Skip to main content

Active

Expected​

SectionItemPriority GroupDetails
7. Code QualityAt least One Primary Maintainer has taken TBD Training on Secure Software Design0details
7. Code QualityAt least One Primary Maintainer has taken TBD Training on OWASP Top 10 or Equivalent0details
1. User AuthenticationMulti Factor Authentication (MFA) Enforced Across the Github Organization1details
1. User AuthenticationMulti Factor Authentication (MFA) Enforced Across the npm Organization1details
1. User AuthenticationMulti Factor Authentication (MFA) Enforced in All Tools Wherever Techncially Feasible1details
1. User AuthenticationUse Multi Factor Authentication (MFA) Methods that Defend Against Impersonation when Available1details
3. Service AuthenticationNo Secrets and Credentials in Source Code2details
3. Service AuthenticationSecrets are injected at runtime, such as environment variables or as a file (eg: use Github Secrets)2details
7. Code QualityAll Commits are Scanned for Secrets and Credentials2details
7. Code QualityNew Commits Containing Secrets or Credentials are Blocked from Merging2details
1. User AuthenticationUse SSH keys for developer access to source code repositories and use a passphrase3details
3. Service AuthenticationPublish to npm using an MFA-enabled account rather than single factor legacy or granular access tokens3details
3. Service AuthenticationGithub Webhooks Use Secrets3details
2. User Account PermissionsDefault Github Org Member Permissions Should Be Restricted4details
2. User Account PermissionsOnly Admins Should Be Able To Create Public Repositories4details
2. User Account Permissions[For Projects with Two or more Admins] Do not allow Admins to Bypass Branch Protection Settings4details
2. User Account PermissionsDefine roles aligned to functional responsibilities4details
2. User Account PermissionsDefine Individuals/Teams who Write Access to a Github Repo4details
2. User Account Permissions[For Projects with Two or more Owners] Have at least Two Owners Configured for Access Continuity4details
5. Vulnerability ManagementActively Exploited Critical Vulnerabilities Patched within 30 Days5details
5. Vulnerability ManagementNon-Critical Exploitable Vulnerabilities Patched within 90 Days5details
11. Dependency ManagementAn automated process to identify dependencies with publicly disclosed vulnerabilities6details
7. Code QualityUse an Automated Static Code Analysis Tool (eg: ESLInt)6details
7. Code QualityCompilers/Linter Warnings Addressed in order to Merge6details
7. Code QualityAll Commits are Scanned by a Static Application Security Testing Tool6details
7. Code QualityAll Required Commit Status Checks must pass before Merging6details
7. Code QualitySecurity.md Meets OpenJS CVD Guidelines7details
6. Coordinated Vulnerability DisclosureProject Leverages a CVD Tool to Privately Receive/Manage External Vulnerability Reports (eg: H1/GH PVR)7details
6. Coordinated Vulnerability DisclosureAll External Vulnerability Reports Responded to <14 Days7details
6. Coordinated Vulnerability DisclosureEstablish a Clear Communication and Incident Response Plan7details
6. Coordinated Vulnerability DisclosureAll Known Security Vulnerabilities are Issued a CVE7details
6. Coordinated Vulnerability DisclosureRelease Notes must Include the CVE ID of Patched Security Vulnerabilities7details
7. Code QualityRegression Tests for => 50% of Bugs and 100% of Security Vulns8details
4. Github Workflow PermissionsGithub Org Default Workflow Token Permissions are Set to Read Only9details
4. Github Workflow PermissionsWorkflows are not Allowed To Create or Approve Pull Requests9details
9. Source ControlPrevent Force Push on Default Branch9details
9. Source ControlPrevent Default Branch Deletion9details
9. Source ControlDefault Branch must be Up to Date before Merging9details
4. Github Workflow PermissionsGitHub Organization Secrets are Restricted to Selected Repositories10details
4. Github Workflow PermissionsGitHub Actions Should Be Limited To Verified or Explicitly Trusted Actions10details
4. Github WorkflowsDisable use of Self-Hosted Runners in Github Org10details
4. Github WorkflowsBuild Pipeline Cannot Execute Arbitrary Code from Outside of a Build Script11details
4. Github WorkflowsOnly Allow Workflows Write Permissions at the Job-Level11details
4. Github WorkflowsAvoid Script Injection from Untrusted Context Variables11details
4. Github Workflow PermissionsConsistent and Automated Build Process is Documented and Used12details
5. Vulnerability ManagementCommonly Used Older Versions Supported or Upgrade Path Provided/Documented12details
8. Code Review[For Projects with Two or more Maintainers] Document Software Architecture12details
9. Source ControlCI/CD steps should all be automated through a pipeline defined as code12details
4. Github WorkflowsPin Actions with Access to Secrets to a Full Length Commit SHA13details
10. Dependency InventoryAutomated Process is Used to Monitor for and Maintain a List of Out of Date Dependencies14details
10. Dependency Inventory[Freestanding Applications Only] A Machine Readable List of all Direct and Transitive Dependencies is Available for the Software14details
10. Dependency InventoryModified dependencies are uniquely identified and distinct from origin dependency14details
5. Vulnerability ManagementA new release to refresh dependencies occurs at least annually14details
SectionItemPriority GroupDetails
1. User AuthenticationGithub.com: Use a passkey (AAL2) or hardware key (AAL3) that activates using a password or biometricsRec 1details
1. User AuthenticationNon-Interactive Github: Use a passkey (AAL2) or hardware key (AAL3) that activates using a password or biometricsRec 1details
1. User AuthenticationAll Other Contexts: Use a passkey (AAL2) or hardware key (AAL3) that activates using a password or biometricsRec 1details
4. Github WorkflowsLimit changes from forks to workflows by requiring approval for all outside collaboratorsRec 2details
4. Github WorkflowsUse a Workflow Security ScannerRec 2details
4. Github WorkflowsUse a Github Runner Security ScannerRec 2details
2. User Account PermissionsGithub Organization Admins Should Have Activity In The Last 6 MonthsRec 3details
2. User Account PermissionsGithub Organization Members with Write Permissions Should Have Activity In The Last 6 MonthsRec 3details
9. Source ControlRequire Pull Requests before MergingRec 4details
9. Source ControlGithub Org Requires Commit Signoff for Web-Based CommitsRec 4details
9. Source ControlRequire Signed CommitsRec 4details
10. Dependency Inventory[Freestanding Applications Only] Commit a package-lock.json file with each releaseRec 5details
8. Code Review[For Projects with Two or more Maintainers] Require Two Party ReviewRec 6details
8. Code Review[For Projects with Four or more Maintainers] Require Code Owners ReviewRec 6details
9. Source Control[For Projects with Two or more Maintainers] Require Approved PRs for all commits to mainline branchesRec 6details
2. User Account PermissionsLimit Number of Github Org Owners (ideally Fewer Than Three)Rec 7details
2. User Account PermissionsLimit Number of Github Repository Admins (ideally Fewer Than Three)Rec 7details
5. Vulnerability ManagementActively Exploited Critical and High Vulnerabilities Patched within 14 DaysRec 8details
5. Vulnerability ManagementNon-Critical Expoitable Vulnerabilities Patched within 60 DaysRec 8details