You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 4 Next »

In Scope: All security vulnerabilities in the ONAP code base. This includes vulnerabilities in the code, and vulnerabilities related to the configuration of dependent packages, e.g., using default passwords or enabling debug tools.

Out of Scope: Known vulnerabilities in the dependent packages included in the ONAP code base. Examples of dependent packages in ONAP include ODL, com.fasterxml.jackson.core : jackson-databind : 2.8.11.3, and org.eclipse.jetty : jetty-util : 9.4.14.v20181114.

Reminder: All security vulnerabilities found in the ONAP code base must be fixed within 60days in order for the project to retain its CII Passing badge.

ONAP Policy:

  • Any security vulnerability found in the ONAP code base must be removed from the ONAP code base within 60 days.
    • Within the 60 days period, the expectations are that the project team will develop and test a resolution for the CVE.
    • The resolution will immediately be candidate for the next candidate release i.e. early drop, minor or major release.

    • An exception may be raised on extra-ordinary issue, but exceptions must be rare and have well documented rationale.

    • If there is an emergency, people can always use the container available in the “staging” repositories.

    • Inter-dependencies between projects:
      • The project containing the vulnerability must immediately notify the projects that have it as a dependency of:
        • the vulnerability
        • the projected timeline for resolution
        • changes to functionality caused by resolution
      • The projects with dependencies must incorporate the new version within 60 days.
  • If a project is unable to remove a security vulnerability within the 60 day window:
    • the project should supply a default configuration that prevents execution of the vulnerable code, and
    • the project must add removal of the vulnerable code to the backlog for the next release.
    • the readthedocs for the project must be updated with the vulnerability and the fix
  • Any critical CVE that will not be resolved within the 60 day period must be presented to the TSC for review no later than one week before the expiration period (day 53).
    • The project must present the following:

      • SECCOM Recommendations, following similar process than the IP Legal issues.

      • The reason they could not meet the deadline.

      • The nature of the risk.

    • If TSC does not provide a waiver then the impacted project team will need to build a recovery plan.

    • If TSC gives a waiver then it means that the TSC acknowledges the risk.

      • The project will change the answer to CII badging vulnerabilities_fixed_60_days to UNMET.
      • The project will prioritize resolving the vulnerability.
  • No labels