-
Notifications
You must be signed in to change notification settings - Fork 36
Add a couple more OpenSSF resources #236
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Open
puerco
wants to merge
3
commits into
orcwg:main
Choose a base branch
from
puerco:openssf-resources
base: main
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Open
Changes from all commits
Commits
File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -268,6 +268,28 @@ These requirements do not apply open source software stewards. However, per [Art | |
* **Publication date:** | ||
</details> | ||
|
||
* [Open Source Project Security Baseline](https://baseline.openssf.org/) - The Open | ||
Source Project Security Baseline (OSPS Baseline for short) is a structured, | ||
community curated set of security requirements designed to bolster the security | ||
posture of open source software projects. The OSPS Baseline offers a tiered | ||
framework of security practices that evolve with project maturity. It compiles | ||
existing guidance from OpenSSF and other expert groups, outlining tasks, | ||
processes, artifacts, and configurations that enhance software development and | ||
consumption security. By adhering to the Baseline, developers can lay a foundation | ||
that supports compliance with global cybersecurity regulations, such as the EU | ||
Cyber Resilience Act (CRA) and U.S. National Institute of Standards and | ||
Technology (NIST) Secure Software Development Framework (SSDF). | ||
<details> | ||
<summary>More info</summary> | ||
|
||
* **Title:** Open Source Project Security Baseline | ||
* **URL:** https://github.com/ossf/security-baseline | ||
* **Publisher:** OpenSSF | ||
* **License:** Community Specification License 1.0 | ||
* **Type:** Framework | ||
* **Publication date:** Feb 2025 | ||
</details> | ||
|
||
## 3. Vulnerability Management | ||
|
||
This section contains references which are relevant to: | ||
|
@@ -339,6 +361,22 @@ This section contains references which are relevant to: | |
* **Publication date:** 2022 | ||
</details> | ||
|
||
* [OpenVEX Specification](https://github.com/openvex/spec) - OpenVEX is a lightweight | ||
implementation of the Vulnerability Exploitability Exchange. VEX offers a rapid | ||
channel to communicate the impact of vulnerabilities found in software components. | ||
VEX can be used to inform about non-exploitable vulnerabilities addressing requirements | ||
outlined in Article 13(2) and other sections of the CRA. | ||
<details> | ||
<summary>More info</summary> | ||
|
||
* **Title:** OpenVEX Specification and Tooling | ||
* **URL:** https://github.com/openvex/spec | ||
* **Publisher:** OpenSSF | ||
* **License:** Apache-2.0 / Community-Spec-1.0 | ||
* **Type:** Specification | ||
* **Publication date:** Aug 2023 | ||
</details> | ||
|
||
|
||
### 3.2 Existing open source foundation policies | ||
|
||
|
@@ -736,6 +774,25 @@ This section contains references which are relevant to the requirements expresse | |
* **Publication date:** 2024 | ||
</details> | ||
|
||
* [CISA SBOM Community - SBOM Reference Implementations](https://github.com/SBOM-Community/SBOM-Generation) - A white paper examinining the practical challenges of producing robust, National | ||
Telecommunications and Information Administration (NTIA) Minimum Elements-adherent, | ||
Software Bills of Materials (SBOM) that not only meet the NTIA Minimum Elements | ||
but can go beyond this to meet future compliance frameworks. As of publication, | ||
the authors' research found that no single open source tool can reliably generate | ||
an SBOM that adheres to NTIA Minimum Elements out of the box. The authors propose | ||
a six-step process that separates SBOM creation (or "authoring") into distinct, | ||
manageable phases (Generation, Augmentation, Enrichment, Verification, Signing). | ||
Comment on lines
+782
to
+784
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I see only 5 phases listed here, yet also see |
||
<details> | ||
<summary>More info</summary> | ||
|
||
* **Title:** White Paper: Enhancing Software Bill of Materials (SBOM) Generation | ||
* **URL:** https://github.com/SBOM-Community/SBOM-Generation/blob/main/whitepaper/Draft-SBOM-Generation-White-Paper-Feb-25-2025.pdf | ||
* **Publisher:** CISA SBOM Community - Reference Implementations Tiger Team | ||
* **License:** Apache-2.0 | ||
* **Type:** formal | ||
* **Publication date:** Feb 2025 | ||
</details> | ||
|
||
|
||
## 5. Due diligence requirements | ||
|
||
|
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There are no VEX standards in the document for now, so if you are adding OpenVex, it would be a good idea to add all other relevant ones like CSAF