-
Notifications
You must be signed in to change notification settings - Fork 81
Security documentation #2475
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
Merged
Security documentation #2475
Changes from all commits
Commits
Show all changes
19 commits
Select commit
Hold shift + click to select a range
1780e09
docs(common): add security docs
ntacheva 108cfc2
chore(common): secrity docs polishment
ntacheva 9336127
Update security/faq.md
ntacheva 514a86c
Update security/faq.md
ntacheva 09a6f68
Update security/faq.md
ntacheva a8ef230
Update security/faq.md
ntacheva af93e1f
Update security/faq.md
ntacheva 868033f
Update security/overview.md
ntacheva d6796b3
Update security/faq.md
ntacheva cb26f10
Update security/overview.md
ntacheva 8fb8280
Update security/overview.md
ntacheva b271a72
Update security/overview.md
ntacheva 737d059
Update security/overview.md
ntacheva 3543eea
Update security/overview.md
ntacheva 8e72e0a
Update security/faq.md
ntacheva 3cd8e51
Update security/faq.md
ntacheva 8900ccb
Update security/faq.md
ntacheva 528a80a
Update security/faq.md
ntacheva a8d98ea
Update security/faq.md
ntacheva File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,71 @@ | ||
| --- | ||
| title: FAQ | ||
| page_title: FAQ | ||
| description: Find answers to common questions about securing Telerik UI for Blazor components, including how to report vulnerabilities, handle third-party dependencies, and receive security fixes. | ||
| slug: security-faq | ||
| tags: telerik, blazor, security | ||
| published: True | ||
| position: 3 | ||
| --- | ||
|
|
||
| # Frequently Asked Questions (FAQ) | ||
|
|
||
| This article provides essential information and resources to help you secure Telerik UI for Blazor components. This FAQ provides guidance on the Progress security processes, no matter if you need to report vulnerabilities, manage third-party dependencies, or understand how security fixes are delivered. Explore best practices and learn how Progress ensures the highest level of security for its products, from vulnerability reporting to compliance with industry standards. | ||
|
|
||
| ## How can I submit a security vulnerability report? | ||
|
|
||
| If you have identified a potential security vulnerability in a Telerik or Kendo UI product, you can report it through the following channels: | ||
|
|
||
| - **For Progress Customers**: Submit a security report by opening a support ticket through the [Technical Support Center](https://www.telerik.com/account/support-center). Provide detailed information, including the steps to reproduce the issue and any relevant reports or screenshots. | ||
|
|
||
| - **For Security Researchers**: Ethical hackers and security researchers can report vulnerabilities through our [Bugcrowd Vulnerability Disclosure Program](https://bugcrowd.com/engagements/whatsupgold-vdp). This platform ensures that security issues are addressed efficiently and transparently. | ||
|
|
||
| We will review the report and follow up in line with our security processes, making every effort to resolve confirmed vulnerabilities in a timely manner. | ||
|
|
||
| --- | ||
|
|
||
| ## What if I am using a third-party scanning tool and want Progress' assessment? | ||
|
|
||
| As a client, you can open a support ticket through the [Technical Support Center](https://www.telerik.com/account/support-center) for the respective product and submit detailed information, including scan reports (PDF/Word/Excel/Screenshot) triggered against a no-minified version of the scripts and steps to reproduce or evidence of the issue. Our team will review and respond accordingly. We treat Security Vulnerability reports with **highest priority** and we engage with our internal Security Champions for revisions. | ||
|
|
||
| >tip We recommend running the scan against the latest product version, as the problem may have already been resolved. | ||
|
|
||
| --- | ||
|
|
||
| ## What is Progress' policy on handling third-party dependencies? | ||
|
|
||
| Progress uses leading commercial tools to automatically monitor and update third-party dependencies in our Telerik and Kendo GitHub projects. Alerts are set up for all GitHub-hosted products, and any identified vulnerable dependencies are addressed by the repository owners and our dedicated security team. | ||
|
|
||
| Our definition of "done" includes successful builds that are scanned using top security scanning tools, and the resolution of any security alerts. | ||
|
|
||
| --- | ||
|
|
||
| ## Is security integrated into the CI pipeline? | ||
|
|
||
| Yes, for example, our CI builds use some of the leading security scanning tools to ensure that new code commits do not introduce vulnerabilities or insecure code. | ||
|
|
||
| --- | ||
|
|
||
| ## How does Progress prioritize security reports? | ||
|
|
||
| We prioritize security vulnerability reports with the highest urgency. When we receive an inquiry or vulnerability report, we analyze the issue to determine whether it's a false positive or a valid concern. If the report is confirmed as valid, we assess its severity using the CVSS (Common Vulnerability Scoring System) and release a patch based on the severity level. | ||
|
|
||
| --- | ||
|
|
||
| ## How are security fixes shipped? | ||
|
|
||
| Security fixes are typically included in the next product release. Similar to the bugfixes policy, we maintain and commit to support the latest version of the product. That said, if you want to benefit from a security fix, you would need to upgrade to the version where the fix exists. | ||
|
|
||
| --- | ||
|
|
||
| ## How am I notified about security fixes? | ||
|
|
||
| Once a vulnerability is fixed, we aim to release a patched version of the product. Depending on the severity of the issue, we may notify customers through CVE publications, email, blog posts, KB articles, or Release Notes for the specific product. | ||
|
|
||
| --- | ||
|
|
||
| ## Does Progress Telerik have any security certifications or accreditations, such as SOC 2 or other industry-recognized standards? | ||
|
|
||
| Yes, Progress and DevTools products perform annual SOC 2 compliance, which validates our commitment to security, confidentiality, and privacy. You can find more information about our compliance on the [Progress Trust Center](https://www.progress.com/trust-center). Additionally, we align our security practices with industry-leading frameworks to maintain and continually improve our high security standards. | ||
|
|
||
|
|
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,88 @@ | ||
| --- | ||
| title: Overview | ||
| page_title: Overview | ||
| description: Learn how to secure Telerik UI for Blazor components and your Web Forms app with best practices, vulnerability reporting, and component-specific security guidelines. | ||
| slug: security-overview | ||
| tags: telerik, blazor, security, xss, owasp, csp | ||
| published: True | ||
| position: 1 | ||
| --- | ||
|
|
||
| # Security | ||
|
|
||
| In today's world, security is more critical than ever. At Progress, we prioritize our customers' security, ensuring that our products are built with a strong foundation to safeguard their data and operations. We are committed to identifying and addressing potential vulnerabilities to provide our clients with the highest level of protection and confidence in our products. | ||
|
|
||
| ## Purpose of this Article | ||
|
|
||
| This article covers common security-related questions, best practices, and the tools and processes we use to ensure the security of our products. It also outlines how customers and security researchers can report security issues, including our processes to mitigate risks. We provide guidance for submitting security reports through technical support or Bugcrowd, ensuring a clear pathway for identifying and addressing security concerns. | ||
|
|
||
| ## Reporting Security Vulnerabilities | ||
|
|
||
| Whether you're a customer encountering an issue or a security researcher, we have processes to ensure a swift response and evaluation. Below are the steps for Progress customers and security researchers to report potential security vulnerabilities: | ||
|
|
||
| ### For Progress Customers | ||
|
|
||
| At Progress, we work diligently to identify and fix security vulnerabilities in our products. Customers who believe they have identified a security issue should contact Technical Support for an evaluation. This allows us to document the issue and have our engineering teams confirm and address it as needed. Customers can submit reports through our support center: | ||
|
|
||
| - [Technical Support](https://www.telerik.com/account/support-center) | ||
| - [Contact Us](https://www.telerik.com/account/support-center/contact-us/technical-support) | ||
|
|
||
| ### For Security Researchers | ||
|
|
||
| We value the contributions of security researchers and ethical hackers. If a researcher identifies a potential vulnerability, they can submit it via our [Bugcrowd](https://bugcrowd.com/engagements/devtools-vdp) platform. We aim to meet the following response times: | ||
|
|
||
| | Type of Response | SLO (in business days) | | ||
| |------------------|------------------------| | ||
| | First Response | 7 days | | ||
| | Time to Triage | 10 days | | ||
| | Time to Resolution| Depends on severity | | ||
|
|
||
| For more information, visit: | ||
ntacheva marked this conversation as resolved.
Show resolved
Hide resolved
|
||
|
|
||
| - [Bugcrowd Vulnerability Disclosure Program](https://bugcrowd.com/engagements/devtools-vdp) | ||
| - [Progress Trust Center](https://www.progress.com/trust-center) | ||
| - [Vulnerability Reporting Policy](https://www.progress.com/trust-center/vulnerability-reporting-policy) | ||
|
|
||
|
|
||
| ## What We Do to Mitigate Risk | ||
|
|
||
| Our dedicated security team is comprised of experienced developers and security experts—our "Security Champions". They review all web, desktop, and mobile products technologies for potential vulnerabilities. These vulnerabilities may be internally identified, reported by third-party tools, or flagged externally. | ||
|
|
||
| We actively manage the following strategies to mitigate risks: | ||
|
|
||
| ### Prevention | ||
|
|
||
| Our primary goal is to prevent security issues before product delivery. We use the following prevention techniques: | ||
|
|
||
| - **Internal Logging**: Every potential security issue is logged, researched, tested, and verified. Issues deemed valid are assessed using a CVSS score, with critical issues prioritized. | ||
| - **Third-Party Static Analysis Testing**: We utilize some of the leading security scanning tools in the market to scan for vulnerabilities in our software code. Regular scans are conducted, and results are reviewed to address vulnerabilities and mitigate false positives. | ||
|
|
||
|
|
||
| ## Third-Party Dependency Handling | ||
|
|
||
| We leverage leading commercial tools to automatically monitor and update third-party dependencies in our Telerik and Kendo GitHub projects, ensuring they remain secure and up-to-date. Alerts are enabled for all GitHub-hosted products, and the identified vulnerable dependencies are addressed by the repository code owners and security champions. | ||
|
|
||
| >Note: Our definition of "Done" includes successful builds that are scanned using top security scanning tools, and the resolution of any security alerts. | ||
|
|
||
|
|
||
| ## Content Security Compliance | ||
|
|
||
| Content Security Policy (CSP) is a critical security measure that helps detect and mitigate the risks of content injection vulnerabilities, such as cross-site scripting (XSS) and data injection attacks. Telerik UI for Blazor components are designed to be CSP-compliant, ensuring secure integration into customer projects. | ||
|
|
||
| For more detailed information on CSP compliance, refer to the [Telerik UI for Blazor Content Security Policy]({%slug troubleshooting-csp%}) article. | ||
|
|
||
| This resource provides guidelines on how to configure your Blazor application to comply with CSP requirements when using the Telerik UI for Blazor components. | ||
|
|
||
| ## OWASP Top 10 Alignment | ||
|
|
||
| We closely monitor the [OWASP Top 10](https://owasp.org/www-project-top-ten/) list of security risks and align our security practices with these industry-leading standards. Regular updates ensure that our products address evolving security threats and vulnerabilities. | ||
|
|
||
| ## Telerik UI for Blazor Component-Specific Security Guidelines | ||
|
|
||
| The following resources outline best practices and recommendations for securing the corresponding component and mitigating potential risks: | ||
|
|
||
| * [Editor - Security Guidelines]({%slug editor-overview%}#security) | ||
| * [Upload - Security Guidelines]({%slug upload-overview%}#security) | ||
|
|
||
| For more detailed answers to common security-related questions, please refer to our [Security FAQ page]({%slug security-faq%}). | ||
|
|
||
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Uh oh!
There was an error while loading. Please reload this page.