Split BR-03 into development, release, and consumption requirements. #152
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
BR-03 requires:
Which, on the face of it, would require that all developers ensure that any email sent relating to the project and project decisions is delivered via SMTPS. This is probably not intended.
I suspect this criteria will be more clear if we separate it into three concerns:
Secure access to source code (and use of secure connections during code review) during development.
This seems well-addressed by git forges such as GitHub, GitLab et al.
Securing end-user access to released assets, including documentation. This would align with the best practices badge on sites_https and delivery_mitm.
This seems addressed by a combination of checking the homepage is HTTPS and using a standard release mechanism (e.g. GitHub releases, language package managers, OCI repositories)
Securing external content during the release pipeline (e.g. a SLSA attack D on an insecure download)
This seems trickier to assess, though we could make a stab at checking Makefiles, shell scripts, and GitHub Actions for
http://
URLs. This will obviously be leaky.