‹ Reports
The Dispatch

Enterprise Enhancements and Bug Fixes Drive Recent Progress in CISO Assistant Community Project

The CISO Assistant Community project, developed by Intuitem, focuses on Governance, Risk, and Compliance (GRC) management, supporting over 57 global frameworks. Recent activities have centered on enterprise feature enhancements and resolving critical bugs.

Recent Activity

Recent issues and pull requests indicate a strong focus on improving third-party risk management (#839) and addressing deployment challenges, particularly with Docker and SSL configurations (#226, #227). The team is actively working on usability improvements like better evidence management (#618).

Development Team Activities

  1. Nassim (nas-tabchiche)

    • Enterprise enhancements: Ongoing work.
    • Frontend dependency upgrades: In progress.
    • Collaboration: Worked with Mohamed-Hacene on various tasks.
  2. Mohamed-Hacene

    • TPRM enhancements: Continued focus.
    • Collaboration: Partnered with Nassim.
  3. Abder (ab-smith)

    • Documentation updates: Engaged in improvements.
    • Docker configurations: Worked with Nassim.
  4. Eric (eric-intuitem)

    • Backend library updates: Focused on framework versioning.
    • Collaboration: Worked with Coffee-007.
  5. Phil Ball (PhilBall-DEFEND)

    • NZISM framework updates: Contributed alongside Eric.
  6. Monsieurswag

    • Frontend component improvements: Focused on translation consistency.
  7. Melinoix

    • Calendar bug fixes: Added functional frontend tests independently.

Of Note

  1. Deployment Challenges: Ongoing issues with Docker and SSL suggest documentation or setup gaps (#226, #227).

  2. Framework Expansion Requests: Demand for additional frameworks like ENS Esquema Nacional de Seguridad (#520).

  3. Usability Enhancements Needed: User-driven demands for efficient workflows (#618).

  4. Translation Efforts: Active efforts to support non-English speakers through translation updates.

  5. Dependency Management: Regular updates to maintain security and performance (e.g., PR #837).

Quantified Reports

Quantify Issues



Recent GitHub Issues Activity

Timespan Opened Closed Comments Labeled Milestones
7 Days 5 8 7 3 1
30 Days 22 21 55 3 1
90 Days 81 71 155 8 1
All Time 238 159 - - -

Like all software activity quantification, these numbers are imperfect but sometimes useful. Comments, Labels, and Milestones refer to those issues opened in the timespan in question.

Quantify commits



Quantified Commit Activity Over 30 Days

Developer Avatar Branches PRs Commits Files Changes
Phil Ball 1 0/0/0 3 6 166059
ImanABS 3 3/3/0 5 10 69541
Nassim 11 20/19/1 101 151 26571
monsieurswag 9 13/16/0 55 61 17783
eric-intuitem 6 9/11/0 24 46 8025
Mohamed-Hacene 5 8/8/0 53 176 6465
dependabot[bot] 2 6/1/4 2 4 5054
Abder 6 13/12/1 31 51 2262
titouan ameline de cadeville 2 0/0/0 4 2 64
melinoix (melinoix) 3 4/0/2 4 3 30
github-actions[bot] 1 0/0/0 2 1 16
Automated code reviews 1 0/0/0 1 4 14
Alexis (Alexdev8) 0 1/0/0 0 0 0
007 0 1/1/0 0 0 0
None (vincenttisseront) 0 1/1/0 0 0 0

PRs: created by that dev and opened/merged/closed-unmerged during the period

Detailed Reports

Report On: Fetch issues



Recent Activity Analysis

Recent GitHub issue activity for the CISO Assistant Community project shows a mix of bug reports, feature requests, and questions. Notably, there are several issues related to deployment challenges, especially with Docker and SSL configurations (#226, #227). There are also requests for support of additional frameworks such as ENS Esquema Nacional de Seguridad (#520) and ISMS-P (#498), indicating a demand for broader compliance coverage. Some issues highlight usability improvements, like the need for better evidence management (#618) and enhanced risk assessment features (#376).

Anomalies and Themes

  • Deployment Challenges: Several issues report difficulties with Docker deployments, SSL errors, and environment configurations (#226, #227). This suggests potential gaps in documentation or setup scripts.
  • Framework Support: Requests for new frameworks like ENS and ISMS-P indicate ongoing interest in expanding the tool's applicability across different regulatory environments.
  • Usability Enhancements: Issues like #618 (clipboard evidence pasting) and #376 (risk assessment cloning) highlight user-driven demands for more efficient workflows.
  • Localization and Translation: There are multiple closed issues related to translation support, indicating active efforts to make the tool accessible to non-English speakers.

Issue Details

Most Recently Created Issues

  • #838: Cross-site POST form submissions are forbidden

    • Priority: High
    • Status: Open
    • Created: 1 day ago
    • Updated: Today
  • #834: "Add your own library" feature is not running

    • Priority: Medium
    • Status: Open
    • Created: 2 days ago
    • Updated: Today

Most Recently Updated Issues

  • #803: App behind reverse proxy very slow

    • Priority: Medium
    • Status: Open
    • Created: 13 days ago
    • Updated: Today
  • #635: Use ACR / AKS to run CISO assistant

    • Priority: Low
    • Status: Open
    • Created: 73 days ago
    • Updated: Today

Notable Closed Issues

  • #836: Bigger URL size

    • Closed after addressing URL length limitations.
  • #815: Ciso behind Apache2

    • Resolved with community-provided configuration guidance.

These details reflect ongoing efforts to address technical challenges and expand the tool's functionality and accessibility.

Report On: Fetch pull requests



Overview

The analysis of the pull requests (PRs) for the CISO Assistant Community project reveals a vibrant and active development environment. The project is continuously evolving with contributions that enhance its functionality, fix bugs, and improve security. The PRs cover a wide range of updates, from dependency upgrades to new feature implementations and bug fixes.

Summary of Pull Requests

Open Pull Requests

  • PR #850: A bug correction on the calendar component to prevent future months from displaying filled boxes incorrectly.
  • PR #849: Addition of functional front-end tests in the about section to verify build and version display.
  • PR #839: Enhancements related to third-party risk management, including improvements to questionnaires and tag systems.
  • PR #837: A dependency update for Vite, addressing several fixes and improvements.
  • PR #754: Enterprise enhancements including various updates and improvements across the project.

Closed Pull Requests

  • PR #848: A hotfix addressing null answers in requirement assessments, ensuring proper handling of null values.
  • PR #847: A front-end bug correction on the calendar component, similar to PR #850 but not merged.
  • PR #846: An update to the Docker build and push workflow to revert failing tags.
  • PR #845: Removal of obsolete version fields in Docker compose files.
  • PR #844: Fixing a regression in SSO functionality.

Analysis of Pull Requests

The PRs indicate a strong focus on both feature enhancement and maintenance within the CISO Assistant Community project. The presence of multiple PRs related to bug fixes (e.g., PRs #848, #847) suggests an active effort to ensure stability and reliability in the software. Additionally, enhancements like those in PR #839 reflect ongoing development aimed at expanding the project's capabilities, particularly in areas like third-party risk management.

Dependency updates (e.g., PRs #837, #754) are crucial for keeping the project secure and efficient. These updates not only address potential vulnerabilities but also incorporate performance improvements from newer library versions.

The closed PRs show a mix of quick fixes (e.g., PRs #846, #845) and more substantial changes (e.g., PR #839), indicating a well-managed workflow where both urgent issues and planned enhancements are addressed promptly. The use of automated tools like Dependabot for dependency updates (as seen in PRs like #837) helps streamline this process.

Overall, the activity around these PRs demonstrates a healthy development cycle with regular contributions that enhance functionality, improve security, and fix bugs. This is indicative of a robust community engagement and a commitment to maintaining high software quality standards.

Report On: Fetch commits



Development Team and Recent Activity

Team Members and Activities

Nassim (nas-tabchiche)

  • Recent Work: Focused on frontend improvements, bug fixes, and backend enhancements. Worked on translations, Docker configurations, and SSO regression fixes.
  • Collaboration: Worked with Mohamed-Hacene and others on various branches.
  • In Progress: Ongoing work on enterprise enhancements and frontend dependency upgrades.

Mohamed-Hacene

  • Recent Work: Concentrated on frontend fixes, UI improvements, and backend serializers. Involved in enhancing the tag system and entity assessment features.
  • Collaboration: Collaborated with Nassim on multiple tasks.
  • In Progress: Continued work on TPRM enhancements.

Abder (ab-smith)

  • Recent Work: Engaged in documentation updates, Docker configurations, and framework support enhancements. Also worked on translation updates.
  • Collaboration: Worked with Nassim and others on documentation and Docker-related tasks.

Eric (eric-intuitem)

  • Recent Work: Focused on backend library updates, bug fixes, and framework version updates. Worked on NZISM versioning.
  • Collaboration: Collaborated with Coffee-007 and others on framework updates.

Phil Ball (PhilBall-DEFEND)

  • Recent Work: Contributed to NZISM framework updates and removal of unused implementation groups.
  • Collaboration: Worked alongside Eric for framework-related tasks.

Monsieurswag

  • Recent Work: Involved in frontend component improvements, bug fixes, and translation consistency. Worked on evidence management in ModelTable.
  • Collaboration: Collaborated with Nassim and others on frontend enhancements.

Melinoix

  • Recent Work: Addressed calendar bugs and added functional frontend tests.
  • Collaboration: Worked independently on specific bug fixes.

Patterns, Themes, and Conclusions

  1. Active Collaboration: The team shows strong collaboration across different branches, especially between Nassim, Mohamed-Hacene, and Abder.

  2. Focus Areas:

    • Frontend improvements are a significant focus area, with many commits addressing UI/UX issues.
    • Backend enhancements include framework updates and bug fixes related to compliance assessments.
  3. Ongoing Projects:

    • Enterprise features are being actively developed by Nassim.
    • TPRM (Third Party Risk Management) enhancements are ongoing by Mohamed-Hacene.
  4. Translation Updates: Multiple team members are involved in updating translations across various languages, indicating a focus on internationalization.

  5. Framework Support Enhancements: There is a continuous effort to update and maintain support for various frameworks like NZISM.

Overall, the team is actively engaged in both frontend and backend development with a strong emphasis on collaboration and continuous improvement of existing features.