Third-Party Component Security Review Procedure (ENG-PROC-002)
1. Purpose
The purpose of this procedure is to define the steps for scanning, reviewing, and approving the use of new open-source or commercial software components to minimize security and licensing risks.
2. Scope
This procedure applies to all new open-source and commercial third-party software components, libraries, and dependencies being considered for inclusion in company software.
3. Overview
This procedure describes the process for managing the security of third-party components. It begins with a developer proposing a new component, followed by automated scanning, a formal review of the results by engineering and security teams, and concludes with a documented approval or denial.
4. Procedure
Step | Who | What |
---|---|---|
1 | Developer | Proposes the use of a new third-party component by creating an issue ticket and documenting the component’s purpose and source. |
2 | Developer / CI/CD Pipeline | Uses automated Software Composition Analysis (SCA) tools to scan the component for known vulnerabilities (CVEs) and potential software license compliance issues. |
3 | Development Team Lead & Security Team | Review the SCA scan results. They assess the severity of any identified vulnerabilities and the implications of the component’s license. |
4 | Development Team | If significant vulnerabilities are found, the team shall create a remediation plan (e.g., wait for a patched version) or formally document a risk acceptance rationale. |
5 | Development Team Lead | Based on the review and any remediation plan, formally approves or denies the use of the component in the project documentation or ticket. |
5. Standards Compliance
Procedure Step(s) | Standard/Framework | Control Reference |
---|---|---|
1-5 | SOC 2 | CC8.1 |
1-5 | NIST SP 800-161 |
6. Artifact(s)
A record of the SCA scan results and a formal approval or denial for the component in the project documentation or tracking system.
7. Definitions
SCA (Software Composition Analysis): An automated process that identifies the open-source software in a codebase to evaluate security, license compliance, and code quality.
CVE (Common Vulnerabilities and Exposures): A list of publicly disclosed computer security flaws.
8. Responsibilities
Role | Responsibility |
---|---|
Developer | Proposes new components and initiates the SCA scan. |
Development Team Lead | Reviews scan results, makes the final decision on component use, and ensures proper documentation. |
Security Team | Assists in reviewing SCA scan results, provides guidance on vulnerability risk, and reviews risk acceptance cases. |