-
Notifications
You must be signed in to change notification settings - Fork 79
Security monitoring procedure
Jeroen Jansen van Rosendaal edited this page Apr 21, 2023
·
4 revisions
This process describes how critical and high security findings are solved, monitored and registered.
- Previous release (n-1)
- Current release (n)
- Upcoming release (n+1)
Detecting
We use dependabot in our github environment and snyk in our local CI to detect potential CVE's
Fixing
- A CVE or other security issue is detected.
- The core development team determines impact
- Severity of the CVE
- Usage of code/library containing the CVE (test/compile/provided)
- Is a fix available (if not are any alternatives available)
- What is the impact of the fix to the framework
- Based on the analysis we determine the FF severity and the plan of attack
- critical --> needs immediate fix for (n-1 / n / n+1) and potentially creation of a new version
- high --> needs an immediate fix implemented on for the next bugfix/security release (n-1 / n / n+1)
- medium --> fixed as soon as possible fix implemented for the next release (n / n+1) (depends on impact on framework)
- low --> fixed on (n+1)
_Critical _