@@ -8,139 +8,6 @@ description: |
88 security threats and vulnerabilities in the software.
99controls :
1010 - id : OSPS-VM-01
11- title : |
12- Define a threshold for remediation of SCA findings related to
13- vulnerabilities and licenses
14- objective : |
15- Ensure that the project clearly communicates the threshold for remediation of
16- SCA findings, including vulnerabilities and license issues in software
17- dependencies.
18- family : Vulnerability Management
19- mappings :
20- - reference-id : BPB
21- identifiers :
22- - Q-B-12
23- - Q-S-9
24- - S-B-14
25- - S-B-15
26- - A-B-3
27- - A-B-8
28- - reference-id : CRA
29- identifiers :
30- - 1.2a
31- - 1.2b
32- - 1.2c
33- - 2.1
34- - 2.2
35- - 2.3
36- - reference-id : SSDF
37- identifiers :
38- - PO.4
39- - PW1.2
40- - PW8.1
41- - RV2.1
42- - RV 2.2
43- - reference-id : CSF
44- identifiers :
45- - GV.RM-05
46- - GV.RM-06
47- - GV.PO-01
48- - GV.PO-02
49- - ID.RA-01
50- - ID.RA-08
51- - ID.IM-02
52- - reference-id : OC
53- identifiers :
54- - 4.1.5
55- - 4.2.1
56- - 4.3.2
57- - reference-id : OCRE
58- identifiers :
59- - 124-564
60- - 832-555
61- - 611-158
62- - 207-435
63- - 088-377
64- assessment-requirements :
65- - id : OSPS-VM-01.01
66- text : |
67- The project documentation MUST include a policy that defines a threshold
68- for remediation of SCA findings related to vulnerabilities and licenses.
69- applicability :
70- - Maturity Level 3
71- recommendation : |
72- Document a policy in the project that defines a threshold for
73- remediation of SCA findings related to vulnerabilities and licenses.
74- Include the process for identifying, prioritizing, and remediating
75- these findings.
76-
77- - id : OSPS-VM-02
78- title : |
79- Address SCA violations prior to merge and release
80- objective : |
81- Ensure that violations of your SCA policy are addressed before software
82- is merged as well as before it releases, reducing the risk of compromised
83- delivery mechanisms or released software assets that are vulnerable or
84- malicious.
85- family : Vulnerability Management
86- mappings :
87- - reference-id : BPB
88- identifiers :
89- - S-B-14
90- - S-B-15
91- - A-B-3
92- - A-B-8
93- - reference-id : CRA
94- identifiers :
95- - 1.2a
96- - 1.2c
97- - 2.2
98- - 2.3
99- - reference-id : SSDF
100- identifiers :
101- - PW8.1
102- - reference-id : CSF
103- identifiers :
104- - GV.PO-01
105- - GV.PO-02
106- - ID.RA-01
107- - ID.RA-08
108- - reference-id : OC
109- identifiers :
110- - 4.1.5
111- - reference-id : OCRE
112- identifiers :
113- - 486-813
114- - 833-442
115- - 611-158
116- - 207-435
117- - 088-377
118- assessment-requirements :
119- - id : OSPS-VM-02.01
120- text : |
121- The project documentation MUST include a policy to address SCA
122- violations prior to any release.
123- applicability :
124- - Maturity Level 3
125- recommendation : |
126- Document a policy in the project to address applicable Software
127- Composition Analysis results before any release, and add status checks
128- that verify compliance with that policy prior to release.
129- - id : OSPS-VM-02.02
130- text : |
131- All proposed changes to the project's codebase must be automatically
132- evaluated against a documented policy for known vulnerabilities and
133- blocked in the event of violations except when declared and suppressed
134- as non-exploitable.
135- applicability :
136- - Maturity Level 3
137- recommendation : |
138- Create a status check in the project's version control system that
139- runs a Static Application Security Testing (SAST) tool on all changes
140- to the codebase. Require that the status check passes before changes
141- can be merged.
142-
143- - id : OSPS-VM-03
14411 title : |
14512 Define a policy for coordinated vulnerability reporting
14613 objective : |
@@ -181,7 +48,7 @@ controls:
18148 identifiers :
18249 - 887-750
18350 assessment-requirements :
184- - id : OSPS-VM-03 .01
51+ - id : OSPS-VM-01 .01
18552 text : |
18653 The project documentation MUST include a policy for coordinated
18754 vulnerability reporting, with a clear timeframe for response.
@@ -194,7 +61,7 @@ controls:
19461 method for reporting vulnerabilities. Set expectations for the how the
19562 project will respond and address reported issues.
19663
197- - id : OSPS-VM-04
64+ - id : OSPS-VM-02
19865 title : |
19966 Publish contacts and process for reporting vulnerabilities
20067 objective : |
@@ -228,7 +95,7 @@ controls:
22895 identifiers :
22996 - 464-513
23097 assessment-requirements :
231- - id : OSPS-VM-04 .01
98+ - id : OSPS-VM-02 .01
23299 text : |
233100 The project MUST publish contacts and process for reporting vulnerabilities.
234101 applicability :
@@ -238,7 +105,7 @@ controls:
238105 contacts for the project and provide project's process for handling
239106 vulnerabilities in the project or dependencies.
240107
241- - id : OSPS-VM-05
108+ - id : OSPS-VM-03
242109 title : |
243110 Provide a means for reporting security vulnerabilities privately
244111 objective : |
@@ -258,7 +125,7 @@ controls:
258125 identifiers :
259126 - 308-514
260127 assessment-requirements :
261- - id : OSPS-VM-05 .01
128+ - id : OSPS-VM-03 .01
262129 text : |
263130 The project MUST provide a means for reporting security
264131 vulnerabilities privately to the security contacts within the project.
@@ -268,7 +135,7 @@ controls:
268135 recommendation : |
269136 Enable private bug reporting through VCS or other infrastructure.
270137
271- - id : OSPS-VM-06
138+ - id : OSPS-VM-04
272139 title : |
273140 Publicly publish data about any vulnerabilities discovered
274141 objective : |
@@ -284,7 +151,7 @@ controls:
284151 - 2.4
285152 - 2.6
286153 assessment-requirements :
287- - id : OSPS-VM-06 .01
154+ - id : OSPS-VM-04 .01
288155 text : |
289156 The project MUST publicly publish data about discovered
290157 vulnerabilities.
@@ -297,3 +164,144 @@ controls:
297164 To the degree possible, this information should include affected
298165 version(s), how a consumer can determine if they are vulnerable, and
299166 instructions for mitigation or remediation.
167+ - id : OSPS-VM-04.02
168+ text : |
169+ Any vulnerabilities in the software components not affecting the
170+ project MUST be accounted for in a VEX document, augmenting
171+ the vulnerability report with non-exploitability details.
172+ applicability :
173+ - Maturity Level 3
174+ recommendation : |
175+ Establish a VEX feed communicating the exploitability status of
176+ known vulnerabilities, including assessment details or any
177+ mitigations in place preventing vulnerable code from being
178+ executed.
179+
180+ - id : OSPS-VM-05
181+ title : |
182+ Define and enforce a threshold for remediation of SCA findings
183+ objective : |
184+ Ensure that the project clearly communicates the threshold for remediation
185+ of SCA findings, including vulnerabilities and license issues in software
186+ dependencies.
187+ Ensure that violations of your SCA policy are addressed before software
188+ is merged as well as before it releases, reducing the risk of compromised
189+ delivery mechanisms or released software assets that are vulnerable or
190+ malicious.
191+ family : Vulnerability Management
192+ mappings :
193+ - reference-id : BPB
194+ identifiers :
195+ - Q-B-12
196+ - Q-S-9
197+ - S-B-14
198+ - S-B-15
199+ - A-B-3
200+ - A-B-8
201+ - reference-id : CRA
202+ identifiers :
203+ - 1.2a
204+ - 1.2b
205+ - 1.2c
206+ - 2.1
207+ - 2.2
208+ - 2.3
209+ - reference-id : SSDF
210+ identifiers :
211+ - PO.4
212+ - PW1.2
213+ - PW8.1
214+ - RV2.1
215+ - RV 2.2
216+ - reference-id : CSF
217+ identifiers :
218+ - GV.RM-05
219+ - GV.RM-06
220+ - GV.PO-01
221+ - GV.PO-02
222+ - ID.RA-01
223+ - ID.RA-08
224+ - ID.IM-02
225+ - reference-id : OC
226+ identifiers :
227+ - 4.1.5
228+ - 4.2.1
229+ - 4.3.2
230+ - reference-id : OCRE
231+ identifiers :
232+ - 124-564
233+ - 832-555
234+ - 611-158
235+ - 207-435
236+ - 088-377
237+ assessment-requirements :
238+ - id : OSPS-VM-05.01
239+ text : |
240+ The project documentation MUST include a policy that defines a
241+ threshold for remediation of SCA findings related to vulnerabilities
242+ and licenses.
243+ applicability :
244+ - Maturity Level 3
245+ recommendation : |
246+ Document a policy in the project that defines a threshold for
247+ remediation of SCA findings related to vulnerabilities and licenses.
248+ Include the process for identifying, prioritizing, and remediating
249+ these findings.
250+ - id : OSPS-VM-05.02
251+ text : |
252+ The project documentation MUST include a policy to address SCA
253+ violations prior to any release.
254+ applicability :
255+ - Maturity Level 3
256+ recommendation : |
257+ Document a policy in the project to address applicable Software
258+ Composition Analysis results before any release, and add status checks
259+ that verify compliance with that policy prior to release.
260+ - id : OSPS-VM-05.03
261+ text : |
262+ All changes to the project's codebase MUST be automatically evaluated
263+ against a documented policy for malicious dependencies and
264+ known vulnerabilities in dependencies and blocked in the event of
265+ violations except when declared and suppressed as non-exploitable.
266+ applicability :
267+ - Maturity Level 3
268+ recommendation : |
269+ Create a status check in the project's version control system that
270+ runs a Software Composition Analysis tool on all changes
271+ to the codebase. Require that the status check passes before changes
272+ can be merged.
273+
274+ - id : OSPS-VM-06
275+ title : |
276+ Define and enforce a threshold for remediation of SAST findings
277+ objective : |
278+ Identify and address defects and security weaknesses in the project's
279+ codebase early in the development process, reducing the risk of shipping
280+ insecure software.
281+ family : Vulnerability Management
282+ mappings : []
283+ assessment-requirements :
284+ - id : OSPS-VM-06.01
285+ text : |
286+ The project documentation MUST include a policy that defines a
287+ threshold for remediation of SAST findings.
288+ applicability :
289+ - Maturity Level 3
290+ recommendation : |
291+ Document a policy in the project that defines a threshold for
292+ remediation of Static Application Security Testing (SAST) findings.
293+ Include the process for identifying, prioritizing, and remediating
294+ these findings.
295+ - id : OSPS-VM-06.02
296+ text : |
297+ All changes to the project's codebase MUST be automatically evaluated
298+ against a documented policy for security weaknesses and blocked in the
299+ event of violations except when declared and suppressed as
300+ non-exploitable.
301+ applicability :
302+ - Maturity Level 3
303+ recommendation : |
304+ Create a status check in the project's version control system that
305+ runs a Static Application Security Testing (SAST) tool on all changes
306+ to the codebase. Require that the status check passes before changes
307+ can be merged.
0 commit comments