Convert Figma logo to code with AI

cncf logotag-security

🔐CNCF Security Technical Advisory Group -- secure access, policy control, privacy, auditing, explainability and more!

2,024
505
2,024
41

Top Related Projects

11,906

Kubernetes community content

22,801

Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more

7,226

Cloud Native Runtime Security

9,505

Open Policy Agent (OPA) is an open source, general-purpose policy engine.

4,889

Snyk CLI scans and monitors your projects for security vulnerabilities.

8,441

A vulnerability scanner for container images and filesystems

Quick Overview

The CNCF TAG-Security (Technical Advisory Group - Security) repository is a collaborative space for cloud-native security initiatives. It focuses on developing best practices, guidelines, and resources for securing cloud-native applications and infrastructure within the Cloud Native Computing Foundation (CNCF) ecosystem.

Pros

  • Provides comprehensive security guidance for cloud-native technologies
  • Fosters collaboration among industry experts and practitioners
  • Offers valuable resources and documentation for implementing security best practices
  • Aligns with CNCF projects and ecosystem, ensuring relevance and applicability

Cons

  • May require frequent updates to keep pace with rapidly evolving cloud-native technologies
  • Could be overwhelming for newcomers due to the breadth of information and topics covered
  • Might not address specific implementation details for all cloud platforms or environments
  • Relies on community contributions, which can lead to varying levels of depth across different topics

Competitor Comparisons

11,906

Kubernetes community content

Pros of community

  • Larger and more active community with frequent updates and contributions
  • Broader scope covering all aspects of Kubernetes, not just security
  • More comprehensive documentation and guides for contributors

Cons of community

  • Can be overwhelming for newcomers due to its size and complexity
  • Less focused on security-specific topics and discussions
  • May have slower response times for security-related issues due to broader focus

Code comparison

community:

sig-list:
  - name: sig-architecture
    dir: sig-architecture
  - name: sig-auth
    dir: sig-auth
  - name: sig-autoscaling
    dir: sig-autoscaling

tag-security:

working-groups:
  - name: Policy
  - name: Supply Chain Security
  - name: Security Assessments
  - name: Security Tooling
  - name: Secure Software Factory

The community repo uses a structure focused on Special Interest Groups (SIGs), while tag-security organizes its content around specific security-related working groups. This reflects the broader scope of community compared to the more focused approach of tag-security.

22,801

Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more

Pros of Trivy

  • Comprehensive vulnerability scanning for containers, filesystems, and Git repositories
  • Fast and easy-to-use command-line interface
  • Regularly updated vulnerability database

Cons of Trivy

  • Focused primarily on vulnerability scanning, lacking broader security governance features
  • May require additional tools for complete cloud-native security coverage

Code Comparison

Trivy:

trivy image alpine:3.10
trivy fs /path/to/project
trivy repo https://github.com/knqyf263/trivy-ci-test

TAG-Security:

# No direct code comparison available
# TAG-Security focuses on security best practices and guidelines
# rather than providing a specific tool or codebase

Key Differences

  • Trivy is a specific security scanning tool, while TAG-Security is a CNCF working group focused on cloud-native security standards and best practices
  • Trivy provides immediate, actionable results for vulnerability scanning, whereas TAG-Security offers broader guidance and recommendations for secure cloud-native implementations
  • Trivy is maintained by Aqua Security, while TAG-Security is a collaborative effort within the CNCF community

Use Cases

  • Use Trivy for quick and efficient vulnerability scanning of containers, filesystems, and Git repositories
  • Refer to TAG-Security for comprehensive cloud-native security guidelines, best practices, and industry standards
7,226

Cloud Native Runtime Security

Pros of Falco

  • Focused runtime security tool for cloud-native environments
  • Provides real-time threat detection and alerting
  • Extensive rule set for detecting various security threats

Cons of Falco

  • Narrower scope compared to TAG-Security's broader security guidelines
  • Requires more setup and configuration for specific environments
  • May have a steeper learning curve for non-security specialists

Code Comparison

TAG-Security (policy example):

apiVersion: constraints.gatekeeper.sh/v1beta1
kind: K8sRequiredLabels
metadata:
  name: require-team-label
spec:
  match:
    kinds:
      - apiGroups: [""]
        kinds: ["Namespace"]

Falco (rule example):

- rule: Detect Outbound Connection to C2 Servers
  desc: Detect outbound connection to known C2 servers
  condition: outbound and dest.ip in (known_c2_servers)
  output: "Outbound connection to C2 server detected"
  priority: CRITICAL

While TAG-Security focuses on broader security policies and guidelines, Falco provides specific runtime security rules and detection capabilities. TAG-Security's policies are often implemented at the cluster level, while Falco operates at the system call level for real-time threat detection.

9,505

Open Policy Agent (OPA) is an open source, general-purpose policy engine.

Pros of OPA

  • Mature, production-ready policy engine with wide adoption
  • Flexible, declarative policy language (Rego) for expressing complex rules
  • Extensive integrations with various cloud-native technologies

Cons of OPA

  • Steeper learning curve for Rego language
  • Focused solely on policy enforcement, not broader security guidance
  • Requires additional tooling for policy management at scale

Code Comparison

TAG-Security (example security checklist item):

- name: Use secure protocols
  description: Ensure that only secure protocols are used for communication
  mitigation:
    - Disable insecure protocols (e.g., HTTP, FTP)
    - Implement TLS for all network communications

OPA (example policy in Rego):

package httpapi
deny[msg] {
    input.protocol = "http"
    msg := "HTTP protocol is not allowed, use HTTPS instead"
}

While TAG-Security provides high-level security guidance and checklists, OPA offers a concrete policy implementation mechanism. TAG-Security focuses on broader security practices, while OPA specializes in enforcing specific policies across various systems and applications.

4,889

Snyk CLI scans and monitors your projects for security vulnerabilities.

Pros of Snyk CLI

  • Provides a comprehensive command-line interface for vulnerability scanning and management
  • Offers integration with various CI/CD pipelines and development workflows
  • Supports multiple programming languages and package managers

Cons of Snyk CLI

  • Requires a Snyk account and API token for full functionality
  • May have limitations on free tier usage compared to open-source alternatives
  • Focuses primarily on dependency vulnerabilities rather than broader security concerns

Code Comparison

TAG-Security (example of a security policy):

apiVersion: security.policy.v1beta1
kind: SecurityPolicy
metadata:
  name: example-policy
spec:
  rules:
    - name: restrict-privileged-containers
      match:
        resources:
          kinds:
            - Pod

Snyk CLI (example of running a vulnerability scan):

snyk test --all-projects
snyk monitor --all-projects

While TAG-Security focuses on defining security policies for Kubernetes environments, Snyk CLI provides direct vulnerability scanning and monitoring capabilities for various projects and dependencies.

8,441

A vulnerability scanner for container images and filesystems

Pros of Grype

  • Focused specifically on vulnerability scanning for container images and filesystems
  • Provides a command-line interface for easy integration into CI/CD pipelines
  • Regularly updated vulnerability database for timely security checks

Cons of Grype

  • Limited scope compared to TAG-Security's broader security focus
  • Lacks the extensive community backing and resources of a CNCF project
  • May not cover all aspects of cloud-native security that TAG-Security addresses

Code Comparison

TAG-Security (example policy):

apiVersion: constraints.gatekeeper.sh/v1beta1
kind: K8sRequiredLabels
metadata:
  name: require-team-label
spec:
  match:
    kinds:
      - apiGroups: [""]
        kinds: ["Namespace"]
  parameters:
    labels: ["team"]

Grype (example usage):

grype alpine:latest
grype dir:./path/to/project
grype sbom:./path/to/sbom.json

While TAG-Security focuses on broader security policies and best practices, Grype provides a specific tool for vulnerability scanning. TAG-Security's code often involves policy definitions, while Grype's usage is more command-line oriented for direct scanning operations.

Convert Figma logo designs to code with AI

Visual Copilot

Introducing Visual Copilot: A new AI model to turn Figma designs to high quality code using your components.

Try Visual Copilot

README

Security Technical Advisory Group

Cloud Native Security Logo

Quick links

About Us

The CNCF Security Technical Advisory Group facilitates collaboration to exchange and produce knowledge and resources for building security in the cloud native ecosystem.

Cloud Native involves building, deploying, and operating modern applications in cloud computing environments, typically using open source. This complex ecosystem presents a technology risk landscape that demands rethinking application and information security through the lens of developer experience.

We aim to significantly reduce the probability and impact of attacks, breaches, and compromises. By empowering developers and operators to understand and manage the security posture of their systems, we strive to fulfill the promise of enhanced productivity and operational efficiency.

Key Focus Areas

  • System Security Architectures: Frameworks to protect resources and data.
  • Common Lexicon, Templates & Libraries: Tools for developers to create secure apps.
  • Heuristics and Models: Approaches for reasoning about system security.

Publications

Below is a list of publications by TAG Security. For a comprehensive collection of our works in various formats, please visit the publications directory.

PublicationDate
Formal Verification for Policy ConfigurationsAugust, 2019
Catalog of Supply Chain CompromisesNovember 2019 - Present
Software Supply Chain Best PracticesMay, 2021
Evaluating your Supply Chain SecurityMay, 2021
Cloud Native Security LexiconAugust, 2021
Cloud Native Security WhitepaperMay, 2022
Cloud Native Security Controls CatalogMay, 2022
Handling Build-time Dependency VulnerabilitiesJune, 2022
Secure Software Factory: A Reference Architecture to Securing the Software Supply ChainMay, 2022
Secure DefaultsFebruary, 2022
Open and Secure - A Manual for Practicing Threat Modeling to Assess and Fortify Open Source SecurityNovember, 2023

Governance

Refer to the Security TAG charter for our governance process.

Communications

Join our open discussions and share news:

Meeting Information

  • Americas: Weekly on Wednesdays at 10 am (UTC-7). Zoom link, Meeting ID: 923 4036 9657.
  • EMEA: Bi-weekly on Wednesdays at 1 pm UTC+0 (adjusts for daylight saving). Zoom link, Meeting ID: 983 4873 8138.

Check your local timezone here. Meetings are listed on the CNCF calendar and the TAG Security Calendar.

To add a topic to the agenda, review our process.

New members

If you are new to the group, we encourage you to check out our contributing guidelines.

Related groups

Explore groups affiliated with or relevant to Security TAG here

Members

Leadership

Details about the TAG Chairs, Tech Leads, and TOC Liaisons can be found on the CNCF Technical Advisory Groups (TAGs) information page

TAG Emeritus Leaders

Thank you to all the tag emeritus leaders for your contributions to the success of this community.

Working Groups

The TAG's working groups focus on specific areas and organize most community activities, including weekly meetings. These groups facilitate discussions, engagement, and publications with key stakeholders, operating differently based on their needs. Each group, led by a responsible leader, reaches consensus on issues and manages logistics. All materials, such as reports, white papers, documents, and reference architectures, are in the repository's /community directory.

ProjectLeads
Automated GovernanceMatthew Flannery, Brandt Keller
Catalog of Supply Chain CompromisesSantiago Arias Torres
ComplianceAnca Sailer, Robert Ficcaglia
ControlsJon Zeolla
Security ReviewsJustin Cappos, Eddie Knight
Software Supply ChainMarina Moore, Michael Liebermann, John Kjell

Additional information

CNCF Security TAG reviews

For CNCF project proposal process create a new security review issue with a self-assessment.