Hi folks,

I was lucky enough to attend the ASF Board face2face strategy meeting
that was held immediately before the Community over Code EU. I don't
speak for the board and don't want to steal their thunder but I did
want to give our community a heads-up of changes coming our way. I'm
sure there will be more discussions from the ASF on these topics in
the coming weeks and months.

Two of the big priorities for the board are to help projects meet
Cyber Resilience Act (CRA) requirements and reduce the burden on
projects for things like board reporting. There will be good and bad
aspects of the CRA, but my feeling for us is that once some ASF
tooling (still under discussion) is in place, we'll be able to produce
higher quality releases with lower burdens on the project.

For those that haven't brushed up on the CRA recently, a quick summary follows.

A few weeks ago, the European commission added digital software
products as products covered under the Product Liability Directive.
The CRA will fully roll out over the next 3 years with increasing
requirements coming into play over time. This means that there will be
an increased burden on projects within the open source
ecosystem/supply chain.

Similar initiatives are following in other regions over the coming
years. The EU has just been the first to get the legislation enacted.

Some of the requirements will likely be:
* CVE Processes
* Risk Based triage
* Responsible Disclosure
* SBOM publication
* Reproducible builds
* Explicit reporting/alerts to the regulators
* Release artifacts not built on an individual release manager's laptop

For us, we are already in a reasonable position but if the ASF wasn't
planning to do more, there would certainly be further burdens.

The CRA talks about "manufacturers" who have many requirements and
"open source stewards" who have fewer. The ASF is an open source
steward. Their current thinking (at the board level) is that they
would like to make meeting the (open source steward level of) CRA
requirements as easy as possible for their projects. That is good news
for us. Some of the things we do in our release builds might move into
common tooling, so we won't have to maintain that part.

Now, before everyone gets too pessimistic that the CRA might destroy
our industry, I want to point out that I have given a super condensed
version of the situation. There is provision for hobby open source,
research projects, and micro-businesses, where the CRA requirements
may not apply. There are grey areas like testing tools and static
analysis tools (think codenarc) which never end up in a digital
product. There's fuzziness around software-as-a-service scenarios.
There is also a risk-based assessment of products that may or may not
harm a human being. So, I am not trying to give a definitive picture,
just a heads-up.

My guess on how this might impact us is:

* We will likely need to make further build improvements around
quality. Eventually some of this will be taken over by
foundation-level tooling.
* We will need to get more rigorous around EOL statements for old
versions. In at least one place for instance, we have some warm fuzzy
words "not actively supported ... but if the community provides a
patch, we may apply it". Under CRA that won't be good enough. It is
either "fit for commercial purposes" with reasonable CVE delays, or it
must be EOL.
* While some projects within our ecosystem may not be affected, there
is likely to be some which prefer the comfort of being part of a
well-established software steward. If that happens, we might need to
help them enter the ASF (or elsewhere) or consider adding them as
Groovy subprojects.

I don't see any immediate action points, just wanted to give you all a
heads-up. If others are more intimately involved with the CRA, please
feel free to add any clarification, in particular if you think I
haven't quite got the details correct. Some of this is still quite new
to me and I have taken liberties in summarizing to keep this email
from doubling in size.

Cheers, Paul.

<https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=webmail>
Virus-free.www.avast.com
<https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=webmail>
<#DAB4FAD8-2DD7-40BB-A1B8-4E2AA1F9FDF2>

Reply via email to