You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
josephineSei opened this issue
Oct 28, 2024
· 2 comments
Labels
SCS-VP10Related to tender lot SCS-VP10securityIssues or pull requests that are security-relevantstandardsIssues / ADR / pull requests relevant for standardization & certification
In #749 we are standardizing the security of the software of the IaaS Layer.
But integrating security patches and updates are not solely done on one layer, but need to be accomplished by CSPs on all Layers.
This issue should investigate which measures should be done on the KAAS layer to prevent and deal with security issues.
It should be included, how CSPs could get information about potential security issues.
How fast they should respond according to the severity? (see C5 criteria catalog with timeframes for responses on page 75. )## Definition of Done:
Proposal has been written with name of the form scs-xxxx-v1-slug.md (only substitute slug)
Proposal has the fields status, type, track set
Proposal has been voted upon in the corresponding team
Status has been changed into Draft, file renamed: xxxx replaced by document number
If applicable: test script has been written (this item may be moved into a separate issue so long as the state is Draft)
The text was updated successfully, but these errors were encountered:
josephineSei
added
security
Issues or pull requests that are security-relevant
standards
Issues / ADR / pull requests relevant for standardization & certification
SCS-VP10
Related to tender lot SCS-VP10
labels
Oct 28, 2024
I read the version policy standard. It includes how to deal with patches and CVEs, but the time frame required there is vague. It just says "Must provide latest patch version no later than a week after release" and "Should be faster for critical CVEs (CVSS >= 8)"
Maybe it would be good to align this timeframe for security patches over all layers.
SCS-VP10Related to tender lot SCS-VP10securityIssues or pull requests that are security-relevantstandardsIssues / ADR / pull requests relevant for standardization & certification
In #749 we are standardizing the security of the software of the IaaS Layer.
But integrating security patches and updates are not solely done on one layer, but need to be accomplished by CSPs on all Layers.
This issue should investigate which measures should be done on the KAAS layer to prevent and deal with security issues.
It should be included, how CSPs could get information about potential security issues.
How fast they should respond according to the severity? (see C5 criteria catalog with timeframes for responses on page 75. )## Definition of Done:
Please refer to scs-0001-v1 for details.
scs-xxxx-v1-slug.md
(only substituteslug
)status
,type
,track
setDraft
, file renamed:xxxx
replaced by document numberDraft
)The text was updated successfully, but these errors were encountered: