Security code reviews differ from peer code reviews, as they are usually on large blocks of code, and after the fact. Architectural reviews should occur prior to a merge to main. These reviews bring a second set of eyes, with dedicated focus to the problem.
Conducting a review
To request a review from the security team:
- Create a GitHub issue in the security repository, and add the securityreview label.
- Provide a clear description, and links to the code, using Sourcegraph.
- Provide as much detail as possible for the specifics of what has changed, and where we should focus.
- Share usage scenarios, data flows, and any reference material
- Share the issue in the Security team slack channel, asking for a review. If you have a deadline, share it. By default, we target reviews for the upcoming iteration. Ideally two weeks notice is preferred.
- Someone from the security team will schedule and record a meeting with you, for an in-person code-tour.
- During this code-tour, you will walk a Security team member through parts of the code, and answer questions they might have.
- After the review, the meeting recording will be shared in Slack, in the security channel.
For the purposes of SOC compliance, the Security team member will document the days this review was conducted, and the total amount of time (in half-day measures) the review took.
What we look for
- Security reviews begin with the OWASP guidelines and branch throughout the code base. We start by focusing on seven key areas:
- Authentication
- Authorization
- Session management
- Data validation
- Error handling
- Logging
- Encryption
- We pay specific attention to data validation, conversions, inputs, and outputs.
Review outputs
The GitHub issue will contain the conversation around Security. We are responsible for sharing a link and comment to each block of code, so that they can be clearly discussed.