Scott,
I think I may be in a similar position to you. I am a co-developer along with another collaborator on an open-source product that is maintained on GitHub and distributed via PyPi;
https://github.com/rjb4standards/CISASAGReader
My Company, Business Cyber Guardian™, supports the CISASAGReader open-source product but is not receiving any economic benefits. It’s not a heavy lift to maintain, except for the occasional VDR checking and updates that may occur (about
10 minutes per week). No new feature enhancements are planned so the other artifacts will remain static at release 1.0.4.
I'm not too concerned about the EU-CRA "open-source software steward" obligations
IF it only requires providing the following items to comply:
Could this group of artifacts provided with the CISASAGReader open-source product (see tble below) also serve as a model for what
Open Source Stewards should provide to satisfy EU-CRA expectations for transparency and Secure by Design/Default?
How long did it take to produce the CISASAGReader SBOM, VDR, VRF and CISA Software Acquisition Guide Spreadsheet?
I’m hoping to receive confirmation of this “set of artifact” as being sufficient to comply with EU-CRA “open source software steward” obligations OR receive guidance on what else is needed.
I can live with this set of artifacts knowing how much time it takes to create them (shown above), which occurs once per release, with ongoing checking for new vulnerabilities (about 10 minutes per week and any time required to update
the VDR accordingly – usually zero minutes)
Thanks,
Dick Brooks
Active Member of the CISA Critical Manufacturing Sector,
Sector Coordinating Council – A Public-Private Partnership
Never trust software, always verify and report! ™
Risk always exists, but trust must be earned and awarded.™
https://businesscyberguardian.com/
Email:
dick@xxxxxxxxxxxxxxxxxxxxxxxxx
Tel: +1 978-696-1788
-----Original Message-----
From: open-regulatory-compliance
<open-regulatory-compliance-bounces@xxxxxxxxxxx> On Behalf Of Scott Lewis via open-regulatory-compliance
Sent: Thursday, December 19, 2024 3:28 PM
To:
open-regulatory-compliance@xxxxxxxxxxx
Cc: Scott Lewis
<slewis@xxxxxxxxxxxxx>
Subject: Re: [open-regulatory-compliance] Maintainer considering removing project due to CRA obligations and uncertainty
Howdy,
On 12/19/2024 9:32 AM, Seth Michael Larson via open-regulatory-compliance wrote:
> Thanks all for the replies, here are some thoughts from me:
>
> > I'd be particularly interested in a description of the minimum steps
> required to transfer CRA responsibilities to a FLOSS steward, say
> hypothetically the PSF or a cooperative of Python consultants.
>
> I'm not sure the PSF or any other foundation like it is in a position
> to absorb all projects under, in our example, PyPI. However, we still
> have our eyes on lowering the bar, for example I have plans this
> upcoming year to make complying with the "vulnerability reporting" and
> "market surveillance compliance" easier for maintainers.
Although I support every desire and effort to make things easier for maintainers, I can tell you:
1) The Eclipse project I maintain (ECF) is independent committer led (me)
2) Is a -1 dependency for the Eclipse IDE...we provide the file transfer (e.g. https/ssl) api for Eclipse implemented by multiple third-party provided impls (e.g. httpclient).
3) As part of the Eclipse Platform, ECF filetransfer (at least) will likely be subject to vulnerabilities and regulations applying to the Eclipse IDE install/update mechanism (called equinox p2) and our third-party dependencies (equinox,
provider impls, Eclipse Platform).
> Things like an official location for a security policy, report a
> vulnerability, and a process for contacting all relevant market
> surveillance groups (CISA, ENISA, etc) in the case of actively
> exploited vulnerabilities. I think these sorts of developments are
> much more within our resourcing. That doesn't provide the resourcing
> and time it takes to operate those facilities (so is still a burden on
> solo-and-low-maintainer projects), but at least there's more clarity
> about what is actually needed from folks and for external groups to
> not "spook" maintainers with official and legalese-sounding emails
> that you are now legally obligated not to ignore.
Although I have only read some of the DCA and am not a lawyer, and appreciate the efforts that went into having a category of open source 'steward' recognized in the DCA, currently there is every reason to expect that if faced with the
burdens under discussion, I would be/am 'spooked' in a way similar to Seth's colleague.
I know that I do not have the personal resources even to continue as the project steward, cannot absorb the additional maintenance burden (e.g.
responding to and addressing vulnerabilities or procedure), and certainly cannot/will not absorb new legal risk.
FWIW, I do think that there should be additional thought in this group to the 'open source steward spooking' problem identified by Seth.
Scott
https://eclipse.org/ecf
_______________________________________________
open-regulatory-compliance mailing list
open-regulatory-compliance@xxxxxxxxxxx
To unsubscribe from this list, visit
https://accounts.eclipse.org