Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

OpenSSF Security MVP #215

Closed
Danajoyluck opened this issue Nov 13, 2023 · 13 comments
Closed

OpenSSF Security MVP #215

Danajoyluck opened this issue Nov 13, 2023 · 13 comments
Labels
enhancement New feature or request OpsModel

Comments

@Danajoyluck
Copy link
Contributor

Danajoyluck commented Nov 13, 2023

We need to define the minimal security requirements/baseline for OpenSSF projects. The requirements will include projects at different stages of the lifecycle.

This would be an extension of issue 214 Universal adoption of scorecard and best practices

The effort is to drive cross-Linux foundation security standards. This is one of the outcomes of Linux Foundation Member Summit.

The draft baseline is here: https://docs.google.com/document/d/1-NBXdKvEJ9Wsh2i7lDNYven4fY9Bn6uvNJM5ySlMrdg/edit

@SecurityCRob SecurityCRob added the enhancement New feature or request label Nov 14, 2023
@SecurityCRob
Copy link
Contributor

related to #45

@SecurityCRob
Copy link
Contributor

related to #214

@Danajoyluck
Copy link
Contributor Author

Danajoyluck commented Apr 26, 2024

Had a discussion with CRob about how to formalize the establish the baseline incrementally, by publishing baseline for sandbox first. Here are the advices from CROb

  1. Publish the baseline content to a centralized location, GitHub would be ideal for public access. Currently it’s on Google drive
  2. Incorporate the baseline into the operating model for the specific life cycle
  3. Incorporate the baseline into the TAC lifecycle definition document
  4. Reuse the this TAC issue to raise PR for point 2 & 3?

Do TAC members agree with the process in point 1 to 3?
Can I get the precise list of the documents for the PR in point 4?

@steiza
Copy link
Member

steiza commented Apr 30, 2024

I am definitely in favor of security baselines being part of our existing lifecycle docs that we have in https://github.com/ossf/tac/tree/main/process.

I think once we're broadly aligned on content, we should make pull requests to modify those docs. What I've learned in the past is it might make sense to start will one scoped pull request (like just adding security requirements to Sandbox stage), to align on phrasing / formatting / content before we progress to the other lifecycle stages.

@sevansdell
Copy link
Contributor

@mlieberman85 May we use GUAC as an initial test TI for the Security MVP, per Zach's recommendation above.

@Danajoyluck do you have any outstanding items from your comment above that you need to get started with a proof of concept using GUAC?

How can I help?

@lehors
Copy link
Contributor

lehors commented Jul 8, 2024

I've reviewed the latest version of the proposed baseline and I think implementing it would really move us forward. I'm in favor of adopting it sooner rather than later. As always we can still fine tune it as we gain experience implementing it.

@lehors
Copy link
Contributor

lehors commented Jul 8, 2024

By the way we will need to define a transition path to phase this in. We could start with a few pilot projects and progressively require existing TIs to implement the different levels of requirements they are expected to fulfill according to their lifecycle status.

@puerco
Copy link
Member

puerco commented Jul 8, 2024

During the @openvex meeting on Jul 8th 2024 we discussed and we want the project to participate in the initial baseline pilot.

I think we can volunteer @protobom as well, I will share it with the community in our next community meeting to confirm, I think our contributors will be happy to help out too.

@mlieberman85
Copy link
Contributor

I will be talking to Dana shortly, and I think GUAC is already set up to do most of this but I think the big challenge is going to be less around adopting the baseline and more about proving that we are adopting this baseline and how to make sure the data is consumed and accessible to project maintainers, OpenSSF stakeholders, and the broader community as a whole.

@mlieberman85
Copy link
Contributor

The baseline by and large makes sense. I just want to be open to minor revisions as we pilot it.

@torgo
Copy link
Contributor

torgo commented Jul 9, 2024

Agree with this direction of work and would also support piloting it.

@steiza
Copy link
Member

steiza commented Jul 9, 2024

I really appreciate Dana leading the conversation here and doing consensus building. Just to be clear, you don't need TAC pre-approval to open up a pull request (the review happens on the pull request itself). That said, I'm happy to say I support this moving forward by opening up a pull request!

@SecurityCRob
Copy link
Contributor

this was approved by the TAC on 9july2024 and will be implemented in a series of forthcoming PRs that will augment the existing TI lifecycle documentation.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request OpsModel
Projects
None yet
Development

No branches or pull requests

8 participants