Skip to main content

ISO/IEC 5230 · 18974 Linkage

This page focuses on ISO/IEC 18974 (Open Source Security Assurance). You can check which of the standard requirements your implementation meets in this DevSecOps guide. The license compliance standard ISO/IEC 5230 is outside the scope of this guide.

What is ISO/IEC 18974?

ISO/IEC 18974 is an international standard for open source security assurance

Hosted by OpenChain Project Through self-certification Anyone can authenticate for free.

Purpose: Define the minimum core requirements to identify, track, and respond to known security vulnerabilities (CVE, etc.) in open source software. We focus on minimum standards so organizations of all sizes can adopt without burden.

Organization: Consists of four sections: Program establishment, definition of related tasks, compliance assurance, and data provision. Each requirement is numbered in the format 4.x.x.

Authentication Method: Complete and submit a self-certification checklist on the OpenChain official site. Since the organization declares itself without external audit, the procedure is simple and there is no cost.


DevSecOps Implementation and requirements mapping

The table below shows how the DevSecOps pipeline implemented in this guide meets the key requirements of ISO/IEC 18974.

Requirement NumberRequirements (Summary)Implementation methodRelated Pages
4.1.1Documenting Security Assurance PolicyDevSecOps Strategy/SLA Policy DocumentIntroduction Strategy
4.1.2Policy awareness and educationGuidance and documentation of pipeline failures within the teamPipeline Design
4.2.1Open source component identificationsyft SBOM auto-generatedSCA
4.2.2Check for known vulnerabilitiesgrype CVE Scan/PR blockingSCA
4.2.3vulnerability Response ProcedureSLA definition/exception handling processSCA
4.3.1Compliance assurance activitiesRegular Scan·SBOM Artifact StorageMonitoring
4.3.2Data PreservationSBOM Permanent storage by releaseMonitoring
4.4.1External Inquiry Response Procedurevulnerability Response SLA·VEX DocumentSCA

Self-certification preparation checklist

Prepare a trace file that satisfies each item in advance

OpenChain Self-certification is a declaration method, but You must be able to provide evidence when an audit is requested.

  1. Security Policy Document
  • DevSecOps Introduction Strategy Document (based on strategy.md)
  • SLA definition document by vulnerability severity
  • Exception handling approval process document
  1. SBOM Accumulation
  • SBOM files automatically generated from CI/CD (kept by release version)
  • SBOM Creation tool/format/cycle specification document
  1. vulnerability management evidence
  • grype scan result artifacts
  • Exception handled CVE list and approval records (including .grype.yaml comments)
  • vulnerability discovery → Modification history (GitHub Issues·PR)
  1. Continuous monitoring evidence
  • Regular scan workflow execution log
  • Dependabot·Renovate PR history
  • New CVE Notification → Response Timeline

Certification registration process

  1. Self-Assessment: Self-assess ISO/IEC 18974 items from the OpenChain official checklist and ensure that all requirements are met.
  2. Declaration: After confirming that all requirements are met, declare that OpenChain has an eligible program. It is also recommended that this be stated in organizational policy documents.
  3. Registration: Register the organization name in OpenChain Community of Conformance. Although optional, it helps improve supply chain reliability.

Limitations and precautions

DevSecOps Scope: This guide's implementation of DevSecOps focuses on the open source security assurances of ISO/IEC 18974. Additional areas such as SAST, DAST, and IaC security are security enhancement activities that go beyond standard requirements and are optional improvements beyond the scope of certification.

ISO/IEC 5230 Separate preparation required: The license compliance standard, ISO/IEC 5230, is outside the scope of this guide. Please refer to Trusted OSS’s Enterprise Open Source Governance Guide.