Skip to content

Commit bdc01a9

Browse files
authored
Refactor Vuln Management Requirements & Titles (ossf#219)
1 parent d716434 commit bdc01a9

File tree

1 file changed

+47
-36
lines changed

1 file changed

+47
-36
lines changed

baseline/OSPS-VM.yaml

Lines changed: 47 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,8 @@ description: |
99
controls:
1010
- id: OSPS-VM-01
1111
title: |
12-
Define a policy for coordinated vulnerability reporting
12+
The project documentation MUST include a policy for coordinated
13+
vulnerability reporting, with a clear timeframe for response.
1314
objective: |
1415
Establish a process for reporting and addressing vulnerabilities in the
1516
project, ensuring that security issues are handled promptly and
@@ -50,8 +51,9 @@ controls:
5051
assessment-requirements:
5152
- id: OSPS-VM-01.01
5253
text: |
53-
The project documentation MUST include a policy for coordinated
54-
vulnerability reporting, with a clear timeframe for response.
54+
While active, the project documentation MUST
55+
include a policy for coordinated vulnerability reporting, with a clear
56+
timeframe for response.
5557
applicability:
5658
- Maturity Level 2
5759
- Maturity Level 3
@@ -63,7 +65,8 @@ controls:
6365
6466
- id: OSPS-VM-02
6567
title: |
66-
Publish contacts and process for reporting vulnerabilities
68+
The project MUST publish contacts and process for reporting
69+
vulnerabilities.
6770
objective: |
6871
Reports from researchers and users are an important source for identifying
6972
vulnerabilities in a project. People with vulnerabilities to report should
@@ -97,21 +100,22 @@ controls:
97100
assessment-requirements:
98101
- id: OSPS-VM-02.01
99102
text: |
100-
The project MUST publish contacts and process for reporting vulnerabilities.
103+
While active, the project documentation MUST contain
104+
security contacts.
101105
applicability:
102106
- Maturity Level 1
103107
recommendation: |
104108
Create a security.md (or similarly-named) file that contains security
105-
contacts for the project and provide project's process for handling
106-
vulnerabilities in the project or dependencies.
109+
contacts for the project.
107110
108111
- id: OSPS-VM-03
109112
title: |
110-
Provide a means for reporting security vulnerabilities privately
113+
The project MUST provide a means for reporting security
114+
vulnerabilities privately to the security contacts within the project.
111115
objective: |
112116
Security vulnerabilities should not be shared with the public until such
113-
time the project has been provided time to analyze and prepare remediations
114-
to protect users of the project.
117+
time the project has been provided time to analyze and prepare
118+
remediations to protect users of the project.
115119
family: Vulnerability Management
116120
mappings:
117121
- reference-id: CRA
@@ -127,17 +131,21 @@ controls:
127131
assessment-requirements:
128132
- id: OSPS-VM-03.01
129133
text: |
130-
The project MUST provide a means for reporting security
131-
vulnerabilities privately to the security contacts within the project.
134+
While active, the project documentation MUST
135+
provide a means for reporting security vulnerabilities privately to
136+
the security contacts within the project.
132137
applicability:
133138
- Maturity Level 2
134139
- Maturity Level 3
135140
recommendation: |
136-
Enable private bug reporting through VCS or other infrastructure.
141+
Provide a means for security researchers to report vulnerabilities
142+
privately to the project. This may be a dedicated email address, a
143+
web form, VSC specialized tools, email addresses for security
144+
contacts, or other methods.
137145
138146
- id: OSPS-VM-04
139147
title: |
140-
Publicly publish data about any vulnerabilities discovered
148+
The project MUST publicly publish data about discovered vulnerabilities.
141149
objective: |
142150
Consumers of the project must be informed about known vulnerabilities
143151
found within the project.
@@ -153,8 +161,8 @@ controls:
153161
assessment-requirements:
154162
- id: OSPS-VM-04.01
155163
text: |
156-
The project MUST publicly publish data about discovered
157-
vulnerabilities.
164+
While active, the project documentation MUST
165+
publicly publish data about discovered vulnerabilities.
158166
applicability:
159167
- Maturity Level 2
160168
- Maturity Level 3
@@ -166,9 +174,10 @@ controls:
166174
instructions for mitigation or remediation.
167175
- id: OSPS-VM-04.02
168176
text: |
169-
Any vulnerabilities in the software components not affecting the
170-
project MUST be accounted for in a VEX document, augmenting
171-
the vulnerability report with non-exploitability details.
177+
While active, any vulnerabilities in the
178+
software components not affecting the project MUST be accounted for
179+
in a VEX document, augmenting the vulnerability report with
180+
non-exploitability details.
172181
applicability:
173182
- Maturity Level 3
174183
recommendation: |
@@ -179,7 +188,7 @@ controls:
179188
180189
- id: OSPS-VM-05
181190
title: |
182-
Define and enforce a threshold for remediation of SCA findings
191+
The project MUST enforce a policy for addressing SCA findings.
183192
objective: |
184193
Ensure that the project clearly communicates the threshold for remediation
185194
of SCA findings, including vulnerabilities and license issues in software
@@ -237,9 +246,9 @@ controls:
237246
assessment-requirements:
238247
- id: OSPS-VM-05.01
239248
text: |
240-
The project documentation MUST include a policy that defines a
241-
threshold for remediation of SCA findings related to vulnerabilities
242-
and licenses.
249+
While active, the project documentation MUST include a policy that
250+
defines a threshold for remediation of SCA findings related to
251+
vulnerabilities and licenses.
243252
applicability:
244253
- Maturity Level 3
245254
recommendation: |
@@ -249,8 +258,8 @@ controls:
249258
these findings.
250259
- id: OSPS-VM-05.02
251260
text: |
252-
The project documentation MUST include a policy to address SCA
253-
violations prior to any release.
261+
While active, the project documentation MUST include a policy to
262+
address SCA violations prior to any release.
254263
applicability:
255264
- Maturity Level 3
256265
recommendation: |
@@ -259,10 +268,11 @@ controls:
259268
that verify compliance with that policy prior to release.
260269
- id: OSPS-VM-05.03
261270
text: |
262-
All changes to the project's codebase MUST be automatically evaluated
263-
against a documented policy for malicious dependencies and
264-
known vulnerabilities in dependencies and blocked in the event of
265-
violations except when declared and suppressed as non-exploitable.
271+
While active, all changes to the project's codebase MUST be
272+
automatically evaluated against a documented policy for malicious
273+
dependencies and known vulnerabilities in dependencies, then blocked
274+
in the event of violations, except when declared and suppressed as
275+
non-exploitable.
266276
applicability:
267277
- Maturity Level 3
268278
recommendation: |
@@ -273,7 +283,8 @@ controls:
273283
274284
- id: OSPS-VM-06
275285
title: |
276-
Define and enforce a threshold for remediation of SAST findings
286+
The project documentation MUST enforce a policy that defines a
287+
threshold for remediation of SAST findings.
277288
objective: |
278289
Identify and address defects and security weaknesses in the project's
279290
codebase early in the development process, reducing the risk of shipping
@@ -283,8 +294,8 @@ controls:
283294
assessment-requirements:
284295
- id: OSPS-VM-06.01
285296
text: |
286-
The project documentation MUST include a policy that defines a
287-
threshold for remediation of SAST findings.
297+
While active, the project documentation MUST include a policy that
298+
defines a threshold for remediation of SAST findings.
288299
applicability:
289300
- Maturity Level 3
290301
recommendation: |
@@ -294,10 +305,10 @@ controls:
294305
these findings.
295306
- id: OSPS-VM-06.02
296307
text: |
297-
All changes to the project's codebase MUST be automatically evaluated
298-
against a documented policy for security weaknesses and blocked in the
299-
event of violations except when declared and suppressed as
300-
non-exploitable.
308+
While active, all changes to the project's codebase MUST be
309+
automatically evaluated against a documented policy for security
310+
weaknesses and blocked in the event of violations except when declared
311+
and suppressed as non-exploitable.
301312
applicability:
302313
- Maturity Level 3
303314
recommendation: |

0 commit comments

Comments
 (0)