Part 4 of: Aligning with the UK’s Software Security Code of Practice

Latest Comments

No comments to show.
UK's Software Security Code of Practice

Communication with Customers – A Technical and Strategic Guide to Secure Software Transparency

Background and Structure

This part of the Software Security Code of Practice complements the other three (Secure Design, Build Environment, Deployment and Maintenance) by ensuring that security does not end at code delivery, but continues through transparency and open communication with users and integrators.

Part 4 is evaluated through the UK government’s Assurance, Principles & Claims (APC) model. A Senior Responsible Owner (SRO), typically a director-level or VP-level leader, must ensure these practices are adopted across product, support, engineering, and communications teams.

Objective

To establish trust, support customer risk management, and meet contractual or regulatory obligations by proactively communicating security-relevant information. This includes lifecycle policies, incident notifications, and remediation guidance.


Core Principles of Part 4: Customer Communication

1. Lifecycle Documentation and Visibility

What This Means

Allow customers to plan upgrades, risk mitigation, and security patching by publishing clear and predictable software support timelines.

Implementation

Define Lifecycle Stages for Each Product

Document the following for each major release, version line, or product:

  • Release date
  • Active support period
  • Security-fix support period
  • End-of-life (EOL) date
  • Post-EOL options (e.g., extended support)

These should be:

  • Machine-readable (e.g., JSON or YAML for APIs/integrators)
  • Published on your website and developer portals

Provide at Least 12 Months’ Notice for EOL

  • Automate alerts for internal and external users when a product is 12 months from EOL.
  • Notify customers via email, support portals, and public documentation.

Potentially useful tools:

  • Commercial: Salesforce Service Cloud or Atlassian Jira Service Management (with lifecycle notification workflows)
  • Open Source: Documize for publishing lifecycle docs, or static site generators like MkDocs

Maintain a Version Support Matrix

Publish a version matrix table that clearly shows:

  • Which versions are in full support
  • Which are in security-only support
  • Which are EOL

Best Practice: Include lifecycle metadata in your product’s API or CLI via –version or /metadata endpoints.


2. Security Incident Reporting and Response Communication

What This Means

Ensure that customers receive timely, accurate, and actionable information when security incidents or vulnerabilities could impact their environments.

Implementation

Establish Predefined Customer Communication Channels

Security advisories should be published via multiple channels:

  • RSS or Atom feeds
  • Email lists (opt-in)
  • Customer portals or service dashboards
  • Developer blog or changelog

Ensure all comms reference a common incident ID (e.g., SEC-2025-003) and provide links to detailed post-mortems where applicable.

Define Notification Triggers

Triggers for customer notifications should include:

  • Discovery of vulnerabilities that affect deployed code
  • Data breaches or credential leakage
  • Software misconfiguration that could cause systemic risk
  • Suspicious behaviour or signs of compromise in distributed software

Potentially useful tools:

  • Commercial: PagerDuty with StatusPage integration, or Atlassian Opsgenie + Confluence for advisories
  • Open Source: Cortex XSOAR Community Edition, Zinc for alert publishing

Deliver Post-Incident Reports

Where applicable, publish a customer-facing summary of:

  • What happened
  • Which systems or data were impacted
  • How it was resolved
  • Steps customers should take (patch, reconfigure, rotate credentials, etc.)
  • Improvements made to prevent recurrence

Post-incident reports should avoid assigning blame and focus on transparency, timelines, and remediation.


Evaluating Compliance

The Senior Responsible Owner (SRO) should lead regular evaluations to determine whether customer-facing security communication is compliant and effective. The following questions are a starting point:

Assessment AreaKey Questions
Lifecycle VisibilityIs a lifecycle policy publicly available and easy to understand?
Do you provide a 12-month advance notice for EOL products?
Customer NotificationCan customers easily subscribe to security notifications?
Are all critical incidents communicated within your SLA (e.g., 48 hours)?
Remediation SupportDo incident reports include actionable steps for affected users?
Are internal and external versions of postmortems maintained?
Accessibility & AccessibilityAre your security comms accessible to non-technical audiences (e.g., procurement, IT security)?

Organisational Support: Enabling Customer-Centric Security Communication

Governance

  • Policy Ownership: Assign lifecycle and incident communication policies to the product or customer success function.
  • Templates and Playbooks: Standardise advisory, bulletin, and postmortem templates to reduce delay and inconsistency.
  • Legal and PR Review Workflows: Pre-approve security communication workflows to reduce bottlenecks during an incident.

Cross-Team Collaboration

  • Security + Marketing: Ensure that security teams can publish communications without unnecessary branding or marketing delay.
  • Product + Legal: Work together to define lifecycle obligations for customers under SLA, licensing, or procurement contracts.

Automation

  • Advisory Syndication: Automatically syndicate new advisories to GitHub Security Advisories, mailing lists, and changelogs.
  • Ticket Generation: Trigger automated Jira or ServiceNow tickets for customers when their deployed version approaches EOL.

Tooling Summary: Some Potentially Useful Solutions

FunctionCommercial ToolOpen Source Alternative
Lifecycle Policy ManagementSalesforce Knowledge, Jira Service MgmtDocumize, MkDocs
Security Notification ManagementPagerDuty + StatusPageZabbix or Cortex + Zinc
Incident Playbooks & ResponseAtlassian Opsgenie, ServiceNow IRTheHive + Cortex
VDP / Customer Security ReportingHackerOne, Bugcrowdsecurity.txt + Disclose.io templates
Public CommunicationGitHub Security AdvisoriesRSS/Atom feeds, self-hosted changelogs

Final Recommendations on aligning with the UK Software Security Code of Practice

  • Make transparency a default posture, not a legal fallback. Customers reward vendors who communicate early and honestly.
  • Establish internal thresholds for incident severity and corresponding communication timelines (e.g., <24h for high-impact vulnerabilities).
  • Treat customer trust as a security control, your ability to notify, guide, and support during security events is part of your risk surface.

Missed part 3? Find it at https://clearpathsecurity.co.uk/part-3-of-aligning-with-the-uks-software-security-code-of-practice

Tags:

Comments are closed