> One of later changes in the RFC was the requirement for the
"expires" filed,

That's one of the thing you can specify in machine-readable OSSF Security
Insight specification:
https://github.com/ossf/security-insights-spec/blob/main/security-insights-schema.yaml#L15

On Tue, Oct 15, 2024 at 4:35 PM Brian Demers <bdem...@apache.org> wrote:

> Re: .well-known/security.txt
>
> TL;DR a common security.txt template would be nice
>
> It might be nice to generate these based on data in the project's asf.yaml?
> (granted that's an implementation detail).
>
> One of later changes in the RFC was the requirement for the
> "expires" filed, it would nice to see recommendations around this (less
> important if this is generated regularly)
> Similar with the "Contact", field, Shiro's security.txt [0] only has a
> single entry, but I'm guessing _should_ be both the project's mailing list
> and `secur...@apache.org`, (though I'm not sure this matters given how the
> mailing list alias work)
>
> [0] https://shiro.apache.org/.well-known/security.txt
>
> On Tue, Oct 15, 2024 at 7:32 AM Mark J Cox <m...@apache.org> wrote:
>
> > On Tue, Oct 15, 2024 at 1:14 AM Jarek Potiuk <ja...@potiuk.com> wrote:
> >
> > > ...
> > > and I know Arnout is working on showing such an assessment for the ASF
> > > projects - and exposing it, so maybe that should be the starting point.
> > > Maybe Arnout,  you can share what you have now ? And maybe we could
> work
> > > together on making it available as "standard" information available to
> > our
> > > PMCs ?
> > >
> >
> > We're currently capturing health information as issues in a private
> github
> > instance (you and the security committee have access) and using a script
> to
> > parse those open issues to provide the commentary that will go into the
> > board reports.  For the October board report we provided the output to
> the
> > board but it's marked as private this month, as we wanted to give
> ourselves
> > time to make sure none of the projects listed there were surprised (or
> had
> > corrections).  For November and going forward the report will be split
> into
> > a section that is recorded in the public available minutes, and a private
> > section that can contain vulnerability-specific information (for example
> > stating details of not-yet-public issues and plans to address them).  We
> > can also parse the labels of the issues to come up with a dashboard, and
> we
> > do plan to expose that data somewhere, probably an automated web page, so
> > that users of Apache projects can get an idea of the security health.
> >
> > Individual PMCs are reminded on a frequent basis about their unfixed
> > security issues, and part of our new process is to parse the red/amber
> > health projects more often so a PMC should have direct contact from the
> > security team and it will be clear what state they are in (and how to get
> > better).
> >
> > But unlike OpenSSF scorecards which are designed to be fully automated,
> the
> > data we are collecting is entirely manual and can't be automated.  It's
> > more like a set of red flags combined with the position of the project in
> > our new escalation plan.
> >
> > Regards, Mark
> > ASF Security
> >
>

Reply via email to