-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Analysis and Compliance Strategy for New Cyber Resilience Act #3712
Comments
Hi @camilamacedo86, thanks for brining this to attention. I took a dig at the Cyber Resilience Act and some of the implications it may have. A few thoughts on this:
|
I also took a look at the shared article and I 100% agree with the breakdown @varshaprasad96 shared. My inclination is that we would be classified as a non-critical project based (since we are a dev tool for streamlining the building of software) on the information provided. I agree with waiting for more guidance from the Kubernetes orgs or CNCF as a whole before making any commitments. |
Here are the actions we have taken to enhance security and ensure compliance:
We tried to get guidance either:
It seems that:
Anyway, it seems that the best approach is to ensure that all is done properly |
It seems that this channel in CNFC can help us to validate: So, if any required for change came back from what was done we can create specific issues for each |
Issue Description:
We need to conduct a thorough analysis of the new Cyber Resilience Act to understand its implications for the Kubebuilder project, particularly in terms of our release process, tooling, and dependencies.
We probably need to start to generate the SBOOMs.
Areas of Focus:
goreleaser
for automating releases, triggered by pushing a new tag.The text was updated successfully, but these errors were encountered: