Skip to content

Commit

Permalink
Merge pull request #139 from Linaro/add-vdp
Browse files Browse the repository at this point in the history
Add security incident handling process page
  • Loading branch information
pcolmer authored Nov 19, 2024
2 parents 5c8d4e8 + 3870848 commit 223e7b4
Show file tree
Hide file tree
Showing 2 changed files with 94 additions and 3 deletions.
91 changes: 91 additions & 0 deletions src/content/pages/vdp.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,91 @@
---
layout: ../../layouts/Flow.astro
slug: vdp
title: Security Incident Handling Process
description: |
Information about Linaro's Security Incident Handling Process.
hero:
title: >
Security Incident Handling Process
description: ""
styles:
text_container: text-center w-full
title: w-full text-center
background: bg-right-top md:bg-top opacity-50
description: text-md sm:text-lg
main_container: max-h-[20rem] min-h-[20ch] h-[20vh]
flow:
- row: container_row
sections:
- component: text
text_content: |
## Reporting
If you think you have found a security vulnerability in any Linaro products or in our infrastructure, then please send an email to the Linaro Product Security Incident Team (PSIRT) at psirt@linaro.org. The PSIRT is referred to from now on as “us/we/our”. We will do our best to respond and fix any issues as soon as possible.
As with any bug, the more information you provide, the easier it is to diagnose and fix. Any exploit code is very helpful, please include it with your report if available.
Please let us know your disclosure plans if you have any. This may affect our disclosure plan as described in the next section.
Please indicate any sensitive information you do not wish us to share. We reserve the right to share any information you provide with trusted third parties and eventually the public unless you request otherwise.
If we consider the bug not to be a security vulnerability, we will inform you and direct the bug to the normal support process.
## Process
The Linaro PSIRT adheres to the following process:
- component: graphic
src: linaro-website/graphics/779f08d9-425d-401b-8c95-3a82c9f408f7.png
alt: "Linaro Security Incident Handling Process"
width: 931
height: 201
- component: text
text_content: |
### Triage
When a potential vulnerability report is received by us, we will assess it to understand the potential product impact:
1. If we can reproduce the potential vulnerability, then we carry out the remaining process through to disclosure.
2. If we can not reproduce the vulnerability, we will inform you and close the report.
3. If we consider the report not to be a security vulnerability, we will inform you and direct the bug to the normal support process.
### Risk Assessment
We will make a risk-based decision as to whether the vulnerability will be remediated in the product or if the vulnerability will be addressed through other means, for example risk acceptance or transference (such as configuration changes).
### Temporary Remediation
We will determine if and how the vulnerability can be temporarily mitigated, before providing a permanent solution.
### Permanent Solution
If we decided in the risk assessment that the vulnerability will be remediated in the product, we will fix the vulnerability as soon as possible. We will work with you if the fix can be provided as a hotfix, in a monthly support release or due the impact/risk, in a major release.
### Disclosure
We will communicate vulnerability information as appropriate, for example by notifying affected customers only or by publishing a public security advisory.
We will also perform retrospective work and incorporated learnings from any vulnerability in our processes and products.
## Frequently asked questions
### 1. Do you have a bug bounty program?
We currently don’t have any bug bounty program.
### 2. Your DMARC records aren’t properly configured
We are aware of this and believe we have sufficient settings in place. However, if you find that this still is exploitable, please don’t hesitate to reach out to us.
### 3. Unauthenticated Jenkins Server
The domains listed below are available to unauthenticated users. This is deliberate and poses no security issues. There are no privileged builds with confidential information logged. Jenkins is configured to hide secrets from output and logs. If you still come across non-open source content or other content that you believe is sensitive, please let us know what that content is and why you believe it’s sensitive and then we will investigate further.
Domains:
https://ci.trustedfirmware.org
https://ci.staging.trustedfirmware.org
---
6 changes: 3 additions & 3 deletions yarn.lock
Original file line number Diff line number Diff line change
Expand Up @@ -4545,9 +4545,9 @@ camelcase@^7.0.1:
integrity sha512-xlx1yCK2Oc1APsPXDL2LdlNP6+uu8OCDdhOBSVT279M/S+y75O30C2VuD8T2ogdePBBl7PfPF4504tnLgX3zfw==

caniuse-lite@^1.0.30001587, caniuse-lite@^1.0.30001599:
version "1.0.30001611"
resolved "https://registry.yarnpkg.com/caniuse-lite/-/caniuse-lite-1.0.30001611.tgz#4dbe78935b65851c2d2df1868af39f709a93a96e"
integrity sha512-19NuN1/3PjA3QI8Eki55N8my4LzfkMCRLgCVfrl/slbSAchQfV0+GwjPrK3rq37As4UCLlM/DHajbKkAqbv92Q==
version "1.0.30001680"
resolved "https://registry.npmjs.org/caniuse-lite/-/caniuse-lite-1.0.30001680.tgz"
integrity sha512-rPQy70G6AGUMnbwS1z6Xg+RkHYPAi18ihs47GH0jcxIG7wArmPgY3XbS2sRdBbxJljp3thdT8BIqv9ccCypiPA==

case@1.6.3:
version "1.6.3"
Expand Down

0 comments on commit 223e7b4

Please sign in to comment.