Skip to content

Security: CurtisSlone/SSDF-Rust-Template

Security

SECURITY.md

Security Policy and Vulnerability Disclosure

Implements: RV.1.3, PS.2.1

We take the security of this project seriously. If you discover a security vulnerability, please report it to us as described below.

Reporting Process

DO NOT report security vulnerabilities through public GitHub issues, discussions, or pull requests.

Instead, please send an email to: [email protected]

Include the following information:

  • Type of issue (e.g., buffer overflow, SQL injection, cross-site scripting, etc.)
  • Full paths of source file(s) related to the manifestation of the issue
  • The location of the affected source code (tag/branch/commit or direct URL)
  • Any special configuration required to reproduce the issue
  • Step-by-step instructions to reproduce the issue
  • Proof-of-concept or exploit code (if possible)
  • Impact of the issue, including how an attacker might exploit the issue

Response Timeline

Timeline Action
Within 48 hours Acknowledgment of your report
Within 5 business days Initial assessment and triage
Every 10 business days Status updates until resolution
Within 90 days Resolution for critical/high severity issues

Vulnerability Disclosure Policy

We follow responsible disclosure practices:

  1. Private Disclosure: We will work with you to understand and resolve the issue privately
  2. Coordinated Timeline: We will coordinate with you on the disclosure timeline
  3. Public Disclosure: We will publicly disclose the vulnerability after a fix is available
  4. Credit: We will credit you in our security advisory (unless you prefer to remain anonymous)

Vulnerability Severity Classification

We use the Common Vulnerability Scoring System (CVSS) v3.1 to assess severity:

Severity CVSS Score Response SLA
Critical 9.0 - 10.0 24 hours
High 7.0 - 8.9 72 hours
Medium 4.0 - 6.9 2 weeks
Low 0.1 - 3.9 Next release

Security Updates

Security updates will be released as:

  • Emergency releases for critical vulnerabilities
  • Priority releases for high severity vulnerabilities
  • Regular releases for medium/low severity vulnerabilities

Subscribe to our security advisories:

  • GitHub Security Advisories: [Repository Security Tab]
  • Security notifications: [YOUR-NOTIFICATION-METHOD]

Scope

This vulnerability disclosure policy applies to:

  • [PROJECT-NAME] core application
  • Official [PROJECT-NAME] containers and packages
  • [PROJECT-NAME] documentation that could lead to security issues

Out of Scope

The following are generally considered out of scope:

  • Denial of service attacks requiring excessive resources
  • Issues in third-party dependencies (please report to the respective projects)
  • Social engineering attacks
  • Physical attacks against infrastructure

Legal Safe Harbor

We will not pursue legal action against researchers who:

  • Make a good faith effort to avoid privacy violations and disruptions to others
  • Only interact with accounts you own or with explicit permission of the account holder
  • Do not access, modify, or delete data belonging to others
  • Do not perform attacks that could harm the reliability/integrity of our services
  • Do not use social engineering techniques against our employees or contractors
  • Comply with this policy

Recognition

We recognize and appreciate the security research community's contributions to keeping [PROJECT-NAME] secure. Researchers who responsibly disclose vulnerabilities may be recognized in:

  • Our security hall of fame (with permission)
  • Security advisories and release notes
  • Our annual security report

Security Features

Built-in Security

[PROJECT-NAME] incorporates security-by-design principles:

  • Memory Safety: Written in Rust to prevent buffer overflows and memory corruption
  • Input Validation: All inputs are validated at entry points
  • Least Privilege: Role-based access control with minimal necessary permissions
  • Secure Defaults: All configurations default to secure settings
  • Encryption: Data encrypted at rest and in transit
  • Audit Logging: Comprehensive security event logging
  • [ADD YOUR SPECIFIC SECURITY FEATURES]

Security Configuration

For security hardening guidelines, see:

Compliance

[PROJECT-NAME] is developed following:

  • NIST Secure Software Development Framework (SSDF) SP 800-218
  • NIST SP 800 53
  • NIST SP 800 171

Contact


PGP Key for Encrypted Communications:

[ADD YOUR PGP PUBLIC KEY HERE IF APPLICABLE]

Last Updated: [UPDATE DATE]


This security policy follows NIST SP 800-218 practices for vulnerability disclosure and response.

There aren’t any published security advisories