Skip to content

Commit 2f922a1

Browse files
committed
Rename Product Security Team to Committee
1 parent a4474ad commit 2f922a1

File tree

7 files changed

+9
-9
lines changed

7 files changed

+9
-9
lines changed

committee-steering/governance/sig-governance.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ Subproject Owner Role. (this different from a SIG or Organization Member).
7474
### Security Contact
7575

7676
- Security Contact
77-
- *MUST* be a contact point for the Product Security Team to reach out to for
77+
- *MUST* be a contact point for the Product Security Committee to reach out to for
7878
triaging and handling of incoming issues
7979
- *MUST* accept the [Embargo Policy]
8080
- Defined in `SECURITY_CONTACTS` files, this is only relevant to the root file in

contributors/guide/bug-bounty.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ vulnerability reports in these areas, they are not (currently) eligible to recei
6464
- Linux privilege escalations<br>
6565
_Please report these through [email protected]_
6666
- Attacks against containers from the host they are running on
67-
- Attacks relying on insecure configurations (subject to the [Product Security Team][]'s opinion),
67+
- Attacks relying on insecure configurations (subject to the [Product Security Committee][]'s opinion),
6868
such as clusters not utilizing mutual authentication or encryption between Kubernetes components.
6969
- Attacks relying on or against deprecated components (e.g. gitrepo volumes)
7070
- Vulnerabilities in etcd<br>
@@ -74,6 +74,6 @@ vulnerability reports in these areas, they are not (currently) eligible to recei
7474
- Vulnerabilities specific to a hosted Kubernetes setup<br>
7575
_Please report these through the associated provider_
7676

77-
[Product Security Team]: https://github.com/kubernetes/sig-release/blob/master/security-release-process-documentation/security-release-process.md#product-security-team-pst
77+
[Product Security Committee]: https://git.k8s.io/security/security-release-process.md#product-security-committee-psc
7878
[CoreOS's disclosure process]: https://coreos.com/security/disclosure/
7979
[CoreDNS's disclosure process]: https://github.com/coredns/coredns#security

sig-auth/archive/meeting-notes-2018.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -582,7 +582,7 @@ q2Xz68mF3_LggEY/edit?ts=5a68cdbc
582582
* Tim Allclair (@tallclair, Google) nominated as replacement
583583
* Long-term contributor to k8s auth/security
584584
* Helped drive pod security policy and audit features
585-
* Member of kubernetes product security team
585+
* Member of kubernetes product security committee
586586
* Brings container/node security expertise
587587
* Unanimous support from other leads (Jordan Liggitt, Red Hat; Eric Chiang, CoreOS)
588588
* Feedback on the change welcome (either public or private)

sig-auth/charter.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ Link to SIG section in [sigs.yaml]
4949
- Protection of volume data, container ephemeral data, and other non-API data (prefer: sig-storage
5050
and sig-node)
5151
- Container isolation (prefer: sig-node and sig-networking)
52-
- Bug bounty (prefer: product security team)
52+
- Bug bounty (prefer: product security committee)
5353
- Resource quota (prefer: sig-scheduling)
5454
- Resource availability / DOS protection (prefer: sig-apimachinery, sig-network, sig-node)
5555

sig-service-catalog/charter.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -109,7 +109,7 @@ roles. We do not have the Tech Lead role, and have a honorary Emeritus Chair rol
109109
related events, such as KubeCon.
110110

111111
- Security Contacts
112-
- Are a contact point for the Product Security Team to reach out to for
112+
- Are a contact point for the Product Security Committee to reach out to for
113113
triaging and handling of incoming issues.
114114
- Must be a maintainer.
115115
- Must accept and adhere to the Kubernetes [Embargo

wg-k8s-infra/charter.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -98,15 +98,15 @@ time.
9898
must be staffed / owned by at least 3 volunteers
9999

100100
- We aspire to follow the same 1/3 maximal representation rules used by the
101-
Steering Committee, Product Security Team, and other groups that have
101+
Steering Committee, Product Security Committee, and other groups that have
102102
project-wide impact
103103
- However, while we are bootstrapping, we consider it acceptable for maximal
104104
representation concerns to be violated, since this will often be necessary
105105
for Google-staffed subprojects to divest themselves of the infrastructure.
106106
- Our plan would be to rectify this when choosing new members or rotating
107107
old members such that we eventually meet maximal representation criteria
108108

109-
- We plan to follow the model set forth by the Product Security Team for
109+
- We plan to follow the model set forth by the Product Security Committee for
110110
suitable vetting new subproject owners
111111

112112
- Subproject owners must provide additional contact details within the WG, and

wg-lts/charter.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ There is yet another set of developers of Kubernetes internals who are
7979
those involved in meta-topics:
8080
* SIG Release: production of supported release artifacts
8181
* SIG Testing: how we can most effectively test Kubernetes
82-
* Product Security Team (PST): security vulnerability handling
82+
* Product Security Committee (PSC): security vulnerability handling
8383
* SIG Architecture: maintains and evolves the design principles of Kubernetes, and provides a consistent body of expertise necessary to ensure architectural consistency over time. Also defines conformance testing.
8484
* Steering Committee: scope includes deciding how and when official releases of Kubernetes artifacts are made and what they include
8585

0 commit comments

Comments
 (0)