2022-03-25 Meeting Minutes
Hyperledger is committed to creating a safe and welcoming community for all. For more information please visit the Hyperledger Code of Conduct. |
|---|
Welcome and Introductions
Who you are, which project you represent, your role in the project and what your interest is in the Hyperledger security process effort.
Attendees
@Arun S M
@Ry Jones
@Danno Ferrin
@Hart Montgomery
@kamlesh nagware
@artem
@Peter Somogyvari (Deactivated)
Announcements
Agenda
Welcome
Cover the threats
Open Agenda
Next Meeting
Future Topics
Notes
Document all the threats first, it helps in creating the categories later. This will also help in prioritising what is important.
Define the assets or properties that are to be protected before adding in threats.
Infrastructure
Supply delivery of the open source software.
Continuous delivery, continuous integration.
Binaries and outcome authenticated/signed. The end binary user can verify the source and integrity of the software.
Include physical break into the data center or cloud going down.
Operational threats.
Insufficient test bed setup, recommend ways for reproducibility.
Architecture
Data confidentiality.
Excessive backward compatibility.
Implementation
Deployment issues