kubernetes / committee-security-response

Kubernetes Security Process and Security Committee docs

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Distributors Application for VMware By Broadcom

skhushboo-vm opened this issue · comments

Actively monitored security email alias for our project: Vmware.psirt@broadcom.com

1. Be an actively maintained and CNCF certified distribution of Kubernetes components.

2. Have a user base not limited to your own organization.

3. Have a publicly verifiable track record up to present day of fixing security issues.

4. Not be a downstream or rebuild of another distribution.

5. Be a participant and active contributor in the community.

6. Accept the Embargo Policy.

7. Be willing to contribute back.

8. Have someone already on the list vouch for the person requesting membership on behalf of your distribution.
security@vmware.com

Hi @skhushboo-vm, VMWare is already on the distributors list:

https://github.com/kubernetes/k8s.io/blob/main/groups/committee-security-response/groups.yaml#L62-L63

Is this a request for a new email to be added? Do the existing two email addresses still need to be included?

Unfortunately GitHub *'s out all the email names in the comments! 😄 I'll reach out to the original aliases on file to confirm

Is there any way for embargoed content( going fwd) you can add patches at an access restricted server or drop it in our drive( if we share it with you)?

I do not foresee us updating our process to workaround arbitrary restrictions of a distributor.