Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
/tacPublic

Technical Advisory Council

License

NotificationsYou must be signed in to change notification settings

ossf/tac

Repository files navigation

The OpenSSF Technical Advisory Council is responsible for oversight of the various Technical Initiatives (TI) of the OpenSSF.

Get Involved

Although the TAC is composed of a set of official members listed below, any community member is welcome to participate in the TAC discussions.

Official communications occur on theTAC mailing list.Manage your subscriptions to Open SSF mailing lists.

Informal discussions occur in the TAC channel of theOpenSSF Slack.To join, use the followinginvite link.

UseGitHub Issues to request and discuss agenda items.

If you need support in any part of the process, please emailoperations@openssf.org.

Meetings

The TACmeetings minutes are online and appear on theOpenSSF Community Calendar.

Meetings are also recorded and posted to theOpenSSF YouTube channel.

TAC Members

NamePositionEmailOrganizationTerm
Arnaud J Le Horslehors@us.ibm.comIBMJanuary 2024 - December 2025
Bob CallawayVice Chairbcallaway@google.comGoogleJanuary 2025 - December 2026
Michael Liebermanmike@kusari.devKusariJanuary 2025 - December 2026
Zach SteindlerChairsteiza@github.comGitHubJanuary 2025 - December 2026
Marcela Melaramarcela.melara@intel.comIntelJanuary 2024 - December 2025
Jautau "Jay" Whitejaywhite@microsoft.comMicrosoftJanuary 2024 - December 2025
Stephen Augustusopenssf@auggie.devBloomberg L.P.January 2025 - December 2025*
Georg Kunzgeorg.kunz@ericsson.comEricssonJanuary 2025 - December 2025*
Michael Scovettamichael.scovetta@microsoft.comMicrosoftJanuary 2025 - December 2025*

NOTE:*-marked entries denote TAC members appointed by the OpenSSF Governing Board; all other members are community-elected.

Charter

The TAC is chartered as part of theOpen Source Security Foundation Charter.

Technical Initiatives

The governance of TIs is documented inthe process section. This section provides you with all the information about the different types of initiatives and how they are managed, as well as how to propose a new initiative. It also covers the different levels of maturity a TI can be in, the requirements that must be met to move up to the next level, as well as the benefits that come with each level.

The following Technical Initiatives have been approved by the TAC. You may learn more about their status through theirquarterly reports.

Working Groups (WGs)

NameRepositoryNotesStaff ContactStatus
AI/ML SecurityGitHubMeeting NotesJeff DiecksIncubating
Diversity, Equity, & InclusionGitHubMeeting NotesKhahil WhiteIncubating
Global Cyber PolicyGitHubMeeting NotesJeff Diecks & Kris BorchersSandbox
Securing Critical ProjectsGitHubMeeting NotesKris BorchersIncubating
Securing Software RepositoriesGitHubMeeting NotesKris BorchersGraduated
Security Best PracticesGitHubMeeting NotesDavid A. WheelerGraduated
Security ToolingGitHubMeeting NotesJeff DiecksIncubating
Supply Chain IntegrityGitHubMeeting NotesKris BorchersIncubating
Vulnerability DisclosuresGitHubMeeting NotesJeff DiecksGraduated

Projects

NameRepositoryWebsiteSponsoring OrgStatus
Best Practices BadgeGitHubhttps://www.bestpractices.dev/Best Practices WGTBD
BomctlGitHubSecurity Tooling WGSandbox
Criticality ScoreGitHubSecuring Critical Projects WGTBD
Fuzz IntrospectorGitHubSecurity Tooling WGTBD
GUACGitHubhttps://guac.shSupply Chain Integrity WGIncubating
gittufGitHubhttps://gittuf.dev/Supply Chain Integrity WGSandbox
OpenSSF ScorecardGitHubhttps://securityscorecards.dev/Best Practices WGIncubating
OpenVEXGitHubVulnerability Disclosures WGSandbox
OSV SchemaGitHubhttps://ossf.github.io/osv-schema/Vulnerability Disclosures WGTBD
MinderGitHubSecurity Tooling WGSandbox
Model signingGitHubAI/ML Security WGSandbox
Package AnalysisGitHubSecuring Critical Projects WGTBD
ProtobomGitHubSecurity Tooling WGSandbox
Repository Service for TUFGitHubhttps://repository-service-tuf.readthedocs.io/Securing Software Repositories WGIncubating
S2C2FGitHubSupply Chain Integrity WGIncubating
SBOMitGitHubSecurity Tooling WGSandbox
Security Insights SpecGitHubSupply Chain Integrity WGTBD
SigstoreGitHubhttps://www.sigstore.dev/OpenSSF TACGraduated
SLSAGitHubhttps://slsa.dev/Supply Chain Integrity WGTBD
ZarfGitHubhttps://zarf.dev/Supply Chain Integrity WGSandbox

OpenSSF affiliated projects

NameRepositoryStatus
Core Toolchain Infrastructurehttps://git.coretoolchain.dev/TBD
Alpha Omegahttps://github.com/ossf/alpha-omegaTBD

Special Interest Groups (SIGs)

SIGs can be created and managed without formal approval from the TAC. The following is for information purpose only.

NameRepository/Home PageGoverning Org
CVD Guideshttps://github.com/ossf/oss-vulnerability-guideVulnerability Disclosures WG
OpenVEXhttps://github.com/ossf/OpenVEXVulnerability Disclosures WG
Educationhttps://github.com/ossf/educationBest Practices WG
Memory Safetyhttps://github.com/ossf/Memory-SafetyBest Practices WG
C/C++ Compiler Optionshttps://github.com/ossf/wg-best-practices-os-developers/tree/main/docs/Compiler-Hardening-GuidesBest Practices WG
Python Hardeninghttps://github.com/ossf/wg-best-practices-os-developers/tree/main/docs/Secure-Coding-Guide-for-PythonBest Practices WG
Security Baselinehttps://github.com/ossf/security-baselineBest Practices WG
SBOM Everywherehttps://github.com/ossf/sbom-everywhereSecurity Tooling WG
OSS Fuzzinghttps://github.com/ossf/wg-security-tooling?tab=readme-ov-file#oss-fuzzing-sigSecurity Tooling WG

Overview Diagrams

Diagrams with an overview of the OpenSSF, including its projects and SIGs, are available in the presentationOpenSSF Introduction (including Diagrammers’ Society diagrams) as created and maintained by theOpenSSF Diagrammer's Society.

Antitrust Policy

Linux Foundation meetings involve participation by industry competitors, and it is the intention of the Linux Foundation to conduct all of its activities in accordance with applicable antitrust and competition laws. It is therefore extremely important that attendees adhere to meeting agendas, and be aware of, and not participate in, any activities that are prohibited under applicable US state, federal or foreign antitrust and competition laws.

Examples of types of actions that are prohibited at Linux Foundation meetings and in connection with Linux Foundation activities are described in the Linux Foundation Antitrust Policy available athttp://www.linuxfoundation.org/antitrust-policy. If you have questions about these matters, please contact your company counsel, or if you are a member of the Linux Foundation, feel free to contact Andrew Updegrove of the firm of Gesmer Updegrove LLP, which provides legal counsel to the Linux Foundation.


[8]ページ先頭

©2009-2025 Movatter.jp