@@ -221,14 +221,8 @@ applying to join the PSRT. These responsibilities include:
221221* Coordinators that can no longer move a report forwards for any reason must
222222 delegate their Coordinator role to someone else in the PSRT.
223223* PSRT members that are admins will have additional responsibilities.
224- * PSRT members who are staff of the Python Software Foundation, as an
225- "Open Source Steward" defined in `Article 24 of the Cyber Resilience Act `_,
226- have `additional responsibilities `_, such as reporting actively exploited
227- vulnerabilities to ENISA/CSIRTs.
228224
229225.. _security-announce@python.org : https://mail.python.org/archives/list/security-announce@python.org/
230- .. _Article 24 of the Cyber Resilience Act : https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=OJ:L_202402847#art_24
231- .. _additional responsibilities : #responsibilities-of-psf-staff-psrt-members
232226.. _Python Developer's Guide : https://devguide.python.org/developer-workflow/psrt/
233227
234228Responsibilities of PSRT Admins
@@ -243,43 +237,6 @@ following additional responsibilities:
243237* On a yearly basis, providing the Steering Council with a report including
244238 a list of inactive PSRT members.
245239
246- Responsibilities of PSF Staff PSRT members
247- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
248-
249- The Python Software Foundation acts as the "Open Source Steward" for
250- CPython, pip, and other projects according to the Cyber Resilience Act (CRA).
251- Therefore, vulnerability reporting has additional requirements for PSF staff
252- detailed in CRA `Article 24 <https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=OJ:L_202402847#art_24 >`_.
253- These requirements can be summarized as:
254-
255- * Maintain a vulnerability disclosure policy fostering the voluntary reporting
256- of vulnerabilities. The policy shall include aspects related to documenting,
257- addressing, and remediating vulnerabilities and promote the sharing of
258- information concerning discovered vulnerabilities within the open-source
259- community.
260-
261- * Cooperate with EU market surveillance authorities (ENISA and CSIRTs) to
262- mitigate cybersecurity risks.
263-
264- * If a vulnerability is **known to be actively exploited ** EU market
265- surveillance authorities must be notified through the Single Reporting
266- Platform (SRP) within the following timelines:
267-
268- * **Within 24 hours of becoming aware of an actively exploited
269- vulnerability: ** submit an early warning notification.
270- * **Within 72 hours of becoming aware of an actively exploited
271- vulnerability: ** submit general information,
272- the product, general nature of the exploit and vulnerability, and
273- mitigating measures taking or mitigating measures that users can take.
274- * **Within 14 days after a corrective or mitigating measure is available: ** a
275- final report including a description of the vulnerability including
276- severity and impact, information concerning any malicious actor, and details
277- about the security update or other corrective measures available to remedy
278- the vulnerability.
279-
280- Note that these additional responsibilities don't apply to all members of the
281- PSRT, only to PSF staff.
282-
283240GitHub Security Advisories and GitHub Team
284241------------------------------------------
285242
0 commit comments