Architecture to Securing the Software Supply Chain | May, 2022 |
Secure Defaults | February, 2022 |
Open and Secure - A Manual for Practicing Threat Modeling to Assess and Fortify Open Source Security | November, 2023 |
Governance
Refer to the Security TAG charter for our governance process.
Communications
Join our open discussions and share news:
- Email list
- CNCF Slack #tag-security channel (Refer to the contributing guidelines for posting and participation details.)
Meeting Information
- Americas: Weekly on Wednesdays at 10 am (UTC-7). Zoom link, Meeting ID: 923 4036 9657.
- EMEA: Bi-weekly on Wednesdays at 1 pm UTC+0 (adjusts for daylight saving). Zoom link, Meeting ID: 983 4873 8138.
Check your local timezone here. Meetings are listed on the CNCF calendar and the TAG Security Calendar.
To add a topic to the agenda, review our process.
New members
If you are new to the group, we encourage you to check out our contributing guidelines.
Related groups
Explore groups affiliated with or relevant to Security TAG here
Members
Leadership
Details about the TAG Chairs, Tech Leads, and TOC Liaisons can be found on the CNCF Technical Advisory Groups (TAGs) information page
TAG Emeritus Leaders
Thank you to all the tag emeritus leaders for your contributions to the success of this community.
Working Groups
The TAG's working groups focus on specific areas and organize most community activities, including weekly meetings. These groups facilitate discussions, engagement, and publications with key stakeholders, operating differently based on their needs. Each group, led by a responsible leader, reaches consensus on issues and manages logistics. All materials, such as reports, white papers, documents, and reference architectures, are in the repository's /community directory.
Project | Leads |
---|---|
Automated Governance | Matthew Flannery, Brandt Keller |
Catalog of Supply Chain Compromises | Santiago Arias Torres |
Compliance | Anca Sailer, Robert Ficcaglia |
Controls | Jon Zeolla |
Security Reviews | Justin Cappos, Eddie Knight |
Software Supply Chain | Marina Moore, Michael Liebermann, John Kjell |
Additional information
CNCF Security TAG reviews
For CNCF project proposal process create a new security review issue with a self-assessment.
Top Related Projects
Kubernetes community content
Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
Cloud Native Runtime Security
Open Policy Agent (OPA) is an open source, general-purpose policy engine.
Snyk CLI scans and monitors your projects for security vulnerabilities.
A vulnerability scanner for container images and filesystems
Convert designs to code with AI
Introducing Visual Copilot: A new AI model to turn Figma designs to high quality code using your components.
Try Visual Copilot