Hi Chris,

I like this idea.
Thanks for raising this!

One question to the template bullet:
• Does it make Kafka or any of its components more difficult to run in a
fully-secured fashion?

I don't quite understand what it means. Could you elaborate on it?

Thank you.
Luke

On Wed, Jan 11, 2023 at 11:59 PM Chris Egerton <chr...@aiven.io.invalid>
wrote:

> Hi all,
>
> I'd like to propose augmenting the KIP template with a "Security
> Implications" section. Similar to the recently-added "test plan" section,
> the purpose here is to draw explicit attention to the security impact of
> the changes in the KIP during the design and discussion phase. On top of
> that, it should provide a common framework for how to reason about security
> so that everyone from new contributors to seasoned committers/PMC members
> can use the same standards when evaluating the security implications of a
> proposal.
>
> Here's the draft wording I've come up with so far for the template:
>
> How does this impact the security of the project?
> • Does it make Kafka or any of its components (brokers, clients, Kafka
> Connect, Kafka Streams, Mirror Maker 2, etc.) less secure when run with
> default settings?
> • Does it give users new access to configure clients, brokers, topics, etc.
> in situations where they did not have this access before? Keep in mind that
> the ability to arbitrarily configure a Kafka client can add to the attack
> surface of a project and may be safer to disable by default.
> • Does it make Kafka or any of its components more difficult to run in a
> fully-secured fashion?
>
> Let me know your thoughts. My tentative plan is to add this (with any
> modifications after discussion) to the KIP template after at least one week
> has elapsed, there has been approval from at least a couple seasoned
> contributors, and there are no unaddressed objections.
>
> Cheers,
>
> Chris
>

Reply via email to