diff --git a/SecurityPolicy.html b/SecurityPolicy.html index b50ac68..0b38808 100644 --- a/SecurityPolicy.html +++ b/SecurityPolicy.html @@ -186,6 +186,12 @@ the SM is under the direct control of the Systems Administration team. It is located and version-controlled on the CAcert wiki.
++Section Headings are the same in both documents. +Where Section Headings are empty in one document, +they are expected to be documented in the other. +
+@@ -624,7 +630,6 @@ Operational backups may be online and local.
Document.
@@ -633,7 +638,6 @@ Offline backups should be distributed.
Document.
@@ -673,7 +677,6 @@ See CCA.
Document.
@@ -682,7 +685,6 @@ Access to incident reports is restricted.
Document.
@@ -731,7 +733,7 @@ Evidence must be secured if the severity is high.Document.
+A report should be appended to the documentation of the investigation, @@ -781,9 +783,138 @@ contact information needed.
+Software development team is responsible +for the security of the code. +
+ ++The source code is under CCS. +Additions to the team are approved by Board +
+ ++The primary tasks are: +
++Software Development is not primarily tasked to write the code. +In principle, anyone can submit code changes for approval. +
+ + ++The application code and patches are maintained in a +central version control system by the +software development team. +
+ ++The integrity of the central version control system +is crucial for the integrity of the applications running +on the critical systems. +
+ ++Patches are signed off by the team leader +or his designated reviewer. +Each software change should be reviewed +by a person other than the author. +Author and sign-off must be logged. +
+ ++Software Development team maintains a test system. +Each patch should be built and tested. +Test status of each patch must be logged. +
+ ++Software Development team maintains a bug system. +Primary communications should go through this system. +Access should be granted to all software developers, +systems administrators, and patch contributors. +Access may be granted to other Members. +
+ ++Once signed off, software development (team leader) +coordinates with systems administration (team leader) +to offer the patch. +Software development people are not to have access +to the critical systems, providing a dual control +at the teams level. +
+ ++If compilation and/or other processing of the +application source code in the version control system +is necessary to deploy the application, +detailed installation instructions should also be +maintained in the version control system and offered to the +system administrators. +
+ ++Systems administrators copy the patches securely +from the repository onto the critical machine. +See §3.3. +
+ ++The access interface is under CCS. +Additions to the team are approved by Board +
+ ++Access to Member's private information is restricted. +Support staff may be authorised by the Board +to access any additional, restricted interfaces. +Each such special access is managed by the team leader. +
+ +