Skip to content

streamline SCS-0210 with SCS-0124#1099

Draft
fkr wants to merge 2 commits intomainfrom
feat/streamline-kaas-cve-with-iaas
Draft

streamline SCS-0210 with SCS-0124#1099
fkr wants to merge 2 commits intomainfrom
feat/streamline-kaas-cve-with-iaas

Conversation

@fkr
Copy link
Member

@fkr fkr commented Feb 17, 2026

In SCS-0124 we write:

Critical (CVSS = 9.0 – 10.0): 3 hours
High (CVSS = 7.0 – 8.9): 3 days
Mid (CVSS = 4.0 – 6.9): 1 month
Low (CVSS = 0.1 – 3.9): 3 months

Our Policies should be the same where possible, so adjust this to match IaaS.

In SCS-0124 we write:

---
Critical (CVSS = 9.0 – 10.0): 3 hours
High (CVSS = 7.0 – 8.9): 3 days
Mid (CVSS = 4.0 – 6.9): 1 month
Low (CVSS = 0.1 – 3.9): 3 months
---

Our Policies should be the same where possible, so adjust this to match IaaS.

Signed-off-by: Felix Kronlage-Dammers <fkr@hazardous.org>
@fkr
Copy link
Member Author

fkr commented Feb 17, 2026

This was noticed by @janeczku and raised in our RKE2 session at the hackathon.

@mbuechse
Copy link
Contributor

mbuechse commented Feb 17, 2026

I agree that it may be beneficial to harmonize the two standards, but as far as I can tell, scs-0210 came first, and now I'm wondering why scs-0124 takes precedence.

Signed-off-by: Felix Kronlage-Dammers <fkr@hazardous.org>
@fkr
Copy link
Member Author

fkr commented Feb 18, 2026

I agree that it may be beneficial to harmonize the two standards, but as far as I can tell, scs-0210 came first, and now I'm wondering why scs-0124 takes precedence.

It does not take precedence, but it actually explains the chosen scores much better. Why did we pick 8 for critical in this standard? Technicially only >= 9.0 is critical. High is 7.0 - 8.9 - the IaaS standard explains this and also points to the BSI C5 common criteria. I've updated the change to explain this better.

Thanks for highlighting this!

Copy link
Contributor

@mbuechse mbuechse left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

If we now include CVEs with scores 7 through 8, this makes the regulation stricter, but the rule in question is only a recommendation, so we should be good.

- This time period MUST be even shorter for patches that fix critical or high CVEs.
A critical CVE is a CVE with a CVSS base score >= 9.0 and a high CVE with a CVSS
base score >= 7.0 according to the CVSS version used in the original CVE record (e.g., CVSSv3.1).
It is RECOMMENDED to provide a new patch version in a 3-day time period after their release, this
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
It is RECOMMENDED to provide a new patch version in a 3-day time period after their release, this
It is RECOMMENDED to provide a new patch version in a 3-day time period after their release; this

@fkr
Copy link
Member Author

fkr commented Feb 18, 2026

If we now include CVEs with scores 7 through 8, this makes the regulation stricter, but the rule in question is only a recommendation, so we should be good.

or we explain why we chose 8 - that was the question that initially started this discussion and why i looked up what we do for IaaS.

@depressiveRobot depressiveRobot changed the title streamline this with SCS-0124 streamline SCS-0210 with SCS-0124 Feb 18, 2026
@fkr fkr marked this pull request as draft February 18, 2026 10:06
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants