Skip to content

Conversation

@OrlinVasilev
Copy link
Contributor

Adding the K3s security self-assesment as advised by @eddie-knight cncf/tag-security#1500 (comment)

Signed-off-by: Orlix <orlin@orlix.org>
@OrlinVasilev OrlinVasilev requested a review from a team as a code owner December 10, 2025 10:19
@OrlinVasilev
Copy link
Contributor Author

@eddie-knight PTAL ^^ Thanks!

@JustinCappos
Copy link
Contributor

FYI: The contents of the assessment were reviewed and approved from the prior PR. cncf/tag-security#1500 (review)

@OrlinVasilev
Copy link
Contributor Author

@eddie-knight @JustinCappos is there anything else we need to get this in? thank you!

@eddie-knight
Copy link
Contributor

@OrlinVasilev This is approved by the TAG, but must be merged by the TOC per the codeowner enforcement

@OrlinVasilev
Copy link
Contributor Author

Thank you!

@JustinCappos
Copy link
Contributor

@OrlinVasilev This is approved by the TAG, but must be merged by the TOC per the codeowner enforcement

@mnm678 @jkjell @evankanderson , can you help us move this along?

@jkjell
Copy link
Contributor

jkjell commented Jan 16, 2026

If we move the assessment to a sub-directory called security-assessment under the k3s directory, the TAG leads should be able to fully approve and merge.

https://github.com/cncf/toc/blob/main/.github/CODEOWNERS#L40

Copy link
Contributor

@kfaseela kfaseela left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for the PR! Just left a few small nits. Otherwise LGTM


This document provides K3s maintainers and stakeholders with additional context to help inform the roadmap creation process, so that security and feature improvements can be prioritized accordingly.

## Security functions and features
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

RBAC and Pod Security Admission are correctly identified as critical security functions. Per the TAG Security self-assessment guidance, these could optionally be framed more explicitly in threat-modeling terms (e.g., threats mitigated such as unauthorized access or privilege escalation), not mandatory - just a suggestion.

OrlinVasilev and others added 5 commits January 20, 2026 18:10
Co-authored-by: Faseela K <k.faseela@gmail.com>
Signed-off-by: Orlix <7236111+OrlinVasilev@users.noreply.github.com>
Co-authored-by: Faseela K <k.faseela@gmail.com>
Signed-off-by: Orlix <7236111+OrlinVasilev@users.noreply.github.com>
Co-authored-by: Faseela K <k.faseela@gmail.com>
Signed-off-by: Orlix <7236111+OrlinVasilev@users.noreply.github.com>
Co-authored-by: Faseela K <k.faseela@gmail.com>
Signed-off-by: Orlix <7236111+OrlinVasilev@users.noreply.github.com>
Co-authored-by: Faseela K <k.faseela@gmail.com>
Signed-off-by: Orlix <7236111+OrlinVasilev@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants