Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Extend scs-0003: more context and process (resolves issues/#343) #329

Merged
merged 4 commits into from
Sep 5, 2023

Conversation

mbuechse
Copy link
Contributor

@mbuechse mbuechse commented Aug 10, 2023

  • added lots of context in the introduction
  • introduced the distinction between "certificate" and "certificate type"
  • improved misleading wording in the motivation
  • rectified incorrect section levels
  • added process description (governance)

Copy link
Member

@garloff garloff left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm
Thanks @mbuechse

@garloff garloff added the standards Issues / ADR / pull requests relevant for standardization & certification label Aug 18, 2023
@mbuechse
Copy link
Contributor Author

@alexander-diab This PR is good to be merged; Kurt is satisfied, apparently highly so. Do you have any objections?


## Motivation

This decision record has three main objectives:
This decision record establishes a mechanism (by means of the YAML file) with the following three main objectives:
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Isn't this of type Procedural and not of Decision Record?

Suggested change
This decision record establishes a mechanism (by means of the YAML file) with the following three main objectives:
This standard establishes a mechanism (by means of the YAML file) with the following three main objectives:

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The verbiage in question didn't stem from me. Anyway, following your argumentation, we should change "decision record" into "procedural", right? However, I suppose "decision record" could be construed as a kind of general term (a superset) that includes Standards, Procedurals, and any other document. From this point of view, every standard is a decision record, but not every decision record is a standard. If we expressly designate a document as "decision record" in the header, then this mostly means that it doesn't fit into any of the subcategories. Just one way of looking at it.

@anjastrunk
Copy link
Contributor

Regarding yaml file:

Do we have one yaml file with all layers and levels at the end, or one yaml file per level and layer, such as SCS-compatible-IaaS.yaml for layer IaaS and level "SCS-compatible"

I prefer the second option, as one file may be grow over time and gets confusting. We may even think to have one file or each version, such as SCS-compatible-IaaS-v1.yaml for version 1 of layer "SCS-compatible" certificate for IaaS.

@mbuechse
Copy link
Contributor Author

mbuechse commented Aug 31, 2023

Regarding yaml file:

Do we have one yaml file with all layers and levels at the end, or one yaml file per level and layer, such as SCS-compatible-IaaS.yaml for layer IaaS and level "SCS-compatible"

Currently, it's one file per level, containing both layers. I would prefer one file per type of certificate, that is to say, one file per combination of level and layer. But this has been an open topic in the SIG for months now.

@anjastrunk see here: https://input.scs.community/2023-scs-sig-standardization#2023-06-29
I'm pretty sure that I had raised the matter even earlier, but it got postponed at least once, and even when it got discussed, it was postponed again.

@anjastrunk
Copy link
Contributor

I like your improvements. It makes thing clearer.

One question, which came to may mind: Is there already a standard for receiving a certificate as CSP? I mean, how das a CSP apply for a certificate, how often will a re-certification take place and what are the consequences if certificate rules are violated?

@mbuechse
Copy link
Contributor Author

One question, which came to may mind: Is there already a standard for receiving a certificate as CSP? I mean, how das a CSP apply for a certificate, how often will a re-certification take place and what are the consequences if certificate rules are violated?

@anjastrunk Something like that is being worked on in #337

@anjastrunk
Copy link
Contributor

Regarding yaml file:
Do we have one yaml file with all layers and levels at the end, or one yaml file per level and layer, such as SCS-compatible-IaaS.yaml for layer IaaS and level "SCS-compatible"

Currently, it's one file per level, containing both layers. I would prefer one file per type of certificate, that is to say, one file per combination of level and layer. But this has been an open topic in the SIG for months now.

@anjastrunk see here: https://input.scs.community/2023-scs-sig-standardization#2023-06-29 I'm pretty sure that I had raised the matter even earlier, but it got postponed at least once, and even when it got discussed, it was postponed again.

We should but this on next SIG' agenda and make a decision!

@anjastrunk anjastrunk self-requested a review August 31, 2023 12:37
@anjastrunk
Copy link
Contributor

One question, which came to may mind: Is there already a standard for receiving a certificate as CSP? I mean, how das a CSP apply for a certificate, how often will a re-certification take place and what are the consequences if certificate rules are violated?

@anjastrunk Something like that is being worked on in #337

Yes. Thanks.

@mbuechse
Copy link
Contributor Author

We should put this on next SIG' agenda and make a decision!

I prepared the agenda accordingly.

@alexander-diab
Copy link
Contributor

I currently work on this. I have created a section on the docs page explaining the "certification" topic. There will be one section called "How to get certified". I will discuss this with Kurt tomorrow afternoon. And then write it up in this section. But it will be simply:
0. Download the compliance check tool and test your stack. Once you feel ready.

  1. Write an email to the SCS team and ask for being certified.
  2. You will be asked to give access to your stack for the SCS team to execute the compliance check tool (and this is to be automated).
  3. You must agree to be listed on the docs page with the result of the compliance check tool published and updated each night.
  4. You are certfied!

@mbuechse mbuechse merged commit 3bcd99f into main Sep 5, 2023
@mbuechse mbuechse deleted the extend_scs-0003 branch September 5, 2023 09:40
@anjastrunk anjastrunk added the SCS-VP10 Related to tender lot SCS-VP10 label Sep 7, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
SCS-VP10 Related to tender lot SCS-VP10 standards Issues / ADR / pull requests relevant for standardization & certification
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants