-
Notifications
You must be signed in to change notification settings - Fork 142
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add ability to document known NIST vulnerability information in SPDX documents #109
Comments
Kate, here are some additional thoughts. This may be a lot more challenging than it seems if we want this to actually be useful to people.
If SPDX adopts this feature, I believe the implementation would need to account for these things if we want it to be useful:
With regards to the statement of weakness information. This is a bit of an open-ended requirement. I've written a document for OWASP (currently draft) which outlines 10 unique risk factors that may affect a component. https://www.owasp.org/index.php/Component_Analysis. Some of these may apply to BOMs, others will not. One final thought. Do we want this feature in a BOM or do we want to produce BOMs with highly accurate metadata that would facilitate the automated analysis of them in the future. For example, this is what organizations using CycloneDX BOMs with Dependency-Track are doing today: Dependency-Track also supports SPDX (tag/rdf). However, in order for SPDX to do what CycloneDX is doing today, it needs to support a large number of ecosystems, produce highly accurate metadata which can be analyzed, and support Package URL. IMHO, if SPDX focused on high-quality implementations producing high-quality metadata useful in component analysis, and implemented #53, it will be a lot more useful to the auditor than attempting to include vulnerability and other weakness information in the BOM itself. Apologies for being overly verbose. |
Based on discussion in weekly meeting, we're moving this into 3.0 so it aligns better with the base + security profile. |
@tsteenbe - see comments from Steve above. |
I had a look at the current security profile (google doc proposed by @tsteenbe on https://wiki.spdx.org/view/Technical_Team/Minutes/2020-05-26). In fact it was not quite, what I expected. It took me a while to get my head around this, but I argue as follows:
Putting a long story short. I regard focussing on the vulnerability and weakness information is not sufficient. We need ways to attach CPEs (or the like) to assets, we need to aggregate CVEs (or the like) for an asset, we need to capture vulnerability assessment information, and we must understand how this data ends up in a consumer (and machine) readable and useful documentation (BOM, SBOM, Asset Annex, Compliance Artifact, whatever you want to call it) Just 2 cents on friday evening. I'm happy to go into discussions and SPDX alignments here. We can also shows our current approach if there is interest. Regards, |
Use Case: At a point in time, an auditor wants to be able to document what vulnerability and/or weakness information is known about a specific software deliverable (product, package, component, etc.) The NIST database is the standard here where the information is generally extracted from. It would be helpful to enable people to capture the relevant fields for accurate understanding.
IonChannel's SEVA has a version of this information included that we need to confirm with NIST is the relevant. Vulnerability Information from SEVA XML - Section 7
This information needs to be reviewed and a section created in SPDX document to track this.
The text was updated successfully, but these errors were encountered: