Skip to main content

📣 Submit your proposal: OpenSSF Community Day Korea | Open Source SecurityCon

About OpenSSF

The Open Source Security Foundation (OpenSSF) seeks to make it easier to sustainably secure the development, maintenance, release, and consumption of the open source software (OSS) we all depend on. This includes fostering collaboration within and beyond the OpenSSF, establishing best practices, and developing innovative solutions.

OUR CHARTER

“The mission of the OpenSSF is to inspire and enable the community to secure the open source software we all depend on.”

Read the OpenSSF Charter

OpenSSF Mission

The Open Source Security Foundation (OpenSSF) seeks to make it easier to sustainably secure the development, maintenance, release, and consumption of the open source software (OSS) we all depend on. This includes fostering collaboration within and beyond the OpenSSF, establishing best practices, and developing innovative solutions.

OpenSSF Vision

OSS is a digital public good and as an industry, we have an obligation to address the security concerns with the community. We envision a future where OSS is universally trusted, secure, and reliable. Producers of OSS (of all skill levels) have the ability to proactively and retroactively address both existing and emergent security threats through low-friction tooling automation, education, and clear and actionable guidance. This collaborative vision enables individuals and organizations in a global ecosystem to confidently leverage the benefits and meaningfully contribute back to the OSS community.

Values: Open Source is a Public Good

The OpenSSF serves as a trusted partner to affiliated open source foundations and projects, and provides valuable guidance and artifacts that encourage security-by-design and security- by-default. OpenSSF initiatives should make security easier for open source maintainers and contributors. Consumers of OSS can leverage the output of the OpenSSF to have clear, consistent, and trusted signals to better understand the security profile of OSS content.

The OpenSSF is committed to encouraging all interested stakeholders to participate in the foundation and its technical initiatives (TIs). The OpenSSF is viewed as an influential advocate for mutually-beneficial external efforts and an educator of policy decision makers.

More than just advocacy to Diversity, Equity, and Inclusion (DEI) groups, the OpenSSF remains committed to directly facilitating an environment for all perspectives, all backgrounds, and equitable opportunities for global mentorship and education. The OpenSSF remains committed to continuously evolving these efforts to bring more inclusive and diverse software security education. The OpenSSF will ensure stakeholders have open and transparent opportunities to engage in and receive value from OpenSSF TIs.

OpenSSF Strategy

The OpenSSF strategy is a set of objectives that aim to enhance the security of OSS by developing tooling and processes that make secure development easier, promote a deeper understanding of best practices, and provide support to innovative technical initiatives. The charter is the source of truth for the OpenSSF, and this strategy builds on the charter.

Objectives focus on tooling and processes designed to ensure consistency, integrity, and risk assessment that strengthen the overall security of the OSS ecosystem. This focus supports the community to develop tooling, processes, and educational assets that accelerate OSS security technical initiatives. Accomplishing these objectives will provide maintainers and contributors of OSS (of all skill levels) the ability to proactively or retroactively address both existing and emergent security threats.

OpenSSF Roadmap

The OpenSSF strategy is outlined across three key areas:
We will be a Catalyst for Change, we will Educate and Empower the Modern Developer, and we will be an Ecosystem Leader.

  • How do we impact our technological underpinnings to drive adoption of better security outcomes? Catalyst for Change

OpenSSF acts as a catalyst for change with producers of OSS to improve “secure by design/default”. Drive technical engagement to create integrated tools that remove barriers to adopting security foundations to improve open source software security.

  • How do we ensure the evolving security needs of our developer community are being met? Educate & Empower the Modern Developer

Create and maintain best practices guides & education materials that ensure both current and future OSS developers obtain & maintain sufficient secure development skills. Consumers of OSS can leverage clear, consistent, and easily integrated trusted signals to better understand the security posture of open source content ingested in supply chains.

  • How do we interact with others and influence better security? Ecosystem Leader

Be an influential advocate and provide a thought leadership forum for collaboration with partners, OSS communities, security experts, and industry stakeholders on matters important to open source software and supply chain security. Participate meaningfully in standards, frameworks and public policy that impact OSS security. Up-level technical aspects of open source software security when needed to engage with governments, industry bodies, and other relevant organizations.

 

 

FAQ

Why does the industry need OpenSSF now?

As open source has become more pervasive, its security has become a key consideration for building and maintaining critical infrastructure that supports mission-critical systems throughout our society. It is more important than ever that we bring the industry together in a collaborative and focused effort to advance the state of open source security. The world’s technology infrastructure depends on it.

Who are the initial and current OpenSSF members?

View the full list of current OpenSSF members. The founding members are GitHub, Google, IBM, JPMorgan Chase, Microsoft, NCC Group, OWASP Foundation, and Red Hat, among others. 

Do I have to be a member to participate in a Working Group or project?

No, as with any Linux Foundation effort, any technical effort is open to all and doesn’t require funding to participate (just like any other open source project).

Does the GB or TAC control WGs or projects directly?

Neither the Governing Board (GB) nor the Technical Advisory Council (TAC) is responsible for managing the foundation hosted Working Groups (WGs) and projects directly. Instead, the maintainers of those projects manage them; this includes defining the governance process. The GB is responsible for the budget and the TAC the overall technical strategy.

Does membership or sponsorship level ever affect project-related decisions?

No, all project-related decisions are made by the project maintainers. Maintainership and governance processes are decided by the projects without regard to OpenSSF membership.

Where can I see current status and projects of work items?

All work is happening in the open and the OpenSSF TAC lists all technical initiatives.

How can I report not-publicly-known security vulnerabilities in OpenSSF projects, SIGs, or its website?

For specific projects and SIGs hosted on GitHub, please go to its GitHub repository and try to privately report a vulnerability there (see GitHub’s information on privately reporting a security vulnerability). If that isn’t enabled, or for other reasons you can’t determine where to send private information, please email your report to security@openssf.org.

How is OpenSSF ensuring inclusive representation of the open source community?

Diversity, Inclusion, and Representation is one of our core values. We aim to create an inclusive culture and make sure everyone is respected and valued. 

How do I join and participate?

Anyone can contribute to the OpenSSF. Find out how you can get involved.

How does my organization join as a member?

To learn more about how you can join your industry peers in supporting the OpenSSF, submit a membership inquiry and an OpenSSF representative will be in touch soon.

What is the OpenSSF Outbound Vulnerability Disclosure Policy?

We believe that vulnerability disclosure is a collaborative, two-way street. All parties, maintainers, as well as researchers, must act responsibly. This is why we adhere to a maximum 90-day public disclosure time limit, the “Time Limit.”

Please read more in our Model Outbound Vulnerability Disclosure Policy