Skip to content

Commit f0c75ee

Browse files
committed
Updated SCA and SAST checks
Signed-off-by: Eddie Knight <knight@linux.com>
1 parent 8c23075 commit f0c75ee

File tree

1 file changed

+137
-141
lines changed

1 file changed

+137
-141
lines changed

baseline/OSPS-VM.yaml

Lines changed: 137 additions & 141 deletions
Original file line numberDiff line numberDiff line change
@@ -8,139 +8,6 @@ description: |
88
security threats and vulnerabilities in the software.
99
controls:
1010
- id: OSPS-VM-01
11-
title: |
12-
Define a threshold for remediation of SCA findings related to
13-
vulnerabilities and licenses
14-
objective: |
15-
Ensure that the project clearly communicates the threshold for remediation of
16-
SCA findings, including vulnerabilities and license issues in software
17-
dependencies.
18-
family: Vulnerability Management
19-
mappings:
20-
- reference-id: BPB
21-
identifiers:
22-
- Q-B-12
23-
- Q-S-9
24-
- S-B-14
25-
- S-B-15
26-
- A-B-3
27-
- A-B-8
28-
- reference-id: CRA
29-
identifiers:
30-
- 1.2a
31-
- 1.2b
32-
- 1.2c
33-
- 2.1
34-
- 2.2
35-
- 2.3
36-
- reference-id: SSDF
37-
identifiers:
38-
- PO.4
39-
- PW1.2
40-
- PW8.1
41-
- RV2.1
42-
- RV 2.2
43-
- reference-id: CSF
44-
identifiers:
45-
- GV.RM-05
46-
- GV.RM-06
47-
- GV.PO-01
48-
- GV.PO-02
49-
- ID.RA-01
50-
- ID.RA-08
51-
- ID.IM-02
52-
- reference-id: OC
53-
identifiers:
54-
- 4.1.5
55-
- 4.2.1
56-
- 4.3.2
57-
- reference-id: OCRE
58-
identifiers:
59-
- 124-564
60-
- 832-555
61-
- 611-158
62-
- 207-435
63-
- 088-377
64-
assessment-requirements:
65-
- id: OSPS-VM-01.01
66-
text: |
67-
The project documentation MUST include a policy that defines a threshold
68-
for remediation of SCA findings related to vulnerabilities and licenses.
69-
applicability:
70-
- Maturity Level 3
71-
recommendation: |
72-
Document a policy in the project that defines a threshold for
73-
remediation of SCA findings related to vulnerabilities and licenses.
74-
Include the process for identifying, prioritizing, and remediating
75-
these findings.
76-
77-
- id: OSPS-VM-02
78-
title: |
79-
Address SCA violations prior to merge and release
80-
objective: |
81-
Ensure that violations of your SCA policy are addressed before software
82-
is merged as well as before it releases, reducing the risk of compromised
83-
delivery mechanisms or released software assets that are vulnerable or
84-
malicious.
85-
family: Vulnerability Management
86-
mappings:
87-
- reference-id: BPB
88-
identifiers:
89-
- S-B-14
90-
- S-B-15
91-
- A-B-3
92-
- A-B-8
93-
- reference-id: CRA
94-
identifiers:
95-
- 1.2a
96-
- 1.2c
97-
- 2.2
98-
- 2.3
99-
- reference-id: SSDF
100-
identifiers:
101-
- PW8.1
102-
- reference-id: CSF
103-
identifiers:
104-
- GV.PO-01
105-
- GV.PO-02
106-
- ID.RA-01
107-
- ID.RA-08
108-
- reference-id: OC
109-
identifiers:
110-
- 4.1.5
111-
- reference-id: OCRE
112-
identifiers:
113-
- 486-813
114-
- 833-442
115-
- 611-158
116-
- 207-435
117-
- 088-377
118-
assessment-requirements:
119-
- id: OSPS-VM-02.01
120-
text: |
121-
The project documentation MUST include a policy to address SCA
122-
violations prior to any release.
123-
applicability:
124-
- Maturity Level 3
125-
recommendation: |
126-
Document a policy in the project to address applicable Software
127-
Composition Analysis results before any release, and add status checks
128-
that verify compliance with that policy prior to release.
129-
- id: OSPS-VM-02.02
130-
text: |
131-
All proposed changes to the project's codebase must be automatically
132-
evaluated against a documented policy for known vulnerabilities and
133-
blocked in the event of violations except when declared and suppressed
134-
as non-exploitable.
135-
applicability:
136-
- Maturity Level 3
137-
recommendation: |
138-
Create a status check in the project's version control system that
139-
runs a Static Application Security Testing (SAST) tool on all changes
140-
to the codebase. Require that the status check passes before changes
141-
can be merged.
142-
143-
- id: OSPS-VM-03
14411
title: |
14512
Define a policy for coordinated vulnerability reporting
14613
objective: |
@@ -181,7 +48,7 @@ controls:
18148
identifiers:
18249
- 887-750
18350
assessment-requirements:
184-
- id: OSPS-VM-03.01
51+
- id: OSPS-VM-01.01
18552
text: |
18653
The project documentation MUST include a policy for coordinated
18754
vulnerability reporting, with a clear timeframe for response.
@@ -194,7 +61,7 @@ controls:
19461
method for reporting vulnerabilities. Set expectations for the how the
19562
project will respond and address reported issues.
19663
197-
- id: OSPS-VM-04
64+
- id: OSPS-VM-02
19865
title: |
19966
Publish contacts and process for reporting vulnerabilities
20067
objective: |
@@ -228,7 +95,7 @@ controls:
22895
identifiers:
22996
- 464-513
23097
assessment-requirements:
231-
- id: OSPS-VM-04.01
98+
- id: OSPS-VM-02.01
23299
text: |
233100
The project MUST publish contacts and process for reporting vulnerabilities.
234101
applicability:
@@ -238,7 +105,7 @@ controls:
238105
contacts for the project and provide project's process for handling
239106
vulnerabilities in the project or dependencies.
240107
241-
- id: OSPS-VM-05
108+
- id: OSPS-VM-03
242109
title: |
243110
Provide a means for reporting security vulnerabilities privately
244111
objective: |
@@ -258,7 +125,7 @@ controls:
258125
identifiers:
259126
- 308-514
260127
assessment-requirements:
261-
- id: OSPS-VM-05.01
128+
- id: OSPS-VM-03.01
262129
text: |
263130
The project MUST provide a means for reporting security
264131
vulnerabilities privately to the security contacts within the project.
@@ -268,7 +135,7 @@ controls:
268135
recommendation: |
269136
Enable private bug reporting through VCS or other infrastructure.
270137
271-
- id: OSPS-VM-06
138+
- id: OSPS-VM-04
272139
title: |
273140
Publicly publish data about any vulnerabilities discovered
274141
objective: |
@@ -284,16 +151,145 @@ controls:
284151
- 2.4
285152
- 2.6
286153
assessment-requirements:
287-
- id: OSPS-VM-06.01
154+
- id: OSPS-VM-04.01
288155
text: |
289156
The project MUST publicly publish data about discovered
290157
vulnerabilities.
291158
applicability:
292-
- Maturity Level 2
293159
- Maturity Level 3
294160
recommendation: |
295161
Provide information about known vulnerabilities in a predictable
296162
public channel, such as a CVE entry, blog post, or other medium.
297163
To the degree possible, this information should include affected
298164
version(s), how a consumer can determine if they are vulnerable, and
299165
instructions for mitigation or remediation.
166+
167+
- id: OSPS-VM-05
168+
title: |
169+
Define and enforce a threshold for remediation of SCA findings related to
170+
vulnerabilities and licenses
171+
objective: |
172+
Ensure that the project clearly communicates the threshold for remediation
173+
of SCA findings, including vulnerabilities and license issues in software
174+
dependencies.
175+
Ensure that violations of your SCA policy are addressed before software
176+
is merged as well as before it releases, reducing the risk of compromised
177+
delivery mechanisms or released software assets that are vulnerable or
178+
malicious.
179+
family: Vulnerability Management
180+
mappings:
181+
- reference-id: BPB
182+
identifiers:
183+
- Q-B-12
184+
- Q-S-9
185+
- S-B-14
186+
- S-B-15
187+
- A-B-3
188+
- A-B-8
189+
- reference-id: CRA
190+
identifiers:
191+
- 1.2a
192+
- 1.2b
193+
- 1.2c
194+
- 2.1
195+
- 2.2
196+
- 2.3
197+
- reference-id: SSDF
198+
identifiers:
199+
- PO.4
200+
- PW1.2
201+
- PW8.1
202+
- RV2.1
203+
- RV 2.2
204+
- reference-id: CSF
205+
identifiers:
206+
- GV.RM-05
207+
- GV.RM-06
208+
- GV.PO-01
209+
- GV.PO-02
210+
- ID.RA-01
211+
- ID.RA-08
212+
- ID.IM-02
213+
- reference-id: OC
214+
identifiers:
215+
- 4.1.5
216+
- 4.2.1
217+
- 4.3.2
218+
- reference-id: OCRE
219+
identifiers:
220+
- 124-564
221+
- 832-555
222+
- 611-158
223+
- 207-435
224+
- 088-377
225+
assessment-requirements:
226+
- id: OSPS-VM-05.01
227+
text: |
228+
The project documentation MUST include a policy that defines a
229+
threshold for remediation of SCA findings related to vulnerabilities
230+
and licenses.
231+
applicability:
232+
- Maturity Level 3
233+
recommendation: |
234+
Document a policy in the project that defines a threshold for
235+
remediation of SCA findings related to vulnerabilities and licenses.
236+
Include the process for identifying, prioritizing, and remediating
237+
these findings.
238+
- id: OSPS-VM-05.02
239+
text: |
240+
The project documentation MUST include a policy to address SCA
241+
violations prior to any release.
242+
applicability:
243+
- Maturity Level 3
244+
recommendation: |
245+
Document a policy in the project to address applicable Software
246+
Composition Analysis results before any release, and add status checks
247+
that verify compliance with that policy prior to release.
248+
- id: OSPS-VM-05.03
249+
text: |
250+
All changes to the project's codebase with new dependencies MUST
251+
be automatically evaluated against a documented policy for known
252+
vulnerabilities and blocked in the event of violations except when
253+
declared and suppressed as non-exploitable.
254+
applicability:
255+
- Maturity Level 3
256+
recommendation: |
257+
Create a status check in the project's version control system that
258+
runs a Software Composition Analysis tool on all changes
259+
to the codebase. Require that the status check passes before changes
260+
can be merged.
261+
262+
- id: OSPS-VM-06
263+
title: |
264+
Define and enforce a threshold for remediation of SAST findings
265+
objective: |
266+
Identify and address defects and security weaknesses in the project's
267+
codebase early in the development process, reducing the risk of shipping
268+
insecure software.
269+
family: Vulnerability Management
270+
mappings: []
271+
assessment-requirements:
272+
- id: OSPS-VM-06.01
273+
text: |
274+
The project documentation MUST include a policy that defines a
275+
threshold for remediation of SAST findings.
276+
applicability:
277+
- Maturity Level 3
278+
recommendation: |
279+
Document a policy in the project that defines a threshold for
280+
remediation of Static Application Security Testing (SAST) findings.
281+
Include the process for identifying, prioritizing, and remediating
282+
these findings.
283+
- id: OSPS-VM-06.02
284+
text: |
285+
All changes to the project's codebase MUST be automatically evaluated
286+
against a documented policy for security weaknesses and blocked in the
287+
event of violations except when declared and suppressed as
288+
non-exploitable.
289+
applicability:
290+
- Maturity Level 3
291+
recommendation: |
292+
Create a status check in the project's version control system that
293+
runs a Static Application Security Testing (SAST) tool on all changes
294+
to the codebase. Require that the status check passes before changes
295+
can be merged.

0 commit comments

Comments
 (0)