ABCDEFGHIJKLMNOPQRSTUVWXYZAAABACADAEAF
1
https://github.com/orcwg/cra-hub/blob/main/inventory.mdmelissa.birchler@ge.com
melissa.birchler@ge.com
2
CRA RequirementMain categorySub categoryName*Url*Publisher*LicenseTypeDateDescription*JurisdictionScope*NotesLooking for feedback/input/contributorsContributor Github handle or name
3
eg. Annex I, Part I, point (2)(a)Name of the resourcehttps://url.of/the-resourceExample FoundationCC-BY-SA???Publication dateWhy is this relevant for Open Source maintainers and stewards?eg. EU, DE, ..Technical Best Practice (Standards Input), CRA Compliance Guidance, Non-EU CRA Compliance GuidanceInformation that helps evaluate this resource. Eg. is the guidance potentially contested?Y/N, link to contribution or feedback requesthttps://github.com/maximbaele
4
Annex I, Part I, point (1)Compliance requirementsSecurity attestation of free and open-source softwareBest Practices BadgeThe OpenSSF Best Practices Badge Program is a voluntary self-certification initiative that allows open-source software projects to demonstrate their adherence to a broad range of security and quality best practices. Projects complete a web-based questionnaire covering topics like version control, vulnerability disclosure, testing, code review, and build process hygiene. If they meet the criteria, they earn a badge that can be displayed to indicate the project follows industry-recommended practices for open source development. The program (originating from the Core Infrastructure Initiative and now under the Open Source Security Foundation) aims to improve software health and transparency; consumers of open source can use the badge as one indicator that a project is more likely to produce secure, reliable software.https://www.bestpractices.dev/enOpenSSFMIT/CDLA-Permissivefrom 2021 under the current nameA list of criteria about various best practices in open source projectsN/ATechnical Best Practice (Standard input)mrybczyn
* [Best Practices Badge](https://www.bestpractices.dev/en) - The OpenSSF Best Practices Badge Program is a voluntary self-certification initiative that allows open-source software projects to demonstrate their adherence to a broad range of security and quality best practices. Projects complete a web-based questionnaire covering topics like version control, vulnerability disclosure, testing, code review, and build process hygiene. If they meet the criteria, they earn a badge that can be displayed to indicate the project follows industry-recommended practices for open source development. The program (originating from the Core Infrastructure Initiative and now under the Open Source Security Foundation) aims to improve software health and transparency; consumers of open source can use the badge as one indicator that a project is more likely to produce secure, reliable software.
<details>
<summary>More info</summary>

* **Title:** Best Practices Badge
* **URL:** https://www.bestpractices.dev/en
* **Publisher:** OpenSSF
* **License:** MIT/CDLA-Permissive
* **Type:**
* **Publication date:** from 2021 under the current name
</details>
5
Article 25Compliance requirementsSecurity attestation of free and open-source softwareAuthoritative Guide to AttestationsThis guide provides organizations with a framework for digitally transforming their audit and attestation workflows using standardized, machine-readable attestations. An attestation in this context is a cryptographically signed statement about some aspect of a software product or process (for example, an attestation that a product was built in a secure environment or complies with certain standards). The guide explains how to create and use such attestations, leveraging the CycloneDX format, to document compliance or security assurances in an automated way. By following the guide, organizations can move away from purely manual audit statements and instead generate verifiable digital evidence of their security practices, making it easier to trust and verify software in supply chains or regulatory contexts.https://cyclonedx.org/guides/OWASP_CycloneDX-Authoritative-Guide-to-Attestations-en.pdfOWASPCC-BY-SA 4.0informal2024 – presentFormat for sharing attestationshttps://github.com/anthonyharrison
* [Authoritative Guide to Attestations](https://cyclonedx.org/guides/OWASP_CycloneDX-Authoritative-Guide-to-Attestations-en.pdf) - This guide provides organizations with a framework for digitally transforming their audit and attestation workflows using standardized, machine-readable attestations. An attestation in this context is a cryptographically signed statement about some aspect of a software product or process (for example, an attestation that a product was built in a secure environment or complies with certain standards). The guide explains how to create and use such attestations, leveraging the CycloneDX format, to document compliance or security assurances in an automated way. By following the guide, organizations can move away from purely manual audit statements and instead generate verifiable digital evidence of their security practices, making it easier to trust and verify software in supply chains or regulatory contexts.
<details>
<summary>More info</summary>

* **Title:** Authoritative Guide to Attestations
* **URL:** https://cyclonedx.org/guides/OWASP_CycloneDX-Authoritative-Guide-to-Attestations-en.pdf
* **Publisher:** OWASP
* **License:** CC-BY-SA 4.0
* **Type:** informal
* **Publication date:** 2024 – present
</details>
6
Compliance requirementsDue diligence requirementsGood Practices in Supply Chain CybersecurityThis report by the European Union Agency for Cybersecurity (ENISA) surveys the threat landscape of ICT supply chains and offers recommendations to secure them. It identifies common attack scenarios and weaknesses in digital supply chains (such as compromise of third-party software dependencies, insecure equipment from suppliers, or poor internal supplier security processes). The document then presents a set of good practices for different stakeholders – including manufacturers, service providers, and customers – to mitigate these risks. These practices range from performing due diligence and security audits on suppliers, incorporating security requirements into procurement contracts, ensuring suppliers have vulnerability management and incident response procedures, to establishing multi-tier trust (so that suppliers enforce similar standards on their subcontractors). By following these practices, organizations can strengthen the weakest links in their supply chain and reduce the risk of cascading security incidents originating from outside partners or components.https://www.enisa.europa.eu/sites/default/files/publications/Good%20Practices%20for%20Supply%20Chain%20Cybersecurity.pdfENISACC-BY-4.02023 – presentShows ENISA's view on the best practicesEUmrybczyn
* [Good Practices in Supply Chain Cybersecurity](https://www.enisa.europa.eu/sites/default/files/publications/Good%20Practices%20for%20Supply%20Chain%20Cybersecurity.pdf) - This report by the European Union Agency for Cybersecurity (ENISA) surveys the threat landscape of ICT supply chains and offers recommendations to secure them. It identifies common attack scenarios and weaknesses in digital supply chains (such as compromise of third-party software dependencies, insecure equipment from suppliers, or poor internal supplier security processes). The document then presents a set of good practices for different stakeholders – including manufacturers, service providers, and customers – to mitigate these risks. These practices range from performing due diligence and security audits on suppliers, incorporating security requirements into procurement contracts, ensuring suppliers have vulnerability management and incident response procedures, to establishing multi-tier trust (so that suppliers enforce similar standards on their subcontractors). By following these practices, organizations can strengthen the weakest links in their supply chain and reduce the risk of cascading security incidents originating from outside partners or components.
<details>
<summary>More info</summary>

* **Title:** Good Practices in Supply Chain Cybersecurity
* **URL:** https://www.enisa.europa.eu/sites/default/files/publications/Good%20Practices%20for%20Supply%20Chain%20Cybersecurity.pdf
* **Publisher:** ENISA
* **License:** CC-BY-4.0
* **Type:**
* **Publication date:** 2023 – present
</details>
7
Compliance requirementsSecurity attestation of free and open-source softwareCyber Resilience Act Compliance Guide for Open SourceThis guide, put together by European open source advocacy groups, interprets the EU Cyber Resilience Act (CRA) through the lens of open source software development. The CRA will impose certain security and compliance requirements on “products with digital elements.” Many open source maintainers are concerned about how to meet these obligations. The guide likely breaks down the CRA’s key requirements – such as providing security support and updates for a product, having a vulnerability disclosure process, ensuring the software is developed following secure practices, and including technical documentation – and offers suggestions for open source projects to address them. It might recommend things like adopting an open source security best practices badge (to show development follows guidelines), publishing an SBOM for releases, clearly stating how users will be alerted to issues or updates, and possibly working with downstream distributors who can help fulfill CRA duties. It also may clarify which open source scenarios are out of scope of the CRA (for example, maybe software provided without commercial intent). In short, this compliance guide serves as a bridge to help the open source community understand and prepare for the new regulatory landscape under the CRA, aiming to ensure that open source can remain sustainable and trusted under these rules.
https://code.inno3.eu/ouvert/guide-cra/-/raw/main/CNLL_inno3_Guide-CRA_VE_1.0.pdf?ref_type=heads&inline=false
inno³ and CNLL,CC-by-SA 4.02024
* [Cyber Resilience Act Compliance Guide for Open Source](https://code.inno3.eu/ouvert/guide-cra/-/raw/main/CNLL_inno3_Guide-CRA_VE_1.0.pdf?ref_type=heads&inline=false) - This guide, put together by European open source advocacy groups, interprets the EU Cyber Resilience Act (CRA) through the lens of open source software development. The CRA will impose certain security and compliance requirements on “products with digital elements.” Many open source maintainers are concerned about how to meet these obligations. The guide likely breaks down the CRA’s key requirements – such as providing security support and updates for a product, having a vulnerability disclosure process, ensuring the software is developed following secure practices, and including technical documentation – and offers suggestions for open source projects to address them. It might recommend things like adopting an open source security best practices badge (to show development follows guidelines), publishing an SBOM for releases, clearly stating how users will be alerted to issues or updates, and possibly working with downstream distributors who can help fulfill CRA duties. It also may clarify which open source scenarios are out of scope of the CRA (for example, maybe software provided without commercial intent). In short, this compliance guide serves as a bridge to help the open source community understand and prepare for the new regulatory landscape under the CRA, aiming to ensure that open source can remain sustainable and trusted under these rules.
<details>
<summary>More info</summary>

* **Title:** Cyber Resilience Act Compliance Guide for Open Source
* **URL:** https://code.inno3.eu/ouvert/guide-cra/-/raw/main/CNLL_inno3_Guide-CRA_VE_1.0.pdf?ref_type=heads&inline=false
* **Publisher:** inno³ and CNLL,
* **License:** CC-by-SA 4.0
* **Type:**
* **Publication date:** 2024
</details>
8
Vulnerability ReportingCompliance requirementsDue diligence requirementsUS CISA Software Acquisition GuideThe U.S. CISA Software Acquisition Guide provides practical guidance to government agencies (and large enterprises) on how to incorporate security considerations into the procurement of software. It outlines how buyers should define security requirements in RFPs/contracts – such as requiring vendors to follow secure development standards (like the NIST SSDF), provide artifacts like SBOMs and vulnerability disclosure policies, and agree to notify and patch if vulnerabilities are found. It also advises on evaluating supplier risk (e.g. checking if the vendor has had frequent security issues historically or if they have certified processes like ISO 27001). The guide suggests structuring the vendor selection process to include security questionnaires or assessments and to prefer vendors who can demonstrate secure-by-design approaches (perhaps via certifications or past performance). Additionally, it covers how to handle acquired software: establishing processes for incoming SBOM analysis, periodic re-scans for vulnerabilities in the product, and ensuring maintenance contracts cover security updates. By following this guide, procurement officers and risk managers can make more informed decisions, selecting products that not only meet functionality needs but also contribute positively to the organization’s security posture, thereby using market forces to encourage vendors to deliver safer software.https://cisa.gov/sagCISA2024The CISA Software Acquisiton Guide contains a spreadsheet of questions related to Secure by Design practicesrjb4standards
* [US CISA Software Acquisition Guide](https://cisa.gov/sag) - The U.S. CISA Software Acquisition Guide provides practical guidance to government agencies (and large enterprises) on how to incorporate security considerations into the procurement of software. It outlines how buyers should define security requirements in RFPs/contracts – such as requiring vendors to follow secure development standards (like the NIST SSDF), provide artifacts like SBOMs and vulnerability disclosure policies, and agree to notify and patch if vulnerabilities are found. It also advises on evaluating supplier risk (e.g. checking if the vendor has had frequent security issues historically or if they have certified processes like ISO 27001). The guide suggests structuring the vendor selection process to include security questionnaires or assessments and to prefer vendors who can demonstrate secure-by-design approaches (perhaps via certifications or past performance). Additionally, it covers how to handle acquired software: establishing processes for incoming SBOM analysis, periodic re-scans for vulnerabilities in the product, and ensuring maintenance contracts cover security updates. By following this guide, procurement officers and risk managers can make more informed decisions, selecting products that not only meet functionality needs but also contribute positively to the organization’s security posture, thereby using market forces to encourage vendors to deliver safer software.
<details>
<summary>More info</summary>

* **Title:** US CISA Software Acquisition Guide
* **URL:** https://cisa.gov/sag
* **Publisher:** CISA
* **License:**
* **Type:**
* **Publication date:** 2024
</details>
9
Secure by DesignCompliance requirementsDue diligence requirementsUS CISA Software Acquisition Guide(Note: This entry is a duplicate reference to the CISA Software Acquisition Guide, highlighting its relevance to secure-by-design initiatives.) The Software Acquisition Guide underscores that security is a key component of quality and must be embedded from the very start of software development, a principle that aligns with “secure by design.” It encourages acquirers to demand evidence of secure design principles in the software they purchase. For example, the guide recommends requiring that vendors attest to following secure development frameworks (like NIST’s SSDF or OWASP guidelines), use automated tools to catch common flaws, and avoid known insecure components. It also promotes the idea of holding vendors accountable through contract language for maintaining security over the software’s life (patching, vulnerability disclosure, etc.). In essence, this guide turns secure-by-design concepts into concrete procurement actions: by setting these expectations in procurement, customers drive the market to create products that have security built in, not bolted on. Thus, it serves as both a checklist and a philosophy for buyers to contribute to a more secure software ecosystem.https://cisa.gov/sagCISA2024The CISA Software Acquisition Guide is used to guide US Government software procurement practices to identify, procure and use only trustworthy software productsrjb4standards
* [US CISA Software Acquisition Guide](https://cisa.gov/sag) - (Note: This entry is a duplicate reference to the CISA Software Acquisition Guide, highlighting its relevance to secure-by-design initiatives.) The Software Acquisition Guide underscores that security is a key component of quality and must be embedded from the very start of software development, a principle that aligns with “secure by design.” It encourages acquirers to demand evidence of secure design principles in the software they purchase. For example, the guide recommends requiring that vendors attest to following secure development frameworks (like NIST’s SSDF or OWASP guidelines), use automated tools to catch common flaws, and avoid known insecure components. It also promotes the idea of holding vendors accountable through contract language for maintaining security over the software’s life (patching, vulnerability disclosure, etc.). In essence, this guide turns secure-by-design concepts into concrete procurement actions: by setting these expectations in procurement, customers drive the market to create products that have security built in, not bolted on. Thus, it serves as both a checklist and a philosophy for buyers to contribute to a more secure software ecosystem.
<details>
<summary>More info</summary>

* **Title:** US CISA Software Acquisition Guide
* **URL:** https://cisa.gov/sag
* **Publisher:** CISA
* **License:**
* **Type:**
* **Publication date:** 2024
</details>
10
Artifacts expected from an open source stewardsCompliance requirementsSecurity attestation of free and open-source softwareBusiness Cyber GuardianPython app to read and automate the processing of CISA Software Acquisition Guide Spreadsheets based on CISA format https://cisa.gov/sag

The CISASAGReader product may also serve as a role model for what a Secure by Design solution should provide to satisfy the Secure by Design transparency principle by providing consumers with artifacts to enable a comprehensive software risk assessment, such as an SBOM, living Vulnerability Disclosure Report (VDR), Vendor Response File (VRF) listing additional company information and SDLC policy and product details (i.e. Support Status and Commercial Status), and the CISA Software Acquisition Guide Spreadsheet completed by the software producer.
https://github.com/rjb4standards/CISASAGReaderBCG2025An open source software project that helps consumers view and process CISA Software Acquisition Guide spreadsheet responses in Excel formatrjb4standards
* [Business Cyber Guardian](https://github.com/rjb4standards/CISASAGReader) - Python app to read and automate the processing of CISA Software Acquisition Guide Spreadsheets based on CISA format https://cisa.gov/sag

The CISASAGReader product may also serve as a role model for what a Secure by Design solution should provide to satisfy the Secure by Design transparency principle by providing consumers with artifacts to enable a comprehensive software risk assessment, such as an SBOM, living Vulnerability Disclosure Report (VDR), Vendor Response File (VRF) listing additional company information and SDLC policy and product details (i.e. Support Status and Commercial Status), and the CISA Software Acquisition Guide Spreadsheet completed by the software producer.
<details>
<summary>More info</summary>

* **Title:** Business Cyber Guardian
* **URL:** https://github.com/rjb4standards/CISASAGReader
* **Publisher:** BCG
* **License:**
* **Type:**
* **Publication date:** 2025
</details>
This is not a resource but a piece of software. It is also not openly licensed.
11
Security ControlsGeneric Security RequirementsSecurity requirements & controlsNIST SP 800-53 Rev. 5: Security and Privacy Controls for Information Systems and OrganizationsNIST SP 800-53 is a comprehensive catalog of controls (safeguards and countermeasures) that organizations can apply to protect information systems and personal data. Revision 5, released in 2020, expanded the catalog to integrate privacy fully alongside security and made the language more outcome-based (less federal-centric), so it’s usable by a wider audience (government, industry, international). The catalog is organized into families like Access Control, Incident Response, Cryptography, Personnel Security, etc., each containing specific controls. For example, in Access Control, one control is implementing role-based access with the principle of least privilege. Rev. 5 introduced new control families for areas like Supply Chain Risk Management, refined controls for advanced technologies (IoT, mobile), and removed the concept of “low/medium/high baselines” from the document itself (that moved to separate guidance) to focus on the controls. An organization using SP 800-53 will select a subset of these controls based on its risk assessment (often guided by frameworks like SP 800-37 RMF) and then implement and document them. SP 800-53 is widely used not only by U.S. federal agencies (it’s the backbone of FedRAMP, DoD, etc. requirements) but also by others as a rich reference of security best practices to draw from when securing systems.https://csrc.nist.gov/pubs/sp/800/53/r5/upd1/finalNIST?informal2020This publication provides a catalog of security and privacy controls for information systems and organizations to protect organizational operations and assets, individuals, other organizations, and the Nation from a diverse set of threats and risks, including hostile attacks, human errors, natural disasters, structural failures, foreign intelligence entities, and privacy risks.UShttps://github.com/anthonyharrison
* [NIST SP 800-53 Rev. 5: Security and Privacy Controls for Information Systems and Organizations](https://csrc.nist.gov/pubs/sp/800/53/r5/upd1/final) - NIST SP 800-53 is a comprehensive catalog of controls (safeguards and countermeasures) that organizations can apply to protect information systems and personal data. Revision 5, released in 2020, expanded the catalog to integrate privacy fully alongside security and made the language more outcome-based (less federal-centric), so it’s usable by a wider audience (government, industry, international). The catalog is organized into families like Access Control, Incident Response, Cryptography, Personnel Security, etc., each containing specific controls. For example, in Access Control, one control is implementing role-based access with the principle of least privilege. Rev. 5 introduced new control families for areas like Supply Chain Risk Management, refined controls for advanced technologies (IoT, mobile), and removed the concept of “low/medium/high baselines” from the document itself (that moved to separate guidance) to focus on the controls. An organization using SP 800-53 will select a subset of these controls based on its risk assessment (often guided by frameworks like SP 800-37 RMF) and then implement and document them. SP 800-53 is widely used not only by U.S. federal agencies (it’s the backbone of FedRAMP, DoD, etc. requirements) but also by others as a rich reference of security best practices to draw from when securing systems.
<details>
<summary>More info</summary>

* **Title:** NIST SP 800-53 Rev. 5: Security and Privacy Controls for Information Systems and Organizations
* **URL:** https://csrc.nist.gov/pubs/sp/800/53/r5/upd1/final
* **Publisher:** NIST
* **License:** ?
* **Type:** informal
* **Publication date:** 2020
</details>
12
Generic Security RequirementsSecurity requirements & controlsOWASP Application Security Verification StandardThe OWASP ASVS is a framework that provides a checklist of application security requirements and controls in a structured manner, serving as a basis for testing web application security. It defines three levels of verification depth: Level 1 (basic, for all applications) through Level 3 (advanced, for the most critical applications). Each level comprises requirements across categories such as Authentication, Access Control, Data Protection, Error Handling, and others. For example, at Level 1, there might be a requirement that the application has no default passwords and uses HTTPS; at higher levels, requirements become more stringent, like implementing strong multi-factor authentication, or using cryptographic modules with specific certifications. Developers and architects can use ASVS during development to ensure they build in these controls, and security testers can use it as a guide for what to verify (it’s often used to structure penetration testing or security code review efforts). By using ASVS, organizations get a common language for what it means for an application to be “secure” at a given level, and they can assert compliance to that level. Ultimately, ASVS helps raise the security baseline by providing clear, measurable security criteria for applications.https://owasp.org/www-project-application-security-verification-standard/OWASPCC BY-SA 3.0Application security requirements and testinghttps://github.com/maximbaele
* [OWASP Application Security Verification Standard](https://owasp.org/www-project-application-security-verification-standard/) - The OWASP ASVS is a framework that provides a checklist of application security requirements and controls in a structured manner, serving as a basis for testing web application security. It defines three levels of verification depth: Level 1 (basic, for all applications) through Level 3 (advanced, for the most critical applications). Each level comprises requirements across categories such as Authentication, Access Control, Data Protection, Error Handling, and others. For example, at Level 1, there might be a requirement that the application has no default passwords and uses HTTPS; at higher levels, requirements become more stringent, like implementing strong multi-factor authentication, or using cryptographic modules with specific certifications. Developers and architects can use ASVS during development to ensure they build in these controls, and security testers can use it as a guide for what to verify (it’s often used to structure penetration testing or security code review efforts). By using ASVS, organizations get a common language for what it means for an application to be “secure” at a given level, and they can assert compliance to that level. Ultimately, ASVS helps raise the security baseline by providing clear, measurable security criteria for applications.
<details>
<summary>More info</summary>

* **Title:** OWASP Application Security Verification Standard
* **URL:** https://owasp.org/www-project-application-security-verification-standard/
* **Publisher:** OWASP
* **License:** CC BY-SA 3.0
* **Type:**
* **Publication date:**
</details>
13
Generic Security RequirementsSecurity requirements & controlsHardware Secure BootThis guide from the Open Compute Project (OCP) provides design requirements and recommendations for implementing secure boot in hardware systems (like servers or network devices). Secure boot is a mechanism where the system’s boot firmware (BIOS/UEFI or similar) will only execute code that is cryptographically signed by a trusted authority. The OCP guide likely details how to establish a root of trust in hardware (such as using a TPM or dedicated secure element to store cryptographic keys), how to sign bootloaders and OS kernels, and how the verification process should work at each stage of the boot chain. It may also discuss managing keys (for example, allowing owners to enroll their own keys or update keys securely) and handling firmware updates in a secure manner (ensuring updates are signed and verified). By adhering to this guide, manufacturers can ensure their devices are protected against low-level malware: even if an attacker has physical access or can alter the boot device, the system will refuse to run untrusted boot code, thus preventing persistent malware like rootkits from taking hold. In summary, the OCP Secure Boot Guide is a blueprint for building devices that only run authentic, untampered software from power-on through full system startup.https://www.opencompute.org/documents/secure-boot-2-pdfOpenComputeinformalRequirements for hardware secure boot on Open Compute platformsN/Amrybczyn
* [Hardware Secure Boot](https://www.opencompute.org/documents/secure-boot-2-pdf) - This guide from the Open Compute Project (OCP) provides design requirements and recommendations for implementing secure boot in hardware systems (like servers or network devices). Secure boot is a mechanism where the system’s boot firmware (BIOS/UEFI or similar) will only execute code that is cryptographically signed by a trusted authority. The OCP guide likely details how to establish a root of trust in hardware (such as using a TPM or dedicated secure element to store cryptographic keys), how to sign bootloaders and OS kernels, and how the verification process should work at each stage of the boot chain. It may also discuss managing keys (for example, allowing owners to enroll their own keys or update keys securely) and handling firmware updates in a secure manner (ensuring updates are signed and verified). By adhering to this guide, manufacturers can ensure their devices are protected against low-level malware: even if an attacker has physical access or can alter the boot device, the system will refuse to run untrusted boot code, thus preventing persistent malware like rootkits from taking hold. In summary, the OCP Secure Boot Guide is a blueprint for building devices that only run authentic, untampered software from power-on through full system startup.
<details>
<summary>More info</summary>

* **Title:** Hardware Secure Boot
* **URL:** https://www.opencompute.org/documents/secure-boot-2-pdf
* **Publisher:** OpenCompute
* **License:**
* **Type:** informal
* **Publication date:**
</details>
14
Other legislations/guidelines similar to CRAOtherSimilar legislationCSCRF for SEBI REsIntroduced by the Securities and Exchange Board of India in August 2024, the CSCRF is a comprehensive framework of cybersecurity guidelines for India’s capital market entities (stock exchanges, depositories, brokers, asset managers, etc.). It mandates that these regulated entities implement uniform baseline measures to anticipate cyber threats, protect systems, detect incidents, respond to attacks, and recover operations – aligning with broader cyber resilience goals. The CSCRF sets out objectives like addressing evolving threats, aligning with international standards, enforcing regular cybersecurity audits, and standardizing incident reporting. It introduces structured requirements by combining Cyber Resilience Goals (Anticipate, Withstand, Recover, Evolve) with Cybersecurity Functions (such as Governance, Identify, Protect, Detect, Respond). Entities are categorized by size/impact and must implement controls appropriate to their category. Overall, this framework elevates the cybersecurity posture of India’s financial sector by requiring consistent practices and accountability across all regulated organizations.https://www.sebi.gov.in/legal/circulars/aug-2024/cybersecurity-and-cyber-resilience-framework-cscrf-for-sebi-regulated-entities-res-_85964.htmlSEBIFormalAugust 20, 2024IndiaCybersecurity and Cyber Resilience Framework Circularhttps://github.com/AyanSinhaMahapatra/
* [CSCRF for SEBI REs](https://www.sebi.gov.in/legal/circulars/aug-2024/cybersecurity-and-cyber-resilience-framework-cscrf-for-sebi-regulated-entities-res-_85964.html) - Introduced by the Securities and Exchange Board of India in August 2024, the CSCRF is a comprehensive framework of cybersecurity guidelines for India’s capital market entities (stock exchanges, depositories, brokers, asset managers, etc.). It mandates that these regulated entities implement uniform baseline measures to anticipate cyber threats, protect systems, detect incidents, respond to attacks, and recover operations – aligning with broader cyber resilience goals. The CSCRF sets out objectives like addressing evolving threats, aligning with international standards, enforcing regular cybersecurity audits, and standardizing incident reporting. It introduces structured requirements by combining Cyber Resilience Goals (Anticipate, Withstand, Recover, Evolve) with Cybersecurity Functions (such as Governance, Identify, Protect, Detect, Respond). Entities are categorized by size/impact and must implement controls appropriate to their category. Overall, this framework elevates the cybersecurity posture of India’s financial sector by requiring consistent practices and accountability across all regulated organizations.
<details>
<summary>More info</summary>

* **Title:** CSCRF for SEBI REs
* **URL:** https://www.sebi.gov.in/legal/circulars/aug-2024/cybersecurity-and-cyber-resilience-framework-cscrf-for-sebi-regulated-entities-res-_85964.html
* **Publisher:** SEBI
* **License:**
* **Type:** Formal
* **Publication date:** 45524
</details>
15
OtherSimilar legislationCybersecurity Labelling Scheme for IoT - CLS(IoT)Singapore’s Cybersecurity Labelling Scheme is a four-tier rating program launched in 2020 by the Cyber Security Agency (CSA) to improve the security of consumer smart devices. Under CLS, IoT products (like home routers, smart cameras, etc.) are evaluated and given a security grade of Level 1 (basic) to Level 4 (most robust), indicated by the number of stars on the label. Each level corresponds to a set of cybersecurity provisions: for example, Level 1 requires adherence to baseline security requirements (largely based on ETSI EN 303 645), higher levels add requirements like using a vetted standard (Level 2), conducting structured lifecycle security measures and binary analysis (Level 3), and perhaps formal certification or penetration testing (Level 4). The label helps consumers easily identify products with better cybersecurity and incentivizes manufacturers to incorporate stronger security into design to achieve higher ratings. Singapore’s CLS is one of the first schemes of its kind in Asia and includes mutual recognition arrangements (e.g., a device meeting Finland’s cybersecurity label is recognized at CLS Level 3, and vice versa), promoting international coherence in IoT security standards.https://www.csa.gov.sg/our-programmes/certification-and-labelling-schemes/cybersecurity-labelling-scheme/about/CSAFormal
* [Cybersecurity Labelling Scheme for IoT - CLS(IoT)](https://www.csa.gov.sg/our-programmes/certification-and-labelling-schemes/cybersecurity-labelling-scheme/about/) - Singapore’s Cybersecurity Labelling Scheme is a four-tier rating program launched in 2020 by the Cyber Security Agency (CSA) to improve the security of consumer smart devices. Under CLS, IoT products (like home routers, smart cameras, etc.) are evaluated and given a security grade of Level 1 (basic) to Level 4 (most robust), indicated by the number of stars on the label. Each level corresponds to a set of cybersecurity provisions: for example, Level 1 requires adherence to baseline security requirements (largely based on ETSI EN 303 645), higher levels add requirements like using a vetted standard (Level 2), conducting structured lifecycle security measures and binary analysis (Level 3), and perhaps formal certification or penetration testing (Level 4). The label helps consumers easily identify products with better cybersecurity and incentivizes manufacturers to incorporate stronger security into design to achieve higher ratings. Singapore’s CLS is one of the first schemes of its kind in Asia and includes mutual recognition arrangements (e.g., a device meeting Finland’s cybersecurity label is recognized at CLS Level 3, and vice versa), promoting international coherence in IoT security standards.
<details>
<summary>More info</summary>

* **Title:** Cybersecurity Labelling Scheme for IoT - CLS(IoT)
* **URL:** https://www.csa.gov.sg/our-programmes/certification-and-labelling-schemes/cybersecurity-labelling-scheme/about/
* **Publisher:** CSA
* **License:**
* **Type:** Formal
* **Publication date:**
</details>
16
OtherOtherCyber Resilience Act Requirements Standards Mapping - Joint Research Centre & ENISA Joint AnalysisThis joint analysis report by the European Commission’s Joint Research Centre (JRC) and ENISA examines how existing cybersecurity standards relate to the requirements of the proposed Cyber Resilience Act (CRA). The CRA will impose certain security requirements on hardware and software products in the EU, and this report maps each specific CRA requirement (for example, on secure design, vulnerability handling, encryption, etc.) to one or more international or European standards that address that topic. The analysis identifies where suitable standards already exist (and could be used to comply with or demonstrate conformity to that CRA requirement) and where there are gaps (i.e. no current standard fully covers a particular requirement, indicating a need for further standardization). This mapping is valuable for industry and regulators: manufacturers can use it to figure out which standards or certifications might help them meet CRA obligations, and standards organizations can see where new work might be needed. Overall, the report serves as a bridge between the high-level legal requirements of the CRA and the practical technical standards that can fulfill them.https://www.enisa.europa.eu/publications/cyber-resilience-act-requirements-standards-mappingENISA
* [Cyber Resilience Act Requirements Standards Mapping - Joint Research Centre & ENISA Joint Analysis](https://www.enisa.europa.eu/publications/cyber-resilience-act-requirements-standards-mapping) - This joint analysis report by the European Commission’s Joint Research Centre (JRC) and ENISA examines how existing cybersecurity standards relate to the requirements of the proposed Cyber Resilience Act (CRA). The CRA will impose certain security requirements on hardware and software products in the EU, and this report maps each specific CRA requirement (for example, on secure design, vulnerability handling, encryption, etc.) to one or more international or European standards that address that topic. The analysis identifies where suitable standards already exist (and could be used to comply with or demonstrate conformity to that CRA requirement) and where there are gaps (i.e. no current standard fully covers a particular requirement, indicating a need for further standardization). This mapping is valuable for industry and regulators: manufacturers can use it to figure out which standards or certifications might help them meet CRA obligations, and standards organizations can see where new work might be needed. Overall, the report serves as a bridge between the high-level legal requirements of the CRA and the practical technical standards that can fulfill them.
<details>
<summary>More info</summary>

* **Title:** Cyber Resilience Act Requirements Standards Mapping - Joint Research Centre & ENISA Joint Analysis
* **URL:** https://www.enisa.europa.eu/publications/cyber-resilience-act-requirements-standards-mapping
* **Publisher:** ENISA
* **License:**
* **Type:**
* **Publication date:**
</details>
17
Vulnerability ReportingOtherOtherCISA Secure by Design PledgeThe Secure by Design pledge is an initiative by the U.S. Cybersecurity and Infrastructure Security Agency calling on technology companies to fundamentally shift their development philosophy to prioritize security from the start. The pledge outlines core principles such as developing software with a proactive adversary mindset (anticipating how software could be misused or attacked), ensuring default configurations are secure out-of-the-box (so customers don’t have to harden products themselves), practicing transparency in vulnerability handling (including publishing SBOMs and disclosing vulnerabilities), and enabling continuous security testing and feedback during development. Companies that take the pledge publicly commit to these values, signaling that they will invest in practices like threat modeling, secure coding training, rigorous testing, and building security features (like authentication and encryption) as integral parts of their products. The broader goal is cultural: to move the industry away from treating security as an afterthought or add-on, and instead have security as a foundational aspect of product design, thereby reducing the prevalence of easily exploitable weaknesses in widely used technology.https://www.cisa.gov/sites/default/files/2024-05/CISA%20Secure%20by%20Design%20Pledge_508c.pdfCISA2024Touches on MFA, vulnerability handling, etc. Informal "Pledge" but includes committments to publish updated informationUS
* [CISA Secure by Design Pledge](https://www.cisa.gov/sites/default/files/2024-05/CISA%20Secure%20by%20Design%20Pledge_508c.pdf) - The Secure by Design pledge is an initiative by the U.S. Cybersecurity and Infrastructure Security Agency calling on technology companies to fundamentally shift their development philosophy to prioritize security from the start. The pledge outlines core principles such as developing software with a proactive adversary mindset (anticipating how software could be misused or attacked), ensuring default configurations are secure out-of-the-box (so customers don’t have to harden products themselves), practicing transparency in vulnerability handling (including publishing SBOMs and disclosing vulnerabilities), and enabling continuous security testing and feedback during development. Companies that take the pledge publicly commit to these values, signaling that they will invest in practices like threat modeling, secure coding training, rigorous testing, and building security features (like authentication and encryption) as integral parts of their products. The broader goal is cultural: to move the industry away from treating security as an afterthought or add-on, and instead have security as a foundational aspect of product design, thereby reducing the prevalence of easily exploitable weaknesses in widely used technology.
<details>
<summary>More info</summary>

* **Title:** CISA Secure by Design Pledge
* **URL:** https://www.cisa.gov/sites/default/files/2024-05/CISA%20Secure%20by%20Design%20Pledge_508c.pdf
* **Publisher:** CISA
* **License:**
* **Type:**
* **Publication date:** 2024
</details>
18
Procurement practices by Government Agencies, SBOMs, encryption requirements, OtherSimilar legislationStrengthening and promoting innovation in the ....Executive Order 14144 (signed January 2025) is a broad directive aimed at improving the nation’s cybersecurity and spurring innovation in secure technology. It includes multiple initiatives: one major element is leveraging federal procurement to set higher cybersecurity standards (the government will prefer or require products that meet specific security criteria, thus incentivizing vendors), and another is encouraging the development of new security solutions (through funding R&D or public-private collaboration). The EO calls for updates to federal acquisition regulations to define what makes a product “trustworthy” (for instance, having an SBOM, secure development attestations, and no known vulnerabilities at delivery). It also endorses programs like security labeling for consumer IoT (the “Cyber Trust Mark”) to drive market transparency. Additionally, the EO may establish interagency efforts to streamline cyber incident information sharing and invest in cybersecurity workforce and education to support innovation. Overall, EO 14144 uses the federal government’s roles as both regulator and top customer to push the ecosystem towards products that are secure by design, while also fostering an environment where cutting-edge cybersecurity practices and technologies are developed and adopted.https://www.federalregister.gov/documents/2025/01/17/2025-01470/strengthening-and-promoting-innovation-in-the-nations-cybersecurityUS Executive Order 141442025Requirements for, among other things, updating SSDF, US
* [Strengthening and promoting innovation in the ....](https://www.federalregister.gov/documents/2025/01/17/2025-01470/strengthening-and-promoting-innovation-in-the-nations-cybersecurity) - Executive Order 14144 (signed January 2025) is a broad directive aimed at improving the nation’s cybersecurity and spurring innovation in secure technology. It includes multiple initiatives: one major element is leveraging federal procurement to set higher cybersecurity standards (the government will prefer or require products that meet specific security criteria, thus incentivizing vendors), and another is encouraging the development of new security solutions (through funding R&D or public-private collaboration). The EO calls for updates to federal acquisition regulations to define what makes a product “trustworthy” (for instance, having an SBOM, secure development attestations, and no known vulnerabilities at delivery). It also endorses programs like security labeling for consumer IoT (the “Cyber Trust Mark”) to drive market transparency. Additionally, the EO may establish interagency efforts to streamline cyber incident information sharing and invest in cybersecurity workforce and education to support innovation. Overall, EO 14144 uses the federal government’s roles as both regulator and top customer to push the ecosystem towards products that are secure by design, while also fostering an environment where cutting-edge cybersecurity practices and technologies are developed and adopted.
<details>
<summary>More info</summary>

* **Title:** Strengthening and promoting innovation in the ....
* **URL:** https://www.federalregister.gov/documents/2025/01/17/2025-01470/strengthening-and-promoting-innovation-in-the-nations-cybersecurity
* **Publisher:** US Executive Order 14144
* **License:**
* **Type:**
* **Publication date:** 2025
</details>
19
Formal certification program (administered by UL) - really an alternative to CRA with much narrower scopeOtherSimilar legislationCyberTrust MarkThe Cyber Trust Mark is a forthcoming labeling scheme introduced by the U.S. Federal Communications Commission (FCC) to signify consumer IoT products that meet certain cybersecurity benchmarks. Under this program, makers of smart devices (like smart thermostats, fitness trackers, connected appliances, etc.) can voluntarily undergo an evaluation of their product’s security features. The baseline criteria likely include things like: unique default passwords or user setup of credentials, a commitment to provide security updates for a minimum period, having a vulnerability reporting mechanism, and perhaps compliance with standards such as ETSI EN 303 645. Devices that pass the evaluation will be allowed to display the “Cyber Trust Mark” logo (possibly a shield icon or similar) on their packaging. This functions similarly to an EnergyStar label but for cybersecurity. The idea is to help consumers easily identify products that are deemed more secure, thereby encouraging manufacturers to improve security to earn the mark. Over time, widespread adoption of the Cyber Trust Mark aims to raise the minimum security level of IoT devices available in the U.S. market by combining consumer choice with a recognizable seal of approval for security.https://www.fcc.gov/CyberTrustMarkUS FCCformal2023Voluntary standards for consumer IOT (wireless) devicesUSwireless consumer IOT devices
* [CyberTrust Mark](https://www.fcc.gov/CyberTrustMark) - The Cyber Trust Mark is a forthcoming labeling scheme introduced by the U.S. Federal Communications Commission (FCC) to signify consumer IoT products that meet certain cybersecurity benchmarks. Under this program, makers of smart devices (like smart thermostats, fitness trackers, connected appliances, etc.) can voluntarily undergo an evaluation of their product’s security features. The baseline criteria likely include things like: unique default passwords or user setup of credentials, a commitment to provide security updates for a minimum period, having a vulnerability reporting mechanism, and perhaps compliance with standards such as ETSI EN 303 645. Devices that pass the evaluation will be allowed to display the “Cyber Trust Mark” logo (possibly a shield icon or similar) on their packaging. This functions similarly to an EnergyStar label but for cybersecurity. The idea is to help consumers easily identify products that are deemed more secure, thereby encouraging manufacturers to improve security to earn the mark. Over time, widespread adoption of the Cyber Trust Mark aims to raise the minimum security level of IoT devices available in the U.S. market by combining consumer choice with a recognizable seal of approval for security.
<details>
<summary>More info</summary>

* **Title:** CyberTrust Mark
* **URL:** https://www.fcc.gov/CyberTrustMark
* **Publisher:** US FCC
* **License:**
* **Type:** formal
* **Publication date:** 2023
</details>
20
US Federal Procurement Regulations for Trustworthy ProductsOtherSimilar legislationEO 14144A key aspect of Executive Order 14144 is its directive to federal procurement authorities to define and enforce criteria for “secure and trustworthy” products. The EO mandates that federal agencies, when buying software or connected devices, must ensure those products meet rigorous cybersecurity standards – effectively using government contracts as a driver for better security. It tasks NIST and other agencies with establishing what technical evidence or certifications a vendor must provide to be considered trustworthy. This could include providing an SBOM for supplied software, proving that the software was developed under secure processes (via self-attestation or third-party audit), demonstrating compliance with specific standards (like FIPS-validated cryptography, or adherence to zero-trust principles if relevant), and ensuring mechanisms for swift vulnerability remediation. The Federal Acquisition Regulation (FAR) will be updated accordingly, making these requirements legally binding in contracts. In practical terms, this means a software company wanting to sell to the U.S. government will need to implement robust security in their product and supply chain or risk being excluded. The intent is both to protect government systems from supply chain attacks and to influence the broader market: when large vendors improve security to sell to the government, those improvements often propagate to all customers.
https://www.federalregister.gov/documents/2025/01/17/2025-01470/strengthening-and-promoting-innovation-in-the-nations-cybersecurity#p-10
US Government 2025Regulations to updated federal acquisition rules for secure productsUS Federal civilian agency procurement, network threat sharingrjb4standards
* [EO 14144](https://www.federalregister.gov/documents/2025/01/17/2025-01470/strengthening-and-promoting-innovation-in-the-nations-cybersecurity#p-10) - A key aspect of Executive Order 14144 is its directive to federal procurement authorities to define and enforce criteria for “secure and trustworthy” products. The EO mandates that federal agencies, when buying software or connected devices, must ensure those products meet rigorous cybersecurity standards – effectively using government contracts as a driver for better security. It tasks NIST and other agencies with establishing what technical evidence or certifications a vendor must provide to be considered trustworthy. This could include providing an SBOM for supplied software, proving that the software was developed under secure processes (via self-attestation or third-party audit), demonstrating compliance with specific standards (like FIPS-validated cryptography, or adherence to zero-trust principles if relevant), and ensuring mechanisms for swift vulnerability remediation. The Federal Acquisition Regulation (FAR) will be updated accordingly, making these requirements legally binding in contracts. In practical terms, this means a software company wanting to sell to the U.S. government will need to implement robust security in their product and supply chain or risk being excluded. The intent is both to protect government systems from supply chain attacks and to influence the broader market: when large vendors improve security to sell to the government, those improvements often propagate to all customers.
<details>
<summary>More info</summary>

* **Title:** EO 14144
* **URL:** https://www.federalregister.gov/documents/2025/01/17/2025-01470/strengthening-and-promoting-innovation-in-the-nations-cybersecurity#p-10
* **Publisher:** US Government
* **License:**
* **Type:**
* **Publication date:** 2025
</details>
21
OtherSimilar legislationFinland’s national consumer IoT certification scheme Finland was a pioneer in Europe for consumer IoT security certification, launching its cybersecurity label program in 2019. In this scheme run by Traficom (the Finnish Transport and Communications Agency), manufacturers can apply to have their smart products evaluated against a set of security criteria. Certified products receive a “Cybersecurity Label” (Tietoturvamerkki in Finnish) that they can display to inform consumers that the device meets Finland’s security requirements. The criteria include things like no default passwords, secure communications, and a commitment by the vendor to update the product’s software to fix vulnerabilities. The Finnish label is voluntary but has seen adoption in products like smart watches, home hubs, and IoT appliances. The program’s goal is to raise consumer awareness and reward companies that invest in security. Finland’s label has gained international recognition – it has mutual recognition with Singapore’s CLS (whereby a product meeting the Finnish label is accepted as Level 3 in Singapore’s scheme). This national certification helps build trust in IoT products and influenced the development of similar labeling efforts across the EU.
* [Finland’s national consumer IoT certification scheme]() - Finland was a pioneer in Europe for consumer IoT security certification, launching its cybersecurity label program in 2019. In this scheme run by Traficom (the Finnish Transport and Communications Agency), manufacturers can apply to have their smart products evaluated against a set of security criteria. Certified products receive a “Cybersecurity Label” (Tietoturvamerkki in Finnish) that they can display to inform consumers that the device meets Finland’s security requirements. The criteria include things like no default passwords, secure communications, and a commitment by the vendor to update the product’s software to fix vulnerabilities. The Finnish label is voluntary but has seen adoption in products like smart watches, home hubs, and IoT appliances. The program’s goal is to raise consumer awareness and reward companies that invest in security. Finland’s label has gained international recognition – it has mutual recognition with Singapore’s CLS (whereby a product meeting the Finnish label is accepted as Level 3 in Singapore’s scheme). This national certification helps build trust in IoT products and influenced the development of similar labeling efforts across the EU.
<details>
<summary>More info</summary>

* **Title:** Finland’s national consumer IoT certification scheme
* **URL:**
* **Publisher:**
* **License:**
* **Type:**
* **Publication date:**
</details>
22
OtherSimilar legislationGermany BSI IoT labelThe German Federal Office for Information Security (BSI) introduced an “IT-Sicherheitskennzeichen” (IT Security Label) in 2022 for consumer IT products. This is a voluntary label that manufacturers can obtain to signal that their product meets basic cybersecurity requirements and that the manufacturer is transparent about its security features. Rather than extensive lab testing, the BSI label currently works as a self-declaration: the manufacturer commits to certain practices (for example, providing software updates for a minimum period, and having no universal default passwords) and BSI publishes a webpage for each labeled product detailing its security properties and update policy. The label itself is often a QR code that consumers can scan to read those details on BSI’s website. This approach educates consumers on what the device does for security and what they as users should do (like applying updates). Products like routers, smart TVs, and cameras have started getting the label. The label program also ties into international efforts: Germany and Singapore have a mutual recognition arrangement (devices with Germany’s label count as at least CLS Level 2 in Singapore and vice versa). Overall, the BSI IT Security Label aims to increase IoT product security through transparency and by pushing manufacturers to adhere to baseline good practices in order to earn the official recognition.
* [Germany BSI IoT label]() - The German Federal Office for Information Security (BSI) introduced an “IT-Sicherheitskennzeichen” (IT Security Label) in 2022 for consumer IT products. This is a voluntary label that manufacturers can obtain to signal that their product meets basic cybersecurity requirements and that the manufacturer is transparent about its security features. Rather than extensive lab testing, the BSI label currently works as a self-declaration: the manufacturer commits to certain practices (for example, providing software updates for a minimum period, and having no universal default passwords) and BSI publishes a webpage for each labeled product detailing its security properties and update policy. The label itself is often a QR code that consumers can scan to read those details on BSI’s website. This approach educates consumers on what the device does for security and what they as users should do (like applying updates). Products like routers, smart TVs, and cameras have started getting the label. The label program also ties into international efforts: Germany and Singapore have a mutual recognition arrangement (devices with Germany’s label count as at least CLS Level 2 in Singapore and vice versa). Overall, the BSI IT Security Label aims to increase IoT product security through transparency and by pushing manufacturers to adhere to baseline good practices in order to earn the official recognition.
<details>
<summary>More info</summary>

* **Title:** Germany BSI IoT label
* **URL:**
* **Publisher:**
* **License:**
* **Type:**
* **Publication date:**
</details>
23
OtherSimilar legislationIndia TEC Code of Practice for Securing Consumer IoTIndia’s Telecommunication Engineering Centre (TEC), under the Department of Telecom, released a “Code of Practice” in January 2022 as a guideline for consumer IoT security. This code of practice is largely aligned with global benchmarks like ETSI EN 303 645 and the UK’s 13 principles for IoT security. It provides a list of best practices that manufacturers should implement: some examples include using unique per-device passwords, implementing a vulnerability disclosure mechanism, securing personal data, ensuring communications are encrypted, and providing software updates to devices. While not a regulation, this document serves as an official reference for what the Indian government expects in terms of IoT device security. It’s intended for device manufacturers, IoT service providers, and app developers to consult and adopt these measures in their products and services. By following the TEC’s code, IoT companies can significantly raise the security level of their products in India, and it prepares them for any future mandatory requirements. The issuance of this guideline reflects India’s recognition of the growing risks posed by the proliferation of IoT devices and the need to protect consumers and critical networks from those risks.
* [India TEC Code of Practice for Securing Consumer IoT]() - India’s Telecommunication Engineering Centre (TEC), under the Department of Telecom, released a “Code of Practice” in January 2022 as a guideline for consumer IoT security. This code of practice is largely aligned with global benchmarks like ETSI EN 303 645 and the UK’s 13 principles for IoT security. It provides a list of best practices that manufacturers should implement: some examples include using unique per-device passwords, implementing a vulnerability disclosure mechanism, securing personal data, ensuring communications are encrypted, and providing software updates to devices. While not a regulation, this document serves as an official reference for what the Indian government expects in terms of IoT device security. It’s intended for device manufacturers, IoT service providers, and app developers to consult and adopt these measures in their products and services. By following the TEC’s code, IoT companies can significantly raise the security level of their products in India, and it prepares them for any future mandatory requirements. The issuance of this guideline reflects India’s recognition of the growing risks posed by the proliferation of IoT devices and the need to protect consumers and critical networks from those risks.
<details>
<summary>More info</summary>

* **Title:** India TEC Code of Practice for Securing Consumer IoT
* **URL:**
* **Publisher:**
* **License:**
* **Type:**
* **Publication date:**
</details>
24
OtherSimilar legislationVietnam’s Cyber Information Security Requirements for Internet of thingsIn 2021, Vietnam’s Ministry of Information and Communications issued a set of baseline cybersecurity requirements for consumer Internet-of-Things devices (for example, network cameras, Wi-Fi routers, and smart home gadgets). This was formalized in a decision (Decision 736/QD-BTTTT) that lists mandatory security features for IoT products in Vietnam. These requirements include having unique default credentials or forcing password changes on setup, providing secure update mechanisms for device firmware, implementing data protection measures, and ensuring devices undergo security testing. The regulation also often requires manufacturers to have a point of contact for vulnerability reporting. Vietnam’s move mirrors the global trend initiated by standards like ETSI EN 303 645 but makes it enforceable within the country’s jurisdiction. Manufacturers of IoT devices in Vietnam (or exporters to Vietnam) need to comply with these rules to sell their products legally. The aim is to reduce the prevalence of easily exploitable IoT devices (which could be hijacked for botnets or spying) on the Vietnamese market, thereby enhancing overall cyber hygiene and protecting consumers.
* [Vietnam’s Cyber Information Security Requirements for Internet of things]() - In 2021, Vietnam’s Ministry of Information and Communications issued a set of baseline cybersecurity requirements for consumer Internet-of-Things devices (for example, network cameras, Wi-Fi routers, and smart home gadgets). This was formalized in a decision (Decision 736/QD-BTTTT) that lists mandatory security features for IoT products in Vietnam. These requirements include having unique default credentials or forcing password changes on setup, providing secure update mechanisms for device firmware, implementing data protection measures, and ensuring devices undergo security testing. The regulation also often requires manufacturers to have a point of contact for vulnerability reporting. Vietnam’s move mirrors the global trend initiated by standards like ETSI EN 303 645 but makes it enforceable within the country’s jurisdiction. Manufacturers of IoT devices in Vietnam (or exporters to Vietnam) need to comply with these rules to sell their products legally. The aim is to reduce the prevalence of easily exploitable IoT devices (which could be hijacked for botnets or spying) on the Vietnamese market, thereby enhancing overall cyber hygiene and protecting consumers.
<details>
<summary>More info</summary>

* **Title:** Vietnam’s Cyber Information Security Requirements for Internet of things
* **URL:**
* **Publisher:**
* **License:**
* **Type:**
* **Publication date:**
</details>
25
OtherSimilar legislationU.K.’s Product Security and Telecommunications Infrastructure BillThe UK PSTI Act 2022 is a landmark law that establishes cybersecurity requirements for consumer connectable products (the IoT devices). Building on prior voluntary guidelines, it makes certain practices legally mandatory for manufacturers, importers, and distributors in the UK. The Act’s first set of requirements (which will be enforced via secondary regulations) include: banning universal default passwords in devices, requiring a public point of contact for vulnerability reporting, and mandating transparency about the minimum time period during which the device will receive security updates. Manufacturers must provide a compliance statement for their products covering these aspects. The law gives regulators power to fine companies that don’t comply. Essentially, PSTI turns basic IoT security principles into law – for example, if a toy or appliance ships with a default password like “admin” that is not unique, that will be illegal to sell in the UK. The Act also gives the government flexibility to expand requirements over time (it can add further provisions like mandates around data encryption or firewalls if needed). By legislating these measures, the UK aims to remove the most egregious vulnerabilities from consumer devices and drive manufacturers globally to improve the security of the products that end up in British households.
* [U.K.’s Product Security and Telecommunications Infrastructure Bill]() - The UK PSTI Act 2022 is a landmark law that establishes cybersecurity requirements for consumer connectable products (the IoT devices). Building on prior voluntary guidelines, it makes certain practices legally mandatory for manufacturers, importers, and distributors in the UK. The Act’s first set of requirements (which will be enforced via secondary regulations) include: banning universal default passwords in devices, requiring a public point of contact for vulnerability reporting, and mandating transparency about the minimum time period during which the device will receive security updates. Manufacturers must provide a compliance statement for their products covering these aspects. The law gives regulators power to fine companies that don’t comply. Essentially, PSTI turns basic IoT security principles into law – for example, if a toy or appliance ships with a default password like “admin” that is not unique, that will be illegal to sell in the UK. The Act also gives the government flexibility to expand requirements over time (it can add further provisions like mandates around data encryption or firewalls if needed). By legislating these measures, the UK aims to remove the most egregious vulnerabilities from consumer devices and drive manufacturers globally to improve the security of the products that end up in British households.
<details>
<summary>More info</summary>

* **Title:** U.K.’s Product Security and Telecommunications Infrastructure Bill
* **URL:**
* **Publisher:**
* **License:**
* **Type:**
* **Publication date:**
</details>
26
OtherSimilar legislationAustralia Code of Practice - Securing the Internet of Things for ConsumersAustralia released a voluntary Code of Practice for consumer IoT security in 2020 (developed by the Department of Home Affairs). This code closely mirrors the UK’s 13 IoT security principles and ETSI’s guidelines. It includes practices such as: don’t use default passwords (and preferably implement unique passwords per device), implement a vulnerability disclosure policy, keep software updated and securely updateable, securely store credentials, minimize data collection, and ensure devices can be securely deleted or reset by users. The Australian Code of Practice serves as guidance for industry; while not legally binding, it was endorsed by the government as the expected norm. Companies are encouraged to adopt it and even use it as a competitive advantage (demonstrating compliance could be marketed to consumers). The code also set the stage for potential future regulation if voluntary uptake is insufficient. By articulating clear best practices, Australia’s government aimed to elevate IoT security and protect Australian consumers from common IoT threats like unauthorized access or data breaches via their smart devices. The principles from this code of practice have since influenced discussions on IoT security regulation and labeling in Australia (such as the work towards an IoT security “star rating” similar to other countries).
* [Australia Code of Practice - Securing the Internet of Things for Consumers]() - Australia released a voluntary Code of Practice for consumer IoT security in 2020 (developed by the Department of Home Affairs). This code closely mirrors the UK’s 13 IoT security principles and ETSI’s guidelines. It includes practices such as: don’t use default passwords (and preferably implement unique passwords per device), implement a vulnerability disclosure policy, keep software updated and securely updateable, securely store credentials, minimize data collection, and ensure devices can be securely deleted or reset by users. The Australian Code of Practice serves as guidance for industry; while not legally binding, it was endorsed by the government as the expected norm. Companies are encouraged to adopt it and even use it as a competitive advantage (demonstrating compliance could be marketed to consumers). The code also set the stage for potential future regulation if voluntary uptake is insufficient. By articulating clear best practices, Australia’s government aimed to elevate IoT security and protect Australian consumers from common IoT threats like unauthorized access or data breaches via their smart devices. The principles from this code of practice have since influenced discussions on IoT security regulation and labeling in Australia (such as the work towards an IoT security “star rating” similar to other countries).
<details>
<summary>More info</summary>

* **Title:** Australia Code of Practice - Securing the Internet of Things for Consumers
* **URL:**
* **Publisher:**
* **License:**
* **Type:**
* **Publication date:**
</details>
27
Annex I, Part I, point (1)Principles of security resilienceSecurity processes & governanceOWASP Software Assurance Maturity Model (SAMM)OWASP SAMM is an open framework that organizations use to evaluate and improve their software security practices. It defines 15 security practices grouped into 5 business functions (such as Governance, Design, Implementation, Verification, and Operations), each with maturity levels and activities. By assessing their maturity against SAMM’s criteria, organizations can identify gaps in how they design, develop, and deploy software, and then follow SAMM’s guidance to incrementally implement more advanced security practices. The model is technology-agnostic and is updated by the OWASP community to reflect current best practices, making it a versatile roadmap for building a robust software security assurance program.https://owaspsamm.org/OWASPCC-BY-SA 4.0informal2009 – presentSAMM is a maturity model that helps organizations implement a Secure Development Lifecycle.Technical Best Practice (Standards Input)While mostly catering to manufacturers, SAMM is stil a useful resource for larger open source projects on how to ensure security is taken in to the development in a more structured wayYes, the work has started on v3.0 of SAMM and the team is open to feedback on how to make the project better suit the needs of the user communityhttps://github.com/maximbaele
* [OWASP Software Assurance Maturity Model (SAMM)](https://owaspsamm.org/) - OWASP SAMM is an open framework that organizations use to evaluate and improve their software security practices. It defines 15 security practices grouped into 5 business functions (such as Governance, Design, Implementation, Verification, and Operations), each with maturity levels and activities. By assessing their maturity against SAMM’s criteria, organizations can identify gaps in how they design, develop, and deploy software, and then follow SAMM’s guidance to incrementally implement more advanced security practices. The model is technology-agnostic and is updated by the OWASP community to reflect current best practices, making it a versatile roadmap for building a robust software security assurance program.
<details>
<summary>More info</summary>

* **Title:** OWASP Software Assurance Maturity Model (SAMM)
* **URL:** https://owaspsamm.org/
* **Publisher:** OWASP
* **License:** CC-BY-SA 4.0
* **Type:** informal
* **Publication date:** 2009 – present
</details>
28
Threat ModellingPrinciples of security resilienceRisk analysis OWASP Threat Modeling Cheat SheetThe OWASP Threat Modeling Cheat Sheet is a distilled guide to performing threat modeling, which is the process of systematically identifying and addressing potential threats to an application’s security during the design phase. The cheat sheet outlines the essential steps in threat modeling: defining the security objectives, creating an application diagram or understanding the architecture, identifying threats (often using frameworks like STRIDE: Spoofing, Tampering, Repudiation, Information disclosure, Denial of service, Elevation of privilege), and devising mitigations for those threats. It provides tips and best practices, such as focusing on high-risk assets, involving diverse stakeholders (developers, architects, security engineers), and iterating the threat model as the design evolves. By following this concise guide, developers and teams can ensure they consider security early in the development lifecycle—modeling what could go wrong and building in defenses—rather than reacting to issues late in the game.https://cheatsheetseries.owasp.org/cheatsheets/Threat_Modeling_Cheat_Sheet.htmlOWASPCC BY-SA 4.0informal?OWASP Cheat Sheets are a collection of pragmatic secruity guidelines and best practices for a wide range of technologies.https://github.com/anthonyharrison
* [OWASP Threat Modeling Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Threat_Modeling_Cheat_Sheet.html) - The OWASP Threat Modeling Cheat Sheet is a distilled guide to performing threat modeling, which is the process of systematically identifying and addressing potential threats to an application’s security during the design phase. The cheat sheet outlines the essential steps in threat modeling: defining the security objectives, creating an application diagram or understanding the architecture, identifying threats (often using frameworks like STRIDE: Spoofing, Tampering, Repudiation, Information disclosure, Denial of service, Elevation of privilege), and devising mitigations for those threats. It provides tips and best practices, such as focusing on high-risk assets, involving diverse stakeholders (developers, architects, security engineers), and iterating the threat model as the design evolves. By following this concise guide, developers and teams can ensure they consider security early in the development lifecycle—modeling what could go wrong and building in defenses—rather than reacting to issues late in the game.
<details>
<summary>More info</summary>

* **Title:** OWASP Threat Modeling Cheat Sheet
* **URL:** https://cheatsheetseries.owasp.org/cheatsheets/Threat_Modeling_Cheat_Sheet.html
* **Publisher:** OWASP
* **License:** CC BY-SA 4.0
* **Type:** informal
* **Publication date:** ?
</details>
29
Principles of security resilienceRisk analysis EN18031 - Common security requirements for radio equipment EN 18031-1:2024 is a new European harmonized standard developed to support the security provisions of the EU Radio Equipment Directive (RED). As of August 2024, certain radio-connected devices (including many IoT products) must comply with Article 3(3)(d)-(f) of the RED, which mandates network protection, privacy of data, and fraud prevention. EN 18031-1 provides the “common security requirements” that manufacturers can implement to meet these legal obligations. It likely covers a broad set of controls such as requiring authentication for critical functions, ensuring secure data transmission, protecting personal data handled by the equipment, and maintaining software update mechanisms. This standard builds on prior work (like ETSI EN 303 645) but formalizes it under CEN/CENELEC for regulatory conformity. By following EN 18031-1, manufacturers can self-declare or certify that their wireless and IoT products adhere to the necessary cybersecurity baseline, thereby fulfilling the RED requirements and allowing them to be placed on the EU market. Essentially, EN 18031-1 operationalizes the Cyber Resilience Act’s spirit early for radio devices, harmonizing security across all consumer smart products in Europe.https://www.nen.nl/nen-en-18031-1-2024-en-328074NEN-EN?formal2024This document specifies common security requirements for internet-connected radio equipmentEUSoon to be harmonized standard for RED DA complianceThe EN18031 standard specifies security requirements for internet-connected radio equipment, and has a large overlap with technical CRA requirementshttps://github.com/maximbaele
* [EN18031 - Common security requirements for radio equipment ](https://www.nen.nl/nen-en-18031-1-2024-en-328074) - EN 18031-1:2024 is a new European harmonized standard developed to support the security provisions of the EU Radio Equipment Directive (RED). As of August 2024, certain radio-connected devices (including many IoT products) must comply with Article 3(3)(d)-(f) of the RED, which mandates network protection, privacy of data, and fraud prevention. EN 18031-1 provides the “common security requirements” that manufacturers can implement to meet these legal obligations. It likely covers a broad set of controls such as requiring authentication for critical functions, ensuring secure data transmission, protecting personal data handled by the equipment, and maintaining software update mechanisms. This standard builds on prior work (like ETSI EN 303 645) but formalizes it under CEN/CENELEC for regulatory conformity. By following EN 18031-1, manufacturers can self-declare or certify that their wireless and IoT products adhere to the necessary cybersecurity baseline, thereby fulfilling the RED requirements and allowing them to be placed on the EU market. Essentially, EN 18031-1 operationalizes the Cyber Resilience Act’s spirit early for radio devices, harmonizing security across all consumer smart products in Europe.
<details>
<summary>More info</summary>

* **Title:** EN18031 - Common security requirements for radio equipment
* **URL:** https://www.nen.nl/nen-en-18031-1-2024-en-328074
* **Publisher:** NEN-EN
* **License:** ?
* **Type:** formal
* **Publication date:** 2024
</details>
30
Principles of security resilienceSecurity processes & governanceNIST Cybersecurity FrameworkThe NIST CSF is a high-level framework that helps organizations manage and reduce cybersecurity risk. It is composed of five Core Functions: Identify (know your assets, systems, data, and risks), Protect (implement safeguards like access controls, training, maintenance), Detect (deploy activities to promptly detect anomalies and incidents), Respond (have plans and actions for containing and minimizing incidents), and Recover (restore any capabilities or services impaired by incidents and incorporate lessons learned). Under each function are Categories and Subcategories that outline specific outcomes (for example, under Protect -> Access Control, an outcome is “identities and credentials are managed for authorized devices and users”). The CSF also includes Implementation Tiers to gauge the maturity of risk management practices and a Profile concept to tailor the framework to the organization’s goals and sector. Initially developed for critical infrastructure, the CSF has been widely adopted across industries globally because of its flexibility and clear structure. It’s often used as a starting point for developing a cybersecurity program or as a communication tool between technical teams and management, since it distills complex security practices into a straightforward, business-aligned format. (Note: A CSF 2.0 update is underway to incorporate more guidance on governance and supply chain risk.)https://www.nist.gov/cyberframeworkNIST?informalOngoingHelping organizations to better understand and improve their management of cybersecurity riskUShttps://github.com/anthonyharrison
* [NIST Cybersecurity Framework](https://www.nist.gov/cyberframework) - The NIST CSF is a high-level framework that helps organizations manage and reduce cybersecurity risk. It is composed of five Core Functions: Identify (know your assets, systems, data, and risks), Protect (implement safeguards like access controls, training, maintenance), Detect (deploy activities to promptly detect anomalies and incidents), Respond (have plans and actions for containing and minimizing incidents), and Recover (restore any capabilities or services impaired by incidents and incorporate lessons learned). Under each function are Categories and Subcategories that outline specific outcomes (for example, under Protect -> Access Control, an outcome is “identities and credentials are managed for authorized devices and users”). The CSF also includes Implementation Tiers to gauge the maturity of risk management practices and a Profile concept to tailor the framework to the organization’s goals and sector. Initially developed for critical infrastructure, the CSF has been widely adopted across industries globally because of its flexibility and clear structure. It’s often used as a starting point for developing a cybersecurity program or as a communication tool between technical teams and management, since it distills complex security practices into a straightforward, business-aligned format. (Note: A CSF 2.0 update is underway to incorporate more guidance on governance and supply chain risk.)
<details>
<summary>More info</summary>

* **Title:** NIST Cybersecurity Framework
* **URL:** https://www.nist.gov/cyberframework
* **Publisher:** NIST
* **License:** ?
* **Type:** informal
* **Publication date:** Ongoing
</details>
31
SBOM productionVulnerability handlingSBOM & Supply chain assuranceOWASP Definitive Guide to SBOMThis resource is a comprehensive guide on adopting and using Software Bill of Materials (SBOM) standards, focused on the OWASP CycloneDX format. It explains the importance of SBOMs in the software supply chain and provides detailed instructions for creating and integrating SBOMs into projects. The guide covers how to generate SBOMs for new or existing software, how to include information about components and dependencies, and how SBOMs aid in vulnerability management and compliance (e.g. with emerging regulations like the CRA). As an “authoritative” reference, it helps organizations implement CycloneDX SBOMs effectively to achieve greater transparency and security in their software ecosystems.https://cyclonedx.org/guides/OWASP_CycloneDX-Authoritative-Guide-to-SBOM-en.pdfOWASPCC-BY-SA 4.0informal2023 – presentCycloneDX is an internation standard for producing SBOMshttps://github.com/anthonyharrison
* [OWASP Definitive Guide to SBOM](https://cyclonedx.org/guides/OWASP_CycloneDX-Authoritative-Guide-to-SBOM-en.pdf) - This resource is a comprehensive guide on adopting and using Software Bill of Materials (SBOM) standards, focused on the OWASP CycloneDX format. It explains the importance of SBOMs in the software supply chain and provides detailed instructions for creating and integrating SBOMs into projects. The guide covers how to generate SBOMs for new or existing software, how to include information about components and dependencies, and how SBOMs aid in vulnerability management and compliance (e.g. with emerging regulations like the CRA). As an “authoritative” reference, it helps organizations implement CycloneDX SBOMs effectively to achieve greater transparency and security in their software ecosystems.
<details>
<summary>More info</summary>

* **Title:** OWASP Definitive Guide to SBOM
* **URL:** https://cyclonedx.org/guides/OWASP_CycloneDX-Authoritative-Guide-to-SBOM-en.pdf
* **Publisher:** OWASP
* **License:** CC-BY-SA 4.0
* **Type:** informal
* **Publication date:** 2023 – present
</details>
32
Vulnerability handling for products with digital elementsVulnerability handlingVulnerability HandlingOpenChain ISO/IEC 18974 - Security AssuranceISO/IEC 18974:2023, also known as the OpenChain Security Assurance standard, defines the key requirements for establishing a quality open source software security assurance program. It is designed to help organizations systematically identify and address known vulnerabilities in the open source components they use (for example, by checking for CVEs and dependency alerts). The standard outlines where in the software supply chain security processes should be in place, how roles and responsibilities for security should be assigned, and how to sustain these processes over time. It is intended to be lightweight and accessible, with support from the OpenChain community (providing reference materials and self-certification checklists), so that organizations of all sizes can adopt it and certify that their open source handling meets a baseline of security trustworthiness.https://openchainproject.org/security-assuranceOpenChain/ISOCC-BY-4.02023-12Technical Best Practice (Standards Input)https://github.com/AyanSinhaMahapatra/* [OpenChain ISO/IEC 18974 - Security Assurance](https://openchainproject.org/security-assurance) - ISO/IEC 18974:2023, also known as the OpenChain Security Assurance standard, defines the key requirements for establishing a quality open source software security assurance program. It is designed to help organizations systematically identify and address known vulnerabilities in the open source components they use (for example, by checking for CVEs and dependency alerts). The standard outlines where in the software supply chain security processes should be in place, how roles and responsibilities for security should be assigned, and how to sustain these processes over time. It is intended to be lightweight and accessible, with support from the OpenChain community (providing reference materials and self-certification checklists), so that organizations of all sizes can adopt it and certify that their open source handling meets a baseline of security trustworthiness.
<details>
<summary>More info</summary>

* **Title:** OpenChain ISO/IEC 18974 - Security Assurance
* **URL:** https://openchainproject.org/security-assurance
* **Publisher:** OpenChain/ISO
* **License:** CC-BY-4.0
* **Type:**
* **Publication date:** 45261
</details>
33
Other legislations/guidelines similar to CRAVulnerability handlingSBOM & Supply chain assuranceTechnical guidelines on SBOMsIn October 2024, the Indian Computer Emergency Response Team (CERT-In) released a set of technical guidelines on Software Bill of Materials (SBOM) for organizations in the public sector and critical industries. This document underscores the value of SBOMs as a tool for transparency in software supply chains and provides recommendations for how to generate and maintain SBOMs. It outlines processes and best practices for implementing SBOMs – such as what component information should be included (name, version, supplier, known vulnerabilities, etc.) – and offers guidance on integrating SBOM use into procurement and risk management. The goal of these guidelines is to ensure that Indian government agencies and essential service providers adopt SBOM practices to enhance software security and resilience, in line with global trends and regulatory expectations.https://www.cert-in.org.in/PDF/SBOM_Guidelines.pdfCERT-INinformal03.10.2024 (Version 1.0)IndiaTechnical guidelines on Best PracticesHave to access via a VPN from Indiahttps://github.com/AyanSinhaMahapatra/* [Technical guidelines on SBOMs](https://www.cert-in.org.in/PDF/SBOM_Guidelines.pdf) - In October 2024, the Indian Computer Emergency Response Team (CERT-In) released a set of technical guidelines on Software Bill of Materials (SBOM) for organizations in the public sector and critical industries. This document underscores the value of SBOMs as a tool for transparency in software supply chains and provides recommendations for how to generate and maintain SBOMs. It outlines processes and best practices for implementing SBOMs – such as what component information should be included (name, version, supplier, known vulnerabilities, etc.) – and offers guidance on integrating SBOM use into procurement and risk management. The goal of these guidelines is to ensure that Indian government agencies and essential service providers adopt SBOM practices to enhance software security and resilience, in line with global trends and regulatory expectations.
<details>
<summary>More info</summary>

* **Title:** Technical guidelines on SBOMs
* **URL:** https://www.cert-in.org.in/PDF/SBOM_Guidelines.pdf
* **Publisher:** CERT-IN
* **License:**
* **Type:** informal
* **Publication date:** 03.10.2024 (Version 1.0)
</details>
34
CycloneDX StandardVulnerability handlingSBOM & Supply chain assuranceECMA-424CycloneDX, originally a BOM (Bill of Materials) format from OWASP for software components, has been ratified as an international standard by Ecma International (as ECMA-424). This standard formalizes the schema and usage of CycloneDX for creating Software Bills of Materials, which enumerate the components and dependencies in a software product. ECMA-424 (CycloneDX v1.6) defines how to represent components, their licenses, version information, relationships, and relevant metadata (like hashes, integrity proofs, and known vulnerabilities) in a machine-readable way. The publication of CycloneDX as ECMA-424 means it is a globally recognized specification, facilitating widespread adoption. It enables organizations to exchange SBOM information consistently across tools and industries, enhancing transparency and helping stakeholders (developers, consumers, regulators) to track and manage supply chain risk by knowing exactly what is inside a software product.https://ecma-international.org/publications-and-standards/standards/ecma-424/ECMA International?FormalJune 2024 (version 1.0)Official standard for CycloneDXInternationalhttps://github.com/anthonyharrison* [ECMA-424](https://ecma-international.org/publications-and-standards/standards/ecma-424/) - CycloneDX, originally a BOM (Bill of Materials) format from OWASP for software components, has been ratified as an international standard by Ecma International (as ECMA-424). This standard formalizes the schema and usage of CycloneDX for creating Software Bills of Materials, which enumerate the components and dependencies in a software product. ECMA-424 (CycloneDX v1.6) defines how to represent components, their licenses, version information, relationships, and relevant metadata (like hashes, integrity proofs, and known vulnerabilities) in a machine-readable way. The publication of CycloneDX as ECMA-424 means it is a globally recognized specification, facilitating widespread adoption. It enables organizations to exchange SBOM information consistently across tools and industries, enhancing transparency and helping stakeholders (developers, consumers, regulators) to track and manage supply chain risk by knowing exactly what is inside a software product.
<details>
<summary>More info</summary>

* **Title:** ECMA-424
* **URL:** https://ecma-international.org/publications-and-standards/standards/ecma-424/
* **Publisher:** ECMA International
* **License:** ?
* **Type:** Formal
* **Publication date:** June 2024 (version 1.0)
</details>
35
Vulnerability handlingVulnerability handlingCNA RulesThe CNA Operational Rules are the policy framework governing how CVE Identifiers are assigned to vulnerabilities by authorized organizations. These rules, maintained by the CVE Program, detail the responsibilities of CNAs (organizations like software vendors or security coordinators that assign CVE IDs for vulnerabilities in their scope) and the processes they must follow. The document covers how CVE requests are handled, how and when a CNA should assign an ID, the required information for each CVE record, and how to communicate and publish vulnerabilities in coordination with reporters and other stakeholders. It also establishes procedures for disputes or exceptions (with the CVE Board overseeing cases that fall outside normal rules). The latest version (v4.0) of the CNA Rules introduces more flexibility and community input into CVE assignment, aiming to improve the efficiency and consistency of vulnerability identification worldwide. In essence, the CNA Rules ensure the CVE system operates smoothly, with each CNA doing its part to accurately catalog vulnerabilities in a timely manner.https://www.cve.org/resourcessupport/allresources/cnarulesMITRE?Semi-formal2024 editionCVE Programme rules, including the rules of assignement of CVE numbersInternationalmrybczyn* [CNA Rules](https://www.cve.org/resourcessupport/allresources/cnarules) - The CNA Operational Rules are the policy framework governing how CVE Identifiers are assigned to vulnerabilities by authorized organizations. These rules, maintained by the CVE Program, detail the responsibilities of CNAs (organizations like software vendors or security coordinators that assign CVE IDs for vulnerabilities in their scope) and the processes they must follow. The document covers how CVE requests are handled, how and when a CNA should assign an ID, the required information for each CVE record, and how to communicate and publish vulnerabilities in coordination with reporters and other stakeholders. It also establishes procedures for disputes or exceptions (with the CVE Board overseeing cases that fall outside normal rules). The latest version (v4.0) of the CNA Rules introduces more flexibility and community input into CVE assignment, aiming to improve the efficiency and consistency of vulnerability identification worldwide. In essence, the CNA Rules ensure the CVE system operates smoothly, with each CNA doing its part to accurately catalog vulnerabilities in a timely manner.
<details>
<summary>More info</summary>

* **Title:** CNA Rules
* **URL:** https://www.cve.org/resourcessupport/allresources/cnarules
* **Publisher:** MITRE
* **License:** ?
* **Type:** Semi-formal
* **Publication date:** 2024 edition
</details>
36
SPDX StandardVulnerability handlingSBOM & Supply chain assuranceISO/IEC 5962:2021ISO/IEC 5962:2021 is the international standardization of the Software Package Data Exchange (SPDX) format as a norm for Software Bill of Materials. SPDX originated as a Linux Foundation project to describe the components and licenses in software, and it was brought into ISO to encourage global adoption. The standard defines how to list all pieces of software (open-source libraries, proprietary modules, etc.), along with metadata like their versions, checksums, licenses, and relationships, in a structured document. Using ISO 5962 (SPDX), organizations can share SBOMs across organizational and tool boundaries with confidence that everyone interprets the content the same way. This promotes transparency in software supply chains, helps with automated license compliance checks, and aids vulnerability management (by quickly identifying if a product contains a component with a known CVE). SPDX as an ISO standard underscores its maturity and the importance of SBOMs in modern cybersecurity and compliance workflows.https://www.iso.org/standard/81870.htmlISO?FormalAugust 2021 (Version 1.0)Official SPDX standard (will be upissued in 2025)https://github.com/anthonyharrison* [ISO/IEC 5962:2021](https://www.iso.org/standard/81870.html) - ISO/IEC 5962:2021 is the international standardization of the Software Package Data Exchange (SPDX) format as a norm for Software Bill of Materials. SPDX originated as a Linux Foundation project to describe the components and licenses in software, and it was brought into ISO to encourage global adoption. The standard defines how to list all pieces of software (open-source libraries, proprietary modules, etc.), along with metadata like their versions, checksums, licenses, and relationships, in a structured document. Using ISO 5962 (SPDX), organizations can share SBOMs across organizational and tool boundaries with confidence that everyone interprets the content the same way. This promotes transparency in software supply chains, helps with automated license compliance checks, and aids vulnerability management (by quickly identifying if a product contains a component with a known CVE). SPDX as an ISO standard underscores its maturity and the importance of SBOMs in modern cybersecurity and compliance workflows.
<details>
<summary>More info</summary>

* **Title:** ISO/IEC 5962:2021
* **URL:** https://www.iso.org/standard/81870.html
* **Publisher:** ISO
* **License:** ?
* **Type:** Formal
* **Publication date:** August 2021 (Version 1.0)
</details>
37
Software Heritage Hash IDVulnerability handlingSBOM & Supply chain assuranceUnique identifier for software componentsThe Software Heritage ID is a scheme for assigning permanent, unique identifiers to software artifacts (such as source code files, commits, or releases) based on their content. The specification (developed by the Software Heritage archive) defines a cryptographic hash-based ID format that includes a prefix (swh:), a content hash, and additional qualifiers to denote the type of artifact and its position in the archive’s Merkle graph. For example, there are SWHIDs for files (blobs), directories (which list files), commits (snapshots of directories with metadata), and releases (tags). Because SWHIDs are content-derived, they are immutable and globally unique: the same piece of code will always have the same SWHID. This system enables precise references to software components regardless of where they are stored or how they are named elsewhere. In practice, SWHIDs facilitate long-term preservation, citation, and tracking of software, since one can resolve an SWHID via the Software Heritage archive to retrieve the exact artifact, and they help with supply chain integrity by ensuring that references to source code are unambiguous and verifiable.https://www.swhid.org/specificationSoftware Heritage (ISO pending) ? (Issue raised on GitHub)Semi-formalDec 2023 (v 1.1)International Provides a persistent and unique hash id for specific components (software and otherwise)https://github.com/andrewjskatz* [Unique identifier for software components](https://www.swhid.org/specification) - The Software Heritage ID is a scheme for assigning permanent, unique identifiers to software artifacts (such as source code files, commits, or releases) based on their content. The specification (developed by the Software Heritage archive) defines a cryptographic hash-based ID format that includes a prefix (swh:), a content hash, and additional qualifiers to denote the type of artifact and its position in the archive’s Merkle graph. For example, there are SWHIDs for files (blobs), directories (which list files), commits (snapshots of directories with metadata), and releases (tags). Because SWHIDs are content-derived, they are immutable and globally unique: the same piece of code will always have the same SWHID. This system enables precise references to software components regardless of where they are stored or how they are named elsewhere. In practice, SWHIDs facilitate long-term preservation, citation, and tracking of software, since one can resolve an SWHID via the Software Heritage archive to retrieve the exact artifact, and they help with supply chain integrity by ensuring that references to source code are unambiguous and verifiable.
<details>
<summary>More info</summary>

* **Title:** Unique identifier for software components
* **URL:** https://www.swhid.org/specification
* **Publisher:** Software Heritage (ISO pending)
* **License:** ? (Issue raised on GitHub)
* **Type:** Semi-formal
* **Publication date:** Dec 2023 (v 1.1)
</details>
38
Vulnerability handlingVulnerability handlingCERT Guide to CVDThe CERT Guide to CVD is a comprehensive handbook for establishing a coordinated vulnerability disclosure process. Published by the CERT Coordination Center (part of Carnegie Mellon University’s Software Engineering Institute), it walks through the entire lifecycle of handling a discovered security vulnerability when multiple parties are involved (the finder, the affected vendor, possibly intermediaries like bug bounty platforms or coordination centers). The guide covers fundamental concepts and roles (what it means to be a finder, vendor, coordinator), and lays out best practices on how to receive vulnerability reports, triage and analyze them, communicate between researchers and vendors, remediate the issues, and eventually disclose the vulnerability publicly in a responsible manner. It addresses challenges such as multi-vendor coordination (when a vulnerability affects multiple products) and dealing with disagreements or communication breakdowns. By following the CERT Guide, organizations can improve how they respond to vulnerability reports, ensuring that fixes are developed and delivered to users faster and with less conflict, ultimately reducing harm from security flaws.https://certcc.github.io/CERT-Guide-to-CVD/Carnegie Mellon UniversityFrom 2017Guidelines for creating an running a vulnerability response programmeN/Amrybczyn* [CERT Guide to CVD](https://certcc.github.io/CERT-Guide-to-CVD/) - The CERT Guide to CVD is a comprehensive handbook for establishing a coordinated vulnerability disclosure process. Published by the CERT Coordination Center (part of Carnegie Mellon University’s Software Engineering Institute), it walks through the entire lifecycle of handling a discovered security vulnerability when multiple parties are involved (the finder, the affected vendor, possibly intermediaries like bug bounty platforms or coordination centers). The guide covers fundamental concepts and roles (what it means to be a finder, vendor, coordinator), and lays out best practices on how to receive vulnerability reports, triage and analyze them, communicate between researchers and vendors, remediate the issues, and eventually disclose the vulnerability publicly in a responsible manner. It addresses challenges such as multi-vendor coordination (when a vulnerability affects multiple products) and dealing with disagreements or communication breakdowns. By following the CERT Guide, organizations can improve how they respond to vulnerability reports, ensuring that fixes are developed and delivered to users faster and with less conflict, ultimately reducing harm from security flaws.
<details>
<summary>More info</summary>

* **Title:** CERT Guide to CVD
* **URL:** https://certcc.github.io/CERT-Guide-to-CVD/
* **Publisher:** Carnegie Mellon University
* **License:**
* **Type:**
* **Publication date:** From 2017
</details>
39
Package URL (PURL) IDVulnerability handlingSBOM & Supply chain assuranceUnique identifier for software componentsThe Package URL specification defines a standard way to identify software packages across different programming ecosystems using a simple, URL-like format. A “purl” takes the form of a URI that includes a package’s type (e.g. npm, Maven, PyPI, GitHub), the namespace or group (if applicable), the package name, version, and any qualifiers or subpath. For example, a purl might look like: pkg:maven/org.apache.commons/commons-lang3@3.12.0. This one identifier concisely tells you the package manager (Maven), group (org.apache.commons), artifact (commons-lang3), and version (3.12.0). The purl spec, maintained on GitHub, has become widely used in tools and SBOM formats because it provides a consistent way to refer to components. It helps automate the tracking of dependencies, vulnerability matching (linking known vulnerabilities to package coordinates), and license compliance, since every package instance can be referenced uniformly. In summary, Package URL is like a universal addressing system for software components, making it easier to integrate data about packages across different systems and databases.https://github.com/package-url/purl-specECMA Interantional (in 2025)?Formal2025Format for uniquely identifying software componentshttps://github.com/anthonyharrison* [Unique identifier for software components](https://github.com/package-url/purl-spec) - The Package URL specification defines a standard way to identify software packages across different programming ecosystems using a simple, URL-like format. A “purl” takes the form of a URI that includes a package’s type (e.g. npm, Maven, PyPI, GitHub), the namespace or group (if applicable), the package name, version, and any qualifiers or subpath. For example, a purl might look like: pkg:maven/org.apache.commons/commons-lang3@3.12.0. This one identifier concisely tells you the package manager (Maven), group (org.apache.commons), artifact (commons-lang3), and version (3.12.0). The purl spec, maintained on GitHub, has become widely used in tools and SBOM formats because it provides a consistent way to refer to components. It helps automate the tracking of dependencies, vulnerability matching (linking known vulnerabilities to package coordinates), and license compliance, since every package instance can be referenced uniformly. In summary, Package URL is like a universal addressing system for software components, making it easier to integrate data about packages across different systems and databases.
<details>
<summary>More info</summary>

* **Title:** Unique identifier for software components
* **URL:** https://github.com/package-url/purl-spec
* **Publisher:** ECMA Interantional (in 2025)
* **License:** ?
* **Type:** Formal
* **Publication date:** 2025
</details>
40
Vulnerability handlingSBOM & Supply chain assuranceSLSA Supply Chain Levels for Software ArtifactsSLSA (pronounced “salsa”) is a security framework for improving software supply chain integrity, created by a consortium of industry leaders. It defines a maturity model with four levels that software producers can achieve, each level adding more advanced supply chain protections. At Level 1, basic requirements like using version control and build scripts are in place. By Level 2, tamper-evident builds are required (e.g. generating provenance metadata). Level 3 mandates trusted, verifiable builds (such as using a dedicated, isolated build service to prevent interference), and Level 4 involves the highest assurances including two-party review of all changes and a hermetic, reproducible build process. The framework is documented openly (on GitHub) and provides specifications for how to produce attestations (metadata) that a build meets a certain SLSA level. The purpose of SLSA is to thwart supply chain attacks (like code tampering, compromised dependencies, etc.) by incrementally hardening the build and release process. Organizations can adopt SLSA guidelines to progressively make their software build pipelines more secure, and customers can eventually prefer software that comes with SLSA provenance, indicating it was built under strict controls.https://github.com/slsa-framework/slsaOpenSSFApache 2.0 and othersSemi-formalLevels of secure developmentN/Amrybczyn* [SLSA Supply Chain Levels for Software Artifacts](https://github.com/slsa-framework/slsa) - SLSA (pronounced “salsa”) is a security framework for improving software supply chain integrity, created by a consortium of industry leaders. It defines a maturity model with four levels that software producers can achieve, each level adding more advanced supply chain protections. At Level 1, basic requirements like using version control and build scripts are in place. By Level 2, tamper-evident builds are required (e.g. generating provenance metadata). Level 3 mandates trusted, verifiable builds (such as using a dedicated, isolated build service to prevent interference), and Level 4 involves the highest assurances including two-party review of all changes and a hermetic, reproducible build process. The framework is documented openly (on GitHub) and provides specifications for how to produce attestations (metadata) that a build meets a certain SLSA level. The purpose of SLSA is to thwart supply chain attacks (like code tampering, compromised dependencies, etc.) by incrementally hardening the build and release process. Organizations can adopt SLSA guidelines to progressively make their software build pipelines more secure, and customers can eventually prefer software that comes with SLSA provenance, indicating it was built under strict controls.
<details>
<summary>More info</summary>

* **Title:** SLSA Supply Chain Levels for Software Artifacts
* **URL:** https://github.com/slsa-framework/slsa
* **Publisher:** OpenSSF
* **License:** Apache 2.0 and others
* **Type:** Semi-formal
* **Publication date:**
</details>
41
Incident ResponseVulnerability handlingVulnerability handlingNIST SP 800-61 Rev. 3 (Initial Public Draft): Incident Response Recommendations and Considerations for Cybersecurity Risk Management: A CSF 2.0 Community ProfileThis is the draft of the third revision to NIST’s Computer Security Incident Handling Guide. It updates the well-known incident response lifecycle guidance (Prepare, Detect and Analyze, Contain, Eradicate and Recover, Post-Incident) to address modern challenges and to align with the upcoming NIST Cybersecurity Framework 2.0. The draft emphasizes integrating incident response with overall risk management and uses the CSF structure to organize recommendations. It highlights considerations such as cloud incidents, supply-chain incidents, and coordinating with external entities (like law enforcement or industry sharing groups) – topics that have grown in importance since the previous Rev. 2. The draft also suggests metrics and continuous improvement practices for incident response teams, encouraging organizations to not just react to incidents but to collect lessons learned and feed those back into defensive measures. In essence, SP 800-61 Rev. 3 will serve as a contemporary playbook for cybersecurity incident response, ensuring teams are well-prepared and that their processes fit into a broader strategy for resilience.https://csrc.nist.gov/pubs/sp/800/61/r3/ipdNIST?informal2024Incident response is a critical part of cybersecurity risk management and should be integrated across organizational operations. The six Functions of the NIST Cybersecurity Framework (CSF) 2.0 all play vital roles in incident response.UShttps://github.com/anthonyharrison* [NIST SP 800-61 Rev. 3 (Initial Public Draft): Incident Response Recommendations and Considerations for Cybersecurity Risk Management: A CSF 2.0 Community Profile](https://csrc.nist.gov/pubs/sp/800/61/r3/ipd) - This is the draft of the third revision to NIST’s Computer Security Incident Handling Guide. It updates the well-known incident response lifecycle guidance (Prepare, Detect and Analyze, Contain, Eradicate and Recover, Post-Incident) to address modern challenges and to align with the upcoming NIST Cybersecurity Framework 2.0. The draft emphasizes integrating incident response with overall risk management and uses the CSF structure to organize recommendations. It highlights considerations such as cloud incidents, supply-chain incidents, and coordinating with external entities (like law enforcement or industry sharing groups) – topics that have grown in importance since the previous Rev. 2. The draft also suggests metrics and continuous improvement practices for incident response teams, encouraging organizations to not just react to incidents but to collect lessons learned and feed those back into defensive measures. In essence, SP 800-61 Rev. 3 will serve as a contemporary playbook for cybersecurity incident response, ensuring teams are well-prepared and that their processes fit into a broader strategy for resilience.
<details>
<summary>More info</summary>

* **Title:** NIST SP 800-61 Rev. 3 (Initial Public Draft): Incident Response Recommendations and Considerations for Cybersecurity Risk Management: A CSF 2.0 Community Profile
* **URL:** https://csrc.nist.gov/pubs/sp/800/61/r3/ipd
* **Publisher:** NIST
* **License:** ?
* **Type:** informal
* **Publication date:** 2024
</details>
42
Vulnerability ReportingVulnerability handlingVulnerability handlingNIST SP 800-231: Bug Framework (BF): Formalizing Cybersecurity Weaknesses and VulnerabilitiesNIST’s Bug Framework (BF) is an effort to formalize how we describe software weaknesses and vulnerabilities. Unlike vulnerability databases (which catalog specific instances of bugs in products), the BF provides a methodology and language to define classes of bugs in a rigorous way. It builds on concepts from existing taxonomies like CWE (Common Weakness Enumeration) but adds formal structure, making it easier to see the relations between bugs. For example, the framework may define a hierarchy or mapping of how a higher-level weakness (say “Improper Input Validation”) can manifest as different lower-level bug types in certain contexts. It likely introduces a model to reason from root causes to impacts. The intent is to aid tools and researchers: with a formal bug definition language, static analysis tools or formal methods can more precisely identify and categorize issues, and data analysts can better aggregate and compare vulnerability information across different sources. In essence, SP 800-231 is bringing scientific rigor to how we classify software flaws, which can improve communication (everyone uses terms the same way), allow for more automation in vulnerability management, and potentially help discover logical gaps in existing security coverage.https://csrc.nist.gov/pubs/sp/800/231/finalNIST?informal2024The Bugs Framework (BF) is a classification of security bugs and related faults that features a formal language for the unambiguous specification of software and hardware security weaknesses and vulnerabilities. USPatent submitted https://github.com/anthonyharrison* [NIST SP 800-231: Bug Framework (BF): Formalizing Cybersecurity Weaknesses and Vulnerabilities](https://csrc.nist.gov/pubs/sp/800/231/final) - NIST’s Bug Framework (BF) is an effort to formalize how we describe software weaknesses and vulnerabilities. Unlike vulnerability databases (which catalog specific instances of bugs in products), the BF provides a methodology and language to define classes of bugs in a rigorous way. It builds on concepts from existing taxonomies like CWE (Common Weakness Enumeration) but adds formal structure, making it easier to see the relations between bugs. For example, the framework may define a hierarchy or mapping of how a higher-level weakness (say “Improper Input Validation”) can manifest as different lower-level bug types in certain contexts. It likely introduces a model to reason from root causes to impacts. The intent is to aid tools and researchers: with a formal bug definition language, static analysis tools or formal methods can more precisely identify and categorize issues, and data analysts can better aggregate and compare vulnerability information across different sources. In essence, SP 800-231 is bringing scientific rigor to how we classify software flaws, which can improve communication (everyone uses terms the same way), allow for more automation in vulnerability management, and potentially help discover logical gaps in existing security coverage.
<details>
<summary>More info</summary>

* **Title:** NIST SP 800-231: Bug Framework (BF): Formalizing Cybersecurity Weaknesses and Vulnerabilities
* **URL:** https://csrc.nist.gov/pubs/sp/800/231/final
* **Publisher:** NIST
* **License:** ?
* **Type:** informal
* **Publication date:** 2024
</details>
43
Procurement practices by Government AgenciesVulnerability handlingSBOM & Supply chain assuranceUS NASA procurement practices and processn response to federal requirements (stemming from Executive Order 14028) that government agencies only use software following secure development practices, NASA has instituted a process where software suppliers must self-attest to their security. NASA’s public resources for this include guidance and forms for vendors. Essentially, a contractor providing software to NASA needs to review their own software development processes against criteria (largely drawn from NIST’s Secure Software Development Framework and related guidance) and then sign a statement confirming they comply. The NASA site likely provides a checklist or template covering topics like: does the vendor conduct threat modeling? Do they run static code analysis? How do they manage third-party component vulnerabilities? etc. It might also have educational material to help suppliers understand what practices are expected. By implementing this attestation process, NASA ensures its contractors are consciously evaluating and improving their security postures. This ultimately reduces risk in NASA’s supply chain—only software built with a baseline of security best practices should be running in NASA environments—and it reinforces industry adoption of secure development norms.https://www.nasa.gov/secure-software-development-self-attestation-resources-and-knowledge/NASA2024NASA procurement process to identify, procure and use only trustworthy software products per NIST and CISA requirements o OMB M-22-18rjb4standards* [US NASA procurement practices and process](https://www.nasa.gov/secure-software-development-self-attestation-resources-and-knowledge/) - n response to federal requirements (stemming from Executive Order 14028) that government agencies only use software following secure development practices, NASA has instituted a process where software suppliers must self-attest to their security. NASA’s public resources for this include guidance and forms for vendors. Essentially, a contractor providing software to NASA needs to review their own software development processes against criteria (largely drawn from NIST’s Secure Software Development Framework and related guidance) and then sign a statement confirming they comply. The NASA site likely provides a checklist or template covering topics like: does the vendor conduct threat modeling? Do they run static code analysis? How do they manage third-party component vulnerabilities? etc. It might also have educational material to help suppliers understand what practices are expected. By implementing this attestation process, NASA ensures its contractors are consciously evaluating and improving their security postures. This ultimately reduces risk in NASA’s supply chain—only software built with a baseline of security best practices should be running in NASA environments—and it reinforces industry adoption of secure development norms.
<details>
<summary>More info</summary>

* **Title:** US NASA procurement practices and process
* **URL:** https://www.nasa.gov/secure-software-development-self-attestation-resources-and-knowledge/
* **Publisher:** NASA
* **License:**
* **Type:**
* **Publication date:** 2024
</details>
44
Other legislations/guidelines similar to CRAVulnerability handlingSBOM & Supply chain assuranceTechnical guidelines on SBOMsIn mid-2024, CISA released updated guidance (version 2.0 of its Software Acquisition guidance for enterprises) focusing on how government organizations should handle SBOMs. This technical guide provides detailed procedures for requesting SBOMs from software vendors, ingesting and validating those SBOMs, and using them for risk analysis. It likely advises agencies to use automated tools to parse SBOM data to identify components and check them against vulnerability databases (so if a vendor provides an SBOM, the agency can quickly see if any included library has known flaws). It also covers establishing workflows to manage SBOM data at scale – for example, keeping a repository of SBOMs for all software in use, updating it when software is patched or upgraded, and integrating SBOM review into continuous monitoring. The guide emphasizes that simply obtaining SBOMs is not the end goal; organizations must also develop the capability to act on SBOM information (like prioritizing patches or isolating systems when a critical vulnerability in a common component emerges). By following these guidelines, government enterprises can move toward proactive supply chain security management, gaining visibility into their software assets and being better prepared to respond to new threats or compliance checks (like those required by EO mandates).https://www.cisa.gov/sites/default/files/2024-07/PDM24050%20Software%20Acquisition%20Guide%20for%20Government%20Enterprise%20ConsumersV2_508c.pdfUS Governmentformal2024Technical standards requirements for SBOM artifacts used in a software risk assessment. rjb4standards* [Technical guidelines on SBOMs](https://www.cisa.gov/sites/default/files/2024-07/PDM24050%20Software%20Acquisition%20Guide%20for%20Government%20Enterprise%20ConsumersV2_508c.pdf) - In mid-2024, CISA released updated guidance (version 2.0 of its Software Acquisition guidance for enterprises) focusing on how government organizations should handle SBOMs. This technical guide provides detailed procedures for requesting SBOMs from software vendors, ingesting and validating those SBOMs, and using them for risk analysis. It likely advises agencies to use automated tools to parse SBOM data to identify components and check them against vulnerability databases (so if a vendor provides an SBOM, the agency can quickly see if any included library has known flaws). It also covers establishing workflows to manage SBOM data at scale – for example, keeping a repository of SBOMs for all software in use, updating it when software is patched or upgraded, and integrating SBOM review into continuous monitoring. The guide emphasizes that simply obtaining SBOMs is not the end goal; organizations must also develop the capability to act on SBOM information (like prioritizing patches or isolating systems when a critical vulnerability in a common component emerges). By following these guidelines, government enterprises can move toward proactive supply chain security management, gaining visibility into their software assets and being better prepared to respond to new threats or compliance checks (like those required by EO mandates).
<details>
<summary>More info</summary>

* **Title:** Technical guidelines on SBOMs
* **URL:** https://www.cisa.gov/sites/default/files/2024-07/PDM24050%20Software%20Acquisition%20Guide%20for%20Government%20Enterprise%20ConsumersV2_508c.pdf
* **Publisher:** US Government
* **License:**
* **Type:** formal
* **Publication date:** 2024
</details>
45
Information Sharing - Identifying trustworthy products, i.e. Trust RegistryVulnerability handlingSBOM & Supply chain assuranceIETF SCITTThe IETF’s SCITT working group is developing a set of protocols to enable a trustworthy ledger of software supply chain events (like signing, transferring, and auditing software components). The linked document on software use cases describes scenarios where organizations need a verifiable record of actions in the supply chain. For example, one use case might be tracking the provenance of a piece of code: a developer commits code and signs it, a build service records that it built a binary from specific source, a scanner logs that it scanned the binary for vulnerabilities, etc. SCITT envisions a tamper-evident ledger (possibly blockchain-like or using transparency logs) where each of these actions is recorded by actors with cryptographic signatures. The use case document illustrates how this can help – for instance, a consumer of software can query the ledger to see if a given software package version has a recorded build attestation and security scan results before trusting it. Another use case could involve regulatory compliance: proving to an auditor that every software component in a device went through certain security checks. By enumerating such cases, the document guides the design of the SCITT architecture to ensure it meets real-world needs. In essence, SCITT’s use cases highlight the forthcoming ability to establish a chain of trust for software artifacts through standardized evidence, improving the integrity and transparency of the software supply chain.https://datatracker.ietf.org/doc/draft-ietf-scitt-software-use-cases/IETFformalDRAFT 2024Protocols needed to establish a "Trust Registry" for trusted productsrjb4standards* [IETF SCITT](https://datatracker.ietf.org/doc/draft-ietf-scitt-software-use-cases/) - The IETF’s SCITT working group is developing a set of protocols to enable a trustworthy ledger of software supply chain events (like signing, transferring, and auditing software components). The linked document on software use cases describes scenarios where organizations need a verifiable record of actions in the supply chain. For example, one use case might be tracking the provenance of a piece of code: a developer commits code and signs it, a build service records that it built a binary from specific source, a scanner logs that it scanned the binary for vulnerabilities, etc. SCITT envisions a tamper-evident ledger (possibly blockchain-like or using transparency logs) where each of these actions is recorded by actors with cryptographic signatures. The use case document illustrates how this can help – for instance, a consumer of software can query the ledger to see if a given software package version has a recorded build attestation and security scan results before trusting it. Another use case could involve regulatory compliance: proving to an auditor that every software component in a device went through certain security checks. By enumerating such cases, the document guides the design of the SCITT architecture to ensure it meets real-world needs. In essence, SCITT’s use cases highlight the forthcoming ability to establish a chain of trust for software artifacts through standardized evidence, improving the integrity and transparency of the software supply chain.
<details>
<summary>More info</summary>

* **Title:** IETF SCITT
* **URL:** https://datatracker.ietf.org/doc/draft-ietf-scitt-software-use-cases/
* **Publisher:** IETF
* **License:**
* **Type:** formal
* **Publication date:** DRAFT 2024
</details>
46
SBOM implementation findings, lessons learned and observationsVulnerability handlingSBOM & Supply chain assuranceEnergy Central articleThis article, written by a practitioner with extensive experience in SBOMs, shares practical insights and opinions on the current state of SBOM usage. One key point the author makes is that the only authoritative SBOM for a product should come from its original producer – they have the best knowledge of the components. However, even producers might not have perfect insight into every sub-component, especially when they incorporate third-party elements, highlighting the need for upstream component transparency. The author argues against waiting for SBOM technology to be “perfect” or universally adopted; even imperfect SBOMs provide significant value right now by giving visibility into software contents and risks. The article notes that many tools and a vibrant community already exist to help generate and use SBOMs, debunking the myth that SBOM is immature. It also reminds readers that there are two well-established SBOM standards (CycloneDX and SPDX) that are sufficient for current needs. The author cautions that there are both proponents and detractors of SBOMs speaking in the industry, and suggests readers do their own evaluations – in other words, experiment with SBOMs on their own software to see the benefits firsthand. Overall, the piece encourages organizations to start integrating SBOM practices into their workflows today, to improve software risk management and comply with emerging requirements, rather than adopting a “wait and see” approach.https://energycentral.com/c/iu/facts-and-opinions-about-sbom-implementation-and-adoptionEnergy Central/Dick BrooksinformalFebrary 16, 2025Observations from SBOM implementation experiences in practicerjb4standards* [Energy Central article](https://energycentral.com/c/iu/facts-and-opinions-about-sbom-implementation-and-adoption) - This article, written by a practitioner with extensive experience in SBOMs, shares practical insights and opinions on the current state of SBOM usage. One key point the author makes is that the only authoritative SBOM for a product should come from its original producer – they have the best knowledge of the components. However, even producers might not have perfect insight into every sub-component, especially when they incorporate third-party elements, highlighting the need for upstream component transparency. The author argues against waiting for SBOM technology to be “perfect” or universally adopted; even imperfect SBOMs provide significant value right now by giving visibility into software contents and risks. The article notes that many tools and a vibrant community already exist to help generate and use SBOMs, debunking the myth that SBOM is immature. It also reminds readers that there are two well-established SBOM standards (CycloneDX and SPDX) that are sufficient for current needs. The author cautions that there are both proponents and detractors of SBOMs speaking in the industry, and suggests readers do their own evaluations – in other words, experiment with SBOMs on their own software to see the benefits firsthand. Overall, the piece encourages organizations to start integrating SBOM practices into their workflows today, to improve software risk management and comply with emerging requirements, rather than adopting a “wait and see” approach.
<details>
<summary>More info</summary>

* **Title:** Energy Central article
* **URL:** https://energycentral.com/c/iu/facts-and-opinions-about-sbom-implementation-and-adoption
* **Publisher:** Energy Central/Dick Brooks
* **License:**
* **Type:** informal
* **Publication date:** Febrary 16, 2025
</details>
47
Annex I, Part I, point (1)#N/ASecure coding guidelinesOpenStack Secure development guidelinesThe OpenStack Security Team has created a set of secure development guidelines and best practices to help developers avoid common mistakes that could introduce vulnerabilities in the OpenStack platform. These guidelines cover various areas of secure coding (e.g. proper file permissions, input validation, avoiding insecure libraries, using encryption correctly) and serve as a baseline for developers to follow so that OpenStack components are built with security in mind. By adhering to these recommendations, contributors to OpenStack can systematically reduce security weaknesses and improve the overall resilience of the cloud software.https://security.openstack.org/#secure-development-guidelinesOpenStack CommunityCC-BY-3.0informal2015-02-18 – presentTBD - who was the contributor?N/ATechnical Best Practice (Standards Input)No
* [OpenStack Secure development guidelines](https://security.openstack.org/#secure-development-guidelines) - The OpenStack Security Team has created a set of secure development guidelines and best practices to help developers avoid common mistakes that could introduce vulnerabilities in the OpenStack platform. These guidelines cover various areas of secure coding (e.g. proper file permissions, input validation, avoiding insecure libraries, using encryption correctly) and serve as a baseline for developers to follow so that OpenStack components are built with security in mind. By adhering to these recommendations, contributors to OpenStack can systematically reduce security weaknesses and improve the overall resilience of the cloud software.
<details>
<summary>More info</summary>

* **Title:** OpenStack Secure development guidelines
* **URL:** https://security.openstack.org/#secure-development-guidelines
* **Publisher:** OpenStack Community
* **License:** CC-BY-3.0
* **Type:** informal
* **Publication date:** 2015-02-18 – present
</details>
48
Annex I, Part I, point (1)Principles of security resilienceSecure design and secure coding principlesOWASP Cheat Sheet SeriesThe OWASP Cheat Sheet Series is a collection of concise, high-value guides on a wide range of application security topics. Each cheat sheet focuses on a specific area (for example, authentication, injection prevention, error handling, etc.) and distills essential best practices and recommendations in an easy-to-reference format. Created and maintained by security experts in the OWASP community, the cheat sheets provide developers and defenders with clear guidelines to implement security controls correctly. By following the Cheat Sheet Series, practitioners can quickly learn the do’s and don’ts of application security for common scenarios, thereby improving the security of software without needing to wade through extensive documentation.https://cheatsheetseries.owasp.org/OWASPCC BY-SA 4.0informal2014 – presentOWASP Cheat Sheets are a collection of pragmatic secruity guidelines and best practices for a wide range of technologies.https://github.com/maximbaele
* [OWASP Cheat Sheet Series](https://cheatsheetseries.owasp.org/) - The OWASP Cheat Sheet Series is a collection of concise, high-value guides on a wide range of application security topics. Each cheat sheet focuses on a specific area (for example, authentication, injection prevention, error handling, etc.) and distills essential best practices and recommendations in an easy-to-reference format. Created and maintained by security experts in the OWASP community, the cheat sheets provide developers and defenders with clear guidelines to implement security controls correctly. By following the Cheat Sheet Series, practitioners can quickly learn the do’s and don’ts of application security for common scenarios, thereby improving the security of software without needing to wade through extensive documentation.
<details>
<summary>More info</summary>

* **Title:** OWASP Cheat Sheet Series
* **URL:** https://cheatsheetseries.owasp.org/
* **Publisher:** OWASP
* **License:** CC BY-SA 4.0
* **Type:** informal
* **Publication date:** 2014 – present
</details>
49
Principles of security resilienceSecure by design, based on a risk analysis ISO 31000:2018 Risk management — GuidelinesISO 31000:2018 is an international standard that provides principles and generic guidelines for effective risk management in organizations. Rather than prescribing a specific technique, it outlines a framework and process that organizations can use to identify, assess, and treat risks systematically. Key concepts include establishing the context of risk (understanding the internal and external environment), performing structured risk assessments (identifying risks, analyzing their likelihood and impact, evaluating priorities), and then treating the risks with appropriate controls or mitigation strategies. The standard emphasizes that risk management should be iterative and embedded into organizational processes, decision-making, and culture. By following ISO 31000’s guidelines, organizations of any type can improve their ability to manage uncertainty, minimize losses, and maximize opportunities in a rational, auditable way.https://www.iso.org/standard/65694.htmlISO?Formal2018ISO 31000 outlines a comprehensive approach to identifying, analyzing, evaluating, treating, monitoring and communicating risks across an organization.InternationalThis standard was mentioned in a presentation by EC, in the context of the type A horizontal standards, clarifying risk management for productshttps://github.com/maximbaele
* [ ISO 31000:2018 Risk management — Guidelines](https://www.iso.org/standard/65694.html) - ISO 31000:2018 is an international standard that provides principles and generic guidelines for effective risk management in organizations. Rather than prescribing a specific technique, it outlines a framework and process that organizations can use to identify, assess, and treat risks systematically. Key concepts include establishing the context of risk (understanding the internal and external environment), performing structured risk assessments (identifying risks, analyzing their likelihood and impact, evaluating priorities), and then treating the risks with appropriate controls or mitigation strategies. The standard emphasizes that risk management should be iterative and embedded into organizational processes, decision-making, and culture. By following ISO 31000’s guidelines, organizations of any type can improve their ability to manage uncertainty, minimize losses, and maximize opportunities in a rational, auditable way.
<details>
<summary>More info</summary>

* **Title:** ISO 31000:2018 Risk management — Guidelines
* **URL:** https://www.iso.org/standard/65694.html
* **Publisher:** ISO
* **License:** ?
* **Type:** Formal
* **Publication date:** 2018
</details>
50
Principles of security resilienceSecure by design, based on a risk analysisETSI 303 645 - Cyber Security for Consumer Internet of Things:
Baseline Requirements
ETSI EN 303 645 is a European standard specifying baseline cybersecurity requirements for consumer Internet of Things devices. It enumerates a set of fundamental practices that manufacturers of smart home and wearable devices, for instance, should implement to significantly improve security. Notable provisions include: avoiding universal default passwords (each device must have a unique or user-set credential), providing a means to manage vulnerability disclosure (publish a contact for security issues), keeping software updated (and informing consumers of update duration), securely storing sensitive data, and minimizing exposed attack surfaces. The standard, first released in 2020 (and updated in v2.1.1 to refine requirements), has 13 key provisions in total. While voluntary, EN 303 645 has become highly influential; its guidelines have been adopted or referenced by governments and industry schemes globally (such as in the UK’s and Australia’s IoT codes of practice and Singapore’s CLS levels). In summary, ETSI EN 303 645 serves as a baseline “security hygiene” checklist for IoT products to reduce common vulnerabilities and make consumer devices more resilient against attacks like botnet recruitment or data breaches.https://www.etsi.org/deliver/etsi_en/303600_303699/303645/02.01.01_60/en_303645v020101p.pdfETSI?formal2021This document specifies baseline security requirements for consumer IoT devicesEURelated to RED DA complianceThis standard describes baseline security requirements for consumer iot devices in scope of the radio equipment directiveNohttps://github.com/maximbaele
* [ETSI 303 645 - Cyber Security for Consumer Internet of Things:
Baseline Requirements](https://www.etsi.org/deliver/etsi_en/303600_303699/303645/02.01.01_60/en_303645v020101p.pdf) - ETSI EN 303 645 is a European standard specifying baseline cybersecurity requirements for consumer Internet of Things devices. It enumerates a set of fundamental practices that manufacturers of smart home and wearable devices, for instance, should implement to significantly improve security. Notable provisions include: avoiding universal default passwords (each device must have a unique or user-set credential), providing a means to manage vulnerability disclosure (publish a contact for security issues), keeping software updated (and informing consumers of update duration), securely storing sensitive data, and minimizing exposed attack surfaces. The standard, first released in 2020 (and updated in v2.1.1 to refine requirements), has 13 key provisions in total. While voluntary, EN 303 645 has become highly influential; its guidelines have been adopted or referenced by governments and industry schemes globally (such as in the UK’s and Australia’s IoT codes of practice and Singapore’s CLS levels). In summary, ETSI EN 303 645 serves as a baseline “security hygiene” checklist for IoT products to reduce common vulnerabilities and make consumer devices more resilient against attacks like botnet recruitment or data breaches.
<details>
<summary>More info</summary>

* **Title:** ETSI 303 645 - Cyber Security for Consumer Internet of Things:
Baseline Requirements
* **URL:** https://www.etsi.org/deliver/etsi_en/303600_303699/303645/02.01.01_60/en_303645v020101p.pdf
* **Publisher:** ETSI
* **License:** ?
* **Type:** formal
* **Publication date:** 2021
</details>
51
Risk Management FrameworkPrinciples of security resilienceSecure by design, based on a risk analysisNIST 800-37: Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and PrivacyNIST Special Publication 800-37 Revision 2 is the authoritative guide on applying a Risk Management Framework (RMF) to information systems. The RMF provides a disciplined, structured process that integrates security and privacy into the system development life cycle. The steps of the RMF include: Prepare (organizational and system level preparation for risk management), Categorize (determining the system’s impact level in terms of confidentiality, integrity, availability), Select (choosing an initial set of security and privacy controls from standards like NIST 800-53 based on that categorization and tailoring them as needed), Implement (putting the controls in place), Assess (evaluating how effectively the controls are implemented), Authorize (a senior official formally accepting the residual risk before the system operates), and Monitor (continuously tracking the system’s security posture and control effectiveness over time). Rev. 2 of SP 800-37, published in 2018, updated the process to better support organization-wide risk management, emphasized the importance of privacy, and aligned with the NIST Cybersecurity Framework. It promotes ongoing authorization and continuous monitoring rather than one-time snapshots. Utilizing RMF helps organizations (especially U.S. federal agencies and contractors) ensure that security is not an afterthought but a continuous, lifecycle concern tied to risk decisions.https://csrc.nist.gov/pubs/sp/800/37/r2/finalNIST?informal2018This publication describes the Risk Management Framework (RMF) and provides guidelines for applying the RMF to information systems and organizationsUShttps://github.com/anthonyharrison
* [NIST 800-37: Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy](https://csrc.nist.gov/pubs/sp/800/37/r2/final) - NIST Special Publication 800-37 Revision 2 is the authoritative guide on applying a Risk Management Framework (RMF) to information systems. The RMF provides a disciplined, structured process that integrates security and privacy into the system development life cycle. The steps of the RMF include: Prepare (organizational and system level preparation for risk management), Categorize (determining the system’s impact level in terms of confidentiality, integrity, availability), Select (choosing an initial set of security and privacy controls from standards like NIST 800-53 based on that categorization and tailoring them as needed), Implement (putting the controls in place), Assess (evaluating how effectively the controls are implemented), Authorize (a senior official formally accepting the residual risk before the system operates), and Monitor (continuously tracking the system’s security posture and control effectiveness over time). Rev. 2 of SP 800-37, published in 2018, updated the process to better support organization-wide risk management, emphasized the importance of privacy, and aligned with the NIST Cybersecurity Framework. It promotes ongoing authorization and continuous monitoring rather than one-time snapshots. Utilizing RMF helps organizations (especially U.S. federal agencies and contractors) ensure that security is not an afterthought but a continuous, lifecycle concern tied to risk decisions.
<details>
<summary>More info</summary>

* **Title:** NIST 800-37: Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy
* **URL:** https://csrc.nist.gov/pubs/sp/800/37/r2/final
* **Publisher:** NIST
* **License:** ?
* **Type:** informal
* **Publication date:** 2018
</details>
52
Secure By DesignPrinciples of security resilienceSecure by design, based on a risk analysisNIST SP 800-160 Vol. 2 Rev. 1: Developing Cyber-Resilient Systems: A Systems Security Engineering ApproachThis NIST publication focuses on engineering principles for cyber resilience, complementing traditional cybersecurity (which often emphasizes protection and detection) with strategies to ensure essential functions can withstand and recover from attacks. It adopts a systems security engineering perspective, meaning it embeds resilience into the system design lifecycle. The document introduces a catalog of cyber resiliency techniques and approaches — for example, techniques like redundancy (having backup components), diversity (using different implementations to avoid common-mode failures), segmentation (limiting the blast radius of compromises), deception (confusing or slowing attackers), and graceful degradation (maintaining partial functionality under stress). Rev. 1 updates these concepts and provides use cases and mappings to known frameworks (like mapping resiliency techniques to NIST CSF functions). By applying the guidance in SP 800-160 Vol. 2, system architects and engineers can design systems that continue to operate even while under attack or after compromise, thereby protecting critical missions. The document essentially shifts the focus from just preventing breaches to assuming that incidents will happen and planning how the system will cope and adapt when they do.https://csrc.nist.gov/pubs/sp/800/160/v2/r1/finalNIST?informal2021Cyber resiliency engineering intends to architect, design, develop, implement, maintain, and sustain the trustworthiness of systems with the capability to anticipate, withstand, recover from, and adapt to adverse conditions, stresses, attacks, or compromises that use or are enabled by cyber resources. From a risk management perspective, cyber resiliency is intended to help reduce the mission, business, organizational, enterprise, or sector risk of depending on cyber resources.USCan be used in conjunction with ISO/IEC/IEEE 15288:2015, Systems and software engineering—Systems life cycle processeshttps://github.com/anthonyharrison
* [NIST SP 800-160 Vol. 2 Rev. 1: Developing Cyber-Resilient Systems: A Systems Security Engineering Approach](https://csrc.nist.gov/pubs/sp/800/160/v2/r1/final) - This NIST publication focuses on engineering principles for cyber resilience, complementing traditional cybersecurity (which often emphasizes protection and detection) with strategies to ensure essential functions can withstand and recover from attacks. It adopts a systems security engineering perspective, meaning it embeds resilience into the system design lifecycle. The document introduces a catalog of cyber resiliency techniques and approaches — for example, techniques like redundancy (having backup components), diversity (using different implementations to avoid common-mode failures), segmentation (limiting the blast radius of compromises), deception (confusing or slowing attackers), and graceful degradation (maintaining partial functionality under stress). Rev. 1 updates these concepts and provides use cases and mappings to known frameworks (like mapping resiliency techniques to NIST CSF functions). By applying the guidance in SP 800-160 Vol. 2, system architects and engineers can design systems that continue to operate even while under attack or after compromise, thereby protecting critical missions. The document essentially shifts the focus from just preventing breaches to assuming that incidents will happen and planning how the system will cope and adapt when they do.
<details>
<summary>More info</summary>

* **Title:** NIST SP 800-160 Vol. 2 Rev. 1: Developing Cyber-Resilient Systems: A Systems Security Engineering Approach
* **URL:** https://csrc.nist.gov/pubs/sp/800/160/v2/r1/final
* **Publisher:** NIST
* **License:** ?
* **Type:** informal
* **Publication date:** 2021
</details>
53
Principles of security resilienceSecure design and secure coding principlesCompiler Hardening Guide/ C C++ compiler optionsThis guide (hosted by the OpenSSF Best Practices community) outlines how to leverage modern compiler features and settings to produce more secure software binaries in C and C++. It provides practical recommendations on compiler options that enable various hardening mechanisms. Examples include turning on stack canaries and stack overflow protections (-fstack-protector-strong), using address space layout randomization friendly flags (-fPIE for position-independent executables, and linking with -pie), enabling control-flow integrity or forward-edge protections (if supported by the compiler toolchain), enabling warnings and treating them as errors for risky patterns, and using memory sanitization tools in testing builds. The guide may also discuss choices like enabling Fortify Source (to catch certain buffer overflows at runtime) and using latest standards (e.g. C11/C17 features that improve safety). Each suggested option is explained in terms of what security benefit it provides and any trade-offs (such as performance impact or compatibility). Following this hardening guide helps developers raise the baseline security of their C/C++ applications, making them more resistant to common memory corruption vulnerabilities by catching issues early or making exploitation much more difficult.https://best.openssf.org/Compiler-Hardening-Guides/Compiler-Options-Hardening-Guide-for-C-and-C++.htmlOpenSSF?informal2024N/Ayesmrybczyn* [Compiler Hardening Guide/ C C++ compiler options](https://best.openssf.org/Compiler-Hardening-Guides/Compiler-Options-Hardening-Guide-for-C-and-C++.html) - This guide (hosted by the OpenSSF Best Practices community) outlines how to leverage modern compiler features and settings to produce more secure software binaries in C and C++. It provides practical recommendations on compiler options that enable various hardening mechanisms. Examples include turning on stack canaries and stack overflow protections (-fstack-protector-strong), using address space layout randomization friendly flags (-fPIE for position-independent executables, and linking with -pie), enabling control-flow integrity or forward-edge protections (if supported by the compiler toolchain), enabling warnings and treating them as errors for risky patterns, and using memory sanitization tools in testing builds. The guide may also discuss choices like enabling Fortify Source (to catch certain buffer overflows at runtime) and using latest standards (e.g. C11/C17 features that improve safety). Each suggested option is explained in terms of what security benefit it provides and any trade-offs (such as performance impact or compatibility). Following this hardening guide helps developers raise the baseline security of their C/C++ applications, making them more resistant to common memory corruption vulnerabilities by catching issues early or making exploitation much more difficult.
<details>
<summary>More info</summary>

* **Title:** Compiler Hardening Guide/ C C++ compiler options
* **URL:** https://best.openssf.org/Compiler-Hardening-Guides/Compiler-Options-Hardening-Guide-for-C-and-C++.html
* **Publisher:** OpenSSF
* **License:** ?
* **Type:** informal
* **Publication date:** 2024
</details>
54
Principles of security resilienceSecure by design, based on a risk analysisBSI TR-03183: Cyber Resilience Requirements for Manufacturers and ProductsThis is a German Federal Office for Information Security (BSI) guideline adopted in 2023 to prepare manufacturers for the EU Cyber Resilience Act. It provides detailed requirements and recommendations for product cybersecurity, essentially translating upcoming regulatory expectations into actionable criteria. TR-03183 is divided into parts; Part 1 covers general cyber resilience requirements (e.g. taking a risk-based approach to product security, ensuring secure software development and lifecycle, establishing a vulnerability handling process), and Part 2 focuses specifically on Software Bill of Materials (SBOM) and related transparency measures. The guideline likely also has parts on secure update mechanisms and incident reporting. By following TR-03183, device and software manufacturers can implement baseline security controls (like strong authentication, encryption for data in transit/storage, integrity protections, etc.) and produce artifacts (such as an SBOM) that demonstrate compliance. It effectively serves as an early blueprint for CRA compliance in Germany, giving industry a head-start on meeting those future legal obligations by voluntarily aligning with the technical measures BSI recommends.https://www.bsi.bund.de/EN/Themen/Unternehmen-und-Organisationen/Standards-und-Zertifizierung/Technische-Richtlinien/TR-nach-Thema-sortiert/tr03183/TR-03183_node.htmlBSIFormal2024The Technical Guideline TR-03183 describes Cyber Resilience Requirements for Manufacturers and Products. It intends to provide manufacturers with advance access to the type of requirements that will be imposed on them by the Cyber Resilience Act (CRA).DECRA complianc guidancehttps://github.com/maximbaele
* [BSI TR-03183: Cyber Resilience Requirements for Manufacturers and Products](https://www.bsi.bund.de/EN/Themen/Unternehmen-und-Organisationen/Standards-und-Zertifizierung/Technische-Richtlinien/TR-nach-Thema-sortiert/tr03183/TR-03183_node.html) - This is a German Federal Office for Information Security (BSI) guideline adopted in 2023 to prepare manufacturers for the EU Cyber Resilience Act. It provides detailed requirements and recommendations for product cybersecurity, essentially translating upcoming regulatory expectations into actionable criteria. TR-03183 is divided into parts; Part 1 covers general cyber resilience requirements (e.g. taking a risk-based approach to product security, ensuring secure software development and lifecycle, establishing a vulnerability handling process), and Part 2 focuses specifically on Software Bill of Materials (SBOM) and related transparency measures. The guideline likely also has parts on secure update mechanisms and incident reporting. By following TR-03183, device and software manufacturers can implement baseline security controls (like strong authentication, encryption for data in transit/storage, integrity protections, etc.) and produce artifacts (such as an SBOM) that demonstrate compliance. It effectively serves as an early blueprint for CRA compliance in Germany, giving industry a head-start on meeting those future legal obligations by voluntarily aligning with the technical measures BSI recommends.
<details>
<summary>More info</summary>

* **Title:** BSI TR-03183: Cyber Resilience Requirements for Manufacturers and Products
* **URL:** https://www.bsi.bund.de/EN/Themen/Unternehmen-und-Organisationen/Standards-und-Zertifizierung/Technische-Richtlinien/TR-nach-Thema-sortiert/tr03183/TR-03183_node.html
* **Publisher:** BSI
* **License:**
* **Type:** Formal
* **Publication date:** 2024
</details>
55
Annex I, Part I, point (2)(c)Vulnerability handlingVulnerability HandlingPatching and Updates Guidelines from Berkeley Information Security OfficePublished by the University of California, Berkeley’s Information Security Office, this guideline provides best practices for keeping systems and applications up to date with security patches. It stresses the importance of timely patching as a critical defense against exploits of known vulnerabilities. Key recommendations include maintaining an inventory of all IT assets to know what needs patching, categorizing updates by severity and applying critical security patches as soon as possible (ideally within a defined timeframe like 48-72 hours for high severity), and establishing a regular patch cycle for less urgent updates. The guidelines also suggest testing patches in a staging environment when feasible, having a rollback plan in case an update causes issues, and using automated management tools to deploy patches at scale across an organization’s devices. Additionally, the document might cover how to handle systems that can’t be patched (due to compatibility or support issues), such as isolating them or applying compensating controls. Overall, the Berkeley guidelines serve as a practical manual for IT teams to build a robust patch management process, which in turn reduces an organization’s exposure to known exploits.https://security.berkeley.edu/MSSND/patching-and-updates-guidelinesUC Berkeley informalhttps://github.com/AyanSinhaMahapatra/* [Patching and Updates Guidelines from Berkeley Information Security Office](https://security.berkeley.edu/MSSND/patching-and-updates-guidelines) - Published by the University of California, Berkeley’s Information Security Office, this guideline provides best practices for keeping systems and applications up to date with security patches. It stresses the importance of timely patching as a critical defense against exploits of known vulnerabilities. Key recommendations include maintaining an inventory of all IT assets to know what needs patching, categorizing updates by severity and applying critical security patches as soon as possible (ideally within a defined timeframe like 48-72 hours for high severity), and establishing a regular patch cycle for less urgent updates. The guidelines also suggest testing patches in a staging environment when feasible, having a rollback plan in case an update causes issues, and using automated management tools to deploy patches at scale across an organization’s devices. Additionally, the document might cover how to handle systems that can’t be patched (due to compatibility or support issues), such as isolating them or applying compensating controls. Overall, the Berkeley guidelines serve as a practical manual for IT teams to build a robust patch management process, which in turn reduces an organization’s exposure to known exploits.
<details>
<summary>More info</summary>

* **Title:** Patching and Updates Guidelines from Berkeley Information Security Office
* **URL:** https://security.berkeley.edu/MSSND/patching-and-updates-guidelines
* **Publisher:** UC Berkeley
* **License:**
* **Type:** informal
* **Publication date:**
</details>
56
Vulnerability handlingVulnerability HandlingThis guidance from the UK’s National Cyber Security Centre highlights why and how organizations should ensure their hardware and software are regularly updated. It explains that manufacturers release updates not only for adding features but often to fix security vulnerabilities, and running out-of-date software or firmware leaves systems open to known attacks. The guidance provides advice such as enabling automatic updates on all devices where possible, using centralized update management for enterprise environments, monitoring for announcements of critical patches (especially for high-value assets), and having an inventory of software to quickly identify what needs updates. It also covers challenges like dealing with legacy systems that no longer receive updates—suggesting strategies like network isolation or virtualization in such cases until they can be retired. For home and small business users, the guidance emphasizes simple steps like keeping apps and operating systems on phones and PCs set to auto-update, and upgrading devices that no longer receive support. The NCSC frames staying up-to-date as one of the most accessible yet effective steps in cybersecurity hygiene for all users.https://www.ncsc.gov.uk/collection/device-security-guidance/managing-deployed-devices/keeping-devices-and-software-up-to-dateNCSC UKinformal29 June 2021* [](https://www.ncsc.gov.uk/collection/device-security-guidance/managing-deployed-devices/keeping-devices-and-software-up-to-date) - This guidance from the UK’s National Cyber Security Centre highlights why and how organizations should ensure their hardware and software are regularly updated. It explains that manufacturers release updates not only for adding features but often to fix security vulnerabilities, and running out-of-date software or firmware leaves systems open to known attacks. The guidance provides advice such as enabling automatic updates on all devices where possible, using centralized update management for enterprise environments, monitoring for announcements of critical patches (especially for high-value assets), and having an inventory of software to quickly identify what needs updates. It also covers challenges like dealing with legacy systems that no longer receive updates—suggesting strategies like network isolation or virtualization in such cases until they can be retired. For home and small business users, the guidance emphasizes simple steps like keeping apps and operating systems on phones and PCs set to auto-update, and upgrading devices that no longer receive support. The NCSC frames staying up-to-date as one of the most accessible yet effective steps in cybersecurity hygiene for all users.
<details>
<summary>More info</summary>

* **Title:**
* **URL:** https://www.ncsc.gov.uk/collection/device-security-guidance/managing-deployed-devices/keeping-devices-and-software-up-to-date
* **Publisher:** NCSC UK
* **License:**
* **Type:** informal
* **Publication date:** 44376
</details>
57
Secure DevelopmentPrinciples of security resilienceSecure design and secure coding principles
NIST SP 800-218: Secure Software Development Framework (SSDF) Version 1.1: Recommendations for Mitigating the Risk of Software Vulnerabilities
NIST’s Secure Software Development Framework is a set of recommended practices for integrating security into the software development life cycle. Version 1.1 of the SSDF (published in 2022) organizes these practices into four groups: Prepare the Organization (ensure the development team has the resources, training, and governance to produce secure code), Protect the Software (establish secure environments and tools, and protect code integrity – e.g., via version control protections and dependency management), Produce Well-Secured Software (implement security design, code, and testing practices – like threat modeling, static analysis, and code review – and address findings), and Respond to Vulnerabilities (define processes to handle internally and externally reported bugs in released software, including patching and communication). Each practice is described at a high level with mappings to more specific standards (like OWASP, ISO, etc.). The SSDF is meant to be adaptable: organizations of any size can implement its core tenets and can integrate them into existing development workflows (waterfall, Agile, DevOps, etc.). By following the SSDF, software producers minimize the introduction of vulnerabilities and establish a workflow to catch and fix security issues early, which ultimately leads to more secure products for end users.https://csrc.nist.gov/pubs/sp/800/218/finalNIST?informal2022Few software development life cycle (SDLC) models explicitly address software security in detail, so secure software development practices usually need to be added to each SDLC model to ensure that the software being developed is well-secured. This document recommends the Secure Software Development Framework (SSDF) – a core set of high-level secure software development practices that can be integrated into each SDLC implementation.UShttps://github.com/anthonyharrison* [NIST SP 800-218: Secure Software Development Framework (SSDF) Version 1.1: Recommendations for Mitigating the Risk of Software Vulnerabilities](https://csrc.nist.gov/pubs/sp/800/218/final) - NIST’s Secure Software Development Framework is a set of recommended practices for integrating security into the software development life cycle. Version 1.1 of the SSDF (published in 2022) organizes these practices into four groups: Prepare the Organization (ensure the development team has the resources, training, and governance to produce secure code), Protect the Software (establish secure environments and tools, and protect code integrity – e.g., via version control protections and dependency management), Produce Well-Secured Software (implement security design, code, and testing practices – like threat modeling, static analysis, and code review – and address findings), and Respond to Vulnerabilities (define processes to handle internally and externally reported bugs in released software, including patching and communication). Each practice is described at a high level with mappings to more specific standards (like OWASP, ISO, etc.). The SSDF is meant to be adaptable: organizations of any size can implement its core tenets and can integrate them into existing development workflows (waterfall, Agile, DevOps, etc.). By following the SSDF, software producers minimize the introduction of vulnerabilities and establish a workflow to catch and fix security issues early, which ultimately leads to more secure products for end users.
<details>
<summary>More info</summary>

* **Title:** NIST SP 800-218: Secure Software Development Framework (SSDF) Version 1.1: Recommendations for Mitigating the Risk of Software Vulnerabilities
* **URL:** https://csrc.nist.gov/pubs/sp/800/218/final
* **Publisher:** NIST
* **License:** ?
* **Type:** informal
* **Publication date:** 2022
</details>
58
Compliance requirementsSecurity attestation of free and open-source softwareOpenJS Ecosystem Sustainability Program (ESP)The OpenJS Ecosystem Sustainability Program (ESP) is an initiative by the OpenJS Foundation aimed at enhancing the security and longevity of widely-used but under-maintained JavaScript projects. Launched with HeroDevs as its inaugural partner, the program offers long-term support for legacy software, exemplified by the introduction of "Never-Ending Support" (NES) for Express.js. ESP is an opt-in, partner-driven model designed to secure outdated software and generate new revenue streams for OpenJS projects. By providing structured support for aging yet critical components of the JavaScript ecosystem, ESP addresses software supply chain risks and aligns with regulatory expectations for secure software maintenance, such as those outlined in the EU Cyber Resilience Act. https://openjsf.org/blog/ecosystem-sustainability-programOpenJSinformal2024* [OpenJS Ecosystem Sustainability Program (ESP)](https://openjsf.org/blog/ecosystem-sustainability-program) - The OpenJS Ecosystem Sustainability Program (ESP) is an initiative by the OpenJS Foundation aimed at enhancing the security and longevity of widely-used but under-maintained JavaScript projects. Launched with HeroDevs as its inaugural partner, the program offers long-term support for legacy software, exemplified by the introduction of "Never-Ending Support" (NES) for Express.js. ESP is an opt-in, partner-driven model designed to secure outdated software and generate new revenue streams for OpenJS projects. By providing structured support for aging yet critical components of the JavaScript ecosystem, ESP addresses software supply chain risks and aligns with regulatory expectations for secure software maintenance, such as those outlined in the EU Cyber Resilience Act.
<details>
<summary>More info</summary>

* **Title:** OpenJS Ecosystem Sustainability Program (ESP)
* **URL:** https://openjsf.org/blog/ecosystem-sustainability-program
* **Publisher:** OpenJS
* **License:**
* **Type:** informal
* **Publication date:** 2024
</details>
59
Vulnerability handlingVulnerability HandlingJavaScript SBOM and Software Attestation Challenges and RecommendationsThis resource is a collaborative report produced by the OpenJS Foundation’s security working group, addressing the practical challenges of implementing Software Bill of Materials (SBOM) and Cyber Supply Chain Risk Management (C-SCRM) in open source projects. It identifies key obstacles, such as generating comprehensive SBOMs, ensuring their accuracy and maintenance, and integrating supply chain security practices into development workflows, especially within widely-used JavaScript ecosystems. The document offers recommendations to mitigate these issues, advocating for improved tooling, standardized processes, and cross-project knowledge sharing to strengthen supply chain transparency and vulnerability management. By highlighting these challenges and solutions, the report provides guidance relevant to improving software security posture in line with emerging regulatory expectations (like those of the EU Cyber Resilience Act) that emphasize software supply chain integrity and documentation.
https://github.com/openjs-foundation/security-collab-space/blob/main/OpenJS-SBOM-CSCRM-Challenges-Recommendations.md
OpenJS Security Collaboration Spaceinformal2024* [JavaScript SBOM and Software Attestation Challenges and Recommendations](https://github.com/openjs-foundation/security-collab-space/blob/main/OpenJS-SBOM-CSCRM-Challenges-Recommendations.md) - This resource is a collaborative report produced by the OpenJS Foundation’s security working group, addressing the practical challenges of implementing Software Bill of Materials (SBOM) and Cyber Supply Chain Risk Management (C-SCRM) in open source projects. It identifies key obstacles, such as generating comprehensive SBOMs, ensuring their accuracy and maintenance, and integrating supply chain security practices into development workflows, especially within widely-used JavaScript ecosystems. The document offers recommendations to mitigate these issues, advocating for improved tooling, standardized processes, and cross-project knowledge sharing to strengthen supply chain transparency and vulnerability management. By highlighting these challenges and solutions, the report provides guidance relevant to improving software security posture in line with emerging regulatory expectations (like those of the EU Cyber Resilience Act) that emphasize software supply chain integrity and documentation.
<details>
<summary>More info</summary>

* **Title:** JavaScript SBOM and Software Attestation Challenges and Recommendations
* **URL:** https://github.com/openjs-foundation/security-collab-space/blob/main/OpenJS-SBOM-CSCRM-Challenges-Recommendations.md
* **Publisher:** OpenJS Security Collaboration Space
* **License:**
* **Type:** informal
* **Publication date:** 2024
</details>
60
Principles of security resilienceSecurity processes & governanceOWASP DevSecOps Maturity Model (DSOMM)The OWASP DevSecOps Maturity Model (DSOMM) is a framework that guides organizations in assessing and enhancing the integration of security within their DevOps processes. It defines multiple domains of software development and operations (such as source code, build pipelines, and deployment environments) and outlines progressive maturity levels for each domain, providing clear benchmarks for improvement. By using DSOMM, teams can identify gaps in their current DevSecOps practices and prioritize security measures—ranging from basic safeguards in continuous integration to advanced, automated security testing—appropriate to their maturity level. This model serves as a reference for building more secure development pipelines, aligning with broader software security best practices and supporting compliance efforts by ensuring that security controls are systematically embedded in the software lifecycle.https://dsomm.owasp.orgOWASPGPL-3
Maturity Model
2017 – present
DSOMM is a maturity model aimed at implementing DevSecOps best practices.
* [OWASP DevSecOps Maturity Model (DSOMM)](https://dsomm.owasp.org) - The OWASP DevSecOps Maturity Model (DSOMM) is a framework that guides organizations in assessing and enhancing the integration of security within their DevOps processes. It defines multiple domains of software development and operations (such as source code, build pipelines, and deployment environments) and outlines progressive maturity levels for each domain, providing clear benchmarks for improvement. By using DSOMM, teams can identify gaps in their current DevSecOps practices and prioritize security measures—ranging from basic safeguards in continuous integration to advanced, automated security testing—appropriate to their maturity level. This model serves as a reference for building more secure development pipelines, aligning with broader software security best practices and supporting compliance efforts by ensuring that security controls are systematically embedded in the software lifecycle.
<details>
<summary>More info</summary>

* **Title:** OWASP DevSecOps Maturity Model (DSOMM)
* **URL:** https://dsomm.owasp.org
* **Publisher:** OWASP
* **License:** GPL-3
* **Type:** Maturity Model
* **Publication date:** 2017 – present
</details>
61
Principles of security resilienceSecurity processes & governanceNIST Secure Software Development Framework (NIST SP 800-218)NIST Special Publication 800-218 defines the Secure Software Development Framework (SSDF) version 1.1, a set of high-level practices intended to integrate security throughout the software development life cycle. This framework, published by the National Institute of Standards and Technology in 2022, consolidates established secure development principles into four groups of practices (such as preparing the organization, protecting the software, producing well-secured software, and responding to vulnerabilities) that organizations can adopt irrespective of their development methodology. The SSDF’s guidance aims to reduce the number and impact of vulnerabilities in released software by encouraging actions like threat modeling, secure coding, code review, dependency management, and vulnerability disclosure processes, all described in a common vocabulary to facilitate communication between software producers and acquirers. Widely recognized in industry and government, SP 800-218 now serves as a baseline for software security programs. It is often referenced in regulatory and compliance contexts—for example, in U.S. federal supply chain security requirements and in discussions around the EU Cyber Resilience Act—as a means to ensure software is developed with security by design.https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-218.pdf
National Institute of Standards and Technology (NIST)
No License Required
Guidelines
2022-02 - present
SSDF is a set of community-derived and regulatory
* [NIST Secure Software Development Framework (NIST SP 800-218)](https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-218.pdf) - NIST Special Publication 800-218 defines the Secure Software Development Framework (SSDF) version 1.1, a set of high-level practices intended to integrate security throughout the software development life cycle. This framework, published by the National Institute of Standards and Technology in 2022, consolidates established secure development principles into four groups of practices (such as preparing the organization, protecting the software, producing well-secured software, and responding to vulnerabilities) that organizations can adopt irrespective of their development methodology. The SSDF’s guidance aims to reduce the number and impact of vulnerabilities in released software by encouraging actions like threat modeling, secure coding, code review, dependency management, and vulnerability disclosure processes, all described in a common vocabulary to facilitate communication between software producers and acquirers. Widely recognized in industry and government, SP 800-218 now serves as a baseline for software security programs. It is often referenced in regulatory and compliance contexts—for example, in U.S. federal supply chain security requirements and in discussions around the EU Cyber Resilience Act—as a means to ensure software is developed with security by design.
<details>
<summary>More info</summary>

* **Title:** NIST Secure Software Development Framework (NIST SP 800-218)
* **URL:** https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-218.pdf
* **Publisher:** National Institute of Standards and Technology (NIST)
* **License:** No License Required
* **Type:** Guidelines
* **Publication date:** 2022-02 - present
</details>
62
Vulnerability handlingVulnerability HandlingOpenSSF Outbound Vulnerability Disclosure Policy TemplateThe Open Source Security Foundation (OpenSSF) Outbound Vulnerability Disclosure Policy Template is a model policy document designed to guide organizations in responsibly disclosing security vulnerabilities they discover in external projects or products. This template adheres to the “Model Outbound Vulnerability Disclosure Policy” (version 0.1.1) and clarifies processes distinct from inbound vulnerability handling, focusing on how an organization should report a discovered vulnerability to the affected third party or vendor. It outlines recommended steps such as initial notification, coordination with the affected product’s security team or a relevant CERT, setting timelines for remediation and public disclosure, and conditions for involving outside stakeholders (for instance, regulators or the broader security community) if a vulnerability remains unaddressed. By following this template, organizations can establish a clear and consistent outbound disclosure practice, which contributes to the overall health of the software ecosystem and aligns with broader cybersecurity norms and compliance considerations that encourage transparency in vulnerability management across supply chains.
https://github.com/ossf/wg-vulnerability-disclosures/blob/main/docs/Outbound_Vulnerability_Disclosure_Policy_template.md
OpenSSFApache-2.0
Policy Template
2024- present* [OpenSSF Outbound Vulnerability Disclosure Policy Template](https://github.com/ossf/wg-vulnerability-disclosures/blob/main/docs/Outbound_Vulnerability_Disclosure_Policy_template.md) - The Open Source Security Foundation (OpenSSF) Outbound Vulnerability Disclosure Policy Template is a model policy document designed to guide organizations in responsibly disclosing security vulnerabilities they discover in external projects or products. This template adheres to the “Model Outbound Vulnerability Disclosure Policy” (version 0.1.1) and clarifies processes distinct from inbound vulnerability handling, focusing on how an organization should report a discovered vulnerability to the affected third party or vendor. It outlines recommended steps such as initial notification, coordination with the affected product’s security team or a relevant CERT, setting timelines for remediation and public disclosure, and conditions for involving outside stakeholders (for instance, regulators or the broader security community) if a vulnerability remains unaddressed. By following this template, organizations can establish a clear and consistent outbound disclosure practice, which contributes to the overall health of the software ecosystem and aligns with broader cybersecurity norms and compliance considerations that encourage transparency in vulnerability management across supply chains.
<details>
<summary>More info</summary>

* **Title:** OpenSSF Outbound Vulnerability Disclosure Policy Template
* **URL:** https://github.com/ossf/wg-vulnerability-disclosures/blob/main/docs/Outbound_Vulnerability_Disclosure_Policy_template.md
* **Publisher:** OpenSSF
* **License:** Apache-2.0
* **Type:** Policy Template
* **Publication date:** 2024- present
</details>
63
Principles of security resilienceSecurity processes & governanceOpenSSF Security Policy TemplatesThis resource is a collection of security policy templates provided by the Open Source Security Foundation’s Open Source Software Vulnerability Guide project to help open source maintainers create robust security policies for their projects. The templates include ready-made text and structure for documents like a project’s security policy or “SECURITY.md,” vulnerability reporting guidelines, and coordinated disclosure procedures, all of which maintainers can adapt to their specific needs. By offering standardized language covering aspects such as how to report vulnerabilities, expected response times, and how fixes and advisories will be communicated, these templates lower the barrier for projects to implement best practices in vulnerability management and communication. They are directly relevant to improving open source software resilience and assist projects in meeting expectations set by users and regulations (for instance, the EU Cyber Resilience Act’s call for clear vulnerability disclosure policies), ensuring that even smaller projects can align with industry standards in security process documentation.https://github.com/ossf/oss-vulnerability-guide/tree/main/templates/security_policiesOpenSSFApache-2.0
Policy Template
2022- present* [OpenSSF Security Policy Templates](https://github.com/ossf/oss-vulnerability-guide/tree/main/templates/security_policies) - This resource is a collection of security policy templates provided by the Open Source Security Foundation’s Open Source Software Vulnerability Guide project to help open source maintainers create robust security policies for their projects. The templates include ready-made text and structure for documents like a project’s security policy or “SECURITY.md,” vulnerability reporting guidelines, and coordinated disclosure procedures, all of which maintainers can adapt to their specific needs. By offering standardized language covering aspects such as how to report vulnerabilities, expected response times, and how fixes and advisories will be communicated, these templates lower the barrier for projects to implement best practices in vulnerability management and communication. They are directly relevant to improving open source software resilience and assist projects in meeting expectations set by users and regulations (for instance, the EU Cyber Resilience Act’s call for clear vulnerability disclosure policies), ensuring that even smaller projects can align with industry standards in security process documentation.
<details>
<summary>More info</summary>

* **Title:** OpenSSF Security Policy Templates
* **URL:** https://github.com/ossf/oss-vulnerability-guide/tree/main/templates/security_policies
* **Publisher:** OpenSSF
* **License:** Apache-2.0
* **Type:** Policy Template
* **Publication date:** 2022- present
</details>
64
Compliance requirementsSecurity attestation of free and open-source softwareFreeBSD SSDF AttestationIn November 2023, the FreeBSD Foundation announced the availability of a Secure Software Development Framework (SSDF) Attestation, a formal report that documents how the FreeBSD open-source operating system’s development practices align with NIST’s SSDF guidelines. This attestation was developed to assist commercial users of FreeBSD in meeting emerging security requirements—specifically, U.S. government software procurement rules that require suppliers to self-attest to following secure development practices (as mandated by NIST SP 800-218 and related OMB directives). The announcement highlights FreeBSD’s longstanding emphasis on security by design and explains that the attestation service allows vendors and cloud providers relying on FreeBSD to easily demonstrate that the upstream software meets recognized secure development criteria. By providing this attestation, the FreeBSD Foundation bridges open-source development with regulatory compliance needs, reflecting broader trends (in the U.S. and potentially in the EU through initiatives like the Cyber Resilience Act) to demand greater assurance of software supply chain security.
https://freebsdfoundation.org/news-and-events/latest-news/freebsd-foundation-announces-ssdf-attestation/
FreeBSD Foundation
Confidential
attestation
2024-11-03* [FreeBSD SSDF Attestation](https://freebsdfoundation.org/news-and-events/latest-news/freebsd-foundation-announces-ssdf-attestation/) - In November 2023, the FreeBSD Foundation announced the availability of a Secure Software Development Framework (SSDF) Attestation, a formal report that documents how the FreeBSD open-source operating system’s development practices align with NIST’s SSDF guidelines. This attestation was developed to assist commercial users of FreeBSD in meeting emerging security requirements—specifically, U.S. government software procurement rules that require suppliers to self-attest to following secure development practices (as mandated by NIST SP 800-218 and related OMB directives). The announcement highlights FreeBSD’s longstanding emphasis on security by design and explains that the attestation service allows vendors and cloud providers relying on FreeBSD to easily demonstrate that the upstream software meets recognized secure development criteria. By providing this attestation, the FreeBSD Foundation bridges open-source development with regulatory compliance needs, reflecting broader trends (in the U.S. and potentially in the EU through initiatives like the Cyber Resilience Act) to demand greater assurance of software supply chain security.
<details>
<summary>More info</summary>

* **Title:** FreeBSD SSDF Attestation
* **URL:** https://freebsdfoundation.org/news-and-events/latest-news/freebsd-foundation-announces-ssdf-attestation/
* **Publisher:** FreeBSD Foundation
* **License:** Confidential
* **Type:** attestation
* **Publication date:** 45599
</details>
65
Vulnerability handlingVulnerability HandlingFIRST PSIRT Services FrameworkThe FIRST PSIRT Services Framework version 1.1 is a comprehensive reference document that describes the range of services a Product Security Incident Response Team (PSIRT) can provide. Developed by the Forum of Incident Response and Security Teams (FIRST) with input from industry experts, it enumerates and defines service categories, services, and functions specific to PSIRTs, recognizing that product-focused incident response has unique considerations compared to traditional CSIRTs. The framework covers strategic, tactical, and operational facets of a PSIRT program—from stakeholder management and vulnerability handling processes to incident coordination and post-incident analysis—offering a structured vocabulary and model for organizations either establishing a new PSIRT or benchmarking an existing one. By standardizing what effective product security response entails, the PSIRT Services Framework helps organizations ensure they meet industry best practices and regulatory expectations for managing product vulnerabilities and incidents, an area increasingly significant under product security regulations and guidelines (including parallels to the EU Cyber Resilience Act’s focus on post-market security).https://www.first.org/standards/frameworks/psirts/psirt_services_framework_v1.1FIRSTPublic Domain
Framework
2015-present
Guidance on how to create, manage, and operate a Product Security Incident Repsonse Team (PSIRT)
* [FIRST PSIRT Services Framework](https://www.first.org/standards/frameworks/psirts/psirt_services_framework_v1.1) - The FIRST PSIRT Services Framework version 1.1 is a comprehensive reference document that describes the range of services a Product Security Incident Response Team (PSIRT) can provide. Developed by the Forum of Incident Response and Security Teams (FIRST) with input from industry experts, it enumerates and defines service categories, services, and functions specific to PSIRTs, recognizing that product-focused incident response has unique considerations compared to traditional CSIRTs. The framework covers strategic, tactical, and operational facets of a PSIRT program—from stakeholder management and vulnerability handling processes to incident coordination and post-incident analysis—offering a structured vocabulary and model for organizations either establishing a new PSIRT or benchmarking an existing one. By standardizing what effective product security response entails, the PSIRT Services Framework helps organizations ensure they meet industry best practices and regulatory expectations for managing product vulnerabilities and incidents, an area increasingly significant under product security regulations and guidelines (including parallels to the EU Cyber Resilience Act’s focus on post-market security).
<details>
<summary>More info</summary>

* **Title:** FIRST PSIRT Services Framework
* **URL:** https://www.first.org/standards/frameworks/psirts/psirt_services_framework_v1.1
* **Publisher:** FIRST
* **License:** Public Domain
* **Type:** Framework
* **Publication date:** 2015-present
</details>
66
Vulnerability handlingVulnerability HandlingFIRST PSIRT Services Maturity GuidanceThe FIRST PSIRT Maturity Document is a guidance framework aimed at helping organizations develop and improve their Product Security Incident Response Team capabilities over time. It builds upon the PSIRT Services Framework by outlining a maturity model—describing foundational levels and more advanced stages of PSIRT development—to illustrate how a team can evolve from basic operational readiness to a fully mature, proactive product security program. The document emphasizes essential early steps, such as securing executive sponsorship, defining clear policies (aligned with standards like ISO/IEC 29147 and 30111 for vulnerability disclosure and handling), and establishing core processes for vulnerability triage and response, before progressing to more sophisticated functions. Through this staged approach, the PSIRT Maturity guide enables organizations to assess their current state and identify priorities for enhancement, ensuring that even as regulatory and customer expectations for robust vulnerability response increase, the organization can methodically reach higher levels of preparedness and effectiveness.https://www.first.org/standards/frameworks/psirts/psirt_maturity_documentFIRSTPublic Domain
Framework
2015-present
Guidance on how to demostrate Operational Capabiulity and Maturity for PSIRTs
* [FIRST PSIRT Services Maturity Guidance](https://www.first.org/standards/frameworks/psirts/psirt_maturity_document) - The FIRST PSIRT Maturity Document is a guidance framework aimed at helping organizations develop and improve their Product Security Incident Response Team capabilities over time. It builds upon the PSIRT Services Framework by outlining a maturity model—describing foundational levels and more advanced stages of PSIRT development—to illustrate how a team can evolve from basic operational readiness to a fully mature, proactive product security program. The document emphasizes essential early steps, such as securing executive sponsorship, defining clear policies (aligned with standards like ISO/IEC 29147 and 30111 for vulnerability disclosure and handling), and establishing core processes for vulnerability triage and response, before progressing to more sophisticated functions. Through this staged approach, the PSIRT Maturity guide enables organizations to assess their current state and identify priorities for enhancement, ensuring that even as regulatory and customer expectations for robust vulnerability response increase, the organization can methodically reach higher levels of preparedness and effectiveness.
<details>
<summary>More info</summary>

* **Title:** FIRST PSIRT Services Maturity Guidance
* **URL:** https://www.first.org/standards/frameworks/psirts/psirt_maturity_document
* **Publisher:** FIRST
* **License:** Public Domain
* **Type:** Framework
* **Publication date:** 2015-present
</details>
67
Vulnerability handlingVulnerability HandlingFIRST CSIRT Services FrameworkThe FIRST CSIRT Services Framework version 2.1 is a standardized taxonomy of services for Computer Security Incident Response Teams (CSIRTs), providing a structured description of the possible activities and functions such teams can perform. Co-developed by experts in the FIRST community (with support from groups like TF-CSIRT and the International Telecommunication Union), this framework lists core service categories—such as incident handling, alerts and warnings, vulnerability management, and other cybersecurity services—and breaks them down into specific sub-services and functions with clear definitions. It is intended to guide CSIRTs in defining or expanding their service portfolios, ensuring consistency in terminology and understanding across the incident response community. As the de facto reference for CSIRT operations, version 2.1 helps new and existing teams align with internationally recognized practices, which is valuable for meeting the expectations of frameworks like the EU NIS Directive/NIS2 and complementing the broader regulatory push (including the EU Cyber Resilience Act) for well-structured cybersecurity incident management capabilities.https://www.first.org/standards/frameworks/csirts/csirt_services_framework_v2.1FIRSTPublic Domain
Framework
2015-present
Guidance on how to create, manage, and operate a Computer Security Incident Repsonse Team (CSIRT)
* [FIRST CSIRT Services Framework](https://www.first.org/standards/frameworks/csirts/csirt_services_framework_v2.1) - The FIRST CSIRT Services Framework version 2.1 is a standardized taxonomy of services for Computer Security Incident Response Teams (CSIRTs), providing a structured description of the possible activities and functions such teams can perform. Co-developed by experts in the FIRST community (with support from groups like TF-CSIRT and the International Telecommunication Union), this framework lists core service categories—such as incident handling, alerts and warnings, vulnerability management, and other cybersecurity services—and breaks them down into specific sub-services and functions with clear definitions. It is intended to guide CSIRTs in defining or expanding their service portfolios, ensuring consistency in terminology and understanding across the incident response community. As the de facto reference for CSIRT operations, version 2.1 helps new and existing teams align with internationally recognized practices, which is valuable for meeting the expectations of frameworks like the EU NIS Directive/NIS2 and complementing the broader regulatory push (including the EU Cyber Resilience Act) for well-structured cybersecurity incident management capabilities.
<details>
<summary>More info</summary>

* **Title:** FIRST CSIRT Services Framework
* **URL:** https://www.first.org/standards/frameworks/csirts/csirt_services_framework_v2.1
* **Publisher:** FIRST
* **License:** Public Domain
* **Type:** Framework
* **Publication date:** 2015-present
</details>
68
Compliance requirementsSecurity attestation of free and open-source softwareSecure Software Development Attestation FormIn March 2024, the Cybersecurity and Infrastructure Security Agency (CISA) and the U.S. Office of Management and Budget (OMB) jointly released the Secure Software Development Attestation Form
This document serves as a compliance mechanism under federal cybersecurity initiatives, requiring software producers to affirm adherence to National Institute of Standards and Technology (NIST) secure software development guidelines in accordance with Executive Order 14028 and OMB memoranda M-22-18 and M-23-16
The form’s purpose is to provide assurance that any software used by federal agencies is securely developed, effectively enforcing minimum secure development standards and toolsets among vendors. By tying this attestation to U.S. federal procurement, the government compels software suppliers to demonstrate compliance with specified development practices, and failure to provide a signed attestation may result in agencies discontinuing use of the software. Overall, the resource establishes a uniform attestation process that supports regulatory compliance and strengthens the security of the software supply chain in government acquisitions.
https://www.cisa.gov/resources-tools/resources/secure-software-development-attestation-form
CISAPublic DomainForm2024* [Secure Software Development Attestation Form](https://www.cisa.gov/resources-tools/resources/secure-software-development-attestation-form) - In March 2024, the Cybersecurity and Infrastructure Security Agency (CISA) and the U.S. Office of Management and Budget (OMB) jointly released the Secure Software Development Attestation Form
This document serves as a compliance mechanism under federal cybersecurity initiatives, requiring software producers to affirm adherence to National Institute of Standards and Technology (NIST) secure software development guidelines in accordance with Executive Order 14028 and OMB memoranda M-22-18 and M-23-16
The form’s purpose is to provide assurance that any software used by federal agencies is securely developed, effectively enforcing minimum secure development standards and toolsets among vendors. By tying this attestation to U.S. federal procurement, the government compels software suppliers to demonstrate compliance with specified development practices, and failure to provide a signed attestation may result in agencies discontinuing use of the software. Overall, the resource establishes a uniform attestation process that supports regulatory compliance and strengthens the security of the software supply chain in government acquisitions.
<details>
<summary>More info</summary>

* **Title:** Secure Software Development Attestation Form
* **URL:** https://www.cisa.gov/resources-tools/resources/secure-software-development-attestation-form
* **Publisher:** CISA
* **License:** Public Domain
* **Type:** Form
* **Publication date:** 2024
</details>
69
Vulnerability HandlingOpenStack Vulnerability Management ProcessThe OpenStack VMT Process describes how OpenStack manages security vulnerabilities through coordinated disclosure. It outlines the responsibilities of the independent VMT, including prompt vulnerability resolution, limiting early information exposure, and structured handling from initial report receipt to embargoed disclosure. The process involves confidential reporting channels, internal patch review, drafting impact descriptions, and brief embargo periods. Each issue receives dedicated coordination, including CVE assignment and release scheduling. The documented practices align with industry standards for coordinated vulnerability disclosure and multi-party incident handling.https://security.openstack.org/vmt-process.html
OpenStack Community
CC-BY-3.0informal2011 – present
Subsequently adapted by many other communities and early inspiration for standards like those compiled by CII/OpenSSF
* [OpenStack Vulnerability Management Process](https://security.openstack.org/vmt-process.html) - The OpenStack VMT Process describes how OpenStack manages security vulnerabilities through coordinated disclosure. It outlines the responsibilities of the independent VMT, including prompt vulnerability resolution, limiting early information exposure, and structured handling from initial report receipt to embargoed disclosure. The process involves confidential reporting channels, internal patch review, drafting impact descriptions, and brief embargo periods. Each issue receives dedicated coordination, including CVE assignment and release scheduling. The documented practices align with industry standards for coordinated vulnerability disclosure and multi-party incident handling.
<details>
<summary>More info</summary>

* **Title:** OpenStack Vulnerability Management Process
* **URL:** https://security.openstack.org/vmt-process.html
* **Publisher:** OpenStack Community
* **License:** CC-BY-3.0
* **Type:** informal
* **Publication date:** 2011 – present
</details>
70
Security attestation of free and open-source softwarePHP Security Policies and ProcessPHP’s Security Policies and Process is a meta-policy outlining PHP’s approach to vulnerability disclosure and maintenance of public security information via the security.txt file. It directs maintainers on keeping vulnerability reporting channels clear and up-to-date, linking internal security handling with external communications. The document ensures that the security.txt is updated consistently, aligning PHP’s processes with established best practices and regulatory frameworks, such as the EU Cyber Resilience Act, by providing clarity and transparency in vulnerability disclosure.https://github.com/php/policies/blob/main/security-policies.rstPHP Project
none but CC-BY-4.0 proposed
informal2024 – present
Just initial info about managing security.txt file but it should contain more info in the future
* [PHP Security Policies and Process](https://github.com/php/policies/blob/main/security-policies.rst) - PHP’s Security Policies and Process is a meta-policy outlining PHP’s approach to vulnerability disclosure and maintenance of public security information via the security.txt file. It directs maintainers on keeping vulnerability reporting channels clear and up-to-date, linking internal security handling with external communications. The document ensures that the security.txt is updated consistently, aligning PHP’s processes with established best practices and regulatory frameworks, such as the EU Cyber Resilience Act, by providing clarity and transparency in vulnerability disclosure.
<details>
<summary>More info</summary>

* **Title:** PHP Security Policies and Process
* **URL:** https://github.com/php/policies/blob/main/security-policies.rst
* **Publisher:** PHP Project
* **License:** none but CC-BY-4.0 proposed
* **Type:** informal
* **Publication date:** 2024 – present
</details>
71
Vulnerability HandlingPHP Vulnerability Disclosure PolicyPHP’s Security Issue Classification document defines which PHP bugs constitute security vulnerabilities and categorizes them into Low, Medium, and High severity based on their potential impact and ease of exploitation. High severity issues typically allow serious compromises and receive CVE identifiers, whereas Low severity issues pose limited risks. The document outlines private handling procedures for high-risk vulnerabilities and public bug-fix approaches for lower-risk issues. It sets clear reporting guidelines and supports structured, coordinated vulnerability disclosure aligned with industry practices.https://github.com/php/policies/blob/main/security-classification.rstPHP Project
none but CC-BY-4.0 proposed
informal2023 – present
Security issues classification and their handling
* [PHP Vulnerability Disclosure Policy](https://github.com/php/policies/blob/main/security-classification.rst) - PHP’s Security Issue Classification document defines which PHP bugs constitute security vulnerabilities and categorizes them into Low, Medium, and High severity based on their potential impact and ease of exploitation. High severity issues typically allow serious compromises and receive CVE identifiers, whereas Low severity issues pose limited risks. The document outlines private handling procedures for high-risk vulnerabilities and public bug-fix approaches for lower-risk issues. It sets clear reporting guidelines and supports structured, coordinated vulnerability disclosure aligned with industry practices.
<details>
<summary>More info</summary>

* **Title:** PHP Vulnerability Disclosure Policy
* **URL:** https://github.com/php/policies/blob/main/security-classification.rst
* **Publisher:** PHP Project
* **License:** none but CC-BY-4.0 proposed
* **Type:** informal
* **Publication date:** 2023 – present
</details>
72
Vulnerability HandlingRFC 9116RFC 9116 defines the “security.txt” standard, providing a standardized file format for organizations to publish their vulnerability disclosure policies and security contact information. The RFC addresses the absence of clear reporting mechanisms, presenting a machine-readable structure with fields for contact information, encryption details, acknowledgments, policy links, and expiration dates. Widely adopted despite its informational status, RFC 9116 facilitates improved communication between vulnerability reporters and software maintainers, enhancing coordinated disclosure processes and aligning with regulatory requirements such as the EU Cyber Resilience Act.https://www.rfc-editor.org/rfc/rfc9116IETF
IETF Trust Legal Provisions (TLP)
RFC2022
A File Format to Aid in Security Vulnerability Disclosure
* [RFC 9116](https://www.rfc-editor.org/rfc/rfc9116) - RFC 9116 defines the “security.txt” standard, providing a standardized file format for organizations to publish their vulnerability disclosure policies and security contact information. The RFC addresses the absence of clear reporting mechanisms, presenting a machine-readable structure with fields for contact information, encryption details, acknowledgments, policy links, and expiration dates. Widely adopted despite its informational status, RFC 9116 facilitates improved communication between vulnerability reporters and software maintainers, enhancing coordinated disclosure processes and aligning with regulatory requirements such as the EU Cyber Resilience Act.
<details>
<summary>More info</summary>

* **Title:** RFC 9116
* **URL:** https://www.rfc-editor.org/rfc/rfc9116
* **Publisher:** IETF
* **License:** IETF Trust Legal Provisions (TLP)
* **Type:** RFC
* **Publication date:** 2022
</details>
73
Security processes & governancePHP release processThe PHP Release Process outlines detailed procedures for PHP version releases, specifically highlighting steps for security-focused updates. It distinguishes between regular updates and security releases, requiring explicit labeling and careful scheduling to optimize user response. Release managers follow structured preparation steps including testing, packaging, and documentation, with clear guidance on announcements emphasizing the urgency of security patches. By standardizing this communication and release strategy, PHP maintains transparency and meets coordinated disclosure standards expected by compliance frameworks.https://github.com/php/php-src/blob/master/docs/release-process.mdPHP projectPHP 3.01informal2007 – present
It includes some info about releasing of security fixes
* [PHP release process](https://github.com/php/php-src/blob/master/docs/release-process.md) - The PHP Release Process outlines detailed procedures for PHP version releases, specifically highlighting steps for security-focused updates. It distinguishes between regular updates and security releases, requiring explicit labeling and careful scheduling to optimize user response. Release managers follow structured preparation steps including testing, packaging, and documentation, with clear guidance on announcements emphasizing the urgency of security patches. By standardizing this communication and release strategy, PHP maintains transparency and meets coordinated disclosure standards expected by compliance frameworks.
<details>
<summary>More info</summary>

* **Title:** PHP release process
* **URL:** https://github.com/php/php-src/blob/master/docs/release-process.md
* **Publisher:** PHP project
* **License:** PHP 3.01
* **Type:** informal
* **Publication date:** 2007 – present
</details>
74
Vulnerability HandlingASF Classification of vulnerabiltiesThe Apache Software Foundation (ASF) introduced a standardized vulnerability severity rating system classifying issues into Low, Moderate, Important, and Critical levels based on their exploitability and potential impact. Critical vulnerabilities involve remote exploitation without prerequisites, while lower levels require specific conditions or have less severe implications. This simplified severity rating complements the CVSS system, offering clear, consistent assessments across ASF projects, thereby aiding administrators in prioritizing vulnerability responses and improving coordinated disclosure clarity.https://security.apache.org/blog/severityrating/ASFASLv2practice2023
Captures lessons learned and best practices around vulnerability classification; Improves upon similar scales used by Microsoft, OpenSSL, Red Hat various Apache projects]
* [ASF Classification of vulnerabilties](https://security.apache.org/blog/severityrating/) - The Apache Software Foundation (ASF) introduced a standardized vulnerability severity rating system classifying issues into Low, Moderate, Important, and Critical levels based on their exploitability and potential impact. Critical vulnerabilities involve remote exploitation without prerequisites, while lower levels require specific conditions or have less severe implications. This simplified severity rating complements the CVSS system, offering clear, consistent assessments across ASF projects, thereby aiding administrators in prioritizing vulnerability responses and improving coordinated disclosure clarity.
<details>
<summary>More info</summary>

* **Title:** ASF Classification of vulnerabilties
* **URL:** https://security.apache.org/blog/severityrating/
* **Publisher:** ASF
* **License:** ASLv2
* **Type:** practice
* **Publication date:** 2023
</details>
75
Vulnerability HandlingGeneric ASF vulnerability reporting process
The ASF Security Policies provide guidelines for reporting and handling vulnerabilities across Apache projects. It emphasizes confidential initial reporting, centralized tracking by the ASF Security Team, and CVE coordination. The policy clearly defines exclusions, instructs users on the correct reporting channels, and outlines a structured response including confidential handling, private fix coordination, and public advisory issuance. These policies ensure consistency in vulnerability management, aligning ASF projects with coordinated disclosure best practices and regulatory expectations, such as the EU Cyber Resilience Act.
https://apache.org/security/ASFASLv2policycurrent
Generic process for reporting a vulnerability (i.e. not project specific)
* [Generic ASF vulnerability reporting process](https://apache.org/security/) - The ASF Security Policies provide guidelines for reporting and handling vulnerabilities across Apache projects. It emphasizes confidential initial reporting, centralized tracking by the ASF Security Team, and CVE coordination. The policy clearly defines exclusions, instructs users on the correct reporting channels, and outlines a structured response including confidential handling, private fix coordination, and public advisory issuance. These policies ensure consistency in vulnerability management, aligning ASF projects with coordinated disclosure best practices and regulatory expectations, such as the EU Cyber Resilience Act.
<details>
<summary>More info</summary>

* **Title:** Generic ASF vulnerability reporting process
* **URL:** https://apache.org/security/
* **Publisher:** ASF
* **License:** ASLv2
* **Type:** policy
* **Publication date:** current
</details>
76
Vulnerability HandlingGeneric ASF handling process for vulnerabilities

The ASF’s Committers’ Guidelines detail a comprehensive process for Apache project maintainers responding to vulnerabilities. It emphasizes confidentiality, structured routing of reports, prompt acknowledgment, private investigation, CVE identification, and coordinated patch development. The resolution phase includes internal advisory preparation and reporter collaboration, followed by synchronized public announcements of patches and advisories. Post-disclosure, the guidelines mandate website updates and CVE documentation. These detailed procedures align with international standards and legal obligations for coordinated vulnerability disclosure.
https://apache.org/security/committers.htmlASFASLv2policycurrent
Generic process for developers to follow when handling a vulnerability report (i.e. not project/risk specific)
* [Generic ASF handling process for vulnerabilities](https://apache.org/security/committers.html) -

The ASF’s Committers’ Guidelines detail a comprehensive process for Apache project maintainers responding to vulnerabilities. It emphasizes confidentiality, structured routing of reports, prompt acknowledgment, private investigation, CVE identification, and coordinated patch development. The resolution phase includes internal advisory preparation and reporter collaboration, followed by synchronized public announcements of patches and advisories. Post-disclosure, the guidelines mandate website updates and CVE documentation. These detailed procedures align with international standards and legal obligations for coordinated vulnerability disclosure.
<details>
<summary>More info</summary>

* **Title:** Generic ASF handling process for vulnerabilities
* **URL:** https://apache.org/security/committers.html
* **Publisher:** ASF
* **License:** ASLv2
* **Type:** policy
* **Publication date:** current
</details>
77
Vulnerability HandlingGuide to coordinated vulnerability disclosure for open source software projectsThe Open Source Security Foundation’s (OpenSSF) Guide to Coordinated Vulnerability Disclosure educates open-source maintainers about structured vulnerability management. It describes the coordinated disclosure lifecycle, from preparation and initial reporting through confidential assessment, remediation under embargo, and public disclosure. The guide provides practical templates, emphasizes proactive planning, and is informed by industry best practices. This resource supports the implementation of consistent disclosure practices in open-source communities, assisting maintainers in meeting regulatory demands and improving overall software security maturity.https://github.com/ossf/oss-vulnerability-guideOpenSSFCC-BY-4.0
Guidance, templates, and advise for how open source projects and security researchers can better coordinate vulnerability disclosures together
2022 – present* [Guide to coordinated vulnerability disclosure for open source software projects](https://github.com/ossf/oss-vulnerability-guide) - The Open Source Security Foundation’s (OpenSSF) Guide to Coordinated Vulnerability Disclosure educates open-source maintainers about structured vulnerability management. It describes the coordinated disclosure lifecycle, from preparation and initial reporting through confidential assessment, remediation under embargo, and public disclosure. The guide provides practical templates, emphasizes proactive planning, and is informed by industry best practices. This resource supports the implementation of consistent disclosure practices in open-source communities, assisting maintainers in meeting regulatory demands and improving overall software security maturity.
<details>
<summary>More info</summary>

* **Title:** Guide to coordinated vulnerability disclosure for open source software projects
* **URL:** https://github.com/ossf/oss-vulnerability-guide
* **Publisher:** OpenSSF
* **License:** CC-BY-4.0
* **Type:** Guidance, templates, and advise for how open source projects and security researchers can better coordinate vulnerability disclosures together
* **Publication date:** 2022 – present
</details>
78
Vulnerability HandlingGuidelines and Practices for Multi-Party Vulnerability Coordination and DisclosureFIRST’s Multiparty Vulnerability Coordination Guidelines provide a framework for managing vulnerabilities affecting multiple stakeholders. It addresses the complexities of contemporary software ecosystems, advocating for robust advanced planning, clear communication, minimal exposure of sensitive information, and rapid response to leaks. The guidelines include practical use-case scenarios and advice on roles, embargo timelines, and public communication strategies, complementing existing ISO standards. This structured approach ensures effective coordination in complex disclosure situations, enhancing cybersecurity resilience.https://www.first.org/global/sigs/vulnerability-coordination/multiparty/guidelines-v1.1
Forum of Incident Response and Security Teams (FIRST)
none
Guidelines for handling coordiantion of complex (multiparty) vulnerabilities
2020* [Guidelines and Practices for Multi-Party Vulnerability Coordination and Disclosure](https://www.first.org/global/sigs/vulnerability-coordination/multiparty/guidelines-v1.1) - FIRST’s Multiparty Vulnerability Coordination Guidelines provide a framework for managing vulnerabilities affecting multiple stakeholders. It addresses the complexities of contemporary software ecosystems, advocating for robust advanced planning, clear communication, minimal exposure of sensitive information, and rapid response to leaks. The guidelines include practical use-case scenarios and advice on roles, embargo timelines, and public communication strategies, complementing existing ISO standards. This structured approach ensures effective coordination in complex disclosure situations, enhancing cybersecurity resilience.
<details>
<summary>More info</summary>

* **Title:** Guidelines and Practices for Multi-Party Vulnerability Coordination and Disclosure
* **URL:** https://www.first.org/global/sigs/vulnerability-coordination/multiparty/guidelines-v1.1
* **Publisher:** Forum of Incident Response and Security Teams (FIRST)
* **License:** none
* **Type:** Guidelines for handling coordiantion of complex (multiparty) vulnerabilities
* **Publication date:** 2020
</details>
79
Vulnerability HandlingThe CERT® Guide to Coordinated Vulnerability DisclosureThe CERT Guide to Coordinated Vulnerability Disclosure introduces foundational principles, stakeholders, and process phases for managing software vulnerabilities responsibly. It emphasizes the necessity of coordination to protect users from exploitation, detailing intake, triage, remediation, and disclosure phases. The guide highlights common challenges and provides practical operational advice aligned with ISO standards. Serving as a foundational resource, it supports organizations in establishing or enhancing their vulnerability disclosure capabilities, relevant to national and international cybersecurity regulatory frameworks.https://insights.sei.cmu.edu/documents/1945/2017_003_001_503340.pdf
CERT-CC/Software Engineering Institure (SEI) at Carnegie Mellon University
None - approved for public release and unlimited distribution
Guide* [The CERT® Guide to Coordinated Vulnerability Disclosure](https://insights.sei.cmu.edu/documents/1945/2017_003_001_503340.pdf) - The CERT Guide to Coordinated Vulnerability Disclosure introduces foundational principles, stakeholders, and process phases for managing software vulnerabilities responsibly. It emphasizes the necessity of coordination to protect users from exploitation, detailing intake, triage, remediation, and disclosure phases. The guide highlights common challenges and provides practical operational advice aligned with ISO standards. Serving as a foundational resource, it supports organizations in establishing or enhancing their vulnerability disclosure capabilities, relevant to national and international cybersecurity regulatory frameworks.
<details>
<summary>More info</summary>

* **Title:** The CERT® Guide to Coordinated Vulnerability Disclosure
* **URL:** https://insights.sei.cmu.edu/documents/1945/2017_003_001_503340.pdf
* **Publisher:** CERT-CC/Software Engineering Institure (SEI) at Carnegie Mellon University
* **License:** None - approved for public release and unlimited distribution
* **Type:** Guide
* **Publication date:**
</details>
80
Vulnerability HandlingEUCC Scheme Guidelines on Vulnerability Management and Disclosure
ENISA’s EUCC Vulnerability Management and Disclosure Guidelines detail requirements for vulnerability management under the EU Common Criteria certification scheme. It outlines structured internal management procedures and disclosure obligations, mandating confidential information sharing with authorities following vulnerability resolution. The guidelines ensure certified products maintain robust vulnerability management programs and compliance with EU regulatory requirements, integrating international standards into daily cybersecurity practices for manufacturers and evaluation facilities.
https://certification.enisa.europa.eu/document/download/5f61edd4-0151-4687-8a08-c11c103498f3_en?filename=EUCC_guidelines_vulnerability%20management%20and%20disclosure_v1.1_0.pdf
European Union Agency for Cybersecurity (ENISA)
CC-BY-ND 4.0 DEED
Guidelines for the EUCC Scheme
2025* [EUCC Scheme Guidelines on Vulnerability Management and Disclosure](https://certification.enisa.europa.eu/document/download/5f61edd4-0151-4687-8a08-c11c103498f3_en?filename=EUCC_guidelines_vulnerability%20management%20and%20disclosure_v1.1_0.pdf) - ENISA’s EUCC Vulnerability Management and Disclosure Guidelines detail requirements for vulnerability management under the EU Common Criteria certification scheme. It outlines structured internal management procedures and disclosure obligations, mandating confidential information sharing with authorities following vulnerability resolution. The guidelines ensure certified products maintain robust vulnerability management programs and compliance with EU regulatory requirements, integrating international standards into daily cybersecurity practices for manufacturers and evaluation facilities.
<details>
<summary>More info</summary>

* **Title:** EUCC Scheme Guidelines on Vulnerability Management and Disclosure
* **URL:** https://certification.enisa.europa.eu/document/download/5f61edd4-0151-4687-8a08-c11c103498f3_en?filename=EUCC_guidelines_vulnerability%20management%20and%20disclosure_v1.1_0.pdf
* **Publisher:** European Union Agency for Cybersecurity (ENISA)
* **License:** CC-BY-ND 4.0 DEED
* **Type:** Guidelines for the EUCC Scheme
* **Publication date:** 2025
</details>
81
Software Identification for Cybersecurity: Survey and Recommendations for RegulatorsThis paper provides a comprehensive overview of how software components—especially open-source elements—can be uniquely identified to improve cybersecurity. It examines current challenges in software identification and reviews existing identifier schemes, highlighting issues like naming inconsistencies and ephemerality. In response, the authors advocate for Software Heritage persistent IDs (SWHIDs), which are content-derived, permanent identifiers, as a unified solution for tracking software artifacts across systems. The report emphasizes that SWHIDs would facilitate better vulnerability management and transparency, aligning with emerging regulatory requirements (such as the EU Cyber Resilience Act and U.S. executive orders) by ensuring every component in the supply chain can be traced and verified in a stable, tool-agnostic manner.https://swhsec.github.io/pdf/swhid_for_cybersecurity_regulations.pdf
Olivier Barais, Roberto Di Cosmo, Ludovic Mé, Stefano Zacchiroli, and Olivier Zendra
Not specified
Technical report (survey & policy recommendations)
2025
Surveys existing software component identification methods and proposes persistent content-based identifiers (SWHIDs) to help meet new software supply chain security regulations.
* [Software Identification for Cybersecurity: Survey and Recommendations for Regulators](https://swhsec.github.io/pdf/swhid_for_cybersecurity_regulations.pdf) - This paper provides a comprehensive overview of how software components—especially open-source elements—can be uniquely identified to improve cybersecurity. It examines current challenges in software identification and reviews existing identifier schemes, highlighting issues like naming inconsistencies and ephemerality. In response, the authors advocate for Software Heritage persistent IDs (SWHIDs), which are content-derived, permanent identifiers, as a unified solution for tracking software artifacts across systems. The report emphasizes that SWHIDs would facilitate better vulnerability management and transparency, aligning with emerging regulatory requirements (such as the EU Cyber Resilience Act and U.S. executive orders) by ensuring every component in the supply chain can be traced and verified in a stable, tool-agnostic manner.
<details>
<summary>More info</summary>

* **Title:** Software Identification for Cybersecurity: Survey and Recommendations for Regulators
* **URL:** https://swhsec.github.io/pdf/swhid_for_cybersecurity_regulations.pdf
* **Publisher:** Olivier Barais, Roberto Di Cosmo, Ludovic Mé, Stefano Zacchiroli, and Olivier Zendra
* **License:** Not specified
* **Type:** Technical report (survey & policy recommendations)
* **Publication date:** 2025
</details>
82
The Minimum Elements for a Software Bill of Materials (SBOM)
This official report outlines the fundamental requirements for a minimum Software Bill of Materials (SBOM) as part of a national cybersecurity initiative. It specifies the core data elements that an SBOM should contain (such as component names, versions, and suppliers), along with the need for machine-readable formats and automated tooling to generate and use SBOMs at scale. The document also describes basic organizational processes for maintaining SBOMs and leveraging them in managing software vulnerabilities and license compliance. Issued under the directive of a U.S. Executive Order aimed at improving cybersecurity, the report establishes a common baseline for SBOM content and practices, laying a foundation for greater transparency in software supply chains while noting potential extensions for future use cases beyond the minimum requirements.
https://www.ntia.doc.gov/files/ntia/publications/sbom_minimum_elements_report.pdfUnited States Department of Commerce (NTIA)Public Domain
Government report (cybersecurity guidance)
2021
Defines the baseline data fields, automation support, and processes that constitute a minimum SBOM, to promote software supply chain transparency and vulnerability management under U.S. cybersecurity policy.
* [The Minimum Elements for a Software Bill of Materials (SBOM) ](https://www.ntia.doc.gov/files/ntia/publications/sbom_minimum_elements_report.pdf) - This official report outlines the fundamental requirements for a minimum Software Bill of Materials (SBOM) as part of a national cybersecurity initiative. It specifies the core data elements that an SBOM should contain (such as component names, versions, and suppliers), along with the need for machine-readable formats and automated tooling to generate and use SBOMs at scale. The document also describes basic organizational processes for maintaining SBOMs and leveraging them in managing software vulnerabilities and license compliance. Issued under the directive of a U.S. Executive Order aimed at improving cybersecurity, the report establishes a common baseline for SBOM content and practices, laying a foundation for greater transparency in software supply chains while noting potential extensions for future use cases beyond the minimum requirements.
<details>
<summary>More info</summary>

* **Title:** The Minimum Elements for a Software Bill of Materials (SBOM)
* **URL:** https://www.ntia.doc.gov/files/ntia/publications/sbom_minimum_elements_report.pdf
* **Publisher:** United States Department of Commerce (NTIA)
* **License:** Public Domain
* **Type:** Government report (cybersecurity guidance)
* **Publication date:** 2021
</details>
83
Technical Guideline TR-03183: Cyber Resilience Requirements for Manufacturers and Products
This technical guideline from Germany’s BSI delineates a set of cyber resilience requirements for product manufacturers, aligned with the EU’s upcoming Cyber Resilience Act (CRA). Divided into multiple parts, it covers general security obligations for products (e.g. applying a risk-based approach and securing the software development lifecycle), detailed specifications for creating and delivering a Software Bill of Materials (SBOM) for products, and procedures for handling vulnerability disclosures and notifications. The guideline translates the CRA’s regulatory expectations into concrete technical criteria and practices—for instance, defining what information an SBOM should include and how manufacturers should set up processes to receive and address vulnerability reports. By providing this framework in advance of the CRA’s full enforcement, the document helps industry stakeholders bolster software security and compliance, ensuring that products with digital elements are developed and maintained in line with emerging European cybersecurity standards.https://www.bsi.bund.de/dok/TR-03183-enFederal Office for Information Security (BSI), GermanyNot specified
Technical Guideline (draft regulatory standard)
2023
Provides manufacturers with early guidance on forthcoming EU Cyber Resilience Act requirements, including general product security measures, SBOM provisions, and vulnerability reporting processes
* [Technical Guideline TR-03183: Cyber Resilience Requirements for Manufacturers and Products](https://www.bsi.bund.de/dok/TR-03183-en) - This technical guideline from Germany’s BSI delineates a set of cyber resilience requirements for product manufacturers, aligned with the EU’s upcoming Cyber Resilience Act (CRA). Divided into multiple parts, it covers general security obligations for products (e.g. applying a risk-based approach and securing the software development lifecycle), detailed specifications for creating and delivering a Software Bill of Materials (SBOM) for products, and procedures for handling vulnerability disclosures and notifications. The guideline translates the CRA’s regulatory expectations into concrete technical criteria and practices—for instance, defining what information an SBOM should include and how manufacturers should set up processes to receive and address vulnerability reports. By providing this framework in advance of the CRA’s full enforcement, the document helps industry stakeholders bolster software security and compliance, ensuring that products with digital elements are developed and maintained in line with emerging European cybersecurity standards.
<details>
<summary>More info</summary>

* **Title:** Technical Guideline TR-03183: Cyber Resilience Requirements for Manufacturers and Products
* **URL:** https://www.bsi.bund.de/dok/TR-03183-en
* **Publisher:** Federal Office for Information Security (BSI), Germany
* **License:** Not specified
* **Type:** Technical Guideline (draft regulatory standard)
* **Publication date:** 2023
</details>
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100