Skip to content

Commit

Permalink
Merge pull request #12 from siemens/feat/security-policy
Browse files Browse the repository at this point in the history
feat: add a default security policy
  • Loading branch information
nejch authored Sep 29, 2023
2 parents 317e0a0 + 48d12e6 commit d3d097e
Show file tree
Hide file tree
Showing 2 changed files with 25 additions and 0 deletions.
1 change: 1 addition & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,3 +4,4 @@ This repository contains files related to many or all repositories withing the `

- the [Siemens Contributor License Agreement](cla/) and related automation
- the [Siemens organization profile](profile/)
- a [default security policy](SECURITY.md) for repositories that don't have their own
24 changes: 24 additions & 0 deletions SECURITY.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,24 @@
# Security Policy

Siemens takes the security of its code seriously. If you think you have found a security vulnerability,
please read the next sections and follow the instructions to report your finding.

## Scope of this policy

This is the default security policy for all repositories within the `siemens` organization on GitHub.com.

It does not apply for reposities that have their own security policy.
It also does not apply for forks where you should follow the upstream policy instead.

If you are unsure whether the policy applies feel free to reach out via the channels mentioned below and we'll be happy to help.

## Reporting a Vulnerability

Please DO NOT report any potential security vulnerability via a public channel (mailing list, GitHub issue, etc.).
Instead, [report the vulnerability privately via GitHub](https://docs.github.com/en/code-security/security-advisories/guidance-on-reporting-and-writing/privately-reporting-a-security-vulnerability)
(if enabled for the repository) or [contact us via email](mailto:[email protected]).

Please provide a detailed description of the issue, the steps to reproduce it, the affected version(s) and, if already available,
a proposal for a fix. You should receive a response within 5 working days. If for some reason you do not, please follow up via email to ensure we received your original message.

If we confirm the issue as a vulnerability, we will publish an advisory (e.g. on GitHub) and give credits for your report if desired. We follow the [coordinated vulnerability disclosure](https://vuls.cert.org/confluence/display/CVD) model and will define an appropriate disclosure timeline together with you.

0 comments on commit d3d097e

Please sign in to comment.