Author: jlk
Date: Mon Jun 3 22:16:45 2013
New Revision: 1489205
URL: http://svn.apache.org/r1489205
Log:
Correcting markdown bullet list, tweaked intro text
Modified:
cloudstack/site/trunk/content/security.mdtext
Modified: cloudstack/site/trunk/content/security.mdtext
URL:
http://svn.apache.org/viewvc/cloudstack/site/trunk/content/security.mdtext?rev=1489205&r1=1489204&r2=1489205&view=diff
==============================================================================
--- cloudstack/site/trunk/content/security.mdtext (original)
+++ cloudstack/site/trunk/content/security.mdtext Mon Jun 3 22:16:45 2013
@@ -2,7 +2,7 @@ Title: Apache CloudStack: Security
## Apache CloudStack Security
-The Apache CloudStack project understands that as a core infrastructure
project, the application security of Apache CloudStack is of critical
importance.
+The Apache CloudStack project understands that as a core infrastructure
project, the application security of Apache CloudStack is of critical
importance to the community and users.
### Apache CloudStack Security Team
@@ -22,28 +22,34 @@ The security team asks that you **please
### Procedure for Responding to Potential Security Issues
-* Upon receiving notice of a potential security issue, a security team member
will create a bug to track the investigation, this bug must be flagged as a
security issue. Security flag should mean contents of ticket are not visible to
non-security team members
-* Security team investigates the issue to confirm/deny the presence of a
vulnerability within CloudStack
-* If the issue is determined not to be a vulnerability the reporter will be
notified and the issue will be closed as invalid.
-* If issue is confirmed as a CloudStack vulnerability:
-** Security team notifies the Apache Security team
-** Security team assigns a risk rating to the vulnerability using the Common
Vulnerability Scoring System
-** Security team works with reporter to get a chance to investigate and
mitigate the issue in a timely manner before public announcement. This should
be between 15-30 days, depending on the severity and complexity of the issue
-** Security team works with Apache Security Team to reserve a CVE Identifier
for future public release
-** Security team works with appropriate code maintainer(s) to create patch to
mitigate the issue
-** Testing is conducted to verify patch mitigates issue and does not cause
regression errors
-** Security team creates a vulnerability announcement
-** Patch is committed to trunk and other supported branches that are affected.
The commit should not refer to a particular vulnerability.
-** A new CloudStack release or hotfix is prepared and tested, containing the
new security patch.
-** Distributor coordination is implemented to enable a coordinated
announcement.
-** Security team posts vulnerability announcement to...
-*** CloudStack dev list
-*** CloudStack users list
-*** CloudStack Security alerts web page
-*** The Bugtraq mailing list
-** After announcement, CHANGES and NEWS files need to be updated to reflect
the vulnerability and fix. This must happen AFTER the announcement.
-** Also after announcement, modify the Jira ticket so that the issue is now
publicly viewable.
-* After the vulnerability is addressed, the CloudStack community should review
development processes to see how the community can minimize the chance of
similar vulnerabilities being introduced in the future.
+<ul>
+ <li> Upon receiving notice of a potential security issue, a security team
member will create a bug to track the investigation, this bug must be flagged
as a security issue. Security flag should mean contents of ticket are not
visible to non-security team members
+ <li> Security team investigates the issue to confirm/deny the presence of a
vulnerability within CloudStack
+ <li> If the issue is determined not to be a vulnerability the reporter will
be notified and the issue will be closed as invalid.
+ <li> If issue is confirmed as a CloudStack vulnerability:
+ <ul>
+ <li> Security team notifies the Apache Security team
+ <li> Security team assigns a risk rating to the vulnerability using the
Common Vulnerability Scoring System
+ <li> Security team works with reporter to get a chance to investigate and
mitigate the issue in a timely manner before public announcement. This should
be between 15-30 days, depending on the severity and complexity of the issue
+ <li> Security team works with Apache Security Team to reserve a CVE
Identifier for future public release
+ <li> Security team works with appropriate code maintainer(s) to create
patch to mitigate the issue
+ <li> Testing is conducted to verify patch mitigates issue and does not
cause regression errors
+ <li> Security team creates a vulnerability announcement
+ <li> Patch is committed to trunk and other supported branches that are
affected. The commit should not refer to a particular vulnerability.
+ <li> A new CloudStack release or hotfix is prepared and tested, containing
the new security patch.
+ <li> Distributor coordination is implemented to enable a coordinated
announcement.
+ <li> Security team posts vulnerability announcement to...
+ <ul>
+ <li> CloudStack dev list
+ <li> CloudStack users list
+ <li> CloudStack Security alerts web page
+ <li> The Bugtraq mailing list
+ </ul>
+ <li> After announcement, CHANGES and NEWS files need to be updated to
reflect the vulnerability and fix. This must happen AFTER the announcement.
+ <li> Also after announcement, modify the Jira ticket so that the issue is
now publicly viewable.
+ </ul>
+ <li> After the vulnerability is addressed, the CloudStack community should
review development processes to see how the community can minimize the chance
of similar vulnerabilities being introduced in the future.
+</ul>
### For further information