Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Create a top-level security/cve page for tracibility and remediation reporting #186

Open
aaronlippold opened this issue Mar 29, 2019 · 2 comments

Comments

@aaronlippold
Copy link

As organizations are deploying your products to the Enterprise, The level of trust in those products should be easily maintained. To do this I would suggest that we create an automatically generated vulnerability and CVE page that links back to PRs and code commits and provides a conciselis of which vulnerabilities were remediated and which won our abilities are still in progress of remediation. This should be a top-level page with one click access. If possible given that we recompile upstream sources such as Ruby and other tools we should try to dynamically link to them as well so that if there's a chain of vulnerability we address how we are mitigating that as well. Finally this will help establish pedigree for when chef and it's product lines start to formally validate their products through processes like the common criteria.

@aaronlippold
Copy link
Author

For example a customer of ours has specifically about proof that inspec has an active remediation and security process. when I went to the security page I wasn't able to easily correlate code levels to CVE and the change log had inconsistent reporting of vulnerability data. If this had been a top level link of a single page specifically designed to report vulnerabilities from version to version it would have made a short conversation.

@bennyvasquez bennyvasquez self-assigned this Apr 30, 2021
@tas50
Copy link
Contributor

tas50 commented Apr 30, 2021

This should probably involved expanded content here: https://www.progress.com/security

@bennyvasquez bennyvasquez removed their assignment May 8, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants