Skip to content

Commit 71d7219

Browse files
committed
rebalance system calls
1 parent c71e73d commit 71d7219

File tree

3 files changed

+37
-8
lines changed

3 files changed

+37
-8
lines changed

src/assets/YAML/default/Implementation/InfrastructureHardening.yaml

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -194,21 +194,22 @@ Implementation:
194194
isImplemented: false
195195
evidence: ""
196196
comments: ""
197-
Limitation of system calls in virtual environments:
198-
risk: System calls in virtual environments like docker can lead to privilege
197+
Limitation of system events:
198+
risk: System events (system calls) can lead to privilege
199199
escalation.
200-
measure: System calls in virtual environments like docker are audited and limited.
200+
measure: System calls are limited.
201201
difficultyOfImplementation:
202-
knowledge: 3
203-
time: 3
204-
resources: 3
202+
knowledge: 2
203+
time: 2
204+
resources: 1
205205
usefulness: 5
206-
level: 4
206+
level: 3
207207
dependsOn:
208-
- Applications are running in virtualized environments
208+
- Audit of systemcalls
209209
implementation:
210210
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/seccomp
211211
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/strace
212+
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/falco
212213
references:
213214
samm2:
214215
- O-EM-1-A

src/assets/YAML/default/InformationGathering/Monitoring.yaml

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -45,6 +45,27 @@ Information Gathering:
4545
isImplemented: false
4646
evidence: ""
4747
comments: ""
48+
Audit of system events:
49+
risk: System events (system calls) trends and attacks are not detected.
50+
measure: Gathering of systemcalls.
51+
difficultyOfImplementation:
52+
knowledge: 2
53+
time: 2
54+
resources: 2
55+
usefulness: 4
56+
level: 3
57+
dependsOn:
58+
- Visualized metrics
59+
implementation:
60+
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/falco
61+
references:
62+
samm2:
63+
- O-IM-2-A
64+
iso27001-2017:
65+
- 12.6.1
66+
isImplemented: false
67+
evidence: ""
68+
comments: ""
4869
Alerting:
4970
risk: Incidents are discovered after they happened.
5071
measure: |
@@ -160,6 +181,7 @@ Information Gathering:
160181
isImplemented: false
161182
evidence: ""
162183
comments: ""
184+
163185
Metrics are combined with tests:
164186
risk: Changes might cause high load due to programming errors.
165187
measure: Metrics during tests helps to identify programming errors.

src/assets/YAML/default/implementations.yaml

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -699,3 +699,9 @@ implementations:
699699
url: https://github.com/SDA-SE/defectdojo-client
700700
description: |
701701
This projects contains the DefectDojo upload client and statistics client. It is for example used within the ClusterImageScanner.
702+
falco:
703+
name: Falco
704+
tags: [falco, systemcall, monitoring]
705+
url: https://github.com/falcosecurity/falco
706+
description: |
707+
Falco makes it easy to consume kernel events, and enrich those events with information from Kubernetes and the rest of the cloud native stack.

0 commit comments

Comments
 (0)