Thanks to everyone who attended our recent Town Hall on March 16th where we gave an update on initiatives at the OpenSSF, shared presentations about various initiatives at the OpenSSF, and participants had an opportunity to ask questions to panelists. If you were unable to attend, here are a few highlights from the meeting and where you can find more information.
Improving Supply Chain Security: IBM as a user and a contributor to Open Source Security Foundation Scorecard
Scorecard is becoming a key part of IBM’s review and curation of the open-source software in our products and services. IBM is committed to helping address the systemic security issues in modern SW supply chains and believes an important part of this effort is to help the open-source ecosystem improve the overall security of OS projects.
Answering even basic questions about software supply chain security has been surprisingly hard. For instance, how widespread are the different practices associated with software supply chain security? And do software professionals view these practices as useful or not? Easy or hard? To help answer these and related questions, Chainguard, the Eclipse Foundation, the Rust Foundation, and the Open Source Security Foundation (OpenSSF) partnered to field a software supply chain security survey.
Supply-chain Levels for Software Artifacts (SLSA, pronounced “salsa”) is an OpenSSF project that provides specifications for software supply chain security, established by industry consensus. SLSA’s framework is organized into a series of levels that describe increasing security rigor. Version 0.1 of the SLSA specification has been out for some time. We’ve been steadily working in public on updates to SLSA to have a “version 1.0” ready. Now, we have a draft version 1.0, and we’re seeking your final feedback.
A new report by the Atlantic Council’s Cyber Statecraft Initiative helps draw light on the question on what “open source as infrastructure” really means, and why it matters: Avoiding the success trap: Toward policy for open-source software as infrastructure.
The widespread use of software bill of materials (SBOMs) arguably depends on SBOM quality—that SBOMs contain sufficient and accurate information for the intended user to achieve their goals. But, until recently, it has been difficult to measure SBOM quality. New SBOM quality tools, a new SBOM dataset, and new SBOM quality research changes this state of affairs though. What do these new tools, datasets, and research findings say about the current state of SBOM quality? And how can you make high-quality SBOMs?
Are you interested in addressing open source software (OSS) security risk? Software Bill of Materials (SBOMs)? Diversity, Equity, and Inclusion (DEI) in OSS security? If so, plan to join us at our next OpenSSF Town Hall on Thursday, March 16th at 10 AM US/Pacific Time. During this virtual town hall, we will give you a tour of the OpenSSF, let you know what some of our projects have recently been working on, and walk you through how to get involved in our various initiatives.
We’re delighted to announce the first-ever Open Source Security Foundation (OpenSSF) Meetup in Hong Kong! Whether you’re a member of technical staff or a business executive, if you want to hear the latest on the pressing challenges and leading initiatives in OSS security – please join us. All are welcome.
We are excited to welcome newly elected Governing Board members of the OpenSSF: Tracy Miranda from Chainguard, Duane O’Brien from Indeed, and Stephen Chin from JFrog. The OpenSSF Governing Board is responsible for overall management of the OpenSSF, including approving major decisions, managing the budget, and establishing advisory bodies or committees to support the OpenSSF’s mission.
We’re pleased to announce we are hosting OpenSSF Day at Open Source Summit North America on Wednesday, May 10th and the call for proposals is now open. The full day program will feature keynotes from Open Source Security Foundation (OpenSSF) contributors and thought leaders. This is your chance to meet fellow open source community members and get involved in securing the open source supply chain.