Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Simple OSS Project Security Policy #95

Open
SecurityCRob opened this issue Feb 16, 2021 · 11 comments
Open

Simple OSS Project Security Policy #95

SecurityCRob opened this issue Feb 16, 2021 · 11 comments

Comments

@SecurityCRob
Copy link
Contributor

I'd like to use this issue to talk about what elements we'd like to see in a security policy that could be easily used by open source projects and maintainers that describes their security practices.

At a minimum it would be useful to have the following things documented so that collaborators, researchers, and consumers can understand how the project works with security:

  • Description of how the project manages security flaws
  • Method to report vulnerabilities that is confidential
  • Expectations and timeline that Finder/Researchers should have when reporting a flaw

What other items should we put into a template?

@JasonKeirstead
Copy link
Contributor

If applicable to the project - what is in-scope of the policy, and what is out-of-scope of the policy.

@david-a-wheeler
Copy link
Contributor

Method to report vulnerabilities that is confidential

Not all projects agree that vulnerabilities should be reported confidentially. So "Method to report vulnerabilities" should briefly note that.

There should be some easily-selected options for reporting. For private reporting, an easy approach is to provide email addresses with services that support STARTTLS or MTA-STS based encryption (such as GMail and runbox). We hope that GitHub will someday support private reporting of vulnerabilities to projects (GItHub supports private discussions, but not private reporting).

Under "expectations", note that "We (the OSS project) will gladly give you (the vulnerability reporter) public credit for the report unless you request otherwise". Many people fail to give a simple thank you with credit, which is weird because it costs nothing & that failure can be deeply offending.

You might want to look at some existing policies. Here is GitLab's:
https://about.gitlab.com/security/disclosure/

@lirantal
Copy link

Hi folks,
I started watching this repository a bit, hoping to find some time to get involved :-)

Noticing this issue, and wanted to raise that we have done something simlilar in the Node.js Security working group with proposing that projects adapt a SECURITY.md and proposed a policy such as this one: https://github.com/nodejs/security-wg/blob/master/processes/responsible_disclosure_template.md

@msmeissn
Copy link
Contributor

msmeissn commented Feb 21, 2021

Yes, first things that come to mind is:

  • clearly and easily be found means of contacting for security issues
    • email / bugform / whatever
    • direct link to encryption keys for emails if desired

What i found useful as i created SECURITY.md for libexif to set expectations, what actually are considered valid security issues.
( see here https://github.com/libexif/libexif/blob/master/SECURITY.md ) (toplevel SECURITY.md is actually known and linked by github even)

Perhaps from our side we can offer same simple or more complex examples as cross reference to chose from.

@lirantal
Copy link

Agree on the criteria of what is a valid security issue. Maybe we can even provide a closed list of those, as probably most (?) maintainers won't know what to write.

@annabellegoth2boss
Copy link
Contributor

A link to the SECURITY.md templates we created for the CVD for OSS guide. Ended up making a couple depending on what intake method projects were going to use.

@ericcornelissen
Copy link

I wanted to bring Trewaters/security-README to this group's attention as it relates to SECURITY.md templates.

@david-a-wheeler
Copy link
Contributor

@infojg9 - that would be an increase in scope for this project from just reporting & processing vulnerability repotrs. It's not wrong but we should discuss it first. If we do add this, there are many other things that could be added, including the CII Best Practices badge, Scorecard, Allstar, and SLSA.

@infojg9
Copy link

infojg9 commented Sep 26, 2021

@david-a-wheeler - indeed, just not very sure, at the time of solarwinds/colonial/codecov/eo-14028, without any clearly defined and enforced project security policy, "reporting & processing" would be like another chicken and egg situation, as many cots/gots likely unaware of security policies for "reporting & processing" at the very first place, e.g: https://www.politico.com/news/2021/08/17/blackberry-qnx-vulnerability-hackers-505649.

@EdOverflow
Copy link

Please feel free to use material from https://hackerone.com/ed and https://hackerone.com/liberapay's security policies. Both are CVD policies for (F)OSS projects.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

9 participants