User:Mstone/Commentaries/Infrastructure 1: Difference between revisions
Jump to navigation
Jump to search
mNo edit summary |
mNo edit summary |
||
Line 1: | Line 1: | ||
Here are some proposed requirements for a software system and procedure for communal maintenance of infrastructure: |
Here are some proposed requirements for a software system and procedure for communal maintenance of infrastructure: |
||
Line 6: | Line 5: | ||
; Timely access |
; Timely access |
||
: Failures of otherwise critical pieces of |
: Failures of otherwise critical pieces of infrastructure should not inhibit timely read or write access to the reference documentation. |
||
; Credential rotation |
; Credential rotation |
||
: When people leave the VIG, it should be easy to remove their access to secrets created after their exit. |
: When people leave the VIG, it should be easy to remove their access to secrets created after their exit. |
||
: If people ever leave the VIG non-amicably, it should be possible to quickly update important secrets throughout the |
: If people ever leave the VIG non-amicably, it should be possible to quickly update important secrets throughout the communal infrastructure. |
||
; Publishability |
; Publishability |
Revision as of 17:59, 20 August 2008
Here are some proposed requirements for a software system and procedure for communal maintenance of infrastructure:
- Data integrity
- It should be possible to verify the integrity of reference documentation on an independent system booted from read-only media.
- Timely access
- Failures of otherwise critical pieces of infrastructure should not inhibit timely read or write access to the reference documentation.
- Credential rotation
- When people leave the VIG, it should be easy to remove their access to secrets created after their exit.
- If people ever leave the VIG non-amicably, it should be possible to quickly update important secrets throughout the communal infrastructure.
- Publishability
- Secrets should be carefully separated from public knowledge (e.g. with encryption or quarantine) so that everything else can be published.