Ægis Initiative
Supply Chain Security & Compliance Initiative
Objectives
-
Elevate Ecosystem-Wide Security
Establish a strong, foundational security posture that benefits every user of BEAM languages and tools, regardless of their organization’s size.
-
Streamline Compliance Readiness
Ensure that projects and maintainers can easily meet or exceed emerging global regulations (e.g., EU CRA, NIST SSDF) through built-in security features and best practices.
-
Foster Trust and Transparency
Implement mechanisms like event transparency logs and verifiable package provenance to create an auditable trail that builds user confidence in the ecosystem.
-
Democratize Advanced Security
Provide user-friendly libraries and tools (e.g., cosign, SLSA, SCITT) so that smaller teams without dedicated security resources can adopt best-in-class protections.
-
Enable Secure Publishing Workflows
Protect package maintainers and end-users by deploying robust authentication (passkeys, MFA) and replacing exposed API keys with safer, tokenless publication methods.
-
Empower Continuous Vulnerability Management
Integrate automated vulnerability scanning and reporting into build and install processes, making security awareness accessible to every developer.
-
Support Sustainable Maintenance
Offer stipends, guidance, and community collaboration so maintainers and contributors have the resources needed to keep security features robust and up to date.
-
Enhance Embedded & Enterprise Integration
Develop toolchains (e.g., Yocto integration, BOM generation) that ease the adoption of BEAM-based applications in embedded and heavily regulated environments.
-
Cultivate Long-Term Funding & Governance
Transition from single large grants to a diversified funding model—attracting industry sponsorships and broad community support to ensure financial stability.
-
Promote Ecosystem Growth & Adoption
Demonstrate how open source security capabilities drive broader adoption of BEAM technologies, thereby strengthening the community through shared innovation and best practices.
Roadmap
Name | Area | Status | Sponsors |
---|---|---|---|
Erlang OpenChain Compliance | Compliance | Done |
|
Elixir OpenChain Compliance | Compliance | Done |
|
Gleam OpenChain Compliance | Compliance | In Progress (10%) |
|
Erlang Ecosystem Foundation CNA | Compliance | In Progress (75%) |
|
Core Tooling Compliance | Compliance | In Progress (20%) |
|
Core Tooling Governance Audit | Governance | Planning |
|
Supply Chain Security Audit | Supply Chain | Planning |
More Funding Required |
Hex Vulnerability Handling | Supply Chain | Planning |
More Funding Required |
Hex Account Security | Supply Chain | Planning |
More Funding Required |
Hex API Credential Security | Supply Chain | Planning |
More Funding Required |
Hex Build Provenance | Supply Chain | Planning |
More Funding Required |
Hex Asset Side-Loading | Supply Chain | Planning |
More Funding Required |
SBoM | Supply Chain | Planning |
More Funding Required |
Funding
Achieving the objectives and milestones on our roadmap requires external funding. We welcome contributions in various forms. If you’d like to support this initiative, please contact us at sponsorship@erlef.org. Sponsorship can be provided through:
- Financial Contributions
- Directly fund key activities such as security audits, engineering work, and stipends for maintainers.
- Support can be one-time or recurring, depending on your preference.
- In-Kind Contributions (Manpower)
- Offer developer time, security expertise, or other specialized skill sets to help implement features, review code, or audit progress.
- Enables direct collaboration on critical tasks while also shaping the future of the ecosystem.
Sponsors
Implementation
The initiative is designed to accommodate multiple pathways for contributing new security features and improvements. Regardless of the approach, all work is guided and reviewed by the EEF Security Working Group and the EEF CISO to ensure consistency, quality, and adherence to our strategic roadmap. Here are the primary ways implementation can happen:
-
Internal EEF Resources
The EEF can allocate its own staff and experts (including the CISO) to implement features directly.
-
Stipends for External Contributors
The EEF can fund stipends or grants for developers, maintainers, or other specialists in the community.
-
Sponsor-Provided Implementation
A sponsor may opt to contribute manpower directly, having their own team or contractors develop and integrate new capabilities.