Rook is a large growing community of storage providers, contributors, and users. The Rook community has adopted this security disclosure and response policy to ensure we responsibly handle critical issues.
This policy is adapted from the policies of the following CNCF projects:
The Rook community credits and appreciates the example and security best practices that they have published openly.
A third party security audit was performed in December 2019 by Trail of Bits. The full security report has been published and is available for download.
Security vulnerabilities should be handled quickly and sometimes privately. The primary goal of this process is to reduce the total time users are vulnerable to publicly known exploits.
The Product Security Team (PST) is responsible for organizing the entire response including internal communication and external disclosure.
The initial Product Security Team will consist of the set of maintainers that volunteered. Every beta or stable storage provider MUST have a representative on the PST.
If you find a security vulnerability or any security related issues, please DO NOT file a public issue. Do not create a GitHub issue. Instead, send your report privately to cncf-rook-security@lists.cncf.io. Security reports are greatly appreciated and we will publicly thank you for it.
Please provide as much information as possible, so we can react quickly. For instance, that could include:
If you know of a publicly disclosed security vulnerability please IMMEDIATELY email cncf-rook-security@lists.cncf.io to inform the Product Security Team (PST) about the vulnerability so we start the patch, release, and communication process.
If possible the PST will ask the person making the public report if the issue can be handled via a private disclosure process (for example if the full exploit details have not yet been published). If the reporter denies the request for private disclosure, the PST will move swiftly with the fix and release process. In extreme cases you can ask GitHub to delete the issue but this generally isn't necessary and is unlikely to make a public disclosure less damaging.
For each vulnerability a member of the PST will volunteer to lead coordination with the "Fix Team" and is responsible for sending disclosure emails to the rest of the community. This lead will be referred to as the "Fix Lead."
The role of Fix Lead should rotate round-robin across the PST.
Note that given the current size of the Rook community it is likely that the PST is the same as the "Fix team." The PST may decide to bring in additional contributors for added expertise depending on the area of the code that contains the vulnerability.
All of the timelines below are suggestions and assume a Private Disclosure. If the Team is dealing with a Public Disclosure all timelines become ASAP. If the fix relies on another upstream project's disclosure timeline, that will adjust the process as well. We will work with the upstream project to fit their timeline and best protect our users.
These steps should be completed within the first 24 hours of disclosure.
These steps should be completed within the 1-7 days of Disclosure.
If the CVSS score is under 4.0 (a low severity score) the Fix Team can decide to slow the release process down in the face of holidays, developer bandwidth, etc. These decisions must be discussed on the cncf-rook-security@lists.cncf.io mailing list.
With the Fix Development underway the Rook Security Team needs to come up with an overall communication plan for the wider community. This Disclosure process should begin after the Team has developed a fix or mitigation so that a realistic timeline can be communicated to users.
Disclosure of Forthcoming Fix to Users (Completed within 1-7 days of Disclosure)
The communication to users should be actionable. They should know when to block time to apply patches, understand exact mitigation steps, etc.
Optional Fix Disclosure to Private Distributors List (Completed within 1-14 days of Disclosure):
Fix Release Day (Completed within 1-21 days of Disclosure)
This list is intended to be used primarily to provide actionable information to multiple distributor projects at once. This list is not intended for individuals to find out about security issues.
The information members receive on cncf-rook-distributors-announce@lists.cncf.io must not be made public, shared, nor even hinted at anywhere beyond the need-to-know within your specific team except with the list's explicit approval. This holds true until the public disclosure date/time that was agreed upon by the list. Members of the list and others may not use the information for anything other than getting the issue fixed for your respective distribution's users.
Before any information from the list is shared with respective members of your team required to fix said issue, they must agree to the same terms and only find out information on a need-to-know basis.
In the unfortunate event you share the information beyond what is allowed by this policy, you must urgently inform the cncf-rook-security@lists.cncf.io mailing list of exactly what information leaked and to whom.
If you continue to leak information and break the policy outlined here, you will be removed from the list.
This is a team effort. As a member of the list you must carry some water. This could be in the form of the following:
To be eligible for the cncf-rook-distributors-announce@lists.cncf.io mailing list, your distribution should:
New membership requests are sent to cncf-rook-security@lists.cncf.io.
In the body of your request please specify how you qualify and fulfill each criterion listed in Membership Criteria.