Skip to content

Potential gaps to address prior to intial release & implemenation #32

@SecurityCRob

Description

@SecurityCRob

In reviewing the current baseline(1) I've come across a few things that could be gaps, oversights, or perhaps were intentionally removed for some reason. I'd like the group to discuss if we want to included them so we better align with industry frameworks and the initial TAC proposal(2). I perhaps overlooked something we have already, but perhaps it was phrased in a way that didn't make it obvious to me the goals were the same.

  • Generate SBOMs
  • Only release signed artifacts
  • Run automated tools and scanners to find defects and vulns
  • Review dependencies for security & quality
  • No hard-coded secrets or hard-coded accounts
  • Data protections at rest, in use, and in transit
  • Handling data/PII
  • SLSA lvls?
  • Logging enabled
  • Documented project requirements, including security requirements
  • Threat Modeling/Attack surface analysis

Thanks in advance for the group feedback.

(1) - https://github.com/ossf/security-baseline/blob/main/baseline.md
(2) - https://github.com/ossf/tac/blob/main/process/security_baseline.md

Metadata

Metadata

Labels

documentationImprovements or additions to documentationenhancementNew feature or requesthelp wantedExtra attention is needed

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions