Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Initial write-up for member audit #100

Draft
wants to merge 4 commits into
base: main
Choose a base branch
from
Draft

Conversation

RRosio
Copy link
Contributor

@RRosio RRosio commented Mar 25, 2025

No description provided.

@manics
Copy link
Contributor

manics commented Mar 27, 2025

I think this makes sense. JupyterHub kind-of has a policy for following up on inactive members, though I can't remember the last time we followed it: https://jupyterhub-team-compass.readthedocs.io/en/latest/practices/check-ins.html

What might be worth doing in this policy is emphasizing that GitHub privileges are not a reflection of project membership or status within that project. Traditionally it's been seen that way, but from a security perspective you might be one of the most important/influential people in a project, but if your role doesn't require GitHub privileges then you shouldn't have them.

@Carreau
Copy link
Member

Carreau commented Mar 27, 2025

Sorry i'm going to stay short.
I think a user can/should be able to be marked manually as active (with a reason) on any tooling.

GitHub is uppercase G and H I believe.

@rpwagner
Copy link
Contributor

rpwagner commented Apr 1, 2025

This is looking good. Let's make the first goal to get this to into this repo and communicate it. Next, I'd like to propose a subsecurity section in the governance documents under Organizational Policy.

Learning from this and the 2FA implementation, we can probably draft a short guide on how to propose, decide, communicate, and implement future security policies.

Copy link
Contributor

@dlqqq dlqqq left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@RRosio Thank you for putting this together! This is a great first start. We can make more revisions later. Just one minor comment worth addressing here. 🤗


## Reinstatement of Access

If a member's privileges are adjusted due to inactivity, they can be reinstated upon request. Our goal is to maintain security without hindering future contributions.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

As a reader, it's unclear how I should reach out to the Security Council to reinstate my access privileges. We should probably suggest a way to contact us here, for example:

Suggested change
If a member's privileges are adjusted due to inactivity, they can be reinstated upon request. Our goal is to maintain security without hindering future contributions.
If a member's privileges are adjusted due to inactivity, they can be reinstated on request via email to `[email protected]`. Our goal is to maintain security without hindering future contributions.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should this be handled via the subproject instead of the central security email?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yes! This isn't about a security vulnerability so having it go to the mailing list is better--and more likely to be seen.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Perhaps! This ambiguity is exactly why I think we should document it here first. 😁

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants