In Scope: All security vulnerabilities in the ONAP code base.
Out of Scope: Known vulnerabilities in the dependent packages included in the ONAP code base. Examples of dependent packages in ONAP include ODL, com.fasterxml.jackson.core : jackson-databind : 2.8.11.3, and org.eclipse.jetty : jetty-util : 9.4.14.v20181114.
Reminder: All security vulnerabilities found in the ONAP code base must be fixed within 60days in order for the project to retain its CII Passing badge.
ONAP Policy:
- Any security vulnerability found in the ONAP code base must be removed from the ONAP code base within 60 days.
- Within the 60 days period, the expectations are that the project team will develop and test a resolution for the CVE.
The resolution will immediately be candidate for the next candidate release i.e. early drop, minor or major release.
An exception may be raised on extra-ordinary issue, but exceptions must be rare and have well documented rationale.
If there is an emergency, people can always use the container available in the “staging” repositories.
- Inter-dependencies between projects:
- The project containing the vulnerability must immediately notify the projects that have it as a dependency of:
- the vulnerability
- the projected timeline for resolution
- changes to functionality caused by resolution
- The projects with dependencies must incorporate the new version within 60 days.
- The project containing the vulnerability must immediately notify the projects that have it as a dependency of:
- If a project is unable to remove a security vulnerability within the 60 day window:
- the project should supply a default configuration that prevents execution of the vulnerable code, and
- the project must add removal of the vulnerable code to the backlog for the next release.
- Any critical CVE that has reached the 60 days period with no resolution must be presented to the TSC for review.
The project must present the following:
SECCOM Recommendations, following similar process than the IP Legal issues.
The reason they could not meet the deadline.
The nature of the risk.
If TSC does not provide a waiver then the impacted project team will need to build a recovery plan.
If TSC gives a waiver then it means that the TSC acknowledges the risk.
- The project will change the answer to CII badging vulnerabilities_fixed_60_days to UNMET.
- The project will prioritize resolving the vulnerability.