You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 7 Next »

M1 Release Planning Milestone


Practice Area

Checkpoint

Yes/No

Evidence - Comment

How to?

Security

Has the Release Security/Vulnerability table been filled out in the   protected Security Vulnerabilities wiki space?

 

Table in in the protected Security Vulnerabilities wiki space   corresponds to the latest NexusIQ scan

PTL reviews the NexusIQ scans for their project repos and fills out   the vulnerability review table

Have known vulnerabilities (critical and severe) to address/remove in   the release been identified with jira tickets?

 

Jira tickets exist for vulnerabilities or the project indicates that   there will be no vulnerable library replacement

Complete Jira tickets

Propose that previous line replace this   question in the current M3 template: Do you have a plan to address by   M4 the Critical  and High   vulnerabilities in the third party libraries used within your project?

 

 

Ensure by M4 the Nexus-IQ report from “Jenkins CLM” shows 0 critical   security and severe vulnerabilities. Open the Nexus-IQ report for the details   on each repo.

Has the project committed to the release CII badging level

 

Project plans that include

See https://www.coreinfrastructure.org/programs/badge-program/ and https://wiki.onap.org/display/DW/CII+Badging+Program

Has the project created their project CII questionnaire and completed the ONAP-level CII requirements? 

URL of the questionnaire and all ONAP level CII requirements are answered

See https://wiki.onap.org/display/DW/CII+Badging+Program

If the project uses java, has the project integrated with the   oparent.pom?

 

Oparent.pom included in project

 


M2 Release Planning Milestone


Practice Area

Checkpoint

Yes/No

Evidence - Comment

How to?

Security

Has the Release Security/Vulnerability table been updated in the   protected Security Vulnerabilities wiki space?

 

Table in in the protected Security Vulnerabilities wiki space   corresponding to the latest NexusIQ scan

PTL reviews the NexusIQ scans for their project repos and fills out   the vulnerability review table


M3 Release Planning Milestone


Practice Area

Checkpoint

Yes/No

Evidence - Comment

How to?

Security

Has the Release Security/Vulnerability table been updated in the   protected Security Vulnerabilities wiki space?

 

Table in in the protected Security Vulnerabilities wiki space   corresponds to the latest NexusIQ scan

PTL reviews the NexusIQ scans for their project repos and fills out   the vulnerability review table

Has the project committed to enabling transport level encryption on   all interfaces?

 

Requirements and test cases for transport layer encryption have been   created for all interfaces not currently supporting encryption.

 

Has the project documented all open port information?

 

 

 

Has the project provided the communication policy to OOM and Integration?

Gildas recommends this be moved to M1

 

 

 

Do   you have a plan to address by M4 the Critical  and High vulnerabilities   in the third party libraries used within your project?

Currently also in M1 table

 

 

Ensure by M4 the Nexus-IQ report from “Jenkins CLM” shows 0 critical   security vulnerability. Open the Nexus-IQ report for the details on each   repo.


M4 Release Planning Milestone



Practice Area

Checkpoint

Yes/No

Evidence - Comment

How to?

Security

Has the Release Security/Vulnerability table been filled out in the   protected Security Vulnerabilities wiki space?

 

Table in in the protected Security Vulnerabilities wiki space   corresponds to the latest NexusIQ scan; all NexusIQ finding are marked as   false positive or exploitable with the supporting analysis.

PTL reviews the NexusIQ scans for their project repos and fills out   the vulnerability review table

Are all Defects of priority Highest and High in status   "Closed" in Jira? (this includes the Jira for Critical and Severe   NexusIQ findings)

 

All Jira tickets for vulnerability elimination are complete.

Complete Jira tickets

Did the project achieve the enablement of transport level encryption   on all interfaces?

 

All interfaces are exposed over TLS (or another secure protocol)

 

Provide   the "% Achieved" on the CII Best   Practices program.

Moved from Development section

 

Provide link to your project CII Best Practices page.

As documented in CII   Badging Program, teams have to fill out CII Best Practices

REMOVE FROM DEVELOPMENT

Is there any Critical and Severe level security   vulnerabilities older than 60 days old in the third party libraries used   within your project unaddressed?

Nexus-IQ classifies level as the following:

  •   Critical is   level 7 to 10
  •   Severe is   level 4 to 6
  •   Moderate is   level 1 to 3

which is complaint with CVSS   V2.0 rating.

 

 

 

  • No labels