Skip to main content

Certification Output Best Practice

conformance-preparer This is a completed example of the three outputs generated by the agent. This agent automatically generates gap analysis and declarations by reading existing output in the output/ folder without asking any questions.

Go to reference: Self-certified chapter guide


Gap Analysis Report

generating agent: 07-conformance-preparer | Save Path: output/conformance/gap-analysis.md


Report Type: Gap Analysis (ISO/IEC 5230 + ISO/IEC 18974) Created Date: 2026-03-23 Target project: Tech Unicorn open source program Tools used: trustedoss agents/07-conformance-preparer


1. Summary

  • Analysis target: ISO/IEC 5230:2020 (25 items) + ISO/IEC 18974:2023 (25 items) = A total of 50 supporting materials
  • ISO/IEC 5230: Satisfied ✅ 22 / Partially satisfied 🔶 3 / Not satisfied ❌ 0
  • ISO/IEC 18974: Satisfied ✅ 17 / Partially satisfied 🔶 8 / Not satisfied ❌ 0
  • ❌ No items not met (certification blocked) → Self-certification declaration possible
  • Immediate action recommendation: Enter the real name of the person in charge (raci-matrix.md), begin training (completion-tracker.md)
  • Time-based 🔶 3 items normal upon initial certification (met upon 18-month renewal)

2. ISO/IEC 5230:2020 Satisfaction status by item

Item IDSummary of contentsJudgmentEvidence output
3.1.1.1Documented open source policyOpen source policy
3.1.1.2Policy dissemination procedureOpen source policy §7, Open source education curriculum
3.1.2.1List of Roles and ResponsibilitiesOpen source role and responsibility definition §1
3.1.2.2Competency technical documentation for each roleOpen source role and responsibility definition §2
3.1.2.3Competency Assessment Evidence🔶Education completion tracking sheet (form complete, actual completion not yet started)
3.1.3.1Participant Perception Assessment Evidence🔶Open source training curriculum + Training completion tracking sheet (Training has not started)
3.1.4.1Program coverageOpen Source Policy §1
3.1.5.1License Obligations Review ProcessOpen source use approval procedure §4, Permitted license list
3.2.1.1External inquiry public channelOpen source role and responsibility definition §3 (opensource@sktelecom.com)
3.2.1.2Internal response procedures for external inquiriesDefinition of open source roles and responsibilities §3, Open source use approval process
3.2.2.1Role Assignee Name Document🔶Open source RACI matrix (complete role structure, real name not entered)
3.2.2.2Place roles and check budgetOpen source RACI matrix §Budget allocation status
3.2.2.3How to approach legal adviceOpen source role and responsibility definition §4
3.2.2.4Internal Responsibility Assignment ProcessOpen Source RACI Matrix §Internal Responsibility Assignment Procedure
3.2.2.5Non-compliance case review and correction proceduresOpen Source RACI Matrix §Non-Compliance Case Review Procedure, Open Source Policy §8
3.3.1.1SBOM Management ProceduresSBOM Management Plan, Open Source Use Approval Procedure §6
3.3.1.2Component history (SBOM file)output/sbom/java-vulnerable.cdx.json
3.3.2.1Licensing Use Case Processing ProcedureSBOM License Analysis Report, Copyleft Risk Report, Open Source Use Approval Procedure
3.4.1.1Compliance deliverable preparation and distribution proceduresPre-deployment license compliance checklist
3.4.1.2Compliance deliverable storage proceduresPre-deployment license compliance checklist §5
3.5.1.1Open source contribution policyOpen Source Policy §5
3.5.1.2Open source contribution management processOpen Source Policy §5
3.5.1.3Contribution Policy Recognition ProcedureOpen Source Policy §7
3.6.1.1Confirmation document that all requirements are metGap Analysis Report (this document)
3.6.2.1Document confirming that requirements are met within 18 monthsOpen Source Compliance Self-Certification Statement

ISO/IEC 5230 Subtotal: ✅ 22 / 🔶 3 / ❌ 0


3. ISO/IEC 18974:2023 Satisfaction status by item

Item IDSummary of contentsJudgmentEvidence output
4.1.1.1Security Assurance PolicyOpen Source Policy §4
4.1.1.2Policy dissemination procedureOpen source policy §7, Open source education curriculum
4.1.2.1List of Roles and ResponsibilitiesOpen source role and responsibility definition §1
4.1.2.2Competency technical documentation for each roleOpen source role and responsibility definition §2
4.1.2.3Participant list and roles🔶Open source RACI matrix § Person in charge by role (real name not entered)
4.1.2.4Competency Assessment Evidence🔶Education completion tracking sheet (form complete, actual completion not yet started)
4.1.2.5Periodic review and evidence of change🔶Open source policy §9 (Establishment of review plan, no history accumulation) ※Time-based
4.1.2.6Internal Best Practice Conformance Verification Representative🔶Definition of open source roles and responsibilities §6 (designation of person in charge, scheduled for review 2026-12-31) ※Time-based
4.1.3.1Participant Perception Assessment Evidence🔶Open source training curriculum + Training completion tracking sheet (Training has not started)
4.1.4.1Program Scope DocumentOpen Source Policy §1
4.1.4.2Performance MetricsOpen source policy §3 (5 KPI items)
4.1.4.3Evidence of continuous improvement (audit history)🔶Gap analysis report (this document, 1st audit history) ※Time-based
4.1.5.1vulnerability response standard proceduresvulnerability Response Procedure (Includes all 8 methods)
4.2.1.1External vulnerability inquiry public channelOpen source role and responsibility definition §3 (security@sktelecom.com)
4.2.1.2Internal response procedures for external inquiriesvulnerability response procedures §7
4.2.2.1Role Assignee Name Document🔶Open source RACI matrix (complete role structure, real name not entered)
4.2.2.2Place roles and check budgetOpen source RACI matrix §Budget allocation status
4.2.2.3Demonstrate expertise in resolving vulnerabilitiesOpen source role and responsibility definition §5 (Security team, KrCERT)
4.2.2.4Internal Responsibility Assignment ProcessOpen Source RACI Matrix §Internal Responsibility Assignment Procedure
4.3.1.1SBOM Life Cycle Continuous Recording ProceduresSBOM Management Plan
4.3.1.2Component history (SBOM file)output/sbom/java-vulnerable.cdx.json
4.3.2.1vulnerability detection and resolution proceduresvulnerability response procedure + vulnerability response plan
4.3.2.2vulnerability and Action Logvulnerability Analysis Report (5 CVE records) + vulnerability Response Plan
4.4.1.1Confirmation document that all requirements are metGap Analysis Report (this document)
4.4.2.1Document confirming that requirements are met within 18 monthsOpen Source Compliance Self-Certification Statement

ISO/IEC 18974 Subtotal: ✅ 17 items / 🔶 8 items / ❌ 0 items


4. Measures

  • Target: output/organization/raci-matrix.md §Person in charge by role
  • Problem: The "(Enter Contact Person Name)" placeholder is not replaced with the real name.
  • Affected Items: 3.2.2.1, 4.1.2.3, 4.2.2.1
  • Action: Enter real names in raci-matrix.md assignee by role table.
  • Estimated travel time: 10 minutes

🟡 Medium — Training completion begins (2026-Q2 implementation plan established)

  • Target: output/training/completion-tracker.md
  • Problem: Training plan and form were completed, but 0 people actually completed it (0%)
  • Affected Items: 3.1.2.3, 3.1.3.1, 4.1.2.4, 4.1.3.1
  • Measures: curriculum.md §Training will be implemented from 2026-Q2 according to the training schedule plan
  • 100 employees: Online training begins in May 2026
  • 10 managers: 2026-06 offline group training
  • 1000 developers: sequential online launch in 2026-Q2~Q3
  • Estimated time required: Plan completion, execution stage

🟢 Low — Check and supplement budget information

  • Target: output/organization/raci-matrix.md §Budget allocation status
  • Problem: Open source tool budget and external training budget item “(fill in after confirmation)” incomplete
  • Impacted Item: 3.2.2.2 (Currently judged to be ✅, but supplementation of the relevant item is recommended)
  • Action: Enter actual budget allocation status
  • Estimated travel time: 30 minutes

5. Time-based entry processing (initial authentication normal)

The three items below are items for which evidence cannot be created upon initial authentication. 🔶 It is treated as partially satisfied and converted to satisfied upon renewal for 18 months.

Item IDCurrent ActionSatisfied transition conditions
18974 §4.1.2.5 Periodic Review Evidenceoss-policy.md §9 records "Next review date: 2027-03-23"Accumulating at least one actual review history
18974 §4.1.2.6 Best Practice Conformance VerificationIn role-definition.md §6, assign a person in charge and record the date of initial review (2026-12-31)At least 1 review result record
18974 §4.1.4.3 Evidence of continuous improvementThis gap analysis (2026-03-23) is recorded as the first audit history2 or more audit records

6. Renewal Schedule

Schedulework
2026-06-30Update completion-tracker.md after completing administrator training
2026-09-301st group of developers (250 people) completed offline training
2026-12-3118974 §4.1.2.6 Perform best practice consensus review → update gap-analysis.md
2027-03-23 ​​Annual policy review (oss-policy.md §9) → gap-analysis.md update
2027-09-23Expiration of self-certification validity period (date of declaration + 18 months) → Redeclaration

Open Source Compliance Self-Certification Statement

generating agent: 07-conformance-preparer | Save Path: output/conformance/declaration-draft.md


Declaration information

ItemContent
Declared Company NameTech Unicorn
Declaration OfficerDevOps Team Open Source Manager
Contact Emailopensource@sktelecom.com
Date of declaration2026-03-23 ​​
Validity Period2026-03-23 ​​~ 2027-09-23 (18 months)
Re-declaration date2027-09-23

Applicable standards

  • ISO/IEC 5230:2020 — OpenChain License Compliance Specification
  • ISO/IEC 18974:2023 — OpenChain Security Assurance Specification

applied area

All software developed, distributed and operated by Tech Unicorn:

  • Distribution method: SaaS, App Store (iOS/Android), embedded (device mounted), internal system
  • Applies to: All members involved in using open source, including developers, administrators, and operations teams.
  • Program Name: Tech Unicorn Open Source Compliance Program v1.0

ISO/IEC 5230:2020 Checklist

We declare that all 25 supporting documents below are met.

Item IDContentSatisfied or notoutput
3.1.1.1Documented open source policyOpen source policy
3.1.1.2Policy dissemination procedureOpen source policy §7, Open source education curriculum
3.1.2.1List of Roles and ResponsibilitiesDefinition of open source roles and responsibilities
3.1.2.2Competency technical documentation for each roleOpen source role and responsibility definition §2
3.1.2.3Competency Assessment Evidence🔶Training Completion Tracking Sheet (Completion scheduled to begin)
3.1.3.1Participant Perception Assessment Evidence🔶Open source training curriculum + Training completion tracking sheet
3.1.4.1Program Coverage DocumentOpen Source Policy §1
3.1.5.1License Obligations Review ProcessOpen source use approval procedure §4, Permitted license list
3.2.1.1External inquiry public channelOpen source role and responsibility definition §3
3.2.1.2Internal response procedures for external inquiriesOpen source role and responsibility definition §3
3.2.2.1Role Assignee Name Document🔶Open source RACI matrix (real name entry in progress)
3.2.2.2Place roles and check budgetOpen source RACI matrix §Budget allocation status
3.2.2.3How to approach legal adviceOpen source role and responsibility definition §4
3.2.2.4Internal Responsibility Assignment ProcessOpen Source RACI Matrix §Internal Responsibility Assignment Procedure
3.2.2.5Non-compliance case review and correction proceduresOpen Source RACI Matrix §Non-compliance case review procedure
3.3.1.1SBOM Management ProceduresSBOM Management Plan
3.3.1.2Component history (SBOM file)output/sbom/java-vulnerable.cdx.json
3.3.2.1Licensing Use Case Processing ProcedureSBOM License Analysis Report, Open Source Use Approval Procedure
3.4.1.1Compliance deliverable preparation and distribution proceduresPre-deployment license compliance checklist
3.4.1.2Compliance deliverable storage proceduresPre-deployment license compliance checklist §5
3.5.1.1Open source contribution policyOpen Source Policy §5
3.5.1.2Open source contribution management processOpen Source Policy §5
3.5.1.3Contribution Policy Recognition ProcedureOpen Source Policy §7
3.6.1.1Confirmation document that all requirements are metGap Analysis Report
3.6.2.1Confirmation of meeting requirements within 18 monthsOpen Source Compliance Self-Certification Statement (this document)

ISO/IEC 18974:2023 Checklist

We declare that all 25 supporting documents below are met.

Item IDContentSatisfied or notoutput
4.1.1.1Documented Security Assurance PolicyOpen Source Policy §4
4.1.1.2Policy dissemination procedureOpen source policy §7, Open source education curriculum
4.1.2.1List of Roles and ResponsibilitiesOpen source role and responsibility definition §1
4.1.2.2Competency technical documentation for each roleOpen source role and responsibility definition §2
4.1.2.3Participant list and roles🔶Open source RACI matrix (real name entry in progress)
4.1.2.4Competency Assessment Evidence🔶Training Completion Tracking Sheet (Completion scheduled to begin)
4.1.2.5Periodic review and evidence of change🔶Open source policy §9 (Establish review plan, plan to accumulate history)
4.1.2.6Internal Best Practice Conformance Verification Representative🔶Definition of open source roles and responsibilities §6 (designation of person in charge, scheduled for review 2026-12-31)
4.1.3.1Participant Perception Assessment Evidence🔶Open source training curriculum + Training completion tracking sheet
4.1.4.1Program Scope DocumentOpen Source Policy §1
4.1.4.2Performance MetricsOpen source policy §3 (5 KPI items)
4.1.4.3Evidence of continuous improvement (audit history)🔶Gap Analysis Report (1st audit history)
4.1.5.1vulnerability response standard proceduresvulnerability response procedures
4.2.1.1External vulnerability inquiry public channelOpen source role and responsibility definition §3 (security@sktelecom.com)
4.2.1.2Internal response procedures for external inquiriesvulnerability response procedures §7
4.2.2.1Role Assignee Name Document🔶Open source RACI matrix (real name entry in progress)
4.2.2.2Place roles and check budgetOpen source RACI matrix §Budget allocation status
4.2.2.3Demonstrate expertise in resolving vulnerabilitiesOpen source role and responsibility definition §5
4.2.2.4Internal Responsibility Assignment ProcessOpen Source RACI Matrix §Internal Responsibility Assignment Procedure
4.3.1.1SBOM Life Cycle Continuous Recording ProceduresSBOM Management Plan
4.3.1.2Component history (SBOM file)output/sbom/java-vulnerable.cdx.json
4.3.2.1vulnerability detection and resolution proceduresvulnerability response procedure + vulnerability response plan
4.3.2.2vulnerability and Action Logvulnerability Analysis Report (5 CVE records) + vulnerability Response Plan
4.4.1.1Confirmation document that all requirements are metGap Analysis Report
4.4.2.1Confirmation of meeting requirements within 18 monthsOpen Source Compliance Self-Certification Statement (this document)

###Signature

This declaration confirms that Tech Unicorn meets all requirements of ISO/IEC 5230:2020 and ISO/IEC 18974:2023. We self-certify that we are operating an open source compliance and security assurance program.

CategoryContent
DeclaratorDevOps Team Open Source Manager
Approved byDevOps Team Leader
Date of declaration2026-03-23 ​​
Next redeclaration date2027-09-23

🔶 Information on partially satisfied items: Enter the real name of the person in charge (3.2.2.1, 4.1.2.3, 4.2.2.1) and complete training (3.1.2.3, 4.1.2.4). Measures are in progress and implementation will be completed after declaration of certification. Time-based items (4.1.2.5, 4.1.2.6, 4.1.4.3) are Satisfied upon renewal for 18 months.


OpenChain Guide to self-certification registration process

generating agent: 07-conformance-preparer | Save Path: output/conformance/submission-guide.md


outline

Tech Unicorn has self-certified ISO/IEC 5230:2020 (license compliance) and ISO/IEC 18974:2023 (security assurance). OpenChain Register on the project’s official site and declare it publicly.

ItemContent
Registration sitehttps://www.openchainproject.org/conformance
declaration typeSelf-Certification
Applicable standardsISO/IEC 5230:2020 + ISO/IEC 18974:2023
Validity Period18 months (2026-03-23 ​​~ 2027-09-23)

Preparation before registration

After completing the items below, proceed with the registration process.

  • output/organization/raci-matrix.md §Person in charge by role — Fill in real name
  • output/organization/appointment-template.md — Order letter signed
  • Start completing training — Minimum start of Administrator Course (2026-06)

Final confirmation of output

  • Check the existence of output/conformance/gap-analysis.md
  • Check the existence of output/conformance/declaration-draft.md
  • Check the latest status of all deliverables

Registration process (step by step)

Step 1 — Access OpenChain site

  1. Access https://www.openchainproject.org/conformance
  2. Click "Submit Conformance" in the menu at the bottom or top of the page

Step 2 — Select Standard

  • Select ISO/IEC 5230 (License Compliance)
  • Select ISO/IEC 18974 (Security Assurance)
  • Both standards can be submitted simultaneously

Step 3 — Enter company information

EntryInput Content
Company nameTech Unicorn
Contact nameReal name of DevOps team open source person in charge
Emailopensource@sktelecom.com
countryKorea (South)
websitehttps://www.sktelecom.com

Step 4 — Check checklist items

Refer to output/conformance/declaration-draft.md and check each item.

ISO/IEC 5230 Checklist (25 items):

  • Check all items from 3.1.1.1 to 3.6.2.1
  • 🔶 Recognize and check that items (3.1.2.3, 3.1.3.1, 3.2.2.1) are in progress.

ISO/IEC 18974 Checklist (25 items):

  • Check all items from 4.1.1.1 to 4.4.2.1
  • 🔶 Recognize and check that the items are within the allowable range during initial authentication.

Step 5 — Submit and Confirm

  1. Check all items and click "Submit"
  2. Confirm receipt of confirmation email to the entered email address
  3. OpenChain Tech Unicorn is listed on the official registration list.

Actions after registration is completed

Public Announcement

After completing registration, we recommend posting on the following channels:

  • Post registration and certification status on company wiki/intranet
  • Add OpenChain authentication banner to company security/compliance page
  • Notification of certification acquisition to major suppliers/customers (increasing reliability)

Archive of deliverables

OpenChain After registration, keep the following evidence:

  • Copy of registration confirmation email
  • Screenshot at time of registration (kept in output/conformance/ folder)
  • declaration-draft.md signature (signature of person in charge and team leader)

Maintenance Schedule

18 month redeclaration cycle

viewpointwork
2026-09-23 (6 months after declaration)Interim inspection – Check the implementation of partially satisfied items
2027-03-23 ​​(12 months after declaration)Re-run annual gap analysis, update gap-analysis.md
2027-09-23 (18 months after declaration)Redeclaration — OpenChain site re-registration

Frequent update trigger

If the following situations occur, immediately update the output and rerun the gap analysis:

triggerDeliverables subject to renewal
Open source policy changesoss-policy.md, gap-analysis.md
Change of person in chargerole-definition.md, raci-matrix.md
A new Critical CVE occurscve-report.md, remediation-plan.md
New product/service launchsbom/*, distribution-checklist.md
Add distribution channellicense-allowlist.md, oss-policy.md

Contact us

TypeContact Us
License compliance inquiryopensource@sktelecom.com
Report security vulnerabilitysecurity@sktelecom.com
OpenChain Project Officialhttps://www.openchainproject.org

This document has been written to fulfill requirements ISO/IEC 5230 §3.6.1 and ISO/IEC 18974 §4.4.1.