@@ -8,139 +8,6 @@ description: |
88 security threats and vulnerabilities in the software.
99controls :
1010 - id : OSPS-VM-01
11- title : |
12- Define a threshold for remediation of SCA findings related to
13- vulnerabilities and licenses
14- objective : |
15- Ensure that the project clearly communicates the threshold for remediation of
16- SCA findings, including vulnerabilities and license issues in software
17- dependencies.
18- family : Vulnerability Management
19- mappings :
20- - reference-id : BPB
21- identifiers :
22- - Q-B-12
23- - Q-S-9
24- - S-B-14
25- - S-B-15
26- - A-B-3
27- - A-B-8
28- - reference-id : CRA
29- identifiers :
30- - 1.2a
31- - 1.2b
32- - 1.2c
33- - 2.1
34- - 2.2
35- - 2.3
36- - reference-id : SSDF
37- identifiers :
38- - PO.4
39- - PW1.2
40- - PW8.1
41- - RV2.1
42- - RV 2.2
43- - reference-id : CSF
44- identifiers :
45- - GV.RM-05
46- - GV.RM-06
47- - GV.PO-01
48- - GV.PO-02
49- - ID.RA-01
50- - ID.RA-08
51- - ID.IM-02
52- - reference-id : OC
53- identifiers :
54- - 4.1.5
55- - 4.2.1
56- - 4.3.2
57- - reference-id : OCRE
58- identifiers :
59- - 124-564
60- - 832-555
61- - 611-158
62- - 207-435
63- - 088-377
64- assessment-requirements :
65- - id : OSPS-VM-01.01
66- text : |
67- The project documentation MUST include a policy that defines a threshold
68- for remediation of SCA findings related to vulnerabilities and licenses.
69- applicability :
70- - Maturity Level 3
71- recommendation : |
72- Document a policy in the project that defines a threshold for
73- remediation of SCA findings related to vulnerabilities and licenses.
74- Include the process for identifying, prioritizing, and remediating
75- these findings.
76-
77- - id : OSPS-VM-02
78- title : |
79- Address SCA violations prior to merge and release
80- objective : |
81- Ensure that violations of your SCA policy are addressed before software
82- is merged as well as before it releases, reducing the risk of compromised
83- delivery mechanisms or released software assets that are vulnerable or
84- malicious.
85- family : Vulnerability Management
86- mappings :
87- - reference-id : BPB
88- identifiers :
89- - S-B-14
90- - S-B-15
91- - A-B-3
92- - A-B-8
93- - reference-id : CRA
94- identifiers :
95- - 1.2a
96- - 1.2c
97- - 2.2
98- - 2.3
99- - reference-id : SSDF
100- identifiers :
101- - PW8.1
102- - reference-id : CSF
103- identifiers :
104- - GV.PO-01
105- - GV.PO-02
106- - ID.RA-01
107- - ID.RA-08
108- - reference-id : OC
109- identifiers :
110- - 4.1.5
111- - reference-id : OCRE
112- identifiers :
113- - 486-813
114- - 833-442
115- - 611-158
116- - 207-435
117- - 088-377
118- assessment-requirements :
119- - id : OSPS-VM-02.01
120- text : |
121- The project documentation MUST include a policy to address SCA
122- violations prior to any release.
123- applicability :
124- - Maturity Level 3
125- recommendation : |
126- Document a policy in the project to address applicable Software
127- Composition Analysis results before any release, and add status checks
128- that verify compliance with that policy prior to release.
129- - id : OSPS-VM-02.02
130- text : |
131- All proposed changes to the project's codebase must be automatically
132- evaluated against a documented policy for known vulnerabilities and
133- blocked in the event of violations except when declared and suppressed
134- as non-exploitable.
135- applicability :
136- - Maturity Level 3
137- recommendation : |
138- Create a status check in the project's version control system that
139- runs a Static Application Security Testing (SAST) tool on all changes
140- to the codebase. Require that the status check passes before changes
141- can be merged.
142-
143- - id : OSPS-VM-03
14411 title : |
14512 Define a policy for coordinated vulnerability reporting
14613 objective : |
@@ -181,7 +48,7 @@ controls:
18148 identifiers :
18249 - 887-750
18350 assessment-requirements :
184- - id : OSPS-VM-03 .01
51+ - id : OSPS-VM-01 .01
18552 text : |
18653 The project documentation MUST include a policy for coordinated
18754 vulnerability reporting, with a clear timeframe for response.
@@ -194,7 +61,7 @@ controls:
19461 method for reporting vulnerabilities. Set expectations for the how the
19562 project will respond and address reported issues.
19663
197- - id : OSPS-VM-04
64+ - id : OSPS-VM-02
19865 title : |
19966 Publish contacts and process for reporting vulnerabilities
20067 objective : |
@@ -228,7 +95,7 @@ controls:
22895 identifiers :
22996 - 464-513
23097 assessment-requirements :
231- - id : OSPS-VM-04 .01
98+ - id : OSPS-VM-02 .01
23299 text : |
233100 The project MUST publish contacts and process for reporting vulnerabilities.
234101 applicability :
@@ -238,7 +105,7 @@ controls:
238105 contacts for the project and provide project's process for handling
239106 vulnerabilities in the project or dependencies.
240107
241- - id : OSPS-VM-05
108+ - id : OSPS-VM-03
242109 title : |
243110 Provide a means for reporting security vulnerabilities privately
244111 objective : |
@@ -258,7 +125,7 @@ controls:
258125 identifiers :
259126 - 308-514
260127 assessment-requirements :
261- - id : OSPS-VM-05 .01
128+ - id : OSPS-VM-03 .01
262129 text : |
263130 The project MUST provide a means for reporting security
264131 vulnerabilities privately to the security contacts within the project.
@@ -268,7 +135,7 @@ controls:
268135 recommendation : |
269136 Enable private bug reporting through VCS or other infrastructure.
270137
271- - id : OSPS-VM-06
138+ - id : OSPS-VM-04
272139 title : |
273140 Publicly publish data about any vulnerabilities discovered
274141 objective : |
@@ -284,16 +151,145 @@ controls:
284151 - 2.4
285152 - 2.6
286153 assessment-requirements :
287- - id : OSPS-VM-06 .01
154+ - id : OSPS-VM-04 .01
288155 text : |
289156 The project MUST publicly publish data about discovered
290157 vulnerabilities.
291158 applicability :
292- - Maturity Level 2
293159 - Maturity Level 3
294160 recommendation : |
295161 Provide information about known vulnerabilities in a predictable
296162 public channel, such as a CVE entry, blog post, or other medium.
297163 To the degree possible, this information should include affected
298164 version(s), how a consumer can determine if they are vulnerable, and
299165 instructions for mitigation or remediation.
166+
167+ - id : OSPS-VM-05
168+ title : |
169+ Define and enforce a threshold for remediation of SCA findings related to
170+ vulnerabilities and licenses
171+ objective : |
172+ Ensure that the project clearly communicates the threshold for remediation
173+ of SCA findings, including vulnerabilities and license issues in software
174+ dependencies.
175+ Ensure that violations of your SCA policy are addressed before software
176+ is merged as well as before it releases, reducing the risk of compromised
177+ delivery mechanisms or released software assets that are vulnerable or
178+ malicious.
179+ family : Vulnerability Management
180+ mappings :
181+ - reference-id : BPB
182+ identifiers :
183+ - Q-B-12
184+ - Q-S-9
185+ - S-B-14
186+ - S-B-15
187+ - A-B-3
188+ - A-B-8
189+ - reference-id : CRA
190+ identifiers :
191+ - 1.2a
192+ - 1.2b
193+ - 1.2c
194+ - 2.1
195+ - 2.2
196+ - 2.3
197+ - reference-id : SSDF
198+ identifiers :
199+ - PO.4
200+ - PW1.2
201+ - PW8.1
202+ - RV2.1
203+ - RV 2.2
204+ - reference-id : CSF
205+ identifiers :
206+ - GV.RM-05
207+ - GV.RM-06
208+ - GV.PO-01
209+ - GV.PO-02
210+ - ID.RA-01
211+ - ID.RA-08
212+ - ID.IM-02
213+ - reference-id : OC
214+ identifiers :
215+ - 4.1.5
216+ - 4.2.1
217+ - 4.3.2
218+ - reference-id : OCRE
219+ identifiers :
220+ - 124-564
221+ - 832-555
222+ - 611-158
223+ - 207-435
224+ - 088-377
225+ assessment-requirements :
226+ - id : OSPS-VM-05.01
227+ text : |
228+ The project documentation MUST include a policy that defines a
229+ threshold for remediation of SCA findings related to vulnerabilities
230+ and licenses.
231+ applicability :
232+ - Maturity Level 3
233+ recommendation : |
234+ Document a policy in the project that defines a threshold for
235+ remediation of SCA findings related to vulnerabilities and licenses.
236+ Include the process for identifying, prioritizing, and remediating
237+ these findings.
238+ - id : OSPS-VM-05.02
239+ text : |
240+ The project documentation MUST include a policy to address SCA
241+ violations prior to any release.
242+ applicability :
243+ - Maturity Level 3
244+ recommendation : |
245+ Document a policy in the project to address applicable Software
246+ Composition Analysis results before any release, and add status checks
247+ that verify compliance with that policy prior to release.
248+ - id : OSPS-VM-05.03
249+ text : |
250+ All changes to the project's codebase with new dependencies MUST
251+ be automatically evaluated against a documented policy for known
252+ vulnerabilities and blocked in the event of violations except when
253+ declared and suppressed as non-exploitable.
254+ applicability :
255+ - Maturity Level 3
256+ recommendation : |
257+ Create a status check in the project's version control system that
258+ runs a Software Composition Analysis tool on all changes
259+ to the codebase. Require that the status check passes before changes
260+ can be merged.
261+
262+ - id : OSPS-VM-06
263+ title : |
264+ Define and enforce a threshold for remediation of SAST findings
265+ objective : |
266+ Identify and address defects and security weaknesses in the project's
267+ codebase early in the development process, reducing the risk of shipping
268+ insecure software.
269+ family : Vulnerability Management
270+ mappings : []
271+ assessment-requirements :
272+ - id : OSPS-VM-06.01
273+ text : |
274+ The project documentation MUST include a policy that defines a
275+ threshold for remediation of SAST findings.
276+ applicability :
277+ - Maturity Level 3
278+ recommendation : |
279+ Document a policy in the project that defines a threshold for
280+ remediation of Static Application Security Testing (SAST) findings.
281+ Include the process for identifying, prioritizing, and remediating
282+ these findings.
283+ - id : OSPS-VM-06.02
284+ text : |
285+ All changes to the project's codebase MUST be automatically evaluated
286+ against a documented policy for security weaknesses and blocked in the
287+ event of violations except when declared and suppressed as
288+ non-exploitable.
289+ applicability :
290+ - Maturity Level 3
291+ recommendation : |
292+ Create a status check in the project's version control system that
293+ runs a Static Application Security Testing (SAST) tool on all changes
294+ to the codebase. Require that the status check passes before changes
295+ can be merged.
0 commit comments