githubEdit

Open source and security

Answer the most common questions we hear about how an open source software affects security, and explain why public code is an asset, not a liability, when it is paired with strong operational control

Summary

Open source does not remove the need for strong security engineering. It does something more useful: it makes our code, dependencies, and architecture reviewable, so issues can be found, discussed, and fixed in the open.

For Simpler Grants, our security posture is based on controls that remain effective even when the code is fully visible:

  • secrets stored outside the repository

  • least-privilege access controls

  • network boundaries and managed cloud services

  • automated vulnerability scanning

  • code review, audit trails, and reproducible dependency management

This approach is consistent with modern security practice and with federal guidance from CISA.Federal open source is not a fringe practice; it is increasingly the default:

  • OMB M-16-21 (Federal Source Code Policy, 2016) requires federal agencies to release at least 20% of custom-developed code as open source and to make code reusable across agencies by default.

  • The SHARE IT Act (2024, Public Law 118-187) reinforces and extends this direction: custom-developed federal code should be shared across the government and, where appropriate, with the public.


How this applies to Simpler Grants

Our repository separates public design information from sensitive runtime data. Specifically:

  • Architecture is documented publicly in the repo so reviewers, partners, and contributors can see how the system is built.

  • Runtime secrets and sensitive configuration are managed outside the repository using AWS secrets management and environment-scoped parameters. No credentials, API keys, or private certificates live in the code.

  • Dependencies are pinned and reproducible via lockfiles, so any change is reviewable and auditable.

  • Production dependency footprint is minimized by separating dev-only packages from runtime dependencies and by using minimal release images where possible.

  • Automated dependency maintenance runs through Renovate, including vulnerability alert handling.

  • Vulnerability scanning runs pre-deploy via Anchore.

  • Post-build and cloud-side scanning runs through AWS Inspector and Security Hub.

  • Code review, audit trails, and branch protections mean that every change to production code is attributable, reviewable, and traceable.


What is not public

Our open source approach does not mean every security-relevant detail is published. We do not publish:

  • secrets, tokens, private keys, or credentials

  • protected production data

  • privileged operational access paths

  • private incident handling details that would create unnecessary risk while an issue is being remediated

Security vulnerabilities should be reported through the HHS Vulnerability Disclosure Policy, not through public GitHub issues.


Why this is a security advantage

Open source strengthens security when paired with mature operational controls:

  • Security researchers, vendors, partners, and HHS reviewers can inspect the same code and documentation our team uses. No black box.

  • When a new CVE is published, maintainers can quickly determine whether a vulnerable dependency is present and whether a fix has landed.

  • Pull requests, commit history, and lockfile changes create an auditable record of what changed, when, by whom, and why.

  • Sensitive protections live in secrets, access controls, infrastructure policy, and runtime defenses, not in the assumption that design details will stay hidden.

  • HHS is not dependent on a single vendor's black-box implementation to understand, operate, or transition the software in the future.

This is consistent with CISA's Open Source Software Security Roadmaparrow-up-right, which treats secure open source usage as a core part of modern federal cybersecurity rather than an exception to it. CISA itself operates under an "open-by-default" software development policy and publishes its own code on GitHub.


Industry and government examples of open source in high-risk environments

Public code and professionally operated, security-sensitive services are not mutually exclusive. This is especially well-established in the federal government.

Federal government

  • Login.gov (GSA / Technology Transformation Services). The identity provider that secures authentication for dozens of federal agencies is fully open source. Its core codebase lives at github.com/18F/identity-idparrow-up-right. Login.gov protects access to services handling SSNs, IRS records, veteran benefits, and more — and it does so with a public codebase.

  • CISA. America's cyber defense agency operates under an open-by-default software development policy and publishes its own code publicly on GitHubarrow-up-right. This is the agency whose guidance most federal security programs follow.

Industry

Many organizations operating security-sensitive, mission-critical systems combine public codebases with strong hosted operations:

  • GitLab. GitLab's core product is developed in publicarrow-up-right, and GitLab.com runs as a multi-tenant SaaS on top of that public codebase. GitLab holds FedRAMP and other government certifications.

  • HashiCorp Vault / Terraform. Vault, used for secrets management at many Fortune 500 companies and federal agencies, is developed in the open.

  • Signal. End-to-end encrypted messaging for journalists, activists, and national security personnel is fully open sourcearrow-up-right on both client and server.

  • Bitwarden. Password manager handling credentials for millions of users and enterprise customers is open source.

  • Discourse, Zulip, Mattermost. All operate public codebases alongside managed cloud offerings used by governments and regulated industries.

  • Kubernetes, PostgreSQL, Linux, nginx, OpenSSL. The foundational infrastructure of essentially every modern cloud and government system, including classified environments, is open source.

Last updated

Was this helpful?