Skip to content

Commit 0425672

Browse files
committed
Update Code of Conduct and Security Policy
Updates the readme, code of conduct, security policy and contributing document per OSPO request.
1 parent 5b9ce43 commit 0425672

File tree

4 files changed

+55
-16
lines changed

4 files changed

+55
-16
lines changed

CODE_OF_CONDUCT.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,10 @@
1-
# Code of Conduct
1+
# Microsoft Open Source Code of Conduct
22

3-
This project has adopted the [Microsoft Open Source Code of Conduct][conduct-code].
4-
For more information see the [Code of Conduct FAQ][conduct-FAQ] or contact [[email protected]][conduct-email] with any additional questions or comments.
3+
This project has adopted the [Microsoft Open Source Code of Conduct](https://opensource.microsoft.com/codeofconduct/).
54

6-
[conduct-code]: https://opensource.microsoft.com/codeofconduct/
7-
[conduct-FAQ]: https://opensource.microsoft.com/codeofconduct/faq/
8-
[conduct-email]: mailto:[email protected]
5+
Resources:
6+
7+
- [Microsoft Open Source Code of Conduct](https://opensource.microsoft.com/codeofconduct/)
8+
- [Microsoft Code of Conduct FAQ](https://opensource.microsoft.com/codeofconduct/faq/)
9+
- Contact [[email protected]](mailto:[email protected]) with questions or concerns
10+
- Employees can reach out at [aka.ms/opensource/moderation-support](https://aka.ms/opensource/moderation-support)

CONTRIBUTING.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ To run the link-checker, follow these steps:
6666
## Code of Conduct Enforcement
6767

6868
Reports of abuse will be reviewed by the PS-Committee and if it has been determined that violations of the
69-
Code of Conduct has occurred, then a temporary ban may be imposed.
69+
[Code of Conduct](CODE_OF_CONDUCT.md) has occurred, then a temporary ban may be imposed.
7070
The duration of the temporary ban will depend on the impact and/or severity of the infraction.
7171
This can vary from 1 day, a few days, a week, and up to 30 days.
7272
Repeat offenses may result in a permanent ban from the PowerShell org.

README.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -65,6 +65,14 @@ DSCv3 uses JSON schemas to define the structure of resources, configuration docu
6565
outputs that DSCv3 returns. These schemas make it easier to integrate DSCv3 with other tools,
6666
because they standardize and document how to interface with DSCv3.
6767

68+
## Code of Conduct
69+
70+
Please see our [Code of Conduct](CODE_OF_CONDUCT.md) before participating in this project.
71+
72+
## Security Policy
73+
74+
For any security issues, please see our [Security Policy](SECURITY.md).
75+
6876
[00]: https://github.com/powershell/psdesiredstateconfiguration
6977
[01]: https://github.com/PowerShell/DSC/releases/latest
7078
[02]: https://learn.microsoft.com/powershell/dsc/overview?view=dsc-3.0&preserve-view=true

SECURITY.md

Lines changed: 38 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,41 @@
1-
# Security Vulnerabilities
1+
<!-- BEGIN MICROSOFT SECURITY.MD V0.0.9 BLOCK -->
22

3-
Security issues are treated very seriously and will, by default,
4-
takes precedence over other considerations including usability, performance,
5-
etc... Best effort will be used to mitigate side effects of a security
6-
change, but DSC must be secure by default.
3+
## Security
74

8-
## Reporting a security vulnerability
5+
Microsoft takes the security of our software products and services seriously, which includes all source code repositories managed through our GitHub organizations, which include [Microsoft](https://github.com/Microsoft), [Azure](https://github.com/Azure), [DotNet](https://github.com/dotnet), [AspNet](https://github.com/aspnet), [Xamarin](https://github.com/xamarin) and [PowerShell](https://github.com/PowerShell).
96

10-
If you believe that there is a security vulnerability in DSC,
11-
it **must** be reported using [https://aka.ms/secure-at](https://aka.ms/secure-at) to allow for [Coordinated Vulnerability Disclosure](https://technet.microsoft.com/security/dn467923).
12-
**Only** file an issue, if [MSRC](https://www.microsoft.com/en-us/msrc/faqs-report-an-issue?rtc=1) has confirmed filing an issue is appropriate.
7+
If you believe you have found a security vulnerability in any Microsoft-owned repository that meets [Microsoft's definition of a security vulnerability](https://aka.ms/security.md/definition), please report it to us as described below.
8+
9+
## Reporting Security Issues
10+
11+
**Please do not report security vulnerabilities through public GitHub issues.**
12+
13+
Instead, please report them to the Microsoft Security Response Center (MSRC) at [https://msrc.microsoft.com/create-report](https://aka.ms/security.md/msrc/create-report).
14+
15+
If you prefer to submit without logging in, send email to [[email protected]](mailto:[email protected]). If possible, encrypt your message with our PGP key; please download it from the [Microsoft Security Response Center PGP Key page](https://aka.ms/security.md/msrc/pgp).
16+
17+
You should receive a response within 24 hours. If for some reason you do not, please follow up via email to ensure we received your original message. Additional information can be found at [microsoft.com/msrc](https://www.microsoft.com/msrc).
18+
19+
Please include the requested information listed below (as much as you can provide) to help us better understand the nature and scope of the possible issue:
20+
21+
* Type of issue (e.g. buffer overflow, SQL injection, cross-site scripting, etc.)
22+
* Full paths of source file(s) related to the manifestation of the issue
23+
* The location of the affected source code (tag/branch/commit or direct URL)
24+
* Any special configuration required to reproduce the issue
25+
* Step-by-step instructions to reproduce the issue
26+
* Proof-of-concept or exploit code (if possible)
27+
* Impact of the issue, including how an attacker might exploit the issue
28+
29+
This information will help us triage your report more quickly.
30+
31+
If you are reporting for a bug bounty, more complete reports can contribute to a higher bounty award. Please visit our [Microsoft Bug Bounty Program](https://aka.ms/security.md/msrc/bounty) page for more details about our active programs.
32+
33+
## Preferred Languages
34+
35+
We prefer all communications to be in English.
36+
37+
## Policy
38+
39+
Microsoft follows the principle of [Coordinated Vulnerability Disclosure](https://aka.ms/security.md/cvd).
40+
41+
<!-- END MICROSOFT SECURITY.MD BLOCK -->

0 commit comments

Comments
 (0)