Jump to: navigation, search


Security issues, tooling, innovations and education within OpenStack are the responsibility of the Security SIG. The Security SIG is a horizontal effort within OpenStack that undertakes both technical and governance activities within OpenStack, aiming to provide guidance, information and code that enhances the overall security of the OpenStack ecosystem.

Organization and Contribution

The Security SIG is built up primarily of two groups of people; those who write OpenStack code and those who try to secure OpenStack clouds! If you're interested in helping to make OpenStack more secure, either through writing better code, cross project collaboration, writing documentation or inventing cool new features and tooling - we want to hear from you!


The security SIG has no formal leadership, instead it has chairs who arrange meetings and organize votes. The current chair can be found listed on the SIG governance page.


The security SIG has a discussion channel (#openstack-security) on the OFTC IRC network that's used for general communications, chat and the occasional user query. The security SIG meets monthly to discuss current security activities and progress on security happenings within OpenStack. We encourage new contributors to say hello during our meetings.

Advisory Activities

The Security SIG issues advisories and notes targeted at OpenStack Users and Vendors who either run or package OpenStack for use by downstream consumers.

Advisories are typically issued by the VMT, a small group of experienced developers within the Security SIG who receive, triage and release fixes for vulnerabilities in OpenStack. The final stage of fixing a vulnerability is to release a Security Advisory for the community. The OSSA details the nature of the vulnerability and the patches required to solve it.

Security Notes are designed to complement the Security Advisories issued by the Vulnerability Management Team. Security notes can be issued for almost anything affecting the security of potential OpenStack deployments. In many cases a vulnerability may be reported that cannot be fixed immediately because the fix might break the API or otherwise cause service-breaking issues for downstream consumers. Often the Security SIG write notes that will guide deployers in how to best mitigate the issues when an OSSA cannot be provided. OSSNs are also issued for significant vulnerabilities in third party applications that would affect OpenStack deployments.

See the OpenStack security site for the list of advisories and vulnerability management process documentation, as well as links to security note details.