.. # ******************************************************************************* # Copyright (c) 2025 Contributors to the Eclipse Foundation # # See the NOTICE file(s) distributed with this work for additional # information regarding copyright ownership. # # This program and the accompanying materials are made available under the # terms of the Apache License Version 2.0 which is available at # https://www.apache.org/licenses/LICENSE-2.0 # # SPDX-License-Identifier: Apache-2.0 # ******************************************************************************* Security Plan Formal Review Report ================================== .. document:: Persistency Security Plan Formal Review :id: doc__persistency_security_plan_fdr :status: valid :safety: ASIL_B :security: YES :realizes: wp__fdr_reports :tags: persistency **1. Purpose** The purpose of this security plan formal review checklist is to report status of the review for the security plan. **2. Checklist** .. list-table:: Security Plan Checklist :header-rows: 1 * - Id - Security plan activity - Compliant to ISO SAE 21434? - Comment * - 1 - Is the rationale for the security work products tailoring included? - [YES | NO ] - * - 2 - Is impact analysis planned in case of re-use of SW (needed for every release following the first formal release)? - [YES | NO ] - * - 3 - Does the security plan define all needed activities for security management (incl. Review and Security Audit)? - [YES | NO ] - * - 4 - Does the security plan define all needed activities for SW development, integration and verification? - [YES | NO ] - * - 5 - Does the security plan define all needed activities for security analysis? - [YES | NO ] - * - 6 - Does the security plan define all needed activities for supporting processes (incl. tool mgt)? - [YES | NO ] - * - 7 - Does the security plan document a responsible for all activities? - [YES | NO ] - * - 8 - If Off-the-shelf (e.g. existing OSS) software components is used, is it planned to be analysed? - [YES | NO ] - * - 9 - Is a security manager and a project lead appointed for the project? - [YES | NO ] - * - 10 - Is security plan sufficiently linked to the project plan? - [YES | NO ] - * - 11 - Is security plan updated iteratively to show the progress? - [YES | NO ] - * - 12 - If Out-of-context software components is used, are the assumptions documented? - [YES | NO ] - * - 13 - Does the security plan define all needed activities for SBOM generation? - [YES | NO ] - * - 14 - Does the security plan define regular vulnerability scans for the generated SBOM? - [YES | NO ] - .. note:: Off-the-shelf means existing software which may used w/o modification, e.g. existing OSS