Skip to content

Commit 82af014

Browse files
feat: add control OSPS-BR-07 for secrets management (#373)
* feat: add control OSPS-QA-08 for secrets management This change adds a new control to the Build & Release control family that focuses on secure handling and storage of project secrets. This change closes #352 Signed-off-by: Travis Truman <[email protected]> * Update OSPS-BR.yaml Co-authored-by: Evan Anderson <[email protected]> Signed-off-by: Travis Truman <[email protected]> * Update OSPS-BR.yaml Co-authored-by: Evan Anderson <[email protected]> Signed-off-by: Travis Truman <[email protected]> * chore: resequence controls Signed-off-by: Travis Truman <[email protected]> --------- Signed-off-by: Travis Truman <[email protected]> Co-authored-by: Evan Anderson <[email protected]>
1 parent 161edd4 commit 82af014

File tree

1 file changed

+33
-0
lines changed

1 file changed

+33
-0
lines changed

baseline/OSPS-BR.yaml

Lines changed: 33 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -465,3 +465,36 @@ controls:
465465
signature or attestations, such as GPG or PGP signature, Sigstore
466466
signatures, SLSA provenance, or SLSA VSAs. Include the cryptographic
467467
hashes of each asset in a signed manifest or metadata file.
468+
- id: OSPS-BR-07
469+
title: |
470+
The project MUST store and manage all secrets and credentials used by the project in a secure manner.
471+
objective: |
472+
Ensure that sensitive data is not disclosed, compromised or misused leading to security vulnerabilities or supply chain compromise.
473+
guideline-mappings:
474+
- reference-id: BPB
475+
identifiers:
476+
- S-B-5 # TODO: is this the right numbering for https://www.bestpractices.dev/en/criteria#0.no_leaked_credentials
477+
- reference-id: SSDF
478+
identifiers:
479+
- PO.1.1
480+
- P0.3.1
481+
- P0.4.2
482+
- PO.5.1
483+
- PW.1.2
484+
- PW.1.3
485+
- PW.5.1
486+
assessment-requirements:
487+
- id: OSPS-BR-07.01
488+
text: |
489+
The project MUST prevent the unintentional storage of unencrypted sensitive data, such as secrets and credentials, in the version control system.
490+
applicability:
491+
- Maturity Level 1
492+
recommendation: |
493+
Configure .gitignore or equivalent to exclude files that may contain sensitive information. Use pre-commit hooks and automated scanning tools to detect and prevent the inclusion of sensitive data in commits.
494+
- id: OSPS-BR-07.02
495+
text: |
496+
The project MUST define a policy for managing secrets and credentials used by the project. The policy should include guidelines for storing, accessing, and rotating secrets and credentials.
497+
applicability:
498+
- Maturity Level 3
499+
recommendation: |
500+
Document how secrets and credentials are managed and used within the project. This should include details on how secrets are stored (e.g., using a secrets management tool), how access is controlled, and how secrets are rotated or updated. Ensure that sensitive information is not hard-coded in the source code or stored in version control systems.

0 commit comments

Comments
 (0)