You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Currently cve-services doesn't support deleting users because when a CVE ID is reserved by an organisation (there could be more actions) the user UUID that reserved it is added to the CVE ID document.
Instead of including the user UUID in the requested_by field in the Cve Id document an alternate approach could be to have an audit collection which would have documents that detail any changes that are made and provide the necessary details. Then add an audit field to the Cve Id document that references the relevant document in the audit collection essentially maintaining an audit of any actions against the Cve Id.
A key part of the audit collection document would be to have the user who made the change referenced by the username rather than the UUID that way if the user is deleted the record of the change is still intact.
This approach could be implemented across all data sets that need to be audited assuming there isn't already an audit process built in to the system.
For example: a Cve Id document could be adjusted to have an audit field and the subsequent audit document,
reacted with thumbs up emoji reacted with thumbs down emoji reacted with laugh emoji reacted with hooray emoji reacted with confused emoji reacted with heart emoji reacted with rocket emoji reacted with eyes emoji
-
Problem Statement
Currently cve-services doesn't support deleting users because when a CVE ID is reserved by an organisation (there could be more actions) the user UUID that reserved it is added to the CVE ID document.
Extra information can be found in this PR
Example Cve Id document:
Potential Idea
Instead of including the user UUID in the
requested_by
field in the Cve Id document an alternate approach could be to have an audit collection which would have documents that detail any changes that are made and provide the necessary details. Then add an audit field to the Cve Id document that references the relevant document in the audit collection essentially maintaining an audit of any actions against the Cve Id.A key part of the audit collection document would be to have the user who made the change referenced by the username rather than the UUID that way if the user is deleted the record of the change is still intact.
This approach could be implemented across all data sets that need to be audited assuming there isn't already an audit process built in to the system.
For example: a Cve Id document could be adjusted to have an audit field and the subsequent audit document,
Questions (assuming this could be a valid approach)
Is this even possible?
If this is possible (and thats a big if) Is it feasible to make this adjustment or is there a lot tied to the user UUID in the requested_by field?
Would there be limitations to the amount of documents that could be stored in an audit collection?
How would the integrity of the audit documents be verified/maintained etc?
Beta Was this translation helpful? Give feedback.
All reactions