Skip to content
This repository was archived by the owner on Dec 18, 2025. It is now read-only.
This repository was archived by the owner on Dec 18, 2025. It is now read-only.

Guideline for Applying Secure Defaults #734

@PushkarJ

Description

@PushkarJ

Description: As part of #480 , a discussion sparked about what does secure defaults and applying it to a project mean for us and for the community in general. This issue is an attempt to reasonably address that through community discussions

Impact: Identify state of the art and carve content to articulate this in a standalone doc, which could be adopted in other Security TAG deliverables

Some questions we can attempt to address:

  • How does secure defaults, impact new user experience, stability, backwards compatibility?
  • Is there a golden middle ground somewhere that can be articulated?
  • Which projects have done this well in the past?
  • Does transparent security mean the same as secure defaults?
  • Are there any case studies from end users (security conscious ones especially) that we could benefit from?
  • Is this even something that is theoretical possible but never realistically achievable?

TO DO

  • Security TAG Leadership Representative: @TheFoxAtWork
  • Project leader(s): @PushkarJ
  • Project Members: Authors and contributors to the guideline
  • Scope: Create a high level guideline to successfully enable a project to adopt secure defaults. Each guideline will be brief, with rationale, "how-to" and example
  • Deliverable(s): https://docs.google.com/document/d/1Y1OCgto48Woc0UsZHq7zHuYOFGYI_DTpC2o7k7KYeaA/edit#
  • Due date: 31 October 2021
  • Slack Channel (as needed): #tag-security
  • Meeting Time & Day: Regular meetings
  • Next Step: Decide where and how to publish and adop this guidance

Metadata

Metadata

Assignees

Labels

proposalcommon precursor to project, for discussion & scoping

Type

No type

Projects

No projects

Relationships

None yet

Development

No branches or pull requests

Issue actions