Skip to content

Maintenance Standards

This chapter defines the standards that projects with TQS certification must comply with to maintain their certification status. It includes certification validity period, minor/patch update management, CI pass monitoring, periodic reporting, and certification status change reasons.


34.1.1. Certification Validity Period

The validity period of TQS certification is determined based on the version lifecycle of the certified project.

ItemCriteria
Default validity periodUntil the next major version release (maximum 1 year)
Validity start dateCertificate issuance date
Upon expirationRenewal audit required
Early expiration reasonsMajor version release, certification suspension, certification revocation

The certification validity period begins from the certificate issuance date and expires when the next major version is released or when a maximum of 1 year has elapsed. If a major version is released within 1 year, the certification expires at the time of the major version release. If no major version is released for more than 1 year, it expires after 1 year.

A renewal audit must be requested before the validity period expires. The renewal audit must be requested at least 2 weeks before the expiration date. If the renewal audit is not completed by the expiration date, the certification is automatically suspended.


34.1.2. Minor/Patch Update Management

Minor version (e.g., v1.1 to v1.2) or patch version (e.g., v1.1.0 to v1.1.1) updates do not affect the certification validity period. No separate renewal audit is required; confirming CI pipeline passage is sufficient.

The following requirements must be observed during minor/patch updates.

  • After the update, it must be confirmed that the CI pipeline passes completely.
  • Test coverage must be maintained at or above the certification thresholds (line 80%, branch 70%).
  • When adding new dependencies, OWASP Dependency-Check must be run to verify security vulnerabilities.
  • Changes that violate existing TQS standard items must not be included.

If significant technology stack changes occur in a minor/patch update (e.g., major library replacement, architecture changes), a change audit must be requested. Regardless of the minor/patch version number, the TQS Committee may require a change audit if the scope of substantive changes is large.


34.1.3. CI Pass Monitoring

To maintain certification, the CI pipeline must pass consistently. Continuous CI pipeline failures are considered a situation where the project's compliance with quality standards is in doubt.

34.1.3.1. Monitoring Items

Project teams must continuously monitor the following items.

Monitoring ItemCriteriaVerification Frequency
Build success rateMaintain 90% or higherWeekly
Test pass rate100% (all tests pass)Every commit
Coverage trendMaintain at or above certification thresholdWeekly
Security scan results0 vulnerabilities with CVSS 7.0+Weekly
Format/lint pass0 violationsEvery commit

34.1.3.2. Warnings and Notifications

When CI pipeline failures are repeated, the following escalation actions are performed.

ConditionAction
3 consecutive failuresInternal warning within the project team (self-managed)
5 consecutive failuresAutomatic notification to TQS Committee
10 consecutive failuresTQS Committee requests root cause analysis
30+ consecutive days of failureCertification suspension review

At 5 consecutive failures, the TQS Committee is automatically notified. After notification, the project team must report the cause of failure and resolution plan to the TQS Committee. If CI fails consecutively for 30 or more days, the TQS Committee reviews certification suspension.


34.1.4. Periodic Reporting

Projects maintaining certification may submit quarterly certification maintenance reports. Periodic report submission is optional, but submitting reports provides the benefit of reduced audit scope during renewal audits.

34.1.4.1. Report Contents

Periodic reports must include the following items.

ItemContentData Source
CI pass rateBuild success rate for the quarterCircleCI dashboard
Coverage trendLine/branch coverage change trendJaCoCo, Vitest reports
Security scan resultsVulnerability discovery/resolution status for the quarterOWASP report
Major changesTechnology stack changes, architecture changes, major feature additionsProject change history
Certification criteria maintenance statusSummary of compliance status for each mandatory itemSelf-assessment results

34.1.4.2. Report Submission and Benefits

  • Submission frequency: Once per quarter (every 3 months)
  • Submission method: Written submission to the TQS Committee
  • Benefits of submission: Items confirmed through periodic reports may be exempt from re-verification during renewal audits. This can shorten the renewal audit period.
  • There are no penalties for not submitting reports. However, all items must be re-verified during the renewal audit.

34.1.5. Certification Status Change Reasons

The certification status may be changed when the following reasons occur.

ReasonResultResponse Method
Major version releaseRenewal audit requiredRequest renewal audit before release
Long-term CI failure (30+ days)Certification suspensionRequest restoration after resolving failure cause
Security incident occurrenceSecurity item re-auditRequest re-audit after completing response measures
TQS standard revisionRespond within grace periodRequest re-verification after applying changed items
Voluntary request by project teamCertification suspension or revocationSubmit request form to TQS Committee

34.1.5.1. Major Version Release

When a major version is released (e.g., v1.x to v2.x), the existing certification expires. A renewal audit must be passed for the major version to maintain certification. It is recommended to request the renewal audit before the major version release.

34.1.5.2. Long-term CI Failure

If the CI pipeline fails consecutively for 30 or more days, the TQS Committee may decide to suspend certification. Before the suspension decision, the project team is notified in advance, and a 14-day resolution period is granted. If CI is restored to normal within the resolution period, suspension can be avoided.

34.1.5.3. Security Incident Occurrence

If a security incident (data breach, unauthorized access, vulnerability exploitation, etc.) occurs in the project, the TQS Committee may require a re-audit of security items. The project team must complete incident response measures (root cause analysis, recurrence prevention measures, security configuration reinforcement) and then request the re-audit.

34.1.5.4. TQS Standard Revision

When TQS standards are revised, a grace period is granted to existing certified projects. The grace period is determined by the TQS Committee based on the scope and difficulty of the standard changes, with a default grace period of 3 months. If the changed standard items are not applied within the grace period, certification may be suspended.

TIENIPIA QUALIFIED STANDARD