This is an automated email from the ASF dual-hosted git repository.

xushiyan pushed a commit to branch asf-site
in repository https://gitbox.apache.org/repos/asf/hudi.git


The following commit(s) were added to refs/heads/asf-site by this push:
     new 82ca053a05e4 [Site] Update Security guidance (#17455)
82ca053a05e4 is described below

commit 82ca053a05e480d676c5a09234f6d1df819ee881
Author: Bhavani Sudha Saktheeswaran <[email protected]>
AuthorDate: Tue Dec 2 06:23:39 2025 -0800

    [Site] Update Security guidance (#17455)
---
 website/contribute/report-security-issues.md | 32 ---------------------------
 website/contribute/security.md               | 33 ++++++++++++++++++++++++++++
 website/docusaurus.config.js                 |  4 ++--
 3 files changed, 35 insertions(+), 34 deletions(-)

diff --git a/website/contribute/report-security-issues.md 
b/website/contribute/report-security-issues.md
deleted file mode 100644
index 1b89388c9d01..000000000000
--- a/website/contribute/report-security-issues.md
+++ /dev/null
@@ -1,32 +0,0 @@
----
-title: Report Issues
-sidebar_position: 5
-keywords: [ hudi, security]
-toc: true
-last_modified_at: 2019-12-30T15:59:57-04:00
----
-
-## Reporting HUDI Issues
-
-If you encounter a bug, performance issue, or unexpected behavior while using 
Apache Hudi, please report it by creating a [Github 
Issues](https://github.com/apache/hudi/issues). Be sure to include a clear 
summary, steps to reproduce the issue, expected vs. actual behavior, relevant 
logs, configurations, and your Hudi and Spark versions. The more context you 
provide, the easier it is for the community to diagnose and address the problem 
efficiently.
-
-## Reporting Security Issues
-
-The Apache Software Foundation takes a rigorous standpoint in annihilating the 
security issues in its software projects. Apache Hudi is highly sensitive and 
forthcoming to issues pertaining to its features and functionality.
-
-## Reporting Vulnerability
-
-If you have apprehensions regarding Hudi's security or you discover 
vulnerability or potential threat, don’t hesitate to get in touch with the 
[Apache Security Team](http://www.apache.org/security/) by dropping a mail at 
[[email protected]](mailto:[email protected]). In the mail, specify the 
description of the issue or potential threat. You are also urged to recommend 
the way to reproduce and replicate the issue. The Hudi community will get back 
to you after assessing and analysing t [...]
-
-**PLEASE PAY ATTENTION** to report the security issue on the security email 
before disclosing it on public domain.
-
-## Vulnerability Handling
-
-An overview of the vulnerability handling process is:
-
-* The reporter reports the vulnerability privately to Apache.
-* The appropriate project's security team works privately with the reporter to 
resolve the vulnerability.
-* A new release of the Apache product concerned is made that includes the fix.
-* The vulnerability is publically announced.
-
-A more detailed description of the process can be found 
[here](https://www.apache.org/security/committers).
diff --git a/website/contribute/security.md b/website/contribute/security.md
new file mode 100644
index 000000000000..4dc83177fa09
--- /dev/null
+++ b/website/contribute/security.md
@@ -0,0 +1,33 @@
+---
+title: Security
+sidebar_position: 5
+keywords: [ hudi, security]
+toc: true
+last_modified_at: 2019-12-30T15:59:57-04:00
+---
+
+## Security Model
+
+Apache Hudi is a library that relies on the security posture of the underlying 
compute engine and 
+storage environment in which it operates. In real-world deployments, engines 
like Presto, Apache Spark, Apache Flink are 
+hosted in private virtual network—such as a VPC, VLAN, or on-premises 
subnet—where only trusted entities have access 
+and network controls including firewalls, ACLs, and routing rules are used to 
restrict and prevent untrusted access. 
+
+## Security Reporting and Vulnerability Handling
+
+The Apache Software Foundation takes security seriously, and Apache Hudi 
encourages responsible disclosure of any potential 
+vulnerabilities. If you have apprehensions regarding Hudi's security, or you 
discover vulnerability or potential threat, 
+don’t hesitate to get in touch with the [Apache Security 
Team](http://www.apache.org/security/) by dropping a mail at 
[[email protected]](mailto:[email protected]). 
+In the mail, specify the description of the issue or potential threat. You are 
also urged to recommend the way to 
+reproduce and replicate the issue. The Hudi community will get back to you 
after assessing and analysing the findings.
+
+**PLEASE PAY ATTENTION** to report the security issue on the security email 
before disclosing it on public domain. 
+
+An overview of the vulnerability handling process is:
+
+* The reporter reports the vulnerability privately to Apache.
+* The appropriate project's security team works privately with the reporter to 
resolve the vulnerability.
+* A new release of the Apache product concerned is made that includes the fix.
+* The vulnerability is publically announced.
+
+A more detailed description of the process can be found 
[here](https://www.apache.org/security/committers).
diff --git a/website/docusaurus.config.js b/website/docusaurus.config.js
index 84b334dc66f5..dd1d802d796d 100644
--- a/website/docusaurus.config.js
+++ b/website/docusaurus.config.js
@@ -235,8 +235,8 @@ module.exports = {
               to: "/contribute/rfc-process",
             },
             {
-              label: "Report Issues",
-              to: "/contribute/report-security-issues",
+              label: "Security",
+              to: "/contribute/security",
             },
           ],
         },

Reply via email to