Skip to content

Commit c4628df

Browse files
hindermathclaude
andcommitted
chore: propagate security guidance from home-baseline v1.12.0
- Sicherheitsdokumentation section updated to (XII-XVIII Extensions) with all 10 templates - Sicherheitsstandards section expanded with Principle XIX (EU Cyber Resilience Act) - setup-git-identity Known Pitfall added to CLAUDE.md - constitution.md: Principles XVI (SBOM all levels + automated tooling), XVII (CIA matrix mandatory), XIX (EU CRA) synced Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
1 parent 79f75bc commit c4628df

5 files changed

Lines changed: 94 additions & 12 deletions

File tree

.github/copilot-instructions.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -228,18 +228,23 @@ Diese Regeln gelten für alle Repositories in diesem Workspace. Projektspezifisc
228228
- Änderungen an dieser Regel erfordern ein gemeinsames Update in `constitution.md`, `.specify/memory/constitution.md`, `AGENTS.md`, `CLAUDE.md`, `GEMINI.md` und `.github/copilot-instructions.md`.
229229

230230
*AI-generated and human-written software architecture MUST follow secure-architecture principles. Authoritative rules: `constitution.md`, Principle XIII. Core principles: trust boundaries (validate all input at system boundaries), defense in depth (at least two independent security layers), least privilege (minimum required permissions), fail-safe defaults (deny by default), attack surface reduction (disable unused features), separation of concerns (auth/logging/validation as cross-cutting concerns), secure configuration (secrets in secret stores, never in code or Git), supply-chain security (verified registries, lock files, no known-vulnerable dependencies). Principles XII + XIII together form the complete secure-development approach: XII = tactical code-level security, XIII = strategic architecture-level security. Changes require a joint update across `constitution.md`, `.specify/memory/constitution.md`, and all four agent guidance files.*
231-
## Sicherheitsdokumentation / Security Documentation (XII/XIII Extensions)
231+
## Sicherheitsdokumentation / Security Documentation (XII–XVIII Extensions)
232232

233233
- Jedes Level-2-Projekt MUSS die folgenden Sicherheitsdokumente pflegen, basierend auf den Templates in `.specify/templates/`:
234-
- **Bedrohungsmodell / Threat Model** (`threat-model-template.md`) — STRIDE-Methodik, Trust Boundaries, Risikobewertung (Prinzip XIII)
234+
- **Bedrohungsmodell / Threat Model** (`threat-model-template.md`) — STRIDE-Methodik, Trust Boundaries, Risikobewertung, CAPEC-Referenzen (Prinzip XIII + XVII)
235235
- **Security Architecture Decision Records (S-ADR)** (`adr-template.md`) — architektonische Sicherheitsentscheidungen mit Compliance-Nachweis (Prinzip XIII)
236236
- **arc42 Section 8 Sicherheits-Querschnittskonzepte** (`arc42-security-template.md`) — Authentifizierung, Autorisierung, Verschlüsselung, Eingabevalidierung, Fehlerbehandlung, Logging, Abhängigkeiten, Deployment (Prinzip XIII)
237237
- **Sicherheits-Checkliste / Security Checklist** (`security-checklist-template.md`) — sprachspezifische Code-Review-Checkliste (Prinzip XII)
238238
- **Abhängigkeits-Audit / Dependency Audit** (`dependency-audit-template.md`) — CVE-Tracking, Lizenz-Compliance, Supply-Chain-Sicherheit (Prinzip XII)
239239
- **Sicherheits-Qualitätsszenarien / Security Quality Scenarios** (`security-quality-scenarios-template.md`) — iSAQB CPSA-F Qualitätsszenario-Methodik (Prinzip XII + XIII, SHOULD)
240+
- **ASVS-Verifikation / ASVS Verification** (`asvs-verification-template.md`) — OWASP ASVS Level, Scope und Evidenz (Prinzip XV, Web-/API-Projekte MUST)
241+
- **Supply-Chain-Evidenz / Supply Chain Evidence** (`supply-chain-evidence-template.md`) — SBOM, VEX, SLSA, OpenSSF Scorecard (Prinzip XVI, releasefähige Projekte MUST)
242+
- **Zero-Trust-Anwendbarkeit / Zero Trust Applicability** (`zero-trust-applicability-template.md`) — NIST SP 800-207-Bewertung (Prinzip XVIII, verteilte Systeme SHOULD)
243+
- **SAMM-Bewertung / SAMM Assessment** (`samm-assessment-template.md`) — OWASP SAMM Reifegrad und Verbesserungsplan (Prinzip XVIII, langlebige Projekte SHOULD)
240244
- Projektspezifische Instanzen werden in `docs/security/` gepflegt; S-ADRs als einzelne Dateien in `docs/security/adr/`.
241245

242-
*Every Level-2 project MUST maintain security documents based on templates in `.specify/templates/`: threat model (STRIDE), S-ADRs, arc42 Section 8 security concepts, security checklist, dependency audit, and security quality scenarios (SHOULD). Project-specific instances live in `docs/security/`; S-ADRs in `docs/security/adr/`. See `constitution.md`, Principles XII and XIII for authoritative requirements.*
246+
*Every Level-2 project MUST maintain security documents based on templates in `.specify/templates/`: threat model (STRIDE+CAPEC), S-ADRs, arc42 Section 8 security concepts, security checklist, dependency audit, security quality scenarios (SHOULD), ASVS verification (web/API MUST), supply-chain evidence (release-capable MUST), Zero Trust applicability note (distributed systems SHOULD), and SAMM assessment (long-lived projects SHOULD). Project-specific instances live in `docs/security/`; S-ADRs in `docs/security/adr/`. See `constitution.md`, Principles XII–XVIII for authoritative requirements.*
247+
243248
## Gemeinsame Governance-Ergaenzung / Shared Governance Addendum
244249

245250
- Alle nutzerseitigen Artefakte muessen barrierefrei gedacht und geprueft werden: CLI-Ausgaben, Dokumentation, HTML, UI und generierte Templates; WCAG 2.2 Level AA ist die Standard-Basis, sobald die Kriterien auf das Artefakt anwendbar sind.

.specify/memory/constitution.md

Lines changed: 67 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -572,9 +572,13 @@ Secure development MUST include transparency about what is shipped and how it
572572
was produced.
573573

574574
Mandatory rules:
575-
- Every release-capable or distributable Level-2 project MUST generate a
576-
machine-readable `SBOM` for each released artefact set. The SBOM MAY be
577-
stored as a release asset and/or mirrored in `docs/security/`.
575+
- Every release-capable or distributable project at ALL workspace levels
576+
(Level-0, Level-1, Level-2) MUST generate a machine-readable `SBOM` for
577+
each released artefact set. SBOM generation is mandatory regardless of
578+
whether the SBOM is published externally. The SBOM MAY be stored as a
579+
release asset and/or in `docs/security/`. This reflects the forthcoming
580+
requirements of the EU Cyber Resilience Act (CRA) and established industry
581+
best practice.
578582
- When a released or evaluated component has a known vulnerability that is
579583
relevant to consumers or reviewers, the project MUST publish or record a
580584
`VEX`-style status statement indicating whether the product is affected,
@@ -587,6 +591,18 @@ Mandatory rules:
587591
- Public OSS repositories and the adoption of high-impact external
588592
dependencies SHOULD consider `OpenSSF Scorecard` findings (or an equivalent
589593
source of repository security posture evidence) before release or adoption.
594+
- Dependency tracking SHOULD use automated tooling in preference to manual
595+
static documentation. Preferred approaches:
596+
- **Automated update PRs**: Renovatebot or Dependabot SHOULD be configured
597+
to open PRs automatically for outdated or vulnerable dependencies. This is
598+
established best practice for all projects regardless of level.
599+
- **Continuous SBOM/CVE tracking**: Tools such as Dependency Track (which
600+
accepts SBOM artefacts from CI pipelines and continuously monitors CVE
601+
status and license compliance) SHOULD be preferred over periodic manual
602+
audits wherever the project's hosting infrastructure supports it.
603+
- Static dependency audit documents (`dependency-audit-template.md`) serve
604+
as supplementary evidence for release decisions, exceptions, and risk
605+
acceptance — not as a replacement for automated tooling.
590606
- Dependency, SBOM, VEX, provenance, and Scorecard evidence MUST feed into the
591607
repository's dependency audit and release review process.
592608
- Release-capable projects MUST maintain a supply-chain evidence document using
@@ -597,13 +613,21 @@ Mandatory rules:
597613
**Rationale**: A project can follow secure coding rules and still ship opaque
598614
or tampered artefacts. SBOM, VEX, SLSA, and Scorecard address transparency,
599615
integrity, and supplier trustworthiness across the software supply chain.
616+
Automated tooling (Renovatebot/Dependabot, Dependency Track) dramatically
617+
reduces the manual overhead of dependency management and removes the gap
618+
between policy and enforcement that static documentation cannot close.
600619

601620
### XVII. Threat Modeling & Attack Pattern Coverage
602621

603622
Threat modeling MUST describe both what the system values and how it can be
604623
attacked.
605624

606625
Mandatory rules:
626+
- Every Level-2 threat model MUST include an **asset inventory with a CIA
627+
matrix** (Confidentiality/Integrity/Availability, rated High/Medium/Low/Not
628+
applicable). The CIA rating determines protection requirements and informs
629+
STRIDE prioritisation: assets rated High in Confidentiality or Integrity
630+
MUST be addressed with at least Defense-in-Depth controls (Principle XIII).
607631
- Every Level-2 threat model MUST use `STRIDE` as the base categorization
608632
scheme, as already required by Principle XIII.
609633
- Threat models SHOULD reference relevant `CAPEC` attack patterns for the
@@ -658,6 +682,46 @@ and cloud deployment; SAMM addresses the maturity of the development program
658682
itself. Together they keep security architecture and security process moving
659683
forward instead of freezing at a one-time baseline.
660684

685+
### XIX. EU Cyber Resilience Act (CRA) Compliance Awareness
686+
687+
Software placed on the EU market is subject to the Cyber Resilience Act
688+
(Regulation (EU) 2024/2847), which establishes mandatory cybersecurity
689+
requirements for products with digital elements. This principle requires
690+
that all workspace projects maintain awareness of CRA applicability and
691+
align their practices accordingly.
692+
693+
Mandatory rules:
694+
- All projects MUST assess whether their software qualifies as a "product
695+
with digital elements" under the CRA (commercial sale, licensing, or
696+
free distribution for economic purposes within the EU market). Even
697+
open-source projects distributed for economic benefit may fall in scope.
698+
- CRA-scoped projects MUST generate SBOMs for each released version (see
699+
Principle XVI — this requirement applies at all levels for this reason).
700+
- CRA-scoped projects MUST implement a documented vulnerability disclosure
701+
and handling process. Actively exploited vulnerabilities MUST be reported
702+
to relevant authorities within 24 hours and patched within established
703+
deadlines per the CRA.
704+
- CRA-scoped projects MUST document their conformity assessment approach
705+
(self-assessment for most products; third-party assessment for critical
706+
or important products under Annex III/IV of the CRA).
707+
- All projects SHOULD align security practices with CRA principles
708+
regardless of formal scope applicability, as the CRA reflects emerging
709+
industry baseline expectations for secure software development:
710+
secure-by-design, secure-by-default, vulnerability management, lifecycle
711+
transparency, and SBOM availability.
712+
- The CRA applicability decision MUST be recorded in `docs/security/` or
713+
equivalent governance documentation (e.g., as a note in the supply-chain
714+
evidence document or a dedicated S-ADR).
715+
716+
**Rationale**: The EU Cyber Resilience Act (in force since December 2024,
717+
with compliance deadlines phased through 2027) is the most significant
718+
EU regulatory development in software security since GDPR. It codifies
719+
many existing best practices — SBOM, vulnerability disclosure, secure
720+
development lifecycle, security-by-design — as legal obligations for
721+
software placed on the EU market. Recording CRA applicability and aligning
722+
practices proactively reduces legal and reputational risk and builds on the
723+
security work already required by Principles XII–XVIII.
724+
661725
## Level-2 Project Environment Registry / Level-2-Projektumgebungsregister
662726

663727
This registry consolidates the constitution-relevant Level-2 project facts

AGENTS.md

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -213,18 +213,23 @@ Each machine runs InventarWorkerService (REST agent)
213213
- Änderungen an dieser Regel erfordern ein gemeinsames Update in `constitution.md`, `.specify/memory/constitution.md`, `AGENTS.md`, `CLAUDE.md`, `GEMINI.md` und `.github/copilot-instructions.md`.
214214

215215
*AI-generated and human-written software architecture MUST follow secure-architecture principles. Authoritative rules: `constitution.md`, Principle XIII. Core principles: trust boundaries (validate all input at system boundaries), defense in depth (at least two independent security layers), least privilege (minimum required permissions), fail-safe defaults (deny by default), attack surface reduction (disable unused features), separation of concerns (auth/logging/validation as cross-cutting concerns), secure configuration (secrets in secret stores, never in code or Git), supply-chain security (verified registries, lock files, no known-vulnerable dependencies). Principles XII + XIII together form the complete secure-development approach: XII = tactical code-level security, XIII = strategic architecture-level security. Changes require a joint update across `constitution.md`, `.specify/memory/constitution.md`, and all four agent guidance files.*
216-
## Sicherheitsdokumentation / Security Documentation (XII/XIII Extensions)
216+
## Sicherheitsdokumentation / Security Documentation (XII–XVIII Extensions)
217217

218218
- Jedes Level-2-Projekt MUSS die folgenden Sicherheitsdokumente pflegen, basierend auf den Templates in `.specify/templates/`:
219-
- **Bedrohungsmodell / Threat Model** (`threat-model-template.md`) — STRIDE-Methodik, Trust Boundaries, Risikobewertung (Prinzip XIII)
219+
- **Bedrohungsmodell / Threat Model** (`threat-model-template.md`) — STRIDE-Methodik, Trust Boundaries, Risikobewertung, CAPEC-Referenzen (Prinzip XIII + XVII)
220220
- **Security Architecture Decision Records (S-ADR)** (`adr-template.md`) — architektonische Sicherheitsentscheidungen mit Compliance-Nachweis (Prinzip XIII)
221221
- **arc42 Section 8 Sicherheits-Querschnittskonzepte** (`arc42-security-template.md`) — Authentifizierung, Autorisierung, Verschlüsselung, Eingabevalidierung, Fehlerbehandlung, Logging, Abhängigkeiten, Deployment (Prinzip XIII)
222222
- **Sicherheits-Checkliste / Security Checklist** (`security-checklist-template.md`) — sprachspezifische Code-Review-Checkliste (Prinzip XII)
223223
- **Abhängigkeits-Audit / Dependency Audit** (`dependency-audit-template.md`) — CVE-Tracking, Lizenz-Compliance, Supply-Chain-Sicherheit (Prinzip XII)
224224
- **Sicherheits-Qualitätsszenarien / Security Quality Scenarios** (`security-quality-scenarios-template.md`) — iSAQB CPSA-F Qualitätsszenario-Methodik (Prinzip XII + XIII, SHOULD)
225+
- **ASVS-Verifikation / ASVS Verification** (`asvs-verification-template.md`) — OWASP ASVS Level, Scope und Evidenz (Prinzip XV, Web-/API-Projekte MUST)
226+
- **Supply-Chain-Evidenz / Supply Chain Evidence** (`supply-chain-evidence-template.md`) — SBOM, VEX, SLSA, OpenSSF Scorecard (Prinzip XVI, releasefähige Projekte MUST)
227+
- **Zero-Trust-Anwendbarkeit / Zero Trust Applicability** (`zero-trust-applicability-template.md`) — NIST SP 800-207-Bewertung (Prinzip XVIII, verteilte Systeme SHOULD)
228+
- **SAMM-Bewertung / SAMM Assessment** (`samm-assessment-template.md`) — OWASP SAMM Reifegrad und Verbesserungsplan (Prinzip XVIII, langlebige Projekte SHOULD)
225229
- Projektspezifische Instanzen werden in `docs/security/` gepflegt; S-ADRs als einzelne Dateien in `docs/security/adr/`.
226230

227-
*Every Level-2 project MUST maintain security documents based on templates in `.specify/templates/`: threat model (STRIDE), S-ADRs, arc42 Section 8 security concepts, security checklist, dependency audit, and security quality scenarios (SHOULD). Project-specific instances live in `docs/security/`; S-ADRs in `docs/security/adr/`. See `constitution.md`, Principles XII and XIII for authoritative requirements.*
231+
*Every Level-2 project MUST maintain security documents based on templates in `.specify/templates/`: threat model (STRIDE+CAPEC), S-ADRs, arc42 Section 8 security concepts, security checklist, dependency audit, security quality scenarios (SHOULD), ASVS verification (web/API MUST), supply-chain evidence (release-capable MUST), Zero Trust applicability note (distributed systems SHOULD), and SAMM assessment (long-lived projects SHOULD). Project-specific instances live in `docs/security/`; S-ADRs in `docs/security/adr/`. See `constitution.md`, Principles XII–XVIII for authoritative requirements.*
232+
228233
## Sicherheitsstandards & Anwendbarkeit / Security Standards & Applicability
229234

230235
- Vor jeder Level-2-Aufgabe die anwendbaren Sicherheitsstandards aus `constitution.md`, Prinzipien XIV-XVIII bestimmen und explizit benennen.
@@ -237,6 +242,7 @@ Each machine runs InventarWorkerService (REST agent)
237242
- Nichtanwendbarkeit immer als `N/A` mit kurzer Begründung dokumentieren; keine stillschweigende Auslassung.
238243

239244
*At the start of every Level-2 task, determine and name the applicable security standards from `constitution.md`, Principles XIV-XVIII. `NIST SSDF` and `CWE Top 25` always apply. `OWASP ASVS` applies to web/API/HTTP/auth-bearing services; `SBOM` applies to releasable or distributable artefacts; `VEX` applies when known vulnerabilities in shipped/evaluated components need a disposition statement. `SLSA` is the target model for CI/CD and published artefacts; `Zero Trust` must be explicitly evaluated for distributed, service-based, cloud, or remotely managed systems. `CAPEC`, `OWASP SAMM`, `OWASP Cheat Sheet Series`, `OWASP Proactive Controls`, and `OpenSSF Scorecard` are supporting references where relevant. Record non-applicability as `N/A` with justification rather than omitting it silently.*
245+
240246
## Agentischer Security-Workflow / Agentic Security Workflow
241247

242248
- In `spec.md`, `plan.md` und `tasks.md` die anwendbaren Standards samt Evidenzpfad festhalten.

0 commit comments

Comments
 (0)