-
Notifications
You must be signed in to change notification settings - Fork 13
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Criteria regarding security champions #156
Comments
I'm not in favor of it as a general requirement. I think it's important, but it's the unfundiest of unfunded mandates, plus it puts us in the position of having to become accreditors of training courses as well. (Or we say something like "any LF-provided security course", which is a super bad look because it seems like we're just trying to force people to pay LF money if they want to be considered "secure"). I think this is one of those cases where it's a good idea, but if foundations want to require it, they should include it in additional requirements beyond Baseline. |
If we want people to produce secure software, they need to know how to do it. The details explains the specific criteria. It doesn't say "know everything", it lists what is required. I recommend The Checklist Manifesto which shows that checklists are great for people who know what they're doing. If people don't know what they're doing, checklists tend to be ineffective. So, require knowledge as part of the checklist :-).
The LFD121 is known to meet this criterion, and it's free. We don't need to "accredit" a course. We don't accredit the rest of the criteria either.
All criteria are barriers, in the sense that they require something. That's the point of identifying criteria.
If they already know it, there's no re-appropriation. There's no requirement for some specific credential, the requirement is knowledge. If they don't know how to do this, then yes, there will be some time to do it. Great, we solved a problem! Also, we did a survey that suggests that developers generally like to learn things.
Developers want to find & fix defects, but if they don't know that something is a defect, they'll add the defect when writing software & won't fix it later. I agree that a security vulnerability is a kind of defect, but many developers don't have the knowledge to identify security defects. Many do; the goal is to make that common knowledge. |
The "topical" differences don't matter at the level of this criterion. E.g., "least privilege" is implemented differently in different systems, but that's always a relevant question to consider. |
Free as in dollars, but not free as in time. 16-20 hours is a lot of time for people who aren't working on a project as their primary job. It's the main reason I haven't taken it yet, and open source has been my primarily job for the last seven years. 😅 One of the biggest complaints that I saw from developers about the GitHub Secure Open Source Fund was the time commitment involved. I worry we'll lose a lot of interest, even at lower levels of the Baseline, by requiring this. I fully agree that it's ideal, but I'm unconvinced it's practical. Of course, we have no way of knowing at this point how many of the projects that would be interested in achieving level 3 would already meet this requirement and of those that don't, how many would find it a blocker. |
Meeting this particular criterion would take less than an hour, as it only requires knowing specific design principles. I think we should have higher expectations at level 3. Frankly, it's more important that people know what they're doing than that they meet some specific criteria. We can't possibly create a list of criteria to counter a fundamental lack of knowledge. |
In the best practices badge this is a low-level (passing) criterion. We have other 1,000 projects meeting it. |
BTW, the issue is "knowledge" and not really "champions". In the best practices badge we apply this criterion to single-person projects. |
Regarding two suggestions from issue #155:
Do we like the idea of placing requirements on lv3 maintainer training?
Pros:
Cons:
Questions:
The text was updated successfully, but these errors were encountered: