🛡️ Open Source License Compliance Through Transparent Governance
🎯 Evidence-Based Self-Certification for Supply Chain Trust
📋 Document Owner: CEO | 📄 Version: 1.0 | 📅 Last Updated: 2026-04-10 (UTC)
🔄 Review Cycle: Annual | ⏰ Next Review: 2027-04-10
"Our commitment to open source transparency goes beyond code — it extends to rigorous license compliance and supply chain integrity. This self-certification against ISO/IEC 5230:2020 demonstrates that Hack23 AB operates a mature open source compliance program, giving our clients, partners, and the open source community confidence in how we manage license obligations across all our projects."
— James Pether Sörling, CEO, Hack23 AB
This document provides Hack23 AB's complete self-certification assessment against the OpenChain ISO/IEC 5230:2020 International Standard for open source license compliance, using the official OpenChain Self-Certification Checklist. Each checklist item is assessed with honest, accurate answers reflecting our single-person company structure, linking to specific ISMS policies and evidence.
📎 Checklist Source: OpenChain ISO/IEC 5230 Self-Certification Checklist (GitHub)
🌐 Online Form: openchainproject.org/checklist-iso-5230-2020
📋 Conformance Submission: openchainproject.org/conformance-submission
| Attribute | Detail |
|---|---|
| Organization | Hack23 AB (Org.nr: 559534-7807) |
| Founded | 2025 |
| Location | Göteborg, Sweden |
| CEO / Sole Employee | James Pether Sörling |
| Business Lines | Cybersecurity Consulting, Open Source Software |
| Open Source Projects | 6 active repositories |
| Assessment Date | 2026-04-10 |
| Standard | ISO/IEC 5230:2020 (OpenChain Specification 2.1) |
Hack23 AB open source projects carry public compliance badges demonstrating continuous security validation. All 6 projects have OpenSSF Scorecard, CII Best Practices, SLSA 3, and License badges. FOSSA license compliance scanning is enabled on the 3 primary repositories (CIA, Black Trigram, CIA Compliance Manager):
pie title ISO/IEC 5230:2020 Compliance Status
"Fully Conformant" : 33
"Conformant with Caveat" : 1
"Non-Conformant" : 0
graph LR
subgraph "ISO/IEC 5230:2020 — Hack23 AB Self-Certification"
S1["🏗️ Section 1<br/>Program Foundation<br/>12 Requirements"]
S2["⚙️ Section 2<br/>Tasks Defined<br/>7 Requirements"]
S3["🔍 Section 3<br/>Content Review<br/>8 Requirements"]
S4["📦 Section 4<br/>Artifact Delivery<br/>2 Requirements"]
S5["🤝 Section 5<br/>Community Engagement<br/>3 Requirements"]
S6["✅ Section 6<br/>Adherence<br/>2 Requirements"]
end
S1 --> R1["✅ 12/12"]
S2 --> R2["✅ 7/7"]
S3 --> R3["✅ 8/8"]
S4 --> R4["✅ 2/2"]
S5 --> R5["✅ 3/3"]
S6 --> R6["✅ 2/2"]
style S1 fill:#4CAF50,stroke:#2E7D32,color:#ffffff
style S2 fill:#4CAF50,stroke:#2E7D32,color:#ffffff
style S3 fill:#4CAF50,stroke:#2E7D32,color:#ffffff
style S4 fill:#4CAF50,stroke:#2E7D32,color:#ffffff
style S5 fill:#4CAF50,stroke:#2E7D32,color:#ffffff
style S6 fill:#4CAF50,stroke:#2E7D32,color:#ffffff
style R1 fill:#e8f5e9,stroke:#4CAF50,color:#000000
style R2 fill:#e8f5e9,stroke:#4CAF50,color:#000000
style R3 fill:#e8f5e9,stroke:#4CAF50,color:#000000
style R4 fill:#e8f5e9,stroke:#4CAF50,color:#000000
style R5 fill:#e8f5e9,stroke:#4CAF50,color:#000000
style R6 fill:#e8f5e9,stroke:#4CAF50,color:#000000
| Rating | Meaning | Color |
|---|---|---|
| ✅ Yes | Fully conformant — documented evidence exists | 🟢 Green |
| Conformant with noted simplification due to single-person company | 🟡 Amber | |
| ❌ No | Not conformant — gap identified | 🔴 Red |
Honest Assessment Note: Hack23 AB is a single-person company (solopreneur). The CEO (James Pether Sörling) serves as the sole program participant, fulfilling all roles: developer, compliance officer, legal advisor, and release manager. Where the standard envisions multi-person processes, we answer honestly about our single-person equivalents while demonstrating that the intent and outcomes of each requirement are fully met.
📎 OpenChain Checklist Reference: Section 1: Program foundation
graph TD
subgraph "Section 1 — Program Foundation"
P1["📜 Documented Policy"]
P2["📢 Policy Communication"]
P3["👤 Roles & Responsibilities"]
P4["📋 Competency Requirements"]
P5["✅ Assessed Competence"]
P6["🔔 Awareness: Policy Location"]
P7["🎯 Awareness: Objectives"]
P8["🤝 Awareness: Contributions"]
P9["⚠️ Awareness: Implications"]
P10["🔍 Program Scope Process"]
P11["📄 Scope Statement"]
P12["📖 License Review Procedure"]
end
P1 --> E1["🔓 Open Source Policy"]
P2 --> E2["ISMS Repository"]
P3 --> E3["CEO = All Roles"]
P4 --> E4["Open Source Policy § Roles"]
P5 --> E5["CII Best Practices Gold"]
P6 --> E6["README + Policy Links"]
P7 --> E7["Business Strategy"]
P8 --> E8["CONTRIBUTING.md"]
P9 --> E9["Policy § Non-Compliance"]
P10 --> E10["Open Source Policy § Scope"]
P11 --> E11["Policy § Scope Statement"]
P12 --> E12["FOSSA + License Review"]
style P1 fill:#4CAF50,stroke:#2E7D32,color:#ffffff
style P2 fill:#4CAF50,stroke:#2E7D32,color:#ffffff
style P3 fill:#4CAF50,stroke:#2E7D32,color:#ffffff
style P4 fill:#4CAF50,stroke:#2E7D32,color:#ffffff
style P5 fill:#4CAF50,stroke:#2E7D32,color:#ffffff
style P6 fill:#4CAF50,stroke:#2E7D32,color:#ffffff
style P7 fill:#4CAF50,stroke:#2E7D32,color:#ffffff
style P8 fill:#4CAF50,stroke:#2E7D32,color:#ffffff
style P9 fill:#4CAF50,stroke:#2E7D32,color:#ffffff
style P10 fill:#4CAF50,stroke:#2E7D32,color:#ffffff
style P11 fill:#4CAF50,stroke:#2E7D32,color:#ffffff
style P12 fill:#4CAF50,stroke:#2E7D32,color:#ffffff
style E1 fill:#e8f5e9,stroke:#4CAF50,color:#000000
style E2 fill:#e8f5e9,stroke:#4CAF50,color:#000000
style E3 fill:#e8f5e9,stroke:#4CAF50,color:#000000
style E4 fill:#e8f5e9,stroke:#4CAF50,color:#000000
style E5 fill:#e8f5e9,stroke:#4CAF50,color:#000000
style E6 fill:#e8f5e9,stroke:#4CAF50,color:#000000
style E7 fill:#e8f5e9,stroke:#4CAF50,color:#000000
style E8 fill:#e8f5e9,stroke:#4CAF50,color:#000000
style E9 fill:#e8f5e9,stroke:#4CAF50,color:#000000
style E10 fill:#e8f5e9,stroke:#4CAF50,color:#000000
style E11 fill:#e8f5e9,stroke:#4CAF50,color:#000000
style E12 fill:#e8f5e9,stroke:#4CAF50,color:#000000
| Checklist Item | Answer | Evidence |
|---|---|---|
| We have a documented policy governing the open source license compliance of supplied software. | ✅ Yes | 🔓 Open Source Policy |
📝 Assessment Detail:
Hack23 AB maintains a comprehensive Open Source Policy (v2.4, last updated 2026-02-26) that explicitly governs open source license compliance for all supplied software. The policy covers:
- License Classification Framework: Permissive (Apache-2.0, MIT, BSD), Copyleft (GPL, LGPL, AGPL), Non-standard, and Commercial categories — documented in Open Source Policy § License Classification
- Automated License Scanning: FOSSA integration on the 3 primary repositories (CIA, Black Trigram, CIA Compliance Manager); remaining projects use GitHub's built-in license detection and manual review per Open Source Policy § License Classification
- License Compatibility Review: Manual review required for conflicts or exceptions
- Monthly Compliance Reports: FOSSA reports reviewed by CEO for projects with FOSSA integration
📊 Evidence Badges:
| Project | FOSSA License Compliance | License |
|---|---|---|
| 🏛️ CIA | ||
| 🎮 Black Trigram | ||
| 📊 CIA Compliance Manager | ||
| 🇪🇺 EP MCP Server | — | |
| 🇪🇺 EU Parliament Monitor | — | |
| 🗳️ Riksdagsmonitor | — |
| Checklist Item | Answer | Evidence |
|---|---|---|
| We have a documented procedure to communicate the existence of the open source policy to program participants. | ✅ Yes | 🔓 Open Source Policy • 🌐 ISMS Transparency Plan |
📝 Assessment Detail:
As a single-person company, the CEO is the sole "program participant." Communication of the open source policy is achieved through:
- ISMS Repository: The Open Source Policy is maintained in the central ISMS repository, accessible at all times
- Public Transparency: The policy is published in the ISMS-PUBLIC repository per the ISMS Transparency Plan, making it visible to all stakeholders
- Repository Cross-References: Each project README includes a "Project Classification" section linking back to ISMS governance per Classification Framework
- Annual Review: Annual review cycle ensures continued awareness
Single-Person Caveat: In a single-person company, the policy author and the program participant are the same individual. The CEO created, approved, and implements the policy. Communication is inherently achieved through authorship and continuous maintenance.
| Checklist Item | Answer | Evidence |
|---|---|---|
| We have identified the roles and responsibilities that affect the performance and effectiveness of the program. | ✅ Yes | 🔓 Open Source Policy § Roles |
📝 Assessment Detail:
The Open Source Policy defines the following roles, all fulfilled by the CEO:
| Role | Responsibility | Person |
|---|---|---|
| Open Source Program Manager | Overall governance, policy oversight | James Pether Sörling |
| License Compliance Officer | License review, FOSSA monitoring | James Pether Sörling |
| Exception Approver | License conflict resolution | James Pether Sörling |
| Security Lead | Vulnerability disclosure, remediation | James Pether Sörling |
| Release Manager | SBOM generation, artifact delivery | James Pether Sörling |
| Community Manager | Contribution policy, external engagement | James Pether Sörling |
Honest Note: All roles are held by one person. This is documented transparently. The standard's intent — that responsibilities are defined and assigned — is fully met.
| Checklist Item | Answer | Evidence |
|---|---|---|
| We have identified and documented the competencies required for each role. | ✅ Yes | 🔓 Open Source Policy • 🛠️ Secure Development Policy |
📝 Assessment Detail:
Required competencies documented in the Open Source Policy and Secure Development Policy include:
- License Law Understanding: Knowledge of OSI-approved licenses, copyleft vs. permissive distinctions, license compatibility
- SBOM Generation: CycloneDX and SPDX format expertise
- Security Scanning: SAST (SonarCloud), SCA (Dependabot, FOSSA), DAST (OWASP ZAP) proficiency
- Supply Chain Security: SLSA framework knowledge, provenance attestation
- Regulatory Awareness: EU CRA, GDPR, and NIS2 compliance requirements
- Community Engagement: Open source contribution best practices
| Checklist Item | Answer | Evidence |
|---|---|---|
| We have documented the assessed competence for each program participant. | ✅ Yes | CII Best Practices (Gold), OpenSSF Scorecard results, public project track record |
📝 Assessment Detail:
The CEO's competence is publicly verifiable through the following evidence:
| Competency Area | Evidence | Validation |
|---|---|---|
| License Compliance | FOSSA clean reports on integrated projects | |
| Security Best Practices | CII Best Practices Gold (CIA, project 770) | |
| Supply Chain Security | SLSA Level 3 attestations on all projects | |
| Code Quality | SonarCloud Quality Gate passing | |
| Open Source Track Record | 20+ years of open source development | GitHub Profile |
Single-Person Caveat: Self-assessment of competence carries inherent bias. To mitigate, Hack23 AB relies on third-party automated validation (OpenSSF Scorecard, CII Best Practices, FOSSA, SonarCloud) as objective competency indicators.
| Checklist Item | Answer | Evidence |
|---|---|---|
| We have documented the awareness of our program participants on the open source policy and where to find it. | ✅ Yes | 🔓 Open Source Policy — located in ISMS root |
📝 Assessment Detail:
The Open Source Policy is located at /Open_Source_Policy.md in the ISMS repository. The sole program participant (CEO) authored this policy and knows its location. The ISMS Transparency Plan ensures a public version is maintained in ISMS-PUBLIC.
| Checklist Item | Answer | Evidence |
|---|---|---|
| We have documented the awareness of our program participants on relevant open source objectives. | ✅ Yes | 🔓 Open Source Policy § Purpose |
📝 Assessment Detail:
The Open Source Policy purpose statement and the Information Security Strategy define clear objectives:
- Transparency-led Differentiation: Open source as competitive advantage
- Compliance-first: License compliance via FOSSA, REUSE, and automated scanning
- Security Excellence: Public evidence badges demonstrating continuous security validation
- Supply Chain Integrity: SBOM generation, SLSA provenance, dependency tracking
- Community Alignment: Ethical open source participation per CODE_OF_CONDUCT.md
| Checklist Item | Answer | Evidence |
|---|---|---|
| We have documented the awareness of our program participants on contributions expected to ensure the effectiveness of the program. | ✅ Yes | 🔓 Open Source Policy § Contribution Policy • CONTRIBUTING.md in each repo |
📝 Assessment Detail:
Each Hack23 repository maintains a CONTRIBUTING.md file defining contribution expectations. The Open Source Policy documents contribution governance including license compatibility verification and Developer Certificate of Origin (DCO) requirements.
📊 Evidence:
- 🏛️ CIA: CONTRIBUTING.md
- 🎮 Black Trigram: CONTRIBUTING.md
- 📊 CIA Compliance Manager: CONTRIBUTING.md
| Checklist Item | Answer | Evidence |
|---|---|---|
| We have documented the awareness of our program participants on the implications of failing to follow the Program requirements. | ✅ Yes | 🔓 Open Source Policy • ✅ Compliance Checklist |
📝 Assessment Detail:
The Open Source Policy and Compliance Checklist document non-compliance implications including:
- Legal Risk: License violation liability, potential litigation
- Reputational Damage: Loss of community trust, badge degradation
- Regulatory Exposure: EU CRA non-compliance penalties, NIS2 sanctions
- Business Impact: Client confidence erosion, consulting credibility loss
As a single-person company, the CEO bears full personal and business liability for non-compliance, providing maximum incentive for adherence.
| Checklist Item | Answer | Evidence |
|---|---|---|
| We have a process for determining the scope of our program. | ✅ Yes | 🔓 Open Source Policy § Scope |
📝 Assessment Detail:
The Open Source Policy defines scope as:
In scope:
- All open source repositories under the Hack23 GitHub organization
- Third-party open source usage and compliance
- Open source contribution governance
Out of scope:
- Internal-only repositories not intended for public distribution
The scope determination process is triggered by:
- New repository creation
- New dependency addition (automated via Dependabot/FOSSA)
- Annual policy review
| Checklist Item | Answer | Evidence |
|---|---|---|
| We have a written statement clearly defining the scope and limits of the program. | ✅ Yes | 🔓 Open Source Policy § Scope |
📝 Assessment Detail:
The written scope statement in the Open Source Policy explicitly defines:
| In Scope | Out of Scope |
|---|---|
| All Hack23 GitHub organization public repositories | Internal-only repositories not for distribution |
| Third-party open source dependency compliance | Proprietary client deliverables |
| Open source contribution governance | SaaS services not distributed as software |
| SBOM generation for all releases | |
| License scanning and compatibility checks |
Covered Projects:
| Project | Type | License | In Scope |
|---|---|---|---|
| 🏛️ CIA | Political transparency platform | Apache-2.0 | ✅ |
| 🎮 Black Trigram | Educational gaming platform | Apache-2.0 | ✅ |
| 📊 CIA Compliance Manager | Security assessment tool | Apache-2.0 | ✅ |
| 🇪🇺 EP MCP Server | Political intelligence MCP server | Apache-2.0 | ✅ |
| 🇪🇺 EU Parliament Monitor | News generation platform | Apache-2.0 | ✅ |
| 🗳️ Riksdagsmonitor | Parliament intelligence platform | Apache-2.0 | ✅ |
| Checklist Item | Answer | Evidence |
|---|---|---|
| We have a documented procedure to review and document open source license obligations, restrictions and rights. | ✅ Yes | 🔓 Open Source Policy § License Classification • FOSSA Integration |
📝 Assessment Detail:
The Open Source Policy documents a multi-layer license review procedure:
flowchart TD
A["📦 New Dependency Added"] --> B{"🔍 FOSSA Automated<br/>License Scan"}
B -->|"Clean"| C["✅ Auto-Approved<br/>Permissive License"]
B -->|"Copyleft Detected"| D{"⚖️ Manual Review<br/>by CEO"}
B -->|"Unknown/Custom"| E{"🔍 Deep License<br/>Analysis"}
D -->|"Compatible"| F["✅ Approved with<br/>Obligation Noted"]
D -->|"Incompatible"| G["❌ Rejected<br/>Alternative Required"]
E -->|"Acceptable"| F
E -->|"Unacceptable"| G
F --> H["📋 License Obligation<br/>Documented"]
C --> H
H --> I["📦 SBOM Updated<br/>with License Info"]
style A fill:#2196F3,stroke:#1565C0,color:#ffffff
style B fill:#FFC107,stroke:#FF9800,color:#000000
style C fill:#4CAF50,stroke:#2E7D32,color:#ffffff
style D fill:#FF9800,stroke:#F57C00,color:#ffffff
style E fill:#FF9800,stroke:#F57C00,color:#ffffff
style F fill:#4CAF50,stroke:#2E7D32,color:#ffffff
style G fill:#D32F2F,stroke:#B71C1C,color:#ffffff
style H fill:#4CAF50,stroke:#2E7D32,color:#ffffff
style I fill:#2196F3,stroke:#1565C0,color:#ffffff
License Classification Framework:
| Category | Examples | Policy | Action |
|---|---|---|---|
| Permissive | Apache-2.0, MIT, BSD | ✅ Pre-approved | Auto-accepted |
| Copyleft | GPL, LGPL, AGPL | CEO review + compatibility check | |
| Non-standard | Custom licenses | Legal analysis required | |
| Commercial | Dual-licensed | Business case evaluation | |
| Incompatible | License conflicts | ❌ Prohibited | Alternative must be found |
📎 OpenChain Checklist Reference: Section 2: Relevant tasks defined and supported
graph TD
subgraph "Section 2 — Tasks Defined and Supported"
T1["📧 Public Inquiry Method"]
T2["📋 Inquiry Response Procedure"]
T3["👤 Program Staffing"]
T4["💰 Adequate Funding"]
T5["⚖️ Legal Expertise"]
T6["📝 Internal Responsibilities"]
T7["🔧 Non-Compliance Remediation"]
end
T1 --> ET1["SECURITY.md + GitHub Issues"]
T2 --> ET2["Incident Response Plan"]
T3 --> ET3["CEO = Sole Staff"]
T4 --> ET4["Self-Funded Operations"]
T5 --> ET5["CEO Legal Competence"]
T6 --> ET6["Open Source Policy"]
T7 --> ET7["Vulnerability Mgmt"]
style T1 fill:#4CAF50,stroke:#2E7D32,color:#ffffff
style T2 fill:#4CAF50,stroke:#2E7D32,color:#ffffff
style T3 fill:#4CAF50,stroke:#2E7D32,color:#ffffff
style T4 fill:#4CAF50,stroke:#2E7D32,color:#ffffff
style T5 fill:#FFC107,stroke:#FF9800,color:#000000
style T6 fill:#4CAF50,stroke:#2E7D32,color:#ffffff
style T7 fill:#4CAF50,stroke:#2E7D32,color:#ffffff
style ET1 fill:#e8f5e9,stroke:#4CAF50,color:#000000
style ET2 fill:#e8f5e9,stroke:#4CAF50,color:#000000
style ET3 fill:#e8f5e9,stroke:#4CAF50,color:#000000
style ET4 fill:#e8f5e9,stroke:#4CAF50,color:#000000
style ET5 fill:#fff3e0,stroke:#FFC107,color:#000000
style ET6 fill:#e8f5e9,stroke:#4CAF50,color:#000000
style ET7 fill:#e8f5e9,stroke:#4CAF50,color:#000000
| Checklist Item | Answer | Evidence |
|---|---|---|
| We have a publicly visible method for any third party to make an open source license compliance inquiry. | ✅ Yes | SECURITY.md in each repo + GitHub Issues |
📝 Assessment Detail:
Every Hack23 repository includes a SECURITY.md file providing a public contact method for security and compliance inquiries. Additionally, GitHub Issues are enabled on all repositories for general compliance questions.
📊 Evidence:
| Project | Security Contact | Issues |
|---|---|---|
| 🏛️ CIA | SECURITY.md | Issues |
| 🎮 Black Trigram | SECURITY.md | Issues |
| 📊 CIA Compliance Manager | SECURITY.md | Issues |
| 🇪🇺 EP MCP Server | SECURITY.md | Issues |
| Checklist Item | Answer | Evidence |
|---|---|---|
| We have a documented procedure for responding to open source compliance inquiries. | ✅ Yes | 🚨 Incident Response Plan • 🔓 Open Source Policy |
📝 Assessment Detail:
Compliance inquiries are handled through the Incident Response Plan which covers all external communications including compliance inquiries. Response procedure:
- Receipt: Inquiry received via SECURITY.md, GitHub Issues, or email
- Triage: CEO assesses scope and urgency
- Investigation: License verification via FOSSA and SBOM review
- Response: Documented response within SLA timeframe
- Remediation: If non-compliance found, immediate corrective action per Vulnerability Management
| Checklist Item | Answer | Evidence |
|---|---|---|
| We have documented the persons, group or function supporting the program role(s) identified. | ✅ Yes | 🔓 Open Source Policy § Roles |
📝 Assessment Detail:
All program roles are documented in the Open Source Policy and staffed by the CEO. See Section 1.3 above for the complete role-to-person mapping.
| Checklist Item | Answer | Evidence |
|---|---|---|
| We have ensured the identified program roles been properly staffed and adequately funded. | ✅ Yes | Company operations, tool subscriptions |
📝 Assessment Detail:
- Staffing: The CEO allocates dedicated time for open source compliance activities as part of regular operations
- Tooling Budget: Active subscriptions/integrations for FOSSA, SonarCloud, GitHub (with Advanced Security features), and OpenSSF infrastructure
- Automation Investment: CI/CD pipelines with integrated license scanning reduce manual effort, making single-person management feasible
Honest Note: As a solopreneur, "adequate staffing" means one person managing all activities. This is viable because of extensive automation (FOSSA, Dependabot, OpenSSF Scorecard) that reduces manual compliance overhead to manageable levels.
| Checklist Item | Answer | Evidence |
|---|---|---|
| We have identified legal expertise to address internal and external open source compliance matters. | CEO technical-legal competence + external counsel available |
📝 Assessment Detail:
- Internal Expertise: The CEO has 20+ years of open source experience with working knowledge of major open source licenses (Apache-2.0, GPL family, MIT, BSD), copyright law, and EU regulatory frameworks (CRA, GDPR, NIS2)
- Automated Assistance: FOSSA provides automated legal analysis of license obligations and compatibility
- External Counsel: Access to Swedish legal advisors available for complex matters (not yet needed)
- Community Resources: OpenChain Project resources, Linux Foundation legal guidance
Honest Caveat: The CEO is not a licensed attorney. For complex legal disputes or novel license interpretations, external legal counsel would be engaged. Day-to-day compliance is managed through established tooling and extensive practical experience.
| Checklist Item | Answer | Evidence |
|---|---|---|
| We have a documented procedure assigning internal responsibilities for open source compliance. | ✅ Yes | 🔓 Open Source Policy • 📊 Security Metrics |
📝 Assessment Detail:
The Open Source Policy assigns all compliance responsibilities to the CEO with specific accountability for:
- License scanning review (monthly FOSSA reports)
- Dependency vulnerability remediation (per Vulnerability Management SLAs)
- SBOM accuracy verification (per release)
- Compliance badge maintenance (continuous)
| Checklist Item | Answer | Evidence |
|---|---|---|
| We have a documented procedure for handling the review and remediation of non-compliant cases. | ✅ Yes | 🔍 Vulnerability Management • 🔓 Open Source Policy |
📝 Assessment Detail:
Non-compliance remediation follows a documented escalation procedure:
flowchart TD
A["🚨 Non-Compliance<br/>Detected"] --> B{"📊 Severity<br/>Assessment"}
B -->|"Critical"| C["⚡ Immediate<br/>Remediation<br/>24h SLA"]
B -->|"High"| D["🔴 Priority<br/>Remediation<br/>7 day SLA"]
B -->|"Medium"| E["🟡 Planned<br/>Remediation<br/>30 day SLA"]
B -->|"Low"| F["🟢 Scheduled<br/>Remediation<br/>90 day SLA"]
C --> G["📋 Root Cause<br/>Analysis"]
D --> G
E --> G
F --> G
G --> H["🔄 Process<br/>Improvement"]
H --> I["✅ Verification<br/>& Closure"]
style A fill:#D32F2F,stroke:#B71C1C,color:#ffffff
style B fill:#FFC107,stroke:#FF9800,color:#000000
style C fill:#D32F2F,stroke:#B71C1C,color:#ffffff
style D fill:#FF9800,stroke:#F57C00,color:#ffffff
style E fill:#FFC107,stroke:#FF9800,color:#000000
style F fill:#4CAF50,stroke:#2E7D32,color:#ffffff
style G fill:#2196F3,stroke:#1565C0,color:#ffffff
style H fill:#2196F3,stroke:#1565C0,color:#ffffff
style I fill:#4CAF50,stroke:#2E7D32,color:#ffffff
📎 OpenChain Checklist Reference: Section 3: Open source content review and approval
graph TD
subgraph "Section 3 — Content Review and Approval"
C1["📦 Component Tracking"]
C2["📋 Component Records"]
C3["📦 Binary Distribution"]
C4["📄 Source Distribution"]
C5["🔗 Integration Obligations"]
C6["✏️ Modified OSS"]
C7["⚠️ Incompatible Licenses"]
C8["📝 Attribution Requirements"]
end
C1 --> EC1["FOSSA + Dependabot + SBOM"]
C2 --> EC2["SBOM in GitHub Releases"]
C3 --> EC3["GitHub Releases + Attestation"]
C4 --> EC4["Public GitHub Repos"]
C5 --> EC5["License Compatibility Check"]
C6 --> EC6["Fork Policy + License Review"]
C7 --> EC7["FOSSA Conflict Detection"]
C8 --> EC8["NOTICE + LICENSE Files"]
style C1 fill:#4CAF50,stroke:#2E7D32,color:#ffffff
style C2 fill:#4CAF50,stroke:#2E7D32,color:#ffffff
style C3 fill:#4CAF50,stroke:#2E7D32,color:#ffffff
style C4 fill:#4CAF50,stroke:#2E7D32,color:#ffffff
style C5 fill:#4CAF50,stroke:#2E7D32,color:#ffffff
style C6 fill:#4CAF50,stroke:#2E7D32,color:#ffffff
style C7 fill:#4CAF50,stroke:#2E7D32,color:#ffffff
style C8 fill:#4CAF50,stroke:#2E7D32,color:#ffffff
style EC1 fill:#e8f5e9,stroke:#4CAF50,color:#000000
style EC2 fill:#e8f5e9,stroke:#4CAF50,color:#000000
style EC3 fill:#e8f5e9,stroke:#4CAF50,color:#000000
style EC4 fill:#e8f5e9,stroke:#4CAF50,color:#000000
style EC5 fill:#e8f5e9,stroke:#4CAF50,color:#000000
style EC6 fill:#e8f5e9,stroke:#4CAF50,color:#000000
style EC7 fill:#e8f5e9,stroke:#4CAF50,color:#000000
style EC8 fill:#e8f5e9,stroke:#4CAF50,color:#000000
| Checklist Item | Answer | Evidence |
|---|---|---|
| We have a documented procedure for identifying, tracking, reviewing, approving, and archiving information about the open source components in a supplied software release. | ✅ Yes | 🔓 Open Source Policy § Supply Chain • 🛠️ Secure Development Policy § SBOM |
📝 Assessment Detail:
Open source component management is automated through a comprehensive CI/CD pipeline:
- Identification: Dependabot continuously scans all repositories for open source dependencies
- Tracking: FOSSA provides real-time dependency and license tracking
- Review: Pull request checks include automated license compatibility analysis
- Approval: CEO reviews and approves dependency changes via PR merge
- Archiving: SBOM (SPDX + CycloneDX) generated for every release and stored as GitHub Release artifacts with SLSA provenance attestations
📊 Supply Chain Evidence:
| Project | Dependabot | SBOM/Attestations | FOSSA |
|---|---|---|---|
| 🏛️ CIA | Config | Attestations | Report |
| 🎮 Black Trigram | Config | Attestations | Report |
| 📊 CIA CM | Config | Attestations | Report |
| 🇪🇺 EP MCP | Active | Attestations | — |
| 🇪🇺 EU Parl Mon | Active | Attestations | — |
| 🗳️ Riksdagsmon | Active | Attestations | — |
| Checklist Item | Answer | Evidence |
|---|---|---|
| We have open source component records for the supplied software to demonstrate the documented procedure was properly followed. | ✅ Yes | SBOM artifacts in GitHub Releases |
📝 Assessment Detail:
Every release includes machine-readable SBOM containing:
- Complete dependency tree with exact versions
- License identifiers (SPDX format)
- Cryptographic hashes for integrity verification
- SLSA provenance attestation linking build to source
These records are versioned and publicly accessible for verification. SLSA provenance attestations provide tamper-evident integrity guarantees, and GitHub Releases serve as the primary distribution and archival mechanism.
| Checklist Item | Answer | Evidence |
|---|---|---|
| We have a documented procedure that covers distribution of the supplied software in binary form. | ✅ Yes | 🛠️ Secure Development Policy • CI/CD workflows |
📝 Assessment Detail:
Binary distribution is handled through GitHub Releases with the following compliance controls:
- Build Provenance: SLSA Level 3 attestations verify the build process
- SBOM Inclusion: Every binary release includes a corresponding SBOM
- License Bundling: LICENSE files included in all distributed packages
- Signing: Release artifacts are signed with GitHub's Sigstore integration
📊 SLSA Evidence:
| Project | SLSA Level | Attestations |
|---|---|---|
| 🏛️ CIA | View | |
| 🎮 Black Trigram | View | |
| 📊 CIA CM | View | |
| 🇪🇺 EP MCP | View | |
| 🇪🇺 EU Parl Mon | View | |
| 🗳️ Riksdagsmon | View |
| Checklist Item | Answer | Evidence |
|---|---|---|
| We have a documented procedure that covers distribution of the supplied software in source form. | ✅ Yes | Public GitHub repositories |
📝 Assessment Detail:
All Hack23 software is distributed in source form via public GitHub repositories. Each repository includes:
- LICENSE file with OSI-approved Apache-2.0 license
- README.md with Project Classification section
- Full source code with complete git history
- Automated CI/CD that builds from source
Source distribution inherently satisfies most license obligations since all source is publicly available.
| Checklist Item | Answer | Evidence |
|---|---|---|
| We have a documented procedure that covers integration of the supplied software with open source that may trigger additional obligations. | ✅ Yes | 🔓 Open Source Policy § License Classification |
📝 Assessment Detail:
The license classification framework in the Open Source Policy specifically addresses integration obligations:
- Copyleft Detection: FOSSA flags copyleft licenses that may trigger reciprocal obligations
- Compatibility Check: CEO reviews license compatibility before approving dependencies with copyleft or strong copyleft licenses
- Obligation Documentation: License obligations documented in SBOM and FOSSA reports
| Checklist Item | Answer | Evidence |
|---|---|---|
| We have a documented procedure that covers inclusion of modified open source in the supplied software. | ✅ Yes | 🔓 Open Source Policy § Contribution Policy |
📝 Assessment Detail:
Hack23 AB's current practice involves minimal modification of third-party open source. When modifications are necessary:
- Changes are contributed upstream via pull requests when possible
- Forks clearly document modifications
- License obligations of the original software are maintained
- Modified files retain original copyright notices plus Hack23 attribution
| Checklist Item | Answer | Evidence |
|---|---|---|
| We have a documented procedure that covers inclusion of open source or other software under incompatible licenses interacting with other components in the supplied software. | ✅ Yes | 🔓 Open Source Policy § License Compatibility |
📝 Assessment Detail:
The Open Source Policy explicitly addresses incompatible licenses:
- Prohibited Combinations: Licenses incompatible with the project's primary license are listed
- FOSSA Detection: Automated conflict detection on every pull request
- Rejection Procedure: Dependencies with incompatible licenses are rejected with documented rationale
- Alternative Search: When a dependency is rejected, alternative compatible libraries are identified
| Checklist Item | Answer | Evidence |
|---|---|---|
| We have a documented procedure that covers inclusion of open source with attribution requirements in the supplied software. | ✅ Yes | LICENSE files + FOSSA attribution reports |
📝 Assessment Detail:
Attribution requirements are managed through:
- LICENSE Directory: Contains all dependency licenses (automated via FOSSA for integrated projects, manual review for others)
- NOTICE Files: Attribution for projects requiring it
- SBOM Attribution: Machine-readable attribution in SPDX format
- FOSSA Reports: Complete attribution reports generated for projects with FOSSA integration
📎 OpenChain Checklist Reference: Section 4: Compliance artifact creation and delivery
graph TD
subgraph "Section 4 — Compliance Artifacts"
A1["📦 Artifact Preparation<br/>& Distribution"]
A2["🗄️ Artifact Archival"]
end
A1 --> EA1["GitHub Releases<br/>SBOM + SLSA + LICENSE"]
A2 --> EA2["GitHub immutable releases<br/>+ FOSSA archive"]
style A1 fill:#4CAF50,stroke:#2E7D32,color:#ffffff
style A2 fill:#4CAF50,stroke:#2E7D32,color:#ffffff
style EA1 fill:#e8f5e9,stroke:#4CAF50,color:#000000
style EA2 fill:#e8f5e9,stroke:#4CAF50,color:#000000
| Checklist Item | Answer | Evidence |
|---|---|---|
| We have a documented procedure describing the process for preparing and distributing compliance artifacts with the supplied software as required by the identified licenses. | ✅ Yes | 🛠️ Secure Development Policy § SBOM • 🔓 Open Source Policy |
📝 Assessment Detail:
Compliance artifacts are prepared and distributed automatically with every release:
| Artifact | Format | Distribution Method | Purpose |
|---|---|---|---|
| SBOM | SPDX + CycloneDX | GitHub Release assets | Component inventory + licenses |
| SLSA Provenance | In-toto attestation | GitHub Attestations | Build integrity verification |
| LICENSE | Plain text | Repository root + packages | License terms |
| NOTICE | Plain text | Repository root (where required) | Third-party attribution |
| FOSSA Report | HTML/JSON | FOSSA platform | License compliance report |
| Source Code | Git repository | GitHub public repo | Complete source availability |
| Checklist Item | Answer | Evidence |
|---|---|---|
| We have a documented procedure for archiving copies of compliance artifacts for the supplied software from either the last offer of the supplied software or as required by the identified licenses, whichever is longer. | ✅ Yes | GitHub Releases (versioned, publicly accessible) + FOSSA (continuous) |
📝 Assessment Detail:
- GitHub Releases: All release artifacts (including SBOMs and attestations) are retained in GitHub Releases for the lifetime of the repository. SLSA attestations provide tamper-evident provenance verification.
- Git History: Complete source history maintained via git version control
- FOSSA: Continuous license scanning history maintained on the FOSSA platform (for projects with FOSSA integration)
- Backup: Per Backup & Recovery Policy, GitHub data is included in backup scope
Retention Period: Compliance artifacts are retained for the lifetime of each repository (with no planned deprecation), plus backup retention per Backup & Recovery Policy. Combined with git history preservation, this meets or exceeds typical "last offer + 3 years" requirements.
📎 OpenChain Checklist Reference: Section 5: Understanding open source community engagements
graph TD
subgraph "Section 5 — Community Engagement"
CE1["📜 Contribution Policy"]
CE2["📋 Contribution Procedure"]
CE3["🔔 Contribution Awareness"]
end
CE1 --> ECE1["Open Source Policy<br/>Contribution Section"]
CE2 --> ECE2["CONTRIBUTING.md<br/>in each repo"]
CE3 --> ECE3["Policy + README<br/>Cross-references"]
style CE1 fill:#4CAF50,stroke:#2E7D32,color:#ffffff
style CE2 fill:#4CAF50,stroke:#2E7D32,color:#ffffff
style CE3 fill:#4CAF50,stroke:#2E7D32,color:#ffffff
style ECE1 fill:#e8f5e9,stroke:#4CAF50,color:#000000
style ECE2 fill:#e8f5e9,stroke:#4CAF50,color:#000000
style ECE3 fill:#e8f5e9,stroke:#4CAF50,color:#000000
| Checklist Item | Answer | Evidence |
|---|---|---|
| We have a documented open source contribution policy. | ✅ Yes | 🔓 Open Source Policy § Contribution Policy |
📝 Assessment Detail:
The Open Source Policy contains a dedicated contribution governance section covering:
- Outbound Contributions: Rules for contributing Hack23 code to external projects
- Inbound Contributions: Acceptance criteria for external contributions to Hack23 projects
- License Compatibility: Verification that contribution licenses align
- IP Review: Ensuring contributions don't introduce IP conflicts
- DCO/CLA: Developer Certificate of Origin requirements
| Checklist Item | Answer | Evidence |
|---|---|---|
| We have a documented procedure governing open source contributions. | ✅ Yes | CONTRIBUTING.md in each repository |
📝 Assessment Detail:
Each repository maintains a CONTRIBUTING.md file with:
- How to submit contributions (pull request workflow)
- Code quality standards and testing requirements
- License agreement requirements
- Code of conduct reference
- Review and approval process
📊 Evidence:
| Project | CONTRIBUTING.md | CODE_OF_CONDUCT.md |
|---|---|---|
| 🏛️ CIA | CONTRIBUTING.md | CODE_OF_CONDUCT.md |
| 🎮 Black Trigram | CONTRIBUTING.md | CODE_OF_CONDUCT.md |
| 📊 CIA CM | CONTRIBUTING.md | CODE_OF_CONDUCT.md |
| Checklist Item | Answer | Evidence |
|---|---|---|
| We have a documented procedure for making all program participants aware of the open source contribution policy. | ✅ Yes | 🔓 Open Source Policy + repository documentation |
📝 Assessment Detail:
As a single-person company, the CEO is both the policy author and sole contributor. Awareness is demonstrated through:
- The Open Source Policy contribution section is maintained in the ISMS repository
- Each project's CONTRIBUTING.md references the contribution governance
- All contributions are made by the CEO who authored the contribution policy
📎 OpenChain Checklist Reference: Section 6: Adherence to the specification requirements
graph TD
subgraph "Section 6 — Specification Adherence"
AD1["📋 Program Meets<br/>All Requirements"]
AD2["🔄 Conformance Review<br/>Every 18 Months"]
end
AD1 --> EAD1["This Document<br/>ISO 5230 Self-Cert"]
AD2 --> EAD2["Annual ISMS Review<br/>+ This Assessment"]
style AD1 fill:#4CAF50,stroke:#2E7D32,color:#ffffff
style AD2 fill:#4CAF50,stroke:#2E7D32,color:#ffffff
style EAD1 fill:#e8f5e9,stroke:#4CAF50,color:#000000
style EAD2 fill:#e8f5e9,stroke:#4CAF50,color:#000000
| Checklist Item | Answer | Evidence |
|---|---|---|
| We have documentation confirming that the program meets all the requirements of the specification. | ✅ Yes | This document (ISO_5230_Self_Certification.md) |
📝 Assessment Detail:
This self-certification document serves as the comprehensive evidence that Hack23 AB's open source compliance program meets all requirements of ISO/IEC 5230:2020. Each of the 34 checklist items has been assessed with:
- Direct answer (Yes / Yes with Caveat)
- Specific evidence and policy references
- Honest caveats where the single-person company structure differs from multi-person assumptions
- Public, verifiable evidence via badges and links
| Checklist Item | Answer | Evidence |
|---|---|---|
| We have documentation confirming that the program conformance is reviewed at least every 18 months. | ✅ Yes | Annual ISMS review cycle |
📝 Assessment Detail:
- This Assessment: First ISO 5230 self-certification performed 2026-04-10
- Annual Assessment: Annual (12 months), exceeding the 18-month minimum required by the standard
- Next Review: 2027-04-10 (12 months from this assessment)
- Trigger Events: Additionally reviewed when significant changes occur to the open source program
The ISMS review cycle documented in the ISMS Transparency Plan and Security Metrics ensures all policies, including this self-certification, are reviewed at least annually.
graph LR
subgraph "Conformance Summary"
direction TB
G1["✅ Section 1<br/>12/12 Conformant"]
G2["✅ Section 2<br/>7/7 Conformant"]
G3["✅ Section 3<br/>8/8 Conformant"]
G4["✅ Section 4<br/>2/2 Conformant"]
G5["✅ Section 5<br/>3/3 Conformant"]
G6["✅ Section 6<br/>2/2 Conformant"]
end
G1 --> TOTAL["🏆 TOTAL<br/>34/34<br/>CONFORMANT"]
G2 --> TOTAL
G3 --> TOTAL
G4 --> TOTAL
G5 --> TOTAL
G6 --> TOTAL
style G1 fill:#4CAF50,stroke:#2E7D32,color:#ffffff
style G2 fill:#4CAF50,stroke:#2E7D32,color:#ffffff
style G3 fill:#4CAF50,stroke:#2E7D32,color:#ffffff
style G4 fill:#4CAF50,stroke:#2E7D32,color:#ffffff
style G5 fill:#4CAF50,stroke:#2E7D32,color:#ffffff
style G6 fill:#4CAF50,stroke:#2E7D32,color:#ffffff
style TOTAL fill:#1565C0,stroke:#0D47A1,color:#ffffff
| # | Requirement | Section | Answer | Evidence | ISMS Policy Link |
|---|---|---|---|---|---|
| 1.1 | Documented OSS compliance policy | S1 | ✅ Yes | Open Source Policy v2.4 | 🔓 Open Source Policy |
| 1.2 | Policy communication procedure | S1 | ✅ Yes | ISMS repo + ISMS-PUBLIC | 🌐 ISMS Transparency Plan |
| 1.3 | Roles and responsibilities identified | S1 | ✅ Yes | CEO = all roles (documented) | 🔓 Open Source Policy |
| 1.4 | Competency requirements documented | S1 | ✅ Yes | Policy + Secure Dev Policy | 🛠️ Secure Development Policy |
| 1.5 | Assessed competence documented | S1 | ✅ Yes | CII Gold, OpenSSF, FOSSA | 📊 Security Metrics |
| 1.6 | Awareness: policy location | S1 | ✅ Yes | ISMS root + README links | 🔓 Open Source Policy |
| 1.7 | Awareness: objectives | S1 | ✅ Yes | Policy purpose statement | 🔓 Open Source Policy |
| 1.8 | Awareness: contributions expected | S1 | ✅ Yes | CONTRIBUTING.md in all repos | 🔓 Open Source Policy |
| 1.9 | Awareness: non-compliance implications | S1 | ✅ Yes | Policy + legal/regulatory refs | ✅ Compliance Checklist |
| 1.10 | Program scope process | S1 | ✅ Yes | In/out scope definition | 🔓 Open Source Policy |
| 1.11 | Written scope statement | S1 | ✅ Yes | Policy scope section | 🔓 Open Source Policy |
| 1.12 | License review procedure | S1 | ✅ Yes | FOSSA + manual review | 🔓 Open Source Policy |
| 2.1 | Public inquiry method | S2 | ✅ Yes | SECURITY.md + GitHub Issues | 🚨 Incident Response Plan |
| 2.2 | Inquiry response procedure | S2 | ✅ Yes | IRP + Open Source Policy | 🚨 Incident Response Plan |
| 2.3 | Program staffing documented | S2 | ✅ Yes | CEO = all roles | 🔓 Open Source Policy |
| 2.4 | Adequate staffing and funding | S2 | ✅ Yes | Tool subscriptions + automation | 💻 Asset Register |
| 2.5 | Legal expertise identified | S2 | CEO expertise + external available | 🔓 Open Source Policy | |
| 2.6 | Internal responsibilities assigned | S2 | ✅ Yes | Open Source Policy | 🔓 Open Source Policy |
| 2.7 | Non-compliance remediation procedure | S2 | ✅ Yes | Vuln Mgmt + Open Source Policy | 🔍 Vulnerability Management |
| 3.1 | Component tracking procedure | S3 | ✅ Yes | FOSSA + Dependabot + SBOM | 🛠️ Secure Development Policy |
| 3.2 | Component records exist | S3 | ✅ Yes | SBOM in GitHub Releases | 🛠️ Secure Development Policy |
| 3.3 | Binary distribution procedure | S3 | ✅ Yes | GitHub Releases + SLSA | 🛠️ Secure Development Policy |
| 3.4 | Source distribution procedure | S3 | ✅ Yes | Public GitHub repositories | 🔓 Open Source Policy |
| 3.5 | Integration obligation procedure | S3 | ✅ Yes | License compatibility check | 🔓 Open Source Policy |
| 3.6 | Modified OSS procedure | S3 | ✅ Yes | Fork policy + license review | 🔓 Open Source Policy |
| 3.7 | Incompatible license procedure | S3 | ✅ Yes | FOSSA conflict detection | 🔓 Open Source Policy |
| 3.8 | Attribution requirements procedure | S3 | ✅ Yes | LICENSE files + FOSSA reports | 🔓 Open Source Policy |
| 4.1 | Artifact preparation and distribution | S4 | ✅ Yes | SBOM + SLSA + LICENSE | 🛠️ Secure Development Policy |
| 4.2 | Artifact archival | S4 | ✅ Yes | GitHub Releases (permanent) | 💾 Backup & Recovery Policy |
| 5.1 | Contribution policy | S5 | ✅ Yes | Open Source Policy | 🔓 Open Source Policy |
| 5.2 | Contribution governance procedure | S5 | ✅ Yes | CONTRIBUTING.md in each repo | 🔓 Open Source Policy |
| 5.3 | Contribution awareness | S5 | ✅ Yes | Policy + repo documentation | 🔓 Open Source Policy |
| 6.1 | Program meets all requirements | S6 | ✅ Yes | This document | This document |
| 6.2 | Conformance reviewed every 18 months | S6 | ✅ Yes | Annual ISMS review cycle | 📊 Security Metrics |
* Item 2.5 rated "Yes with Caveat" — CEO has extensive practical expertise but is not a licensed attorney. External legal counsel available if needed.
mindmap
root((ISO 5230 Self-Certification))
Section 1: Foundation
Open Source Policy
Secure Development Policy
ISMS Transparency Plan
Classification Framework
Security Metrics
Section 2: Tasks
Incident Response Plan
Vulnerability Management
Asset Register
Open Source Policy
Section 3: Content Review
Open Source Policy
Secure Development Policy
CRA Conformity Assessment
Section 4: Artifacts
Secure Development Policy
Backup Recovery Policy
Section 5: Community
Open Source Policy
Section 6: Adherence
This Document
Security Metrics
| ISMS Policy | ISO 5230 Sections Referenced | Purpose |
|---|---|---|
| 🔓 Open Source Policy | S1, S2, S3, S5 | Primary compliance policy governing license compliance program |
| 🛠️ Secure Development Policy | S1, S3, S4 | SBOM requirements, security testing, artifact generation |
| ✅ Compliance Checklist | S1, S6 | Multi-framework compliance mapping including open source |
| 🛡️ CRA Conformity Assessment | S3, S4 | EU CRA compliance with SBOM and supply chain requirements |
| 🚨 Incident Response Plan | S2 | Inquiry response and communication procedures |
| 🔍 Vulnerability Management | S2 | Non-compliance remediation SLAs and procedures |
| 💻 Asset Register | S2 | Tool and subscription inventory |
| 📊 Security Metrics | S1, S6 | Compliance monitoring and review cycle evidence |
| 🌐 ISMS Transparency Plan | S1 | Policy publication and communication strategy |
| 💾 Backup & Recovery Policy | S4 | Artifact archival and retention |
| 🏷️ Data Classification Policy | S3 | Classification of open source components |
| 🤝 Third-Party Management | S3 | Supply chain security for dependencies |
graph TD
DEC["📜 DECLARATION<br/>Hack23 AB Self-Certifies Conformance<br/>to ISO/IEC 5230:2020"]
DEC --> D1["✅ All 34 checklist items<br/>answered affirmatively"]
DEC --> D2["📋 33 items fully conformant<br/>1 item conformant with caveat"]
DEC --> D3["📝 Honest assessment reflecting<br/>single-person company reality"]
DEC --> D4["🔄 Next review: 2027-04-10<br/>within 18-month requirement"]
style DEC fill:#1565C0,stroke:#0D47A1,color:#ffffff
style D1 fill:#4CAF50,stroke:#2E7D32,color:#ffffff
style D2 fill:#4CAF50,stroke:#2E7D32,color:#ffffff
style D3 fill:#FFC107,stroke:#FF9800,color:#000000
style D4 fill:#2196F3,stroke:#1565C0,color:#ffffff
Hack23 AB hereby self-certifies that its open source license compliance program conforms to the requirements of ISO/IEC 5230:2020 (OpenChain Specification 2.1) as of 2026-04-10.
This self-certification is based on:
- ✅ Comprehensive assessment of all 34 checklist items
- ✅ 33 items fully conformant, 1 item conformant with documented caveat
- ✅ Evidence linked to specific ISMS policies and public verification sources
- ✅ Honest, transparent assessment reflecting single-person company structure
- ✅ Annual review cycle (12 months) exceeding the 18-month requirement
Certified by: James Pether Sörling, CEO, Hack23 AB
Date: 2026-04-10
Valid until: 2027-10-10 (18 months per specification requirement)
- 🔓 Open Source Policy — Primary open source governance policy
- 🛠️ Secure Development Policy — SBOM, testing, and security requirements
- ✅ Compliance Checklist — Multi-framework compliance mapping
- 🛡️ CRA Conformity Assessment Process — EU CRA compliance process
- 🚨 Incident Response Plan — Inquiry response procedures
- 🔍 Vulnerability Management — Non-compliance remediation
- 💻 Asset Register — Tool and asset inventory
- 📊 Security Metrics — Compliance monitoring and KPIs
- 🌐 ISMS Transparency Plan — Public policy communication
- 💾 Backup & Recovery Policy — Artifact archival
- 🏷️ Data Classification Policy — Information classification
- 🤝 Third-Party Management — Supply chain governance
- 🔐 Information Security Policy — Master security governance
📋 Document Control:
✅ Approved by: James Pether Sörling, CEO
📤 Distribution: All Personnel, Clients, Open Source Community
🏷️ Classification:
📅 Effective Date: 2026-04-10
⏰ Next Review: 2027-04-10
🎯 Framework Compliance: