Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Security Vulnerability Management Process for SONiC Community #1654

Merged
merged 3 commits into from
May 16, 2024

Conversation

zhangyanzhao
Copy link
Collaborator

This document outlines SONiC vulnerability reporting and management process.

@zhangyanzhao
Copy link
Collaborator Author

TSC members, can you please help to review and approve this PR? Thanks.

@eddieruan-alibaba
Copy link
Contributor

Looks good to me.

@Yarden-Z
Copy link
Contributor

Yarden-Z commented Apr 3, 2024

Is there a template to report SONiC security issues?
Regarding security issues - do we want all security issues dealt with within 90 days? Critical item (CVSS > 9.0) might require a more immediate response if the item is highly critical and highly visible.

We appreciate security researchers and SONiC users that report vulnerabilities to the SONiC Open Source Community. All reports will be investigated thoroughly by the SONiC security committee.
## 2.Vulnerability Disclosure
Once a mitigation/fix is reviewed and approved by SONiC security committee, the vulnerability disclosure process starts.
Mitigation/fix for public known vulnerabilities will be released right away once approved by SONiC security committee. Fix/mitigation for non-public vulnerabilities should also come out as soon as possible, but we may postpone them if the reporter or an affected party request so. However, the delay should be no more than 90 days from when a mitigation/fix is ready. The SONiC security committee should create a template for disclosing vulnerability.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Depends on the severity, 90 days may be too long for critical CVE, committee should come up with a timeline for each severity

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

issues open by security researcher are usually more time sensitive since tey want to publish their findings, so such issue need to prioritized. also need to understand if 90 day is acceptable in such cases ( it may be far shorter like 0/60 days)

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

issues in open code packages is different than sonic code issues, so i think we need to handle that differently
first such issues may have being fixed in later versions
i think we need to set a policy to work with open code

  1. we need to score any open code package - based on security / frequency of fix / known issues ..
  2. new open code can only used if "security" score is better that a predefine level
  3. as part of sonic release need to update to last stable any open code with security issues

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

regrading security issues with hw , i believe it should be handled by odm , with the exception of kernel related fixed that apply to Debian

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

one additional note is that on optional feature possible mitigation an be to disable the functionality

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Depends on the severity, 90 days may be too long for critical CVE, committee should come up with a timeline for each severity

The 90 days is the longest waiting time from when a mitigation/fix is ready to provide enough buffer to patch their system whoever is concerned. Committee can further refine that timeline based on severity.

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

issues in open code packages is different than sonic code issues, so i think we need to handle that differently first such issues may have being fixed in later versions i think we need to set a policy to work with open code

  1. we need to score any open code package - based on security / frequency of fix / known issues ..
  2. new open code can only used if "security" score is better that a predefine level
  3. as part of sonic release need to update to last stable any open code with security issues

@marvellgit can you please elaborate a bit on "open code packages"? I do not quite understand your comments.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

like frr or other linux project we use in sonic

SECURITY.md Show resolved Hide resolved
SECURITY.md Outdated Show resolved Hide resolved
@zhangyanzhao
Copy link
Collaborator Author

Is there a template to report SONiC security issues? Regarding security issues - do we want all security issues dealt with within 90 days? Critical item (CVSS > 9.0) might require a more immediate response if the item is highly critical and highly visible.

Security template will be defined later by security committee. The 90 days is the duration from date when mitigation is identified to vul expose date, overall, we expect the reported issues to be mitigated as soon as possible.

@zhangyanzhao
Copy link
Collaborator Author

Is there a template to report SONiC security issues? Regarding security issues - do we want all security issues dealt with within 90 days? Critical item (CVSS > 9.0) might require a more immediate response if the item is highly critical and highly visible.

Security committee can define a template if they want. The 90 days is the longest waiting time from when a mitigation/fix is ready, we expect the vulnerability is mitigated as soon as possible.

@zhangyanzhao
Copy link
Collaborator Author

@adyeung @balajib-cisco @eddieruan-alibaba can you please help to approve this PR if you are ok with the updated content? Thanks.

@zhangyanzhao zhangyanzhao merged commit c256972 into sonic-net:master May 16, 2024
1 check passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants