Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
5 changes: 5 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,10 +1,15 @@
# Changelog

All notable changes to this project will be documented in this file.

The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/),
and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html).


## Unreleased

### Added

### Changed

### Removed
34 changes: 34 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,3 +1,23 @@
## About

This repository is used by Cybersecurity operations teams at the
University of Illinois as a GitHub template.

This resource helps comply with University of Illinois
Cybersecurity standards - including [IT-07][it07], [IT08][it08],
and [IT13][it13].

[it07]: https://go.illinois.edu/secstd-IT07
[it08]: https://go.illinois.edu/secstd-IT08
[it13]: https://go.illinois.edu/secstd-IT13

See [Cybersecurity Development on the Illinois Knowledge Base][kbsearch]
for information about our development standards.

[kbsearch]: https://answers.uillinois.edu/illinois/search.php?q=cybersecurity+developer&cat=0

The remainder of this `README.md` contains example text.

## Data Sources

|Data Store|Data Type|Sensitivity|Notes|
Expand All @@ -7,3 +27,17 @@

|Endpoint|Purpose|Stage|Access|
|--------|-------|-----|------|

## Product Support

This product is supported by Cybersecurity teams at the
University of Illinois Urbana-Champaign on a best-effort basis.

As of the last update to this README, the expected End-of-Life and
End-of-Support dates of this product are <YEAR MONTH>.

End-of-Life was decided upon based on these dependencies:

- <dependency (YEAR MONTH) >
- <dependency (YEAR MONTH) >

5 changes: 3 additions & 2 deletions SECURITY.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,8 @@
Patches for this solution will only be applied to the current release.

## Reporting a Bug or Vulnerability

Vulnerabilities can be responsibly disclosed through the contact information
found at [Cybersecurity Vulnerability Disclosure](https://go.illinois.edu/vulnerability).

Vulnerabilities can be responsibly disclosed to
[securitysupport@illinois.edu](mailto:securitysupport@illinois.edu).
Bugs can be reported via repository issues.