Hello, As shared before[0], the ASF security team is concerned about the ability of the Zeppelin project to respond to security issues.
In the vast majority of Zeppelin deployments, either the network or Shiro needs to be configured to make sure only trusted users have access. Those users must be assumed/trusted to be able to view and manipulate each other's resources, as per the security model[1]. Zeppelin also supports Docker/K8s deployments where the running user code is isolated from the Zeppelin infrastructure. It seems the bottleneck in making security decisions is that it can be difficult to assess whether a potential issue in Zeppelin code could be used to bypass that isolation. For that reason, we propose to stop advertising this isolation as a security boundary. This means even in Docker/K8s deployments users are trusted, and can in theory view and manipulate each other's resources. The isolation can still be useful from an operational perspective, for example when you have one Zeppelin instance that is shared across multiple (trusted) teams. We'd like to gather feedback on whether this would be problematic for any significant Zeppelin deployments. If so, please reach out ASAP - but note we will ask you to play an active role in making security assessments for this use case. [0]: https://lists.apache.org/thread/c6zygxpg6woxttsxwojkt60vvs1f2njx [1]: https://zeppelin.apache.org/security.html -- Arnout Engelen ASF Security Response Apache Pekko PMC member, ASF Member NixOS Committer Independent Open Source consultant