Skip to content

Commit 14a8fb2

Browse files
authored
Merge pull request #333 from cipherstash/docs/add-security-dot-md
2 parents 83fe635 + 040d1f5 commit 14a8fb2

File tree

1 file changed

+117
-0
lines changed

1 file changed

+117
-0
lines changed

SECURITY.md

Lines changed: 117 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,117 @@
1+
# Security Policy
2+
3+
CipherStash takes the security of our software, infrastructure, and customers extremely seriously.
4+
This document describes the security posture, reporting process, and guidelines for the Proxy repository.
5+
6+
## Supported Software
7+
8+
This repository contains the source code for CipherStash Proxy, including:
9+
10+
- The CipherStash Proxy binary
11+
- Docker containers and Docker Compose configuration
12+
- Encryption migration tool
13+
14+
### CipherStash Proxy
15+
16+
| Version | Supported |
17+
| ------- | ------------------ |
18+
| 2.1.x | :white_check_mark: |
19+
| < 2.1 | :x: |
20+
21+
22+
All software follows semantic versioning and undergoes internal security review, automated analysis, and reproducible builds as part of our SDLC.
23+
24+
---
25+
26+
## Reporting a Vulnerability
27+
28+
If you believe you have found a security vulnerability in any CipherStash code, service, or dependency:
29+
30+
📧 **Please email: `security@cipherstash.com`**
31+
32+
We request that you **do not publicly disclose** the issue before we have had a chance to investigate and provide a fix.
33+
34+
When reporting, please include (as applicable):
35+
36+
- Description of the vulnerability
37+
- Steps to reproduce
38+
- Impact assessment or potential misuse
39+
- Any relevant logs, PoCs, or screenshots
40+
- Suggested remediation (if you have one)
41+
42+
We will acknowledge receipt within **48 hours** and provide regular updates until the issue is resolved.
43+
44+
---
45+
46+
## Disclosure & Response Policy
47+
48+
CipherStash follows a **coordinated responsible disclosure** process:
49+
50+
1. **Submit report** privately via `security@cipherstash.com`.
51+
2. **Acknowledgement** within 48 hours.
52+
3. **Assessment** of severity using CVSS and internal risk models.
53+
4. **Fix development** and patch release in a private branch.
54+
5. **Coordinated disclosure**, including:
55+
- New patch release(s)
56+
- Security advisory on GitHub
57+
- Credit to reporter (optional)
58+
59+
We will never take legal action against good-faith security researchers who follow this policy.
60+
61+
---
62+
63+
## Scope
64+
65+
The following are **in scope**:
66+
67+
- The `cipherstash/proxy` GitHub repository
68+
- All published Docker images published to [Docker Hub under `cipherstash/proxy`](https://hub.docker.com/r/cipherstash/proxy)
69+
- Proxy cryptographic implementations, configuration layers, and CLI tooling
70+
- Key-handling, authenticated encryption behaviour, JSON/JSONB field-level encryption flows
71+
- Documentation or code examples that could lead to insecure usage
72+
- CipherStash’s internal infrastructure
73+
- CipherStash CTS, ZeroKMS, or other backend products
74+
75+
The following are **out of scope**:
76+
77+
- Example [schema](./docs/sql/schema-example.sql) and [configuration](./cipherstash-proxy-example.toml) (though we are still grateful for any relevant disclosires there)
78+
- Social engineering, physical attacks, or denial-of-service
79+
- Attacks requiring privileged access to developer machines or CI/CD infrastructure
80+
81+
---
82+
83+
## Security Guidelines for Contributors
84+
85+
To maintain a strong security posture, contributors MUST:
86+
87+
### ⚙️ Follow cryptographic safety rules
88+
- Do **not** modify cryptographic primitives without prior discussion
89+
- Avoid introducing new crypto dependencies without prior discussion
90+
- Never check in test keys, secrets, or example credentials
91+
92+
### 🛡 Coding & dependency hygiene
93+
- Avoid adding dependencies unless necessary
94+
- Keep dependencies updated and vetted
95+
- Use TypeScript for all new code
96+
- Ensure all code paths that handle keys or encrypted data include type-safe boundaries
97+
98+
### 🔍 Testing & review
99+
- Submit PRs with tests covering edge cases and misuse-resistant behaviour
100+
- Flag any changes involving key derivation, key wrapping, AAD, or encryption modes for mandatory security review
101+
- Do not merge PRs that downgrade security controls or introduce unsafe defaults
102+
103+
---
104+
105+
## Questions?
106+
107+
For general questions about CipherStash security practices (not security incidents), contact:
108+
109+
📧 **support@cipherstash.com**
110+
111+
For vulnerability disclosures:
112+
113+
📧 **security@cipherstash.com**
114+
115+
---
116+
117+
Thank you for helping keep Proxy and the wider CipherStash ecosystem secure.

0 commit comments

Comments
 (0)