Open Zaak’s security policies
Open Zaak’s development team is strongly committed to responsible reporting and disclosure of security-related issues. As such, we’ve adopted and follow a set of policies which conform to that ideal and are geared toward allowing us to deliver timely security updates to the official distribution of Open Zaak.
Reporting security issues
Short version: please report security issues by emailing email@example.com.
If you discover security issues in Open Zaak or related projects under the same organization, we request you to disclose these in a responsible way by e-mailing to firstname.lastname@example.org.
It is extremely useful if you have a reproducible test case and/or clear steps on how to reproduce the vulnerability.
Please do not report security issues on the public Github issue tracker, as this makes it visible which exploits exist before a fix is available, potentially comprising a lot of unprotected instances.
Once you’ve submitted an issue via email, you should receive an acknowledgment from a member of the security team as soon as possible, and depending on the action to be taken, you may receive further followup emails.
Timeline of the process
Open Zaak has a technical steering group, of which all members are involved in the handling of security issues.
The recipients of the report first validate if there is indeed a (possible) issue.
After validation, we confirm that we received the report and if it is indeed a valid issue.
We have a private Github repository accessible to the technical steering group. In this repository, an issue is created for the vulnerability where the impact and possible solutions are discussed.
The next step is to create a (draft) Github security advisory, which is only visible to the repository administrators and technical steering group. Severity and impact will be established here.
If appropriate, we request a CVE identifier from Github.
A patch is implemented, reviewed and tested in a private fork.
During the patch development process, known service providers are contacted to inform them of the vulnerability and coordinate the release date and rollout of the fix. Service providers should subscribe to the release early notice list.
When the fix is tested and release coordination is done, the fix is merged into the primary repository. The security advisory and release are published. Service providers update their managed instances.