potiuk commented on issue #10753:
URL: https://github.com/apache/airflow/issues/10753#issuecomment-687673873


   > Do they trust all PyPI packages though? Don't they do scan on every 
release. A package can add a dependency that might be vulnerable.
   
   There are many big organisations (including my customers) that only allow 
specific version of deps and scan them. This - for example happens in Composer 
(they literally use allowed and security team vetted whl files only). This was 
one of the reasons the provider's package did not work initially because the 
way airflow was installed in Composer image (pre-vettted .whl images + airflow 
sources- each landing in a different namespace).
   
   The second customer of ours (the big SAAS) has a security team that provides 
the repositories that you can use and you have no way to install anything whihc 
is not in those repositories (apt, images, apk, pypI are transparently proxied 
to those repositories). If you need a new package they will install it for you 
and will keep on updating new versions after they security scan them (if you 
require that). Their security team scans tthe deps and CVES and alerts when you 
use a non-secure dependency. The same I experienced in Telecom and Banking 
environment for years, so for me this is "normal".
    
   > > "likely it is already filtered, vetted, allow-listed by those security 
teams".
   > 
   > Again, has the same risk as any open source package not on PyPI. The teams 
I have worked with do maintain their own mirrors but check on each release and 
store a copy of the "approved" release in their "repository manager"
   
   Same here. this means that no binary image of unknown provenience can go 
through.


----------------------------------------------------------------
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

For queries about this service, please contact Infrastructure at:
[email protected]


Reply via email to