Anuket Project

Zoom link:

https://zoom.us/j/997256543?pwd=MWptM0F0Y1NpckhFVUgrZnM2TkJ0Zz09

Attendees

Please add your name in here:


  • Agenda:
    • Agenda Bashing
    • Announcements 
    • RM meeting times
      • Meeting decided to have from the next week RM meetings on Wednesdays at 3pm Eastern Time (US)
    • Lakelse M3 (Contents Freeze) date moved by TSC to November 4, 2021
    • Multi-cloud Security - contents discussion:  Multi-cloud Security - Issue #2314
      • PR#2595 merged, 2596 merged, Issue#2314 closed
    • Multi-cloud (general) -contents discussion: (OBSOLETE) Update RM Ch8 -- Multi- and Edge Cloud - Issues #2314,2568,2574,2578
      • PR#2629 (Multi-clod Interactions) responding to Issue#2574  - MERGED
    • Storage - Issues#2056, 2575, 2576, 2578
      • Work in progress on PRs: pending next week
    • Networking Semantics - Issue#2420 - Per coming back on 27th September to take care of PR#2572
      • PR#2572 MERGED, Issue#2420 CLOSED
    • Hardware Acceleration - Issues#2342 - Petar to review and approve (if no further comments)
      • PR#2593 -  MERGED
      • PR#2641 MERGED
    • Security - Issues 2481,2482,2540,2541,2542,2589 
      • PR#2620 (Vulnerabilities)  responding to Issue#2481 - MERGED
      • PR#2633 (Image) MERGED
      • Issue #2541 - for Monitoring : Walter to raise PR
      • Issues #2540, 2542 - Karine to raise PRs
    • PaaS - Issue#2567,
      • PR#2631 under review
    • Automation - Issue#2087, "nice to have", changed to BACKLOG
    • Others - Issues#2603,2609 - relate to all GitHub documents, automated numbering, removing html - technical discussion

Actions:

Decisions:


Minutes:

At ONE Summit, a panel presented the following resources: 1. Edge security paper - https://github.com/kubernetes/community/tree/master/wg-iot-edge/whitepapers/edge-security-challenges#23-physical-component-access  2. Cloud native security paper - https://github.com/cncf/tag-security/blob/main/security-whitepaper/cloud-native-security-whitepaper.md#cloud-native-security-whitepaper  3. Confidential Computing: Hardware-Based Trusted Execution for Applications and Data - https://confidentialcomputing.io/wp-content/uploads/sites/85/2021/03/confidentialcomputing_outreach_whitepaper-8-5x11-1.pdf 4. A Technical Analysis of Confidential Computing - https://confidentialcomputing.io/wp-content/uploads/sites/85/2021/03/CCC-Tech-Analysis-Confidential-Computing-V1.pdf

  • No labels