Replies: 2 comments 3 replies
-
@mbarbero thank you for sharing this work. It is great to see this continued focus on security at the Foundation, and this proposal is a welcome advancement. Firstly, regarding the motivation to create a new framework, I understand and agree with your observations about the existing secure development frameworks. It is helpful to produce a progressive and practical set of levels for development at Eclipse. I think it will be helpful to cross-reference the EF3SCL practices to established descriptions in the other frameworks. This will help to provide additional context and description from an alternate source, and also allow consumers to align the EF3SCL security levels with their obligations under the existing frameworks. It may be that entities have existing procurement requirements that are expressed in terms of the established frameworks, unless/until the EF3SCL levels becomes a recognised designation, projects may still need to declare their levels in terms of the existing frameworks to satisfy their supplier obligations. The categories covered by the EF3SCL framework are comprehensive. A few specific comments:
There are many fundamental services that can be identified within the EF3SCL framework that should be provided by the Foundation. I appreciate that the document is not intended to cover the implementation details for the items described. While we know some have been outsourced to a trusted external service (e.g. GitHub for source code version control, and the Foundation directly manages some data (e.g. secrets) and services (e.g. code signing), there are more in this framework that should reside at the Foundation level rather than being the responsibility of the project. I trust that these will be forthcoming as projects reach the need for them. Finally, the name needs fixing ;-) "EF3SCL" is unpronounceable, and "Eclipse Foundation Secure Software Supply Chain Levels" doesn't adequately describe the framework - since it goes beyond supply chain to include development practices and more. While not the most important point, I do believe that you will get better adoption and uptake by choosing a name that people can remember. Again, I don't want to distract from the great work put into this framework and the levels. I'm definitely in favor of bringing this into production and I am already inspired to work towards some of these points in the Adoptium project. Thanks! |
Beta Was this translation helpful? Give feedback.
-
FYI, the first revision of the SLSA source track just merged today: https://github.com/slsa-framework/slsa/blob/main/docs/spec/v1.1/source-requirements.md |
Beta Was this translation helpful? Give feedback.
-
This is a request for review and feedback on a new security framework proposal. It is a pragmatic security framework designed to promote actionable security practices and provide a clear progression path for Eclipse Foundation projects to secure their supply chains.
The draft document for the spec can be found here: https://github.com/eclipse-csi/gradually/blob/main/spec.md.
Here is a little bit of context on our approach and the reasoning behind the creation of this framework:
First, the intended audience is "just" Eclipse Foundation projects: it is not intended nor proposed as an alternative to other frameworks like SLSA, NIST SSDF, or CNCF SSCSP. Rather it builds on them to define Eclipse Foundation-specific policies, interpretations, and practices. Based on those premises, our focus/objectives with this framework are:
Once again, we have drawn significant inspiration from existing frameworks. Please see below how we position our framework in comparison to them:
Finally, while we have not done it yet, we believe our framework could be easily mapped back to SLSA and NIST SSDF, and we plan on doing so once we have a final 1.0 version.
We look forward to your valuable feedback and guidance.
(edit 2024-10-10: removed references to EF3SCL which was a poor name)
Beta Was this translation helpful? Give feedback.
All reactions