Hello ASF Security Team, Thank you for initiating this discussion and for your proposals regarding Apache Zeppelin's security posture.
Based on my experience operating Zeppelin in production environments, I agree with the premise that users accessing the same instance must be trusted. Given the direct execution of user code, my teams have consistently utilized instances with trusted users. We often deployed smaller, team- or individual-specific Zeppelin servers, and used separate instances for sharing to maintain clear operational boundaries. Therefore, I believe trusting users within the same instance is a valid and practical approach for Zeppelin deployments. I hope this discussion's outcome alleviates security burdens for user-code execution projects like Zeppelin, allowing them to focus on core development. This clarity should significantly contribute to the project's evolution, enabling the community to prioritize feature enhancement and innovation. Please reach out with any questions or feedback. Best regards, Jongyoul Lee 2025년 7월 3일 (목) 19:29, Arnout Engelen <enge...@apache.org>님이 작성: > Hello, > > As shared before[0], the ASF security team is concerned about the ability > of the Zeppelin project to respond to security issues. > > In the vast majority of Zeppelin deployments, either the network or Shiro > needs to be configured to make sure only trusted users have access. Those > users must be assumed/trusted to be able to view and manipulate each > other's resources, as per the security model[1]. > > Zeppelin also supports Docker/K8s deployments where the running user code > is isolated from the Zeppelin infrastructure. It seems the bottleneck in > making security decisions is that it can be difficult to assess whether a > potential issue in Zeppelin code could be used to bypass that isolation. > For that reason, we propose to stop advertising this isolation as a > security boundary. This means even in Docker/K8s deployments users are > trusted, and can in theory view and manipulate each other's resources. The > isolation can still be useful from an operational perspective, for example > when you have one Zeppelin instance that is shared across multiple > (trusted) teams. > > We'd like to gather feedback on whether this would be problematic for any > significant Zeppelin deployments. If so, please reach out ASAP - but note > we will ask you to play an active role in making security assessments for > this use case. > > > [0]: https://lists.apache.org/thread/c6zygxpg6woxttsxwojkt60vvs1f2njx > [1]: https://zeppelin.apache.org/security.html > > -- > Arnout Engelen > ASF Security Response > Apache Pekko PMC member, ASF Member > NixOS Committer > Independent Open Source consultant >