@@ -9,7 +9,8 @@ description: |
99controls :
1010 - id : OSPS-VM-01
1111 title : |
12- Define a policy for coordinated vulnerability reporting
12+ The project documentation MUST include a policy for coordinated
13+ vulnerability reporting, with a clear timeframe for response.
1314 objective : |
1415 Establish a process for reporting and addressing vulnerabilities in the
1516 project, ensuring that security issues are handled promptly and
@@ -50,8 +51,9 @@ controls:
5051 assessment-requirements :
5152 - id : OSPS-VM-01.01
5253 text : |
53- The project documentation MUST include a policy for coordinated
54- vulnerability reporting, with a clear timeframe for response.
54+ While active, the project documentation MUST
55+ include a policy for coordinated vulnerability reporting, with a clear
56+ timeframe for response.
5557 applicability :
5658 - Maturity Level 2
5759 - Maturity Level 3
@@ -63,7 +65,8 @@ controls:
6365
6466 - id : OSPS-VM-02
6567 title : |
66- Publish contacts and process for reporting vulnerabilities
68+ The project MUST publish contacts and process for reporting
69+ vulnerabilities.
6770 objective : |
6871 Reports from researchers and users are an important source for identifying
6972 vulnerabilities in a project. People with vulnerabilities to report should
@@ -97,21 +100,22 @@ controls:
97100 assessment-requirements :
98101 - id : OSPS-VM-02.01
99102 text : |
100- The project MUST publish contacts and process for reporting vulnerabilities.
103+ While active, the project documentation MUST contain
104+ security contacts.
101105 applicability :
102106 - Maturity Level 1
103107 recommendation : |
104108 Create a security.md (or similarly-named) file that contains security
105- contacts for the project and provide project's process for handling
106- vulnerabilities in the project or dependencies.
109+ contacts for the project.
107110
108111 - id : OSPS-VM-03
109112 title : |
110- Provide a means for reporting security vulnerabilities privately
113+ The project MUST provide a means for reporting security
114+ vulnerabilities privately to the security contacts within the project.
111115 objective : |
112116 Security vulnerabilities should not be shared with the public until such
113- time the project has been provided time to analyze and prepare remediations
114- to protect users of the project.
117+ time the project has been provided time to analyze and prepare
118+ remediations to protect users of the project.
115119 family : Vulnerability Management
116120 mappings :
117121 - reference-id : CRA
@@ -127,17 +131,21 @@ controls:
127131 assessment-requirements :
128132 - id : OSPS-VM-03.01
129133 text : |
130- The project MUST provide a means for reporting security
131- vulnerabilities privately to the security contacts within the project.
134+ While active, the project documentation MUST
135+ provide a means for reporting security vulnerabilities privately to
136+ the security contacts within the project.
132137 applicability :
133138 - Maturity Level 2
134139 - Maturity Level 3
135140 recommendation : |
136- Enable private bug reporting through VCS or other infrastructure.
141+ Provide a means for security researchers to report vulnerabilities
142+ privately to the project. This may be a dedicated email address, a
143+ web form, VSC specialized tools, email addresses for security
144+ contacts, or other methods.
137145
138146 - id : OSPS-VM-04
139147 title : |
140- Publicly publish data about any vulnerabilities discovered
148+ The project MUST publicly publish data about discovered vulnerabilities.
141149 objective : |
142150 Consumers of the project must be informed about known vulnerabilities
143151 found within the project.
@@ -153,8 +161,8 @@ controls:
153161 assessment-requirements :
154162 - id : OSPS-VM-04.01
155163 text : |
156- The project MUST publicly publish data about discovered
157- vulnerabilities.
164+ While active, the project documentation MUST
165+ publicly publish data about discovered vulnerabilities.
158166 applicability :
159167 - Maturity Level 2
160168 - Maturity Level 3
@@ -166,9 +174,10 @@ controls:
166174 instructions for mitigation or remediation.
167175 - id : OSPS-VM-04.02
168176 text : |
169- Any vulnerabilities in the software components not affecting the
170- project MUST be accounted for in a VEX document, augmenting
171- the vulnerability report with non-exploitability details.
177+ While active, any vulnerabilities in the
178+ software components not affecting the project MUST be accounted for
179+ in a VEX document, augmenting the vulnerability report with
180+ non-exploitability details.
172181 applicability :
173182 - Maturity Level 3
174183 recommendation : |
@@ -179,7 +188,7 @@ controls:
179188
180189 - id : OSPS-VM-05
181190 title : |
182- Define and enforce a threshold for remediation of SCA findings
191+ The project MUST enforce a policy for addressing SCA findings.
183192 objective : |
184193 Ensure that the project clearly communicates the threshold for remediation
185194 of SCA findings, including vulnerabilities and license issues in software
@@ -237,9 +246,9 @@ controls:
237246 assessment-requirements :
238247 - id : OSPS-VM-05.01
239248 text : |
240- The project documentation MUST include a policy that defines a
241- threshold for remediation of SCA findings related to vulnerabilities
242- and licenses.
249+ While active, the project documentation MUST include a policy that
250+ defines a threshold for remediation of SCA findings related to
251+ vulnerabilities and licenses.
243252 applicability :
244253 - Maturity Level 3
245254 recommendation : |
@@ -249,8 +258,8 @@ controls:
249258 these findings.
250259 - id : OSPS-VM-05.02
251260 text : |
252- The project documentation MUST include a policy to address SCA
253- violations prior to any release.
261+ While active, the project documentation MUST include a policy to
262+ address SCA violations prior to any release.
254263 applicability :
255264 - Maturity Level 3
256265 recommendation : |
@@ -259,10 +268,11 @@ controls:
259268 that verify compliance with that policy prior to release.
260269 - id : OSPS-VM-05.03
261270 text : |
262- All changes to the project's codebase MUST be automatically evaluated
263- against a documented policy for malicious dependencies and
264- known vulnerabilities in dependencies and blocked in the event of
265- violations except when declared and suppressed as non-exploitable.
271+ While active, all changes to the project's codebase MUST be
272+ automatically evaluated against a documented policy for malicious
273+ dependencies and known vulnerabilities in dependencies, then blocked
274+ in the event of violations, except when declared and suppressed as
275+ non-exploitable.
266276 applicability :
267277 - Maturity Level 3
268278 recommendation : |
@@ -273,7 +283,8 @@ controls:
273283
274284 - id : OSPS-VM-06
275285 title : |
276- Define and enforce a threshold for remediation of SAST findings
286+ The project documentation MUST enforce a policy that defines a
287+ threshold for remediation of SAST findings.
277288 objective : |
278289 Identify and address defects and security weaknesses in the project's
279290 codebase early in the development process, reducing the risk of shipping
@@ -283,8 +294,8 @@ controls:
283294 assessment-requirements :
284295 - id : OSPS-VM-06.01
285296 text : |
286- The project documentation MUST include a policy that defines a
287- threshold for remediation of SAST findings.
297+ While active, the project documentation MUST include a policy that
298+ defines a threshold for remediation of SAST findings.
288299 applicability :
289300 - Maturity Level 3
290301 recommendation : |
@@ -294,10 +305,10 @@ controls:
294305 these findings.
295306 - id : OSPS-VM-06.02
296307 text : |
297- All changes to the project's codebase MUST be automatically evaluated
298- against a documented policy for security weaknesses and blocked in the
299- event of violations except when declared and suppressed as
300- non-exploitable.
308+ While active, all changes to the project's codebase MUST be
309+ automatically evaluated against a documented policy for security
310+ weaknesses and blocked in the event of violations except when declared
311+ and suppressed as non-exploitable.
301312 applicability :
302313 - Maturity Level 3
303314 recommendation : |
0 commit comments