Skip to content

Commit 3081543

Browse files
Federicokarlsoderby
andauthored
Apply suggestions from code review
Co-authored-by: Karl Söderby <35461661+karlsoderby@users.noreply.github.com>
1 parent 85758f5 commit 3081543

File tree

2 files changed

+14
-7
lines changed

2 files changed

+14
-7
lines changed

content/software/ide-v1/tutorials/ide-v1-security/ide-v1-security.md

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
---
22
title: 'Security of Arduino IDE'
3-
description: 'Learn the secure development process behind Arduino IDE.'
3+
description: 'Learn about the secure development process behind the Arduino IDE.'
4+
45
tags:
56
- Security
67
author: 'Arduino Security Team'
@@ -10,7 +11,8 @@ Arduino IDE 2.x is the latest version of the Arduino Programming tool and it is
1011

1112
Arduino is committed to regularly monitor and update security measures applied to the Arduino IDE to ensure proper protection from any threats or vulnerabilities detected.
1213

13-
Arduino defined principles and requirements to be followed within the secure development lifecycle of Hardware, System and Software and the development of the open-source Arduino software makes no exception. In particular, Arduino follows the **Secure by Design** principle in every stage of the software development and the **Security Principles** listed below are followed during the secure development lifecycle:
14+
Arduino's defined principles and requirements to be followed within the secure development lifecycle of Hardware, System and Software and the development of the open-source Arduino software makes no exception. In particular, Arduino follows the **Secure by Design** principle in every stage of the software development and the **Security Principles** listed below are followed during the secure development lifecycle:
15+
1416

1517
- **Apply Defense in Depth**: Layered security mechanisms are in place to increase security as a whole.
1618
- **Use a Positive Security Model**: A ‘positive’ security model defines what is allowed and rejects everything else.
@@ -38,15 +40,17 @@ As part of the security testing activities, Arduino periodically performs the fo
3840

3941
Finally, should an Arduino user or customer suspect a vulnerability or security issue, they are invited to report it as described in our Coordinated Vulnerability Disclosure policy available at: [https://www.arduino.cc/en/security](https://www.arduino.cc/en/security).
4042

41-
## Third party components
43+
## Third Party Components
44+
4245
In the process of conducting Secure Component Analysis, Arduino puts particular attention on the aforementioned external dependencies (Eclipse Theia and OpenJS Electron) and reports any found vulnerability to the respective project maintainer:
4346

4447
- Eclipse Theia manages vulnerabilities using the process described in [https://www.eclipse.org/security](https://www.eclipse.org/security).
4548
- OpenJS Electron vulnerabilities are managed using the process described in [https://www.electronjs.org/docs/latest/tutorial/security](https://www.electronjs.org/docs/latest/tutorial/security).
4649

4750
When vulnerabilities in third party components are fixed by the respective maintainer, Arduino will update the component involved as required, in a commercially reasonable time, based on the severity of the identified vulnerability.
4851

49-
## Versions management
52+
## Version Management
53+
5054
When it comes to managing multiple versions of the Arduino IDE, the following policy will be applied:
5155

5256
- all security principles that are applicable to the process (design, development, testing, release) will apply to any version currently in development

content/software/ide-v2/tutorials/ide-v2-security/ide-v2-security.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,8 @@ Arduino IDE 2.x is the latest version of the Arduino Programming tool and it is
1010

1111
Arduino is committed to regularly monitor and update security measures applied to the Arduino IDE to ensure proper protection from any threats or vulnerabilities detected.
1212

13-
Arduino defined principles and requirements to be followed within the secure development lifecycle of Hardware, System and Software and the development of the open-source Arduino software makes no exception. In particular, Arduino follows the **Secure by Design** principle in every stage of the software development and the **Security Principles** listed below are followed during the secure development lifecycle:
13+
Arduino's defined principles and requirements to be followed within the secure development lifecycle of Hardware, System and Software and the development of the open-source Arduino software makes no exception. In particular, Arduino follows the **Secure by Design** principle in every stage of the software development and the **Security Principles** listed below are followed during the secure development lifecycle:
14+
1415

1516
- **Apply Defense in Depth**: Layered security mechanisms are in place to increase security as a whole.
1617
- **Use a Positive Security Model**: A ‘positive’ security model defines what is allowed and rejects everything else.
@@ -38,15 +39,17 @@ As part of the security testing activities, Arduino periodically performs the fo
3839

3940
Finally, should an Arduino user or customer suspect a vulnerability or security issue, they are invited to report it as described in our Coordinated Vulnerability Disclosure policy available at: [https://www.arduino.cc/en/security](https://www.arduino.cc/en/security).
4041

41-
## Third party components
42+
## Third Party Components
43+
4244
In the process of conducting Secure Component Analysis, Arduino puts particular attention on the aforementioned external dependencies (Eclipse Theia and OpenJS Electron) and reports any found vulnerability to the respective project maintainer:
4345

4446
- Eclipse Theia manages vulnerabilities using the process described in [https://www.eclipse.org/security](https://www.eclipse.org/security).
4547
- OpenJS Electron vulnerabilities are managed using the process described in [https://www.electronjs.org/docs/latest/tutorial/security](https://www.electronjs.org/docs/latest/tutorial/security).
4648

4749
When vulnerabilities in third party components are fixed by the respective maintainer, Arduino will update the component involved as required, in a commercially reasonable time, based on the severity of the identified vulnerability.
4850

49-
## Versions management
51+
## Version Management
52+
5053
When it comes to managing multiple versions of the Arduino IDE, the following policy will be applied:
5154

5255
- all security principles that are applicable to the process (design, development, testing, release) will apply to any version currently in development

0 commit comments

Comments
 (0)