Security Baselines & Governance
Document Information
Attribute
Value
1. SLSA Compliance Target
Overview
SLSA Level Requirements
Level
Requirement
Our Implementation
SLSA Level 3 Implementation
1.1 Provenance Generation
1.2 Artifact Signing
1.3 Build Isolation
Control
Implementation
1.4 SBOM Generation
2. Security Policies
2.1 Secret Management
Policy
Requirement
2.2 Access Control
Resource
Access Model
2.3 Network Security
Layer
Control
2.4 Vulnerability Management
Scan Type
Tool
Frequency
Blocking Threshold
3. RACI Matrix
Overview
3.1 Smart Contract Upgrade
Activity
Dev Team
Security
DevOps
Product
Legal
Exec
3.2 Mainnet Deployment
Activity
Dev Team
Security
DevOps
SRE
Product
Exec
Environment
Allowed Days
Allowed Hours (UTC)
3.3 Key Rotation
Activity
Dev Team
Security
DevOps
SRE
Compliance
Exec
Key Type
Rotation Frequency
Lead Time
Backup Required
Severity
Key Revocation
New Key Deployment
4. Incident Response
Severity Levels
Level
Description
Response Time
Example
Escalation Matrix
5. Compliance Checklist
Pre-Deployment Checklist
Post-Deployment Checklist
6. Document Control
Change History
Version
Date
Author
Changes
Review Schedule
Review Type
Frequency
Participants
References
Last updated