Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Added criteria for dependency consumption policy #74

Open
wants to merge 1 commit into
base: main
Choose a base branch
from
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
33 changes: 16 additions & 17 deletions baseline.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -784,7 +784,7 @@ criteria:
criteria: |
The project documentation MUST include a
policy to address SCA violations prior to any
release.
release.
objective: |
Ensure that violations of your SCA policy
are addressed before software releases,
Expand All @@ -801,25 +801,24 @@ criteria:
scorecard_probe:
- # TODO: this is about policy, but we should also look for evidence of SCA
- id: OSPS-72
maturity_level: 3
category: Documentation
maturity_level: 2
criteria: |
The project documentation MUST define a
cadence in which known vulnerabilities are
evaluated, and exploitable vulnerabilities
are either fixed or verified as
unexploitable.
The project documentation MUST include a
policy that defines a threshold for remediation
of SCA findings related to vulnerabilities and
licenses.
objective: |
Establish a process for evaluating and
addressing known vulnerabilities, then
communicate this process to users and
contributors alike.
Ensure that the project clearly communicates
the threshold for remediation of SCA findings,
including vulnerabilities and license issues
in software dependencies.
implementation: |
Define a policy in the project
documentation for evaluating known
vulnerabilities, fixing exploitable
vulnerabilities, and verifying unexploitable
vulnerabilities.
Document a policy in the project that
defines a threshold for remediation of SCA
findings related to vulnerabilities and
licenses. Include the process for
identifying, prioritizing, and remediating
these findings.
control_mappings: # TODO
security_insights_value: # TODO
- id: OSPS-73
Expand Down