|
| 1 | + |
| 2 | + |
| 3 | +# OpenChain Security Assurance Specification 1.1 Self-Certification Checklist |
| 4 | +## The Simple Way To Check Conformance |
| 5 | + |
| 6 | +Revision 1\ |
| 7 | +2022-10-14 |
| 8 | + |
| 9 | +# Introduction |
| 10 | + |
| 11 | +The OpenChain Security Assurance Specification is intended to identify and describe the key requirements of a quality Security Assurance Program in the context of using Open Source Software. It focuses on a narrow subset of primary concern: checking Open Source Software against publicly known security vulnerabilities like CVEs, GitHub/GitLab vulnerability reports, and so on. |
| 12 | + |
| 13 | +You can adopt the OpenChain Security Assurance Specification by self-certification in your own time or working with a service provider for independent assessment or third-party certification. Our recommended path is self-certification and we provide this document to support this with a series of "yes" or "no" statements. If you can answer "yes" to everything, you are self-certified. If you answer "no" to some items, you know where to invest further time to build a quality program. |
| 14 | + |
| 15 | +We have a lot of resources to support you if you need assistance. You can join our mailing lists, our webinars, our group calls and our regional work groups to discuss challenges with your peers and in your native language. You can get started here: |
| 16 | + |
| 17 | +[[https://www.openchainproject.org/community]{.underline}](https://www.openchainproject.org/community) |
| 18 | + |
| 19 | +Finally, if you want direct support from the project you can email |
| 20 | + |
| 21 | +with questions. We provide support for free. The OpenChain Project is funded by our Platinum Members and is designed to help support the global supply chain transition to more effective and efficient open source license compliance. |
| 22 | + |
| 23 | +# The Self-Certification Checklist |
| 24 | + |
| 25 | +## Section 3.1.1 |
| 26 | + |
| 27 | +- [ ] We have a policy governing the open source security assurance of Supplied Software. |
| 28 | +- [ ] We have a documented procedure to communicate the existence of the open source policy to all Software Staff. |
| 29 | + |
| 30 | +## Section 3.1.2 |
| 31 | + |
| 32 | +- [ ] We have identified the roles and responsibilities that affect the performance and effectiveness of the Program. |
| 33 | +- [ ] We have identified and documented the competencies required for each role. |
| 34 | +- [ ] We have identified and documented a list of Program Participants and how they fill their respective roles. |
| 35 | +- [ ] We have documented the assessed competence for each Program Participant. |
| 36 | +- [ ] We have a way to document periodic reviews and changes made to our processes. |
| 37 | +- [ ] We have a way to vertify that our processes align with current company best practices and staff assignments. |
| 38 | + |
| 39 | +## Section 3.1.3 |
| 40 | + |
| 41 | +- [ ] We have documented the awareness of our Program Participants on the following topics: |
| 42 | + |
| 43 | +- - [ ] The open source security assurance policy and where to find it; |
| 44 | +- - [ ] Relevant open source objectives; |
| 45 | +- - [ ] Contributions expected to ensure the effectiveness of the Program; |
| 46 | +- - [ ] The implications of failing to follow the Program requirements. |
| 47 | + |
| 48 | +## Section 3.1.4 |
| 49 | + |
| 50 | +- [ ] We have a written statement clearly defining the scope and limits of the Program. |
| 51 | +- [ ] We have a set of metrics to measure Program performance. |
| 52 | +- [ ] We have Documented Evidence from each review, update, or audit to demonstrate continuous improvement. |
| 53 | + |
| 54 | +## Section 3.1.5 |
| 55 | + |
| 56 | +- [ ] We have a method to identify structural and technical threats to the Supplied Software; |
| 57 | +- [ ] We have a method for detecting existence of Known Vulnerabilities in Supplied Software; |
| 58 | +- [ ] We have a method for following up on identified Known Vulnerabilities; |
| 59 | +- [ ] We have a method to communicate identified Known Vulnerabilities to customer base when warranted; |
| 60 | +- [ ] We have a method for analyzing Supplied Software for newly published Known Vulnerabilities post release of the Supplied Software; |
| 61 | +- [ ] We have a method for continuous and repeated Security Testing is applied for all Supplied Software before release; |
| 62 | +- [ ] We have a method to verify that identified risks will have been addressed before release of Supplied Software; |
| 63 | +- [ ] We have a method to export information about identified risks to third parties as appropriate. |
| 64 | + |
| 65 | +## Section 3.2.1 |
| 66 | + |
| 67 | +- [ ] We have a method to allow third parties to make Known Vulnerability or Newly Discovered Vulnerability enquires (e.g., via an email address or web portal that is monitored by Program Participants); |
| 68 | +- [ ] We have a an internal documented procedure for responding to third party Known Vulnerability or Newly Discovered Vulnerability inquiries. |
| 69 | + |
| 70 | +## Section 3.2.2 |
| 71 | + |
| 72 | +- [ ] We have documented the people, group or functions related to the Program. |
| 73 | +- [ ] We have ensured the identified Program roles have been properly staffed and adequate funding has been provided. |
| 74 | +- [ ] We have ensured expertise available is to address identified Known Vulnerabilities; |
| 75 | +- [ ] We have a documented procedure that assigns internal responsibilities for Security Assurance. |
| 76 | + |
| 77 | +## Section 3.3.1 |
| 78 | + |
| 79 | +- [ ] We have a documented procedure ensuring all Open Source Software used in the Supplied Software is continuously recorded across the lifecycle of the Supplied Software. This includes an archive of all Open Source Software used in the Supplied Software. |
| 80 | +- [ ] We have open source component records for the Supplied Software which demonstrate the documented procedure was properly followed. |
| 81 | + |
| 82 | +## Section 3.3.2 |
| 83 | + |
| 84 | +- [ ] We have a documented procedure for handling detection and resolution of Known Vulnerabilities for the Open Source Software components of the Supplied Software. |
| 85 | +- [ ] We have open source component records for the Supplied Software which track identified Known Vulnerabilities and action(s) taken (including even if no action was required). |
| 86 | + |
| 87 | +## Section 3.4.1 |
| 88 | + |
| 89 | +- [ ] We have documentation confirming that the Program meets all the requirements of this specification. |
| 90 | + |
| 91 | +## Section 3.4.2 |
| 92 | + |
| 93 | +- [ ] We have documentation confirming that Program conformance was reviewed within the last 18 months. |
0 commit comments