This project follows semantic versioning. Currently supported versions:
| Version | Supported | Notes |
|---|---|---|
| 1.0.x | ✅ | Current stable release |
| < 1.0 | ❌ | Development versions |
As this tool is designed for SOC 2 compliance analysis, we maintain strict security standards:
- Access Control: All AWS credentials and sensitive configurations must be properly secured
- Encryption: All data in transit and at rest must be encrypted
- Logging: Comprehensive logging must be enabled for audit trails
- Authentication: MFA should be enabled for all AWS accounts
- Monitoring: CloudWatch alerts should be configured for security events
We take the security of SecurityHub SOC 2 Analyzer seriously. If you believe you have found a security vulnerability, please report it to us as described below.
Please do not report security vulnerabilities through public GitHub issues.
Instead, please report them via:
- AWS Security: If the vulnerability relates to AWS services, report through AWS Security
- GitHub Security: Use the Security tab to report repository-specific issues
- Email: For other security concerns, contact the repository Owner: Through GitHub
You should receive a response within 48 hours. If for some reason you do not, please follow up to ensure we received your original message.
Please include the following information to help us better understand and address the issue:
- Type of issue (e.g., access control, encryption, credential exposure)
- Full paths of source file(s) related to the issue
- The location of the affected source code (tag/branch/commit or direct URL)
- AWS service(s) affected (if applicable)
- SOC 2 controls impacted (if known)
- Any special configuration required to reproduce the issue
- Step-by-step instructions to reproduce the issue
- Proof-of-concept or exploit code (if possible)
- Impact assessment, including:
- Potential data exposure
- Compliance implications
- Service disruption risks
When working with this tool:
-
AWS Configuration:
- Use IAM roles with least privilege
- Enable CloudTrail logging
- Configure SecurityHub standards
- Enable GuardDuty
-
Code Security:
- Keep dependencies updated
- Review CloudFormation templates
- Validate Lambda permissions
- Monitor CloudWatch logs
-
SOC 2 Compliance:
- Maintain evidence of security controls
- Document configuration changes
- Regular security assessments
- Monitor compliance status
We prefer all communications to be in English.
We follow the principle of Responsible Disclosure:
- Report the vulnerability to us privately
- Allow up to 90 days for vulnerability assessment and patch
- Coordinate the public release of information after the patch
- Security patches are released as soon as possible
- Updates are documented in release notes
- Users are notified through GitHub releases
- Critical updates are highlighted in the repository
Security issues may affect SOC 2 compliance. We assess each vulnerability for:
- Trust Services Criteria impact
- Control effectiveness
- Audit implications
- Required compensating controls
For any security-related questions, contact:
- Security Team: security@yourdomain.com
- AWS Security: AWS Security Contact
- Repository Owner: Through GitHub