Skip to content

Commit c187130

Browse files
committed
Remove CRA requirements from PEP
1 parent 91c53cc commit c187130

File tree

1 file changed

+0
-43
lines changed

1 file changed

+0
-43
lines changed

peps/pep-0811.rst

Lines changed: 0 additions & 43 deletions
Original file line numberDiff line numberDiff line change
@@ -221,14 +221,8 @@ applying to join the PSRT. These responsibilities include:
221221
* Coordinators that can no longer move a report forwards for any reason must
222222
delegate their Coordinator role to someone else in the PSRT.
223223
* PSRT members that are admins will have additional responsibilities.
224-
* PSRT members who are staff of the Python Software Foundation, as an
225-
"Open Source Steward" defined in `Article 24 of the Cyber Resilience Act`_,
226-
have `additional responsibilities`_, such as reporting actively exploited
227-
vulnerabilities to ENISA/CSIRTs.
228224

229225
.. _security-announce@python.org: https://mail.python.org/archives/list/security-announce@python.org/
230-
.. _Article 24 of the Cyber Resilience Act: https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=OJ:L_202402847#art_24
231-
.. _additional responsibilities: #responsibilities-of-psf-staff-psrt-members
232226
.. _Python Developer's Guide: https://devguide.python.org/developer-workflow/psrt/
233227

234228
Responsibilities of PSRT Admins
@@ -243,43 +237,6 @@ following additional responsibilities:
243237
* On a yearly basis, providing the Steering Council with a report including
244238
a list of inactive PSRT members.
245239

246-
Responsibilities of PSF Staff PSRT members
247-
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
248-
249-
The Python Software Foundation acts as the "Open Source Steward" for
250-
CPython, pip, and other projects according to the Cyber Resilience Act (CRA).
251-
Therefore, vulnerability reporting has additional requirements for PSF staff
252-
detailed in CRA `Article 24 <https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=OJ:L_202402847#art_24>`_.
253-
These requirements can be summarized as:
254-
255-
* Maintain a vulnerability disclosure policy fostering the voluntary reporting
256-
of vulnerabilities. The policy shall include aspects related to documenting,
257-
addressing, and remediating vulnerabilities and promote the sharing of
258-
information concerning discovered vulnerabilities within the open-source
259-
community.
260-
261-
* Cooperate with EU market surveillance authorities (ENISA and CSIRTs) to
262-
mitigate cybersecurity risks.
263-
264-
* If a vulnerability is **known to be actively exploited** EU market
265-
surveillance authorities must be notified through the Single Reporting
266-
Platform (SRP) within the following timelines:
267-
268-
* **Within 24 hours of becoming aware of an actively exploited
269-
vulnerability:** submit an early warning notification.
270-
* **Within 72 hours of becoming aware of an actively exploited
271-
vulnerability:** submit general information,
272-
the product, general nature of the exploit and vulnerability, and
273-
mitigating measures taking or mitigating measures that users can take.
274-
* **Within 14 days after a corrective or mitigating measure is available:** a
275-
final report including a description of the vulnerability including
276-
severity and impact, information concerning any malicious actor, and details
277-
about the security update or other corrective measures available to remedy
278-
the vulnerability.
279-
280-
Note that these additional responsibilities don't apply to all members of the
281-
PSRT, only to PSF staff.
282-
283240
GitHub Security Advisories and GitHub Team
284241
------------------------------------------
285242

0 commit comments

Comments
 (0)