Skip to content

Latest commit

 

History

History
95 lines (69 loc) · 4.85 KB

idpy-incidentresponse.md

File metadata and controls

95 lines (69 loc) · 4.85 KB

Security Incident Response Plan for Identity Python-governed Projects

Version 0.5 2021-02-02

Approved by the idpy Board on 18 March 2021

The following details the steps and actions that we should consider when responding to security issues related to projects governed by the Identity Python project. Some steps may not be necessary in all cases. Regardless, the Identity Python members should follow a no-blame policy; the focus should always be on improving the project rather than pointing fingers at contributors.

Recognizing the importance of security research we will publicly acknowledge the people that report an incident, granted their consent, on a dedicated page on the Identity Python website.

Stage Activities
Discovery and Assignment Reporter: Project Architect:
  • Creates security advisory in GitHub; this automatically assigns a Common Vulnerabilities and Exposures Identifier (CVE-ID).
  • Sends an email regarding the potential issue to the Board.
  • Acknowledges reporter.
Assessment and Remediation Project Architect:
  • Validates – confirms a vulnerability exists and creates a test for it
  • Classifies - Severity/Impact of the vulnerability is determined using Common Vulnerability Scoring System (CVSS). Specific potential impact to application is noted (e.g., Exploit allows Admin level access to application).
  • Identifies affected products/versions - Identifies all versions affected by the vulnerability and makes a note in the issue.
  • Briefs the reporter on the assessment as appropriate.
  • Works with other technical resources in the community on the remediation.
  • Identifies remediation options and determine best remediation strategy as a result of the analysis.
  • Implements a fix for issue in a the appropriate project repo.
  • Validates that the issue is resolved. Ideally this involves a second organization.
  • Creates a test to verify the issue does not come up again in future versions.
Community Disclosure and Patch Release Project Architect:
  • Announces vulnerability and release date.
  • Creates patch release or remediation instructions.
  • Publishes patch release in consultation with the Incident Manager.
  • Sends disclosure notice to code repository owners.
Post-Mortem Retrospective
  • The Board discusses the Security Incident Response Plan as it played out for this incident, inspecting and adapting to handle the next one better.
  • The [email protected] list discusses the technical substance of the vulnerability and its fix, identifying opportunities to refactor the fix in subsequent releases now that it has more eyes on it and opportunities to improve the product and development practices to prevent or mitigate similar issues in the future.

Storage policy for incident reports

Incident reports are stored for the duration of the Identity Python project in the form of mailing list archives on the [email protected] mailing list, and in the list of GitHub issues filled under the appropriate project-repository.

Appendix A: Templates

Reporter acknowledgement

To: <reporter>
Cc: [email protected]
Subject: Security vulnerability acknowledgement

This is an acknowledgement of your email. Thank you for reporting this. We will
take this under advisement and address as appropriate. You can expect the
incident manager to reach out to you in the near future. For more information,
see the idpy Security Incident Response Plan (<link>).

Sincerely,
<security-monitor>

Private disclosure

To: <technical-resource>
Subject: Private notice of critical security vulnerability in <product>

This is a private disclosure of a critical security vulnerability that has been
discovered in <product>. Affected versions are susceptible to an open redirect
vulnerability in the ....

Affected Software: <product>
Vulnerable versions: <x.y.z>
Fix version: <x.y.z'>

Impact:
<description>

Remediation:
Upgrade affected <product> deployments as soon as possible using the link above.

Public disclosure

To: [email protected], [email protected], [email protected]
Subject: Notice of critical security vulnerability in <product>

This is a public disclosure of a critical security vulnerability that has been
discovered in <product>. Affected versions are susceptible to an open redirect
vulnerability in the ....

Affected Software: <product>
Vulnerable versions: <x.y.z>
Fix version: <x.y.z'>

Impact:
<description>

Remediation:
Upgrade affected <product> deployments as soon as possible using the link above.