2024-02-22 Meeting notes

2024-02-22 Meeting notes

Date

Feb 22, 2024

Attendees

Name

Present

Planned Absences

Name

Present

Planned Absences

@Craig McNally 

Y



@Julian Ladisch 

Y



@Axel Dörrer 





@Ryan Berger 

Y



@Chris Rutledge 

Y



@Jakub Skoczen 





@John Coburn 





@Skott Klebe 











Discussion items

Time

Item

Who

Notes

Time

Item

Who

Notes

5 min max

Tenant Id restrictions (Revisited)

@Julian Ladisch

See slack https://folio-project.slack.com/archives/G013F3AL508/p1708613107682849

if needed schedule a follow-on discussion

25-30 min

Anything Urgent? Review the Kanban board?

Team

Time permitting

Advice for handling of sensitive banking information

Team

From slack conversation, I think I've gathered the following:

  • In this case (bank account and transit numbers), the information is highly sensitive.  

  • Highly sensitive information should:

    • Be stored in it's own table

    • Accessed via a dedicated API

    • Protected by a dedicated permission

    • Encrypted in the database, not only on disk.  

Let's review and discuss before providing this feedback to Raman.

@Axel Dörrer also suggested that defining classes of sensitivity could help teams determine which techniques are applicable in various situations.  I agree having some general guidelines on this would be helpful.

  • regular data

  • low sensitive - permission based on same API

  • high sensitive - permission based on dedicated API

It would probably help to provide concrete examples of data in each class.  This can be a longer term effort, we don't need to sort out all the details today.

  • Next Steps:

    • Clearly define/formalize the various classes

      • Come up with concrete examples of each class

    • Build out guidance

      • Come up with concrete examples of how to protect each class of data.

    • Consider storing some classes of data outside of postgres altogether - e.g. in secret storage.

      • What would be the guidance we provide to teams for this so we don't end up with each team doing things differently?

      • SecretStore interface and existing implementations are currently only read-only.  They would need to be extended to allow for creation/mgmt of this information.

    • Craig to start a conversation in slack about this.

      • Seeking a volunteer to generate a draft document for us to review at a later meeting.


Today:

@Axel Dörrer to do a first draft as a base for further discussions



Status on pentesting works within Network traffic control group

@Axel Dörrer 

Due to some absences on different reasons the group stalled. Axel will try to reactivate the group.

Action items