Approved by the idpy Board on 18 March 2021
The following details the steps and actions that we should consider when responding to security issues related to projects governed by the Identity Python project. Some steps may not be necessary in all cases. Regardless, the Identity Python members should follow a no-blame policy; the focus should always be on improving the project rather than pointing fingers at contributors.
Recognizing the importance of security research we will publicly acknowledge the people that report an incident, granted their consent, on a dedicated page on the Identity Python website.
Stage | Activities |
---|---|
Discovery and Assignment | Reporter:
|
Assessment and Remediation | Project Architect:
|
Community Disclosure and Patch Release | Project Architect:
|
Post-Mortem Retrospective |
|
Incident reports are stored for the duration of the Identity Python project in the form of mailing list archives on the [email protected] mailing list, and in the list of GitHub issues filled under the appropriate project-repository.
To: <reporter>
Cc: [email protected]
Subject: Security vulnerability acknowledgement
This is an acknowledgement of your email. Thank you for reporting this. We will
take this under advisement and address as appropriate. You can expect the
incident manager to reach out to you in the near future. For more information,
see the idpy Security Incident Response Plan (<link>).
Sincerely,
<security-monitor>
To: <technical-resource>
Subject: Private notice of critical security vulnerability in <product>
This is a private disclosure of a critical security vulnerability that has been
discovered in <product>. Affected versions are susceptible to an open redirect
vulnerability in the ....
Affected Software: <product>
Vulnerable versions: <x.y.z>
Fix version: <x.y.z'>
Impact:
<description>
Remediation:
Upgrade affected <product> deployments as soon as possible using the link above.
To: [email protected], [email protected], [email protected]
Subject: Notice of critical security vulnerability in <product>
This is a public disclosure of a critical security vulnerability that has been
discovered in <product>. Affected versions are susceptible to an open redirect
vulnerability in the ....
Affected Software: <product>
Vulnerable versions: <x.y.z>
Fix version: <x.y.z'>
Impact:
<description>
Remediation:
Upgrade affected <product> deployments as soon as possible using the link above.