Skip to content

Commit 612b384

Browse files
committed
use 5 levels and adopt levels of activities
1 parent 2e52718 commit 612b384

File tree

6 files changed

+58
-11101
lines changed

6 files changed

+58
-11101
lines changed

src/assets/YAML/default/BuildAndDeployment/PatchManagement.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ Build and Deployment:
2323
evidence: ""
2424
comments: ""
2525
Automated PRs for patches:
26-
risk: Known vulnerabilities components might stay for long and get exploited,
26+
risk: Components with known (or unknown) vulnerabilities might stay for long and get exploited,
2727
even when a patch is available.
2828
measure: Fast patching of third party component is needed. The DevOps way is
2929
to have an automated pull request for new components. This includes

src/assets/YAML/default/Implementation/DevelopmentAndSourceControl.yaml

Lines changed: 1 addition & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ Implementation:
6060
time: 1
6161
resources: 2
6262
usefulness: 4
63-
level: 1
63+
level: 2
6464
implementation:
6565
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/azuredevops
6666
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/github-policies
@@ -100,32 +100,4 @@ Implementation:
100100
isImplemented: false
101101
evidence: ""
102102
comments: ""
103-
MFA to SCM:
104-
risk: Unauthorized access to source code.
105-
measure: >-
106-
Enforce Multi-Factor authentication to source code management platforms.
107-
These policies can be implemented at repository level or organization level,
108-
depending on the source code management system.
109-
difficultyOfImplementation:
110-
knowledge: 2
111-
time: 1
112-
resources: 2
113-
usefulness: 4
114-
level: 1
115-
implementation:
116-
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/yubikey
117-
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/totp
118-
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/smartcard
119-
references:
120-
samm2:
121-
- O-EM-1-A
122-
iso27001-2017:
123-
- 5.17 # Authentication information
124-
- 6.1.2 # Segregation of duties.
125-
- 14.2.1 # Secure development policies.
126-
d3f:
127-
- Multi-factorAuthentication
128-
isImplemented: false
129-
evidence: ""
130-
comments: ""
131103
...

src/assets/YAML/default/Implementation/InfrastructureHardening.yaml

Lines changed: 45 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,30 +1,61 @@
11
---
22
Implementation:
33
Infrastructure Hardening:
4-
2FA:
4+
MFA for admins:
55
risk: One factor authentication is more vulnerable to brute force attacks and
66
is considered less secure.
7-
measure: Two factor authentication for all privileged accounts on systems and
7+
measure: Two ore more factor authentication for all privileged accounts on systems and
88
applications
99
difficultyOfImplementation:
10-
knowledge: 3
11-
time: 2
12-
resources: 3
10+
knowledge: 2
11+
time: 1
12+
resources: 2
1313
usefulness: 4
14-
level: 2
14+
level: 1
1515
implementation:
1616
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/smartcard
1717
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/yubikey
1818
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/sms
1919
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/totp
2020
references:
2121
samm2:
22-
- TODO
22+
- O-EM-1-A
2323
iso27001-2017:
24-
- not explicitly covered by ISO 27001 - too specific
25-
- 9.1.1
26-
- 9.4.2
27-
- 14.2.5
24+
- 5.17 # Authentication information
25+
- 6.1.2 # Segregation of duties.
26+
- 14.2.1 # Secure development policies.
27+
d3f:
28+
- Multi-factorAuthentication
29+
isImplemented: false
30+
evidence: ""
31+
comments: ""
32+
MFA:
33+
risk: One factor authentication is more vulnerable to brute force attacks and
34+
is considered less secure.
35+
measure: Two ore more factor authentication for all accounts on all (important) systems and
36+
applications
37+
difficultyOfImplementation:
38+
knowledge: 2
39+
time: 2
40+
resources: 2
41+
usefulness: 4
42+
level: 2
43+
dependsOn:
44+
- MFA for admins
45+
implementation:
46+
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/smartcard
47+
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/yubikey
48+
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/sms
49+
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/totp
50+
references:
51+
samm2:
52+
- O-EM-1-A
53+
iso27001-2017:
54+
- 5.17 # Authentication information
55+
- 6.1.2 # Segregation of duties.
56+
- 14.2.1 # Secure development policies.
57+
d3f:
58+
- Multi-factorAuthentication
2859
isImplemented: false
2960
evidence: ""
3061
comments: ""
@@ -96,7 +127,7 @@ Implementation:
96127
isImplemented: false
97128
evidence: ""
98129
comments: ""
99-
Immutable Infrastructure:
130+
Immutable infrastructure:
100131
risk: The availability of IT systems might be disturbed due to components failures
101132
measure: Redundancies in the IT systems
102133
difficultyOfImplementation:
@@ -197,7 +228,7 @@ Implementation:
197228
isImplemented: false
198229
evidence: ""
199230
comments: ""
200-
Microservice-Architecture:
231+
Microservice-architecture:
201232
risk: Monolithic applications are hard to test.
202233
measure: A microservice-architecture helps to have small components, which are
203234
more easy to test.
@@ -290,7 +321,7 @@ Implementation:
290321
isImplemented: false
291322
evidence: ""
292323
comments: ""
293-
Baseline Hardening of the Envirnoment:
324+
Baseline Hardening of the envirnoment:
294325
risk: Using default configurations for a cluster environment leads to potential
295326
risks.
296327
measure: Harden environments according to best practices. Level 1 and

src/assets/YAML/default/TestAndVerification/StaticDepthForApplications.yaml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -213,7 +213,7 @@ Test and Verification:
213213
isImplemented: false
214214
evidence: ""
215215
comments: ""
216-
Test of client side components with known vulnerabilities:
216+
Software Composition Analysis (client side):
217217
risk: Client side components might have vulnerabilities.
218218
measure: Tests for known vulnerabilities in components via Software Composition Analysis of the frontend are performed.
219219
difficultyOfImplementation:
@@ -237,7 +237,7 @@ Test and Verification:
237237
isImplemented: false
238238
evidence: ""
239239
comments: ""
240-
Test of server side components with known vulnerabilities:
240+
Software Composition Analysis (server side):
241241
risk: Server side components might have vulnerabilities.
242242
measure: Tests for known vulnerabilities in server side components (e.g. backend/middleware)
243243
are performed.
@@ -274,8 +274,8 @@ Test and Verification:
274274
usefulness: 1
275275
level: 4
276276
dependsOn:
277-
- Test of server side components with known vulnerabilities
278-
- Test of client side components with known vulnerabilities
277+
- Software Composition Analysis (server side)
278+
- Software Composition Analysis (client side)
279279
- Static analysis for all self written components
280280
implementation: []
281281
references:

src/assets/YAML/default/TestAndVerification/StaticDepthForInfrastructure.yaml

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ Test and Verification:
1818
isImplemented: false
1919
evidence: ""
2020
comments: ""
21-
Check for image lifetime:
21+
Test for image lifetime:
2222
risk: Old container images in production indicate that patch management is not
2323
performed and therefore vulnerabilities might exists.
2424
measure: Check the image age of containers in production.
@@ -39,7 +39,7 @@ Test and Verification:
3939
isImplemented: false
4040
evidence: ""
4141
comments: ""
42-
Check for known vulnerabilities:
42+
Test for known vulnerabilities:
4343
risk: Known vulnerabilities in infrastructure components like container images
4444
might get exploited.
4545
measure: Check for known vulnerabilities
@@ -49,9 +49,11 @@ Test and Verification:
4949
resources: 1
5050
usefulness: 4
5151
level: 4
52+
description: Subscribing to github projects and reading release notes might help. Software Composition Analysis for infrastructe might help, but is often too fine-granular.
5253
implementation:
5354
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/https-github-com-a
5455
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/registries-like-quay
56+
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/dependencyTrack
5557
references:
5658
samm2:
5759
- V-ST-2-A
@@ -60,7 +62,7 @@ Test and Verification:
6062
isImplemented: false
6163
evidence: ""
6264
comments: ""
63-
Check for malware:
65+
Test for malware:
6466
risk: Third party might include malware. Ether due to the maintainer (e.g.
6567
typo squatting of an image name and using the wrong image) or by an attacker
6668
on behalf of the maintainer with stolen credentials.
@@ -82,7 +84,7 @@ Test and Verification:
8284
isImplemented: false
8385
evidence: ""
8486
comments: ""
85-
Check for new image version:
87+
Test for new image version:
8688
risk: When a new version of an image is available, it might fix security vulnerabilities.
8789
measure: Check for new images of containers in production.
8890
difficultyOfImplementation:
@@ -127,7 +129,7 @@ Test and Verification:
127129
isImplemented: false
128130
evidence: ""
129131
comments: ""
130-
Stored Secrets:
132+
Test for stored Secrets:
131133
risk: Stored secrets in git history, in container images or directly in code
132134
shouldn't exists because they might be exposed to unauthorized parties.
133135
measure: Test for secrets in code, container images and history

0 commit comments

Comments
 (0)