Home

Awesome

Open Source Project Security Baseline

The SIG is under the BEST Working Group. The goal of this SIG is to evolve OpenSSF security baseline for OpenSSF and Linux Foundation wide adoption, make it easier to discover, adopt and contribute to open source technologies to improve Open Source Software (OSS) security.

Motivation

For OpenSSF adoption of the security baseline, there needs to be a home for tracking the adoption, for maintainers to raise issues to refine the security baseline, merge the baseline back to TAC lifecycle, and for OpenSSF to develop the roadmap for the security baseline. It will provide a venue for early adopters to share their findings and reusable code with other maintainers. The pilot adoption builds the foundation for wider adoption of the security baseline in OpenSSF and in Linux Foundation.

This SIG creates a venue for other participating foundations to help evolve the OpenSSF security baseline into a security baseline that can be applied to a broad range of software-based projects. The group will define the right level of risks that the security baseline is applicable for, the effectiveness measurement of the security baseline, and the adoption path of the security baseline at the minimum.

Members of this group will be from various Linux foundations and entities outside of Linux Foundation. Reducing duplicate effort and achieving a higher level of security across Linux Foundation participating foundations is one of the goals of the group.

Right now it's very difficult for new people interested in participating to determine how to participate or what to use. This SIG will provide a technology consumption framework to help open source producers quickly navigate the OSS security technology landscape, discover, adopt and contribute to technical initiatives, help end user organizations large and small to think about adopting OpenSSF/adjacent technical projects and guidance.

Objective

Through the effort of this group, open source software is more secure.

Scope

Prior Work

This group's work is built on top of the technical output from all the OpenSSF WGs and Sigs, and projects.

OpenSSF Security Baseline Adoption Pilot Projects

The maintainers of these projects will be the early adopters of the OpenSSF security baseline. The maintainers of these pilot projects have committed to fully adopting the seurity baseline by meeting the security baseline requirements for their project life cycle by 9/15/2024, resolving issues

Detailed adoption plan and tracking will be linked here once it's apprved by the adopting pilot project maintainers.

NameRepository/Home PageSponsoring OrgLifecycleSecurity Baseline requirements
bomctlhttps://github.com/bomctlSecurity Tooling WGApplying for SandboxSecurity Baseline - Once Sandbox
GUAChttps://github.com/guacsec/guacSupply Chain Integrity WGIncubatingSecurity Baseline - Once Sandbox<br /> and <br />Security Baseline - To Become Incubating<br /> and <br />Security Baseline - Once Incubating
OpenVEXhttps://github.com/openvexVulnerability Disclosures WGSandboxSecurity Baseline - Once Sandbox
Protobomhttp://github.com/bom-squad/protobomSecurity Tooling WGSandboxSecurity Baseline - Once Sandbox
Repository Service for TUFhttps://github.com/repository-service-tuf/repository-service-tufSecuring Software Repositories WGIncubatingSecurity Baseline - Once Sandbox <br /> and <br />Security Baseline - To Become Incubating<br /> and <br />Security Baseline - Once Incubating
Scorecardhttps://github.com/ossf/scorecardBest Practices WGApplying for IncubatingSecurity Baseline - Once Sandbox <br /> and <br />Security Baseline - To Become Incubating<br /> and <br />Security Baseline - Once Incubating

Get Involved

Quick Start

Meeting times

Governance

[TODO: Update this link to your specific CHARTER.md file] The CHARTER.md outlines the scope and governance of our group activities.

Intellectual Property

In accordance with the OpenSSF Charter (PDF), work produced by this group is licensed as follows:

  1. Software source code

Antitrust Policy Notice

Linux Foundation meetings involve participation by industry competitors, and it is the intention of the Linux Foundation to conduct all of its activities in accordance with applicable antitrust and competition laws. It is therefore extremely important that attendees adhere to meeting agendas, and be aware of, and not participate in, any activities that are prohibited under applicable US state, federal or foreign antitrust and competition laws.

Examples of types of actions that are prohibited at Linux Foundation meetings and in connection with Linux Foundation activities are described in the Linux Foundation Antitrust Policy available at http://www.linuxfoundation.org/antitrust-policy. If you have questions about these matters, please contact your company counsel, or if you are a member of the Linux Foundation, feel free to contact Andrew Updegrove of the firm of Gesmer Updegrove LLP, which provides legal counsel to the Linux Foundation.