Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

update opencontrol org permissions #44

Open
shawndwells opened this issue Jun 4, 2018 · 5 comments
Open

update opencontrol org permissions #44

shawndwells opened this issue Jun 4, 2018 · 5 comments
Assignees

Comments

@shawndwells
Copy link
Member

The OpenControl project is no longer only 18F and hasn't been for some time (which is great!!). To reflect this, suggesting the OpenControl org permissions be restructured.

Currently there are four organizational teams (https://github.com/orgs/opencontrol/teams):

Suggest the following:

  1. Creation of net-new community-members team. Members would be able to be own tickets, be tagged in PRs, etc. Need a vehicle to recognize community participants and communicate with them.

  2. Creation of repository maintainer teams, such as certification-maintainers , compliance-masonry-maintainers, etc. Members would have write-access to those repos. Currently it's to hard to track permissions and no clear way to give them out either. Also means interested parties could @repo-maintainers when asking for help, a quick PR review, etc.

@joshuamckenty
Copy link
Member

OpenControl wasn't started by 18F, and has never been only 18F staffers - what problem are you trying to solve?

I'm violently allergic to the RH trend towards pseudo-meritocracy, so phrases like "Need a vehicle to recognize community participants" coming from someone who clearly doesn't even know the OpenControl history make me deeply uncomfortable.

@joshuamckenty
Copy link
Member

I'm also unclear why RH content should have a repo within opencontrol at all - that's a commercial entity with its own GitHub repos.

@joshuamckenty joshuamckenty self-assigned this Jun 4, 2018
@shawndwells
Copy link
Member Author

shawndwells commented Jun 5, 2018 via email

@openprivacy
Copy link
Member

I learned about 18F and OpenControl at the same time - via Noah Kunin's Handling FISMA Faster and Better https://www.youtube.com/watch?v=T1S52B1-NT4. It wasn't important to me who created it, but rather that is was FOSS and how it might be able to transform compliance automation. Since that time (about two years ago) I have not seen a lot of progress (and I am partly at fault as I have not contributed much). But it remains an exciting project and (for me) the next step is a library of components that slot into FedRAMP, 800-171, NIST CSF, etc. to more easily inherit from when working with different compliance frameworks.

Shawn may work for the commercial Red Hat (that produces the most secure out-of-the-box OS I know of) but he also has been freely and copiously helpful technically and personally as I work to navigate the world of OpenControl (and OpenSCAP scanning).

Now: how does one feed OpenSCAP scan results into OpenControl?

@joshuamckenty
Copy link
Member

So-called "Meritocracy" is a boundary-policing approach to maintaining systemic privilege. The term itself was invented as satire[1], and the concept underneath it has been put to bed repeatedly by the academic community[2] as well as the broader developer community.

I'm happy to address the needs to a) make it easier for new contributors to get involved, and b) make it easier for active contributors to get admin privileges. To start with, why don't we just give admin bits to anyone who wants them? I'd much rather bias towards an inclusive model (ala C4.1) than assume some hierarchy of governance is required.

[1] https://kottke.org/17/03/the-satirical-origins-of-the-meritocracy
[2] http://journals.sagepub.com/doi/abs/10.2189/asqu.2010.55.4.543
[3] https://modelviewculture.com/pieces/the-dehumanizing-myth-of-the-meritocracy

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants