You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Jan 20, 2025. It is now read-only.
Copy file name to clipboardExpand all lines: docs/about.mdx
+40-44
Original file line number
Diff line number
Diff line change
@@ -6,39 +6,49 @@ slug: /
6
6
---
7
7
8
8
9
-
# The OpenJS Foundation Security Compliance Guide v1.0 <spanstyle={{backgroundColor: '#ff6f3c', color: 'white', padding: '2px 6px'}}>DRAFT</span>
10
-
9
+
# The OpenJS Foundation Security Compliance Guide v1.0
11
10
12
11
## Executive Summary
13
12
14
-
15
13
### Background
16
14
17
-
Since 2020, the number of actively exploited security vulnerabilities in open source software (OSS) has significantly increased, along with attacks on core software supply chain infrastructure and individual community members. Awareness of the heightened threat environment has led to substantial responses from software consumers and regulators:
15
+
Since 2020, the number of actively exploited security vulnerabilities in open source software (OSS) has significantly increased, along with attacks on core software supply chain infrastructure and individual community members. Awareness of the heightened threat environment has led to substantial responses from software consumers and regulators.
18
16
19
17
- The United States, European Union, and other nation states are actively funding efforts to build the modern institutional functions needed to regulate the software supply chains and inclusion of OSS in software they procure.
20
18
- Commercial software vendors have responded to regulator and customer awareness of their Software Supply Chain Security risks and ubiquitous use of OSS by increasingly funding and formalizing internal DevOps, Cybersecurity Supply Chain Risk Management (C-SCRM), and Open Source Program Office (OSPO) initiatives.
21
19
- A new generation of Application Security startups have raised VC funding to support these emerging initiatives. With the promise of regulator-induced demand Software Supply Chain Security, Software Bill of Materials (SBOM), and OSPO products achieved the same Peak status as Generative AI in the 2023 Gartner Hype Cycle.
22
20
- Large commercial consumers of OSS, and more recently governments, have funded new and existing non-profit infrastructure to support defining best practices, tool development, and selectively engaging with maintainers to improve the security posture of their projects. Newer software supply chain security startups are sometimes engaged in these non-profit activities by open sourcing and integrating parts of their tool chains.
23
21
22
+
24
23
### Observations
25
24
26
25
#### Community Outreach Efforts
27
26
28
27
The OSS community’s response to these trends and the expectations thrust upon them by their newfound criticality in national security and for-profit business risk assessments have varied.
29
28
30
29
Observations and research strongly signal that a majority of maintainers have an accurate understanding of their threat environment, desire to proactively protect themselves, and value external support and guidance that tangibly improves their security posture. However, they are generally allergic to dedicating personal time implementing security controls that appear to satisfy low impact checkbox compliance rules without a locally relevant attack chain (“security theater”) or the risk management interests of commercial OSS consumers.
31
-
- Congratulations: We Now Have Opinions on Your Open Source Contributions
32
-
- OpenSSF Maintainer Experiences Lessons Learned
33
-
- Atlantic Council Research on Paying Maintainers
34
-
- <More…>
30
+
31
+
-[Congratulations: We Now Have Opinions on Your Open Source Contributions](https://lucumr.pocoo.org/2022/7/9/congratulations/)
-[Atlantic Council Research on Paying Maintainers](https://dfrlab.org/2024/04/18/more-money-better-security/)
34
+
35
35
36
36
#### Prior Art
37
37
38
38
There exist countless cybersecurity and software security best practices, maturity models, and standards for commercial software developers. Most of these are intended for internal use and assume facilitation by dedicated security practitioners in full time equivalent roles. Others are intended to provide their customers a standard way of measuring security program completeness and efficacy via a 3rd party audit.
39
39
40
40
There are few equivalents designed for OSS maintainers today. Those that exist often combine OSS project health, legal compliance, and technical security concepts together into a single score or maturity model for community and industry audiences. This choice fills a very real market need, but is not without controversy and appears at times to distract from the important work of implementing and celebrating incremental security posture improvements.
-[OpenSSF Source Code Management Best Practices](https://best.openssf.org/SCM-BestPractices)
48
+
-[OWASP SCVS](https://scvs.owasp.org/scvs/)
49
+
- Various npm and GitHub documentation
50
+
51
+
42
52
### Approach
43
53
44
54
Informed by these insights, this Standard is designed to serve as an achievable minimum security baseline for OpenJS Foundation Project maintainers. More plainly said, this is intended to be used as an easily digested and actioned security checklist.
@@ -66,44 +76,31 @@ Multiple open source and proprietary OSS project health measurement systems exis
66
76
67
77
- Security architecture and feature hardening best practices
This Standard does not address secure design and defense-in-depth feature hardening concepts. In their most useful form, these best practices are specific to the frameworks used. Examples include [Node.js' Security Best Practices](https://nodejs.org/en/learn/getting-started/security-best-practices) and [Electron's Security Best Practices](https://www.electronjs.org/docs/latest/tutorial/security).
- Categories that organize the different types of Guidelines by security domain:
85
+
1. User Authentication
86
+
2. User Account Permissions
87
+
3. Service Authentication
88
+
4. Github Workflows
89
+
5. Vulnerability Management
90
+
6. Coordinated Vulnerability Disclosure
91
+
7. Code Quality
92
+
8. Code Review
93
+
9. Source Control
94
+
10. Dependency Inventory
95
+
11. Dependency Management
96
+
- Priority Groups that break up the 72 Guidelines into 22 smaller, sequenced chunks of work. Maintainers can use the Priority Groups to prioritize, sequence, and establish milestones to communicate and celebrate incremental security successes.
97
+
- Applicability of the Guideline based on the Project’s Status in OpenJS’ Project Lifecycle:
98
+
- Incubating Projects
99
+
- For use as part of their processes to mature and maintain their security posture to graduate into an Active Project.
100
+
- Active Projects (eg: At Large and Impact)
101
+
- For use as part of their own processes to mature and maintain their security posture.
102
+
- Retiring Projects (eg: Emeritus Projects)
103
+
- For use when winding down and ending support for an Active Project in order to establish a durable, long-term baseline security posture.
107
104
108
105
These Project types represent very different phases of an OSS project’s lifecycle, including their process maturity and available resources. To acknowledge these potentially enormous variances, for each Project type and Item, the Standard offers four different types of Guidance:
109
106
@@ -120,4 +117,3 @@ These Project types represent very different phases of an OSS project’s lifecy
120
117
- Low real-world security impact
121
118
- Not Applicable (N/A)
122
119
- This Guidance is reserved for Items that are no longer relevant for Projects once they are formally Retired.
0 commit comments