Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Notifications of new VEX #9

Open
pdxjohnny opened this issue Jan 31, 2023 · 3 comments
Open

Notifications of new VEX #9

pdxjohnny opened this issue Jan 31, 2023 · 3 comments

Comments

@pdxjohnny
Copy link

pdxjohnny commented Jan 31, 2023

Are there any docs on how it is envisioned downstreams can be notified of new VEX? Hoping we can see this eventing integrated into transparency log infra federation to enable automated evaluation on new vulns via recursive application of policy and context local transparency services (see ID security threats WG notes in linked SCITT PR).

@puerco
Copy link
Member

puerco commented Jun 14, 2023

Hey @pdxjohnny, We don't have any at the moment, this week we started discussing some of the discovery/delivery means for OpenVEX data in the community call. It is not yet online on the OpenSSF youtube channel but be sure to check it out when it's uploaded (community meeting of Jun 12th).

We are working on the tooling to publish OpenVEX data through repositories and OCI registries, but I'm sure the SIG would love to hear more ideas, please feel free to join and share your thoughts.

@pdxjohnny
Copy link
Author

pdxjohnny commented Jun 14, 2023

Awesome!! I appreciate you letting me know. Glad to hear others are going with OCI registries as well. https://oras.land tooling has been helpful.

@pdxjohnny
Copy link
Author

pdxjohnny commented Oct 20, 2023

Above linked PR mentions claims with payload as VEX for reference to in SCITT and leveraging federation to receive events of new VEX ^

From @charliehart
https://mailarchive.ietf.org/arch/msg/scitt/aNCUl-1aRR5NXxajGHzfk4j6ak8/

The VEX document(s) are good candidates for SCITT especially for two key reasons:

  1. There is no restriction on who can generate one (same for SBOM BTW) and it is essential to understand whether the issuer is trustworthy and/or any kind of source of authority.
  2. A VEX, unlike an SBOM, can be issued at any time and in fact multiple VEXes and CSAFs will be the norm rather than exception.

But to facilitate this, there has to be a way to connect related VEXes and CSAFs (including with any applicable SBOMs, software attestations, and other similar data.

OpenVEX’s JSON-LD definition might be helpful for those connections.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants