Skip to content

Commit 3cdcc2a

Browse files
authored
Create readme.md
archiving og readme Signed-off-by: CRob <69357996+SecurityCRob@users.noreply.github.com>
1 parent 9baaed6 commit 3cdcc2a

1 file changed

Lines changed: 94 additions & 0 deletions

File tree

Archived/2022-2023/readme.md

Lines changed: 94 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,94 @@
1+
<!-- markdownlint-disable MD024 -->
2+
3+
4+
# OpenSSF OSS-SIRT Special Interest Group (SIG)
5+
6+
[![GitHub Super-Linter](https://github.com/ossf/sirt/workflows/Lint%20Code%20Base/badge.svg)](https://github.com/marketplace/actions/super-linter)
7+
8+
The OSS-SIRT SIG (Open Source Software Security Incident Response Team Special Interest Group) is a group working within the OSSF's Vulnerability Disclosure Working Group that is focused on creating secure vulnerability management capabilities within the open source ecosystem to ensure effective coordinated vulnerability disclosure practices (CVD) for all. The group will be a coordinated group of experts from across the industry who will be available to help
9+
open source maintainers with all aspects of remediating high-impact security vulnerabilities and related security emergencies
10+
11+
<img align="right" src="https://github.com/ossf/SIRT/blob/main/Archived/2022-2023/plan/ossf-goose-sirt-sig.png" width="400" height="400">
12+
13+
14+
## Mission
15+
16+
To empower and coordinate open source security teams and open source software projects to be self-sufficient with respect to handling vulnerabilities in their software, and improve itself through lessons learned from its engagement.
17+
18+
## Our promise to the maintainers and consumers of OSS
19+
20+
The SIRT will respond and collaborate with open source software project's requests for assistance, guidance, and support. Through the SIRT's offerings, open source software projects may expect to receive helpful and inclusive recommendations or direction in the handling, processing, communications, and general management of suspected and confirmed vulnerabilities and findings reported to them, directly or by proxy in a manner that considers the project's existing response processes.
21+
22+
In the course of serving open source projects, the SIRT will consider all information provided, seek to understand any outside influences or additional factors to be considered prior to engaging, and render a decision on engagement and execution accordingly. The SIRT shall balance the needs and constraints of the projects requesting support, as well as the needs of the consumers of those projects to the practical extent possible.
23+
24+
## Motivation
25+
26+
Historically, Open Source maintainers and end users have depended on a circle of trust to distribute and consume Open Source Software safely. Over the last several years, this concept has proven to be problematic and sub-optimal by itself with the increase of attacks targeting open source maintainers as well as the components they create and maintain. Effectively, these problems have illustrated additional effort and work are required to ensure that both Consumers and End Users of maintainers are consuming Open Source Software safely while still, having their needs met with the least friction to their overall intent and objective in maintaining their software. As it presently stands, this type of work traditionally is the responsibility of a project's Maintainer group; however, frequently, the Maintainer(s) already lack sufficient resources to address their own needs adequately let alone take on the additional work being asked of them to develop and provide their open source component in a secure manner acceptable to anyone using it. Piling on more work to the already stressed pipeline and burdened maintainers often results in Security not being prioritized until a Security issue becomes the forefront, which is often too late for a project's Consumers and End Users.
27+
28+
This SIRT's motivation is to make available the incident response resources to assist Open Source Software communities, downstream consumers, and vulnerability management ecosystems in addressing their current and upcoming Security issues, vulnerabilities, incidents, and the processes necessary for their execution. We intend to deliver service offerings to projects that provide an additional support arm against incidents, like `log4shell`, which are otherwise not available to these projects. We hope these efforts will assist in addressing critical and time-sensitive Security issues across the Open Source Software communities that participate in the program.
29+
30+
## Objective/Scope
31+
32+
To develop a cohort of trustworthy, vendor-neutral, vetted, well-orchestrated and experienced group of security professionals
33+
34+
**_EXPRESSLY OUT OF SCOPE:_**
35+
36+
- Anything involving vulnerabilities in closed-source/proprietary software
37+
- Security improvements to open-source software that are not tactically essential to the
38+
patching of newly-reported, high- and critical-impact vulnerabilities in open-source
39+
software
40+
- Helping projects or individual enterprises with remediating their security exposures
41+
from another open-source project’s security vulnerabilities
42+
43+
## Prior Work
44+
45+
[The OpenSSF's Mobilization Plan - Stream 5](https://8112310.fs1.hubspotusercontent-na1.net/hubfs/8112310/OpenSSF/White%20House%20OSS%20Mobilization%20Plan.pdf?hsCtaTracking=3b79d59d-e8d3-4c69-a67b-6b87b325313c%7C7a1a8b01-65ae-4bac-b97c-071dac09a2d8)
46+
47+
48+
## Get Involved
49+
50+
- Official communications occur on the [OSSF OSS-SIRT Mailing list](https://lists.openssf.org/g/openssf-sig-osssirt/topics).
51+
[Manage your subscriptions to Open SSF mailing lists](https://lists.openssf.org/g/main/subgroups).
52+
- Slack Channels - [stream-05-incident-response](https://openssf.slack.com/messages/stream-05-vulnerability-disclosure),
53+
[wg_vulnerability-disclosures](https://openssf.slack.com/messages/wg_vulnerability_disclosures)
54+
55+
### Quick Start
56+
- The OSS-SIRT proposed [plan](https://github.com/ossf/SIRT/tree/main/plan)
57+
- Areas that need contributions
58+
- Comments/feedback on the plan or services you'd like to see the OSS-SIRT offer
59+
- Where to file issues - [https://github.com/ossf/SIRT/issues](https://github.com/ossf/SIRT/issues)
60+
61+
### Meeting times
62+
63+
- Every Tuesday @ 9:00 am EST The invite is available on the [OpenSSF Community Calendar](https://calendar.google.com/calendar?cid=czYzdm9lZmhwNWk5cGZsdGI1cTY3bmdwZXNAZ3JvdXAuY2FsZW5kYXIuZ29vZ2xlLmNvbQ).
64+
- [2023 Meeting Minutes](https://docs.google.com/document/d/1sUZNQgU6E5lha7WH0_9YOvoegLeLTs9dv9QZj8dwjJM/edit?usp=sharing) are recorded in google docs
65+
- [2022 Meeting Minutes](https://docs.google.com/document/d/1U9svMNW0KbIeaTKxqIhJ2GyHBn2J4iQWTYAPeY9CdOw/edit?usp=sharing)
66+
67+
### Governance
68+
The [CHARTER.md](https://github.com/ossf/project-template/blob/main/CHARTER.md) outlines the scope and governance of our group activities.
69+
70+
- Lead name: [CRob](https://github.com/SecurityCRob)
71+
- Co-Lead name: [Francis](https://github.com/u269c)
72+
73+
### Project Maintainers
74+
- [Christopher "CRob" Robinson, Intel](https://github.com/SecurityCRob)
75+
- [Francis Perron, Google](https://github.com/u269c)
76+
- [Randall T. Vasquez, Gentoo](https://github.com/ran-dall)
77+
78+
79+
### Project Collaborators
80+
- [David A Wheeler, LF/OSSF](https://github.com/david-a-wheeler)
81+
- [Emily Fox, Apple, CNCF TOC](https://github.com/TheFoxAtWork)
82+
- [Eric Tice, WiPro]
83+
- [Jennifer Mitchell, Tidelift]
84+
- [Madison Oliver, GitHub Security Lab](https://github.com/)
85+
- [Marta Rybczynska, OSTC]
86+
- [VM Brasseur, WiPro](https://github.com/)
87+
- [Marta Rybczynska](https://github.com/)
88+
- [Art Manion, ANALYGENCE](https://github.com/zmanion)
89+
90+
91+
### Project Contributors
92+
- [Matt Rutkowski, IBM]
93+
- [Avashay Balter, Microsoft](https://github.com/)
94+
- [Arnaud J Le Hors, IBM](https://github.com/lehors)

0 commit comments

Comments
 (0)