-
Notifications
You must be signed in to change notification settings - Fork 55
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
[ci skip] Autodoc commit for 4ddaec3.
- Loading branch information
Showing
14 changed files
with
236 additions
and
653 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -8,7 +8,7 @@ Introduction | |
This document details the security framework for Open OnDemand, providing essential information that administrators need to know for secure deployment and operation. | ||
|
||
.. note:: | ||
If you're here to report a vulerability, you may refer to :ref:`vulnerability-management`. | ||
If you're here to report a vulnerability, you may refer to :ref:`vulnerability-management`. | ||
|
||
Considerations | ||
-------------- | ||
|
@@ -38,19 +38,58 @@ that some centers may want to change or disable altogether. | |
Additionally, you may want to disable or limit access to the application. You can do this | ||
through :ref:`disabling_applications`. | ||
|
||
Conclusion | ||
---------- | ||
Maintaining a secure and robust operational environment is critical for the success of Open OnDemand. Administrators are encouraged to implement the security practices recommended in this guide and to regularly review security settings and updates. | ||
.. _vulnerability-management: | ||
|
||
Vulnerability Management | ||
------------------------ | ||
|
||
Vulnerability management is a critical component of the security strategy for Open OnDemand. | ||
This document outlines the procedures for reporting and managing vulnerabilities. | ||
|
||
Reporting a Vulnerability | ||
^^^^^^^^^^^^^^^^^^^^^^^^^ | ||
|
||
If you have security concerns or think you have found a vulnerability, please submit a | ||
private report by visiting the 'Security' section of our GitHub located at | ||
`GitHub Open OnDemand Security <https://github.com/OSC/ondemand/security/>`_ and | ||
clicking 'Report a vulnerability'. | ||
|
||
For direct inquiries or issues in submitting a report, contact the core project team | ||
via email at [email protected]. | ||
|
||
Disclosure Policy | ||
^^^^^^^^^^^^^^^^^ | ||
|
||
- Upon reporting, you will receive a response within hours, acknowledging the receipt of the report. | ||
- A primary handler from the team will be assigned to coordinate the fix and release process: | ||
- Confirm the problem and determine the affected versions (1-2 days). | ||
- Audit code to find any potential similar problems. | ||
- Prepare fixes for all releases still under maintenance and release as soon as possible. | ||
|
||
Comments on Policy | ||
^^^^^^^^^^^^^^^^^^ | ||
|
||
Suggestions to improve this process can be made via submitting a ticket, opening a | ||
Discourse topic, or a pull request. | ||
|
||
Security Audits | ||
^^^^^^^^^^^^^^^ | ||
|
||
Open OnDemand has been audited several times by Trusted CI, the NSF Cybersecurity | ||
Center of Excellence. The latest engagement report is available | ||
`here <https://openondemand.org/sites/default/files/documents/Trusted%20CI%20Open%20OnDemand%20Engagement%20Final%20Report%20-%20REDACTED%20FOR%20PUBLIC%20RELEASE%20210712_0.pdf>`__. | ||
These audits have helped shape the security landscape of the platform and contribute | ||
to its ongoing security enhancements. | ||
|
||
|
||
Maintaining a secure and robust operational environment is critical for the success of | ||
Open OnDemand. Administrators are encouraged to implement the security practices | ||
recommended in this guide and to regularly review security settings and updates. | ||
|
||
|
||
Relevant References | ||
------------------- | ||
|
||
.. toctree:: | ||
:maxdepth: 2 | ||
:caption: Security Topics | ||
|
||
security/vulnerability-management | ||
authentication/overview | ||
how-tos/monitoring/logging | ||
customizations | ||
- :ref:`Authentication Overview <authentication-overview>` | ||
- :ref:`Logging <logging>` | ||
- :ref:`Customizations <customizations>` |
42 changes: 0 additions & 42 deletions
42
develop/_sources/security/vulnerability-management.rst.txt
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.