mirror of https://github.com/dapr/docs.git
Update Reporting security issues
Signed-off-by: Artur Souza <asouza.pro@gmail.com>
This commit is contained in:
parent
c834e263c0
commit
542ba7f209
|
@ -6,10 +6,68 @@ weight: 3000
|
|||
description: "How to report a security concern or vulnerability to the Dapr maintainers."
|
||||
---
|
||||
|
||||
The Dapr organization and team makes security a central focus of how we operate and design our software. From the Dapr binaries to the GitHub release processes, we take numerous steps to ensure user applications and data is secure. For more information visit the [security page]({{< ref security-concept.md >}}).
|
||||
The Dapr project and maintainers make security a central focus of how we operate and design our software. From the Dapr binaries to the GitHub release processes, we take numerous steps to ensure user applications and data is secure. For more information on how security is built-in to Dapr, visit the [security page]({{< ref security-concept.md >}}).
|
||||
|
||||
## Reporting security issues
|
||||
## Covered Repositories and Issues
|
||||
|
||||
To report a security issue, please privately email the [Dapr Maintainers (dapr@dapr.io)](mailto:dapr@dapr.io?subject=[Security%20Disclosure]:%20ISSUE%20TITLE)
|
||||
When we say "a security vulnerability in Dapr" we mean a security issue
|
||||
in any repository under the [dapr GitHub organization](https://github.com/dapr/).
|
||||
|
||||
The Dapr maintainers will triage and respond ASAP and then patch and send an announcement within 30 days.
|
||||
This reporting process is intended only for security issues in the Dapr
|
||||
project itself, and doesn't apply to applications _using_ Dapr or to
|
||||
issues which do not affect security.
|
||||
|
||||
If the issue cannot be fixed by a change to one of the covered
|
||||
repositories above, then it recommended to create a GitHub issue in the appropriate repo or a question in Discord.
|
||||
|
||||
All that said, **if you're unsure** please reach out using this process before
|
||||
raising your issue through another channel. We'd rather err on the side of
|
||||
caution!
|
||||
|
||||
### Explicitly Not Covered: Vulnerability Scanner Reports
|
||||
|
||||
We do not accept reports which amount to copy and pasted output from a vulnerability
|
||||
scanning tool **unless** work has specifically been done to confirm that a vulnerability
|
||||
reported by the tool _actually exists_ in Dapr, including CLI, SDKs, components-contrib
|
||||
or any other repo under the Dapr org.
|
||||
|
||||
We make use of these tools ourselves and try to act on the output they produce; they
|
||||
can be useful! We tend to find, however, that when these reports are sent to our security
|
||||
mailing list they almost always represent false positives, since these tools tend to check
|
||||
for the presence of a library without considering how the library is used in context.
|
||||
|
||||
If we receive a report which seems to simply be a vulnerability list from a scanner we
|
||||
reserve the right to ignore it.
|
||||
|
||||
This applies especially when tools produce vulnerability identifiers which are not publicly
|
||||
visible or which are proprietary in some way. We can look up CVEs or other publicly-available
|
||||
identifiers for further details, but cannot do the same for proprietary identifiers.
|
||||
|
||||
## Security Contacts
|
||||
|
||||
The people who should have access to read your security report are listed in [`maintainers.csv`](/maintainers.csv).
|
||||
|
||||
## Reporting Process
|
||||
|
||||
1. Describe the issue in English, ideally with some example configuration or
|
||||
code which allows the issue to be reproduced. Explain why you believe this
|
||||
to be a security issue in Dapr, if that's not obvious.
|
||||
2. Put that information into an email. Use a descriptive title.
|
||||
3. Send the email to [Dapr Maintainers (dapr@dapr.io)](mailto:dapr@dapr.io?subject=[Security%20Disclosure]:%20ISSUE%20TITLE)
|
||||
|
||||
## Response
|
||||
|
||||
Response times could be affected by weekends, holidays, breaks or time zone
|
||||
differences. That said, the maintainers team will endeavour to reply as
|
||||
soon as possible, ideally within 3 working days.
|
||||
|
||||
If the team concludes that the reported issue is indeed a security
|
||||
vulnerability in a Dapr project, at least two members of the maintainers
|
||||
team will discuss the next steps together as soon as possible, ideally
|
||||
within 24 hours.
|
||||
|
||||
As soon as the team decides that the report is of a genuine vulnerability,
|
||||
one of the team will respond to the reporter acknowledging the issue and
|
||||
establishing a disclosure timeline, which should be as soon as possible.
|
||||
|
||||
Triage, response, patching and announcement should all happen within 30 days.
|
||||
|
|
Loading…
Reference in New Issue