Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update security policy #94

Closed
fcaffieri opened this issue Sep 10, 2024 · 0 comments · Fixed by #95
Closed

Update security policy #94

fcaffieri opened this issue Sep 10, 2024 · 0 comments · Fixed by #95
Assignees
Labels
level/task Task issue request/operational Operational request type/change Change performed in a Wazuh Cloud environment issue

Comments

@fcaffieri
Copy link
Member

fcaffieri commented Sep 10, 2024

Description

Wazuh has updated its public security policy. We need to update the SECURITY.md file on wazuh-indexer repository to inform our users about our new policy.

It is published in https://sites.google.com/wazuh.com/devel/proceedings/security-management/development-vulnerabilities/public-security-policy

Related issue https://github.com/wazuh/internal-devel-requests/issues/263

SECURITY.md

The contents of the mentioned security policy have been transformed into Markdown format for its easy incorporation in our repositories as the SECURITY.md file.

To incorporate the new contents, you can follow the documentation at:

https://docs.github.com/en/code-security/getting-started/adding-a-security-policy-to-your-repository

Wazuh Open Source Project Security Policy

Wazuh Open Source Project Security Policy

Version: 2023-06-12

Introduction

This document outlines the Security Policy for Wazuh's open source projects. It emphasizes our commitment to maintain a secure environment for our users and contributors, and reflects our belief in the power of collaboration to identify and resolve security vulnerabilities.

Scope

This policy applies to all open source projects developed, maintained, or hosted by Wazuh.

Reporting Security Vulnerabilities

If you believe you've discovered a potential security vulnerability in one of our open source projects, we strongly encourage you to report it to us responsibly.

Please submit your findings as security advisories under the "Security" tab in the relevant GitHub repository. Alternatively, you may send the details of your findings to [email protected].

Vulnerability Disclosure Policy

Upon receiving a report of a potential vulnerability, our team will initiate an investigation. If the reported issue is confirmed as a vulnerability, we will take the following steps:

  1. Acknowledgment: We will acknowledge the receipt of your vulnerability report and begin our investigation.
  2. Validation: We will validate the issue and work on reproducing it in our environment.
  3. Remediation: We will work on a fix and thoroughly test it
  4. Release & Disclosure: After 90 days from the discovery of the vulnerability, or as soon as a fix is ready and thoroughly tested (whichever comes first), we will release a security update for the affected project. We will also publicly disclose the vulnerability by publishing a CVE (Common Vulnerabilities and Exposures) and acknowledging the discovering party.
  5. Exceptions: In order to preserve the security of the Wazuh community at large, we might extend the disclosure period to allow users to patch their deployments.

This 90-day period allows for end-users to update their systems and minimizes the risk of widespread exploitation of the vulnerability.

Automatic Scanning

We leverage GitHub Actions to perform automated scans of our supply chain. These scans assist us in identifying vulnerabilities and outdated dependencies in a proactive and timely manner.

Credit

We believe in giving credit where credit is due. If you report a security vulnerability to us, and we determine that it is a valid vulnerability, we will publicly credit you for the discovery when we disclose the vulnerability. If you wish to remain anonymous, please indicate so in your initial report.

We do appreciate and encourage feedback from our community, but currently we do not have a bounty program. We might start bounty programs in the future.

Compliance with this Policy

We consider the discovery and reporting of security vulnerabilities an important public service. We encourage responsible reporting of any vulnerabilities that may be found in our site or applications.

Furthermore, we will not take legal action against or suspend or terminate access to the site or services of those who discover and report security vulnerabilities in accordance with this policy because of the fact.

We ask that all users and contributors respect this policy and the security of our community's users by disclosing vulnerabilities to us in accordance with this policy.

Changes to this Security Policy

This policy may be revised from time to time. Each version of the policy will be identified at the top of the page by its effective date.

If you have any questions about this Security Policy, please contact us at [email protected].

@Desvelao Desvelao self-assigned this Sep 12, 2024
@Desvelao Desvelao added level/task Task issue type/change Change performed in a Wazuh Cloud environment issue request/operational Operational request and removed untriaged labels Sep 12, 2024
@Desvelao Desvelao linked a pull request Sep 12, 2024 that will close this issue
1 task
@wazuhci wazuhci moved this to In progress in Release 4.9.1 Sep 12, 2024
@wazuhci wazuhci moved this from In progress to Pending review in Release 4.9.1 Sep 12, 2024
@wazuhci wazuhci moved this from Pending review to Pending final review in Release 4.9.1 Sep 12, 2024
@wazuhci wazuhci moved this from Pending final review to Done in Release 4.9.1 Sep 12, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
level/task Task issue request/operational Operational request type/change Change performed in a Wazuh Cloud environment issue
Projects
No open projects
Status: Done
Development

Successfully merging a pull request may close this issue.

2 participants