Mijn Bureau
MijnBureau integrates and configures upstream products into a unified suite, acting as the gatekeeper for security of those products. If a product does not meet security requirements, MijnBureau may replace it with a more secure alternative that fits project needs.
Secure Configuration
MijnBureau aims for secure-by-default configurations. The MijnBureau setup is flexible, allowing service integrators to tailor security settings to their hosting environment and requirements.
Software Bill of Materials (SBOM)
MijnBureau plans to collect and publish SBOMs for all integrated products. If an upstream product lacks an SBOM, MijnBureau will assist in its creation. This transparency enables service integrators to scan SBOMs and make informed security decisions.
Supply Chain Attestation
Attestation verifies the authenticity of products. MijnBureau strives to include attestation data for all products, helping service integrators enforce supply chain policies. Where missing, MijnBureau will support upstream projects in adding attestation.
CVE Scanning
MijnBureau intends to provide visibility into vulnerabilities (CVEs) affecting its products. Service integrators are responsible for assessing the impact and deciding on mitigation strategies. CVE scanning is on the backlog and will be implemented in the future.
Operational Guidance
MijnBureau offers recommendations to service integrators for secure operation of MijnBureau. MijnBureau can also offer recommendations for companies the write tenders for MijnBureau.
Current Security Practices
MijnBureau currently improves security by:
- Assuming a DenyAll Kubernetes network policy.
- Scanning configurations with OPA policies for best practices.
- Allowing flexible configuration for maximum Kubernetes security.
- Reviewing and enabling security options in product setups.
- Provide documentation to guide service integrators in maximizing security.
Planned Security Enhancements
MijnBureau is committed to continuously improving its security posture. Future initiatives include:
- Building hardened container images for all integrated products.
- Introducing a continuous CVE scanning pipeline to detect vulnerabilities early.
- Implementing automated SBOM generation and publication for transparency.
- Developing a notification system to alert service integrators about critical security updates and issues.
- Update product versions when provided