Skip to content

Commit a992961

Browse files
authored
Merge pull request #215 from wurstbrot/level5
use 5 levels and adopt levels of activities
2 parents c7d719c + 612b384 commit a992961

22 files changed

+384
-286
lines changed

README.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,6 @@ You can download your current state from the circular headmap and mount it again
6666

6767
This approach also allows teams to perform self assessment with changes tracked in a repository.
6868

69-
7069
## Amazon EC2 Instance
7170

7271
1. In the _EC2_ sidenav select _Instances_ and click _Launch Instance_

src/assets/YAML/default/BuildAndDeployment/Build.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -127,7 +127,7 @@ Build and Deployment:
127127
time: 2
128128
resources: 2
129129
usefulness: 4
130-
level: 3
130+
level: 5
131131
implementation:
132132
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/docker-content-trust
133133
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/in-toto
@@ -151,7 +151,7 @@ Build and Deployment:
151151
time: 2
152152
resources: 2
153153
usefulness: 3
154-
level: 3
154+
level: 4
155155
implementation:
156156
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/signing-of-commits
157157
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/signing-of-commits-protection

src/assets/YAML/default/BuildAndDeployment/Deployment.yaml

Lines changed: 20 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ Build and Deployment:
1111
time: 2
1212
resources: 1
1313
usefulness: 2
14-
level: 4
14+
level: 5
1515
implementation:
1616
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/blue-green-deploymen
1717
dependsOn:
@@ -223,7 +223,7 @@ Build and Deployment:
223223
time: 2
224224
resources: 1
225225
usefulness: 4
226-
level: 3
226+
level: 4
227227
implementation:
228228
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/docker
229229
dependsOn:
@@ -248,7 +248,7 @@ Build and Deployment:
248248
time: 1
249249
resources: 1
250250
usefulness: 2
251-
level: 3
251+
level: 4
252252
implementation:
253253
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/docker
254254
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/martin-feature-toggles
@@ -266,27 +266,30 @@ Build and Deployment:
266266
isImplemented: false
267267
evidence: ""
268268
comments: ""
269-
Usage of trusted images:
270-
risk: Developers or operations might start random images in the production cluster
271-
which have malicious code or known vulnerabilities.
272-
measure: Create image assessment criteria, perform an evaluation of images and
273-
create a whitelist of artifacts/container images/virtual machine images.
274-
implementation:
275-
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/kubernetes-admission
269+
Evaluation of the trust of used components:
270+
risk:
271+
- Application and system components like Open Source libraies or images can have implementation flaws or deployment flaws.
272+
- Developers or operations might start random images in the production cluster
273+
which have malicious code or known vulnerabilities.
274+
measure:
275+
- Each components source is evaluated to be trusted. For example the source, number of developers included, email configuration used by maintainers to prevent maintainer account theft, typo-squatting, ...
276+
- Create image assessment criteria, perform an evaluation of images and create a whitelist of artifacts/container images/virtual machine images.
276277
difficultyOfImplementation:
277-
knowledge: 1
278-
time: 1
278+
knowledge: 3
279+
time: 3
279280
resources: 1
280281
usefulness: 3
281282
level: 2
283+
implementation:
284+
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/kubernetes-admission
285+
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/packj
282286
references:
283287
samm2:
284-
- I-SD-2-A
288+
- O-EM-1-A
285289
iso27001-2017:
286-
- 15.1.1
287-
- 15.1.2
288-
- 15.1.3
289-
- 14.1.3
290+
- not explicitly covered by ISO 27001 - too specific
291+
- 14.2.1
292+
- 14.2.5
290293
isImplemented: false
291294
evidence: ""
292295
comments: ""

src/assets/YAML/default/BuildAndDeployment/PatchManagement.yaml

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -23,12 +23,14 @@ Build and Deployment:
2323
evidence: ""
2424
comments: ""
2525
Automated PRs for patches:
26-
risk: Known vulnerabilities components might stay for long and get exploited,
26+
risk: Components with known (or unknown) vulnerabilities might stay for long and get exploited,
2727
even when a patch is available.
2828
measure: Fast patching of third party component is needed. The DevOps way is
29-
to have an automated pull request for new components. This includes <ul> <li>Applications</li><li>Virtualized
30-
operating system components (e.g. container images)</li> <li>Operating Systems</li><li>Infrastructure
31-
as Code/GitOps (e.g. argocd)</li> </ul>
29+
to have an automated pull request for new components. This includes
30+
* Applications
31+
* Virtualized operating system components (e.g. container images)
32+
* Operating Systems
33+
* Infrastructure as Code/GitOps (e.g. argocd based on a git repository or terraform)
3234
difficultyOfImplementation:
3335
knowledge: 2
3436
time: 2
@@ -38,6 +40,8 @@ Build and Deployment:
3840
implementation:
3941
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/dependabot
4042
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/jenkins
43+
# - $ref: src/assets/YAML/default/implementations.yaml#/implementations/argocd TODO
44+
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/terraform
4145
references:
4246
samm2:
4347
- O-EM-1-B

src/assets/YAML/default/CultureAndOrganization/Design.yaml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ Culture and Organization:
1010
time: 3
1111
resources: 2
1212
usefulness: 3
13-
level: 3
13+
level: 4
1414
dependsOn:
1515
- Conduction of simple threat modeling on technical level
1616
- Creation of threat modeling processes and standards
@@ -151,7 +151,7 @@ Culture and Organization:
151151
time: 2
152152
resources: 1
153153
usefulness: 4
154-
level: 4
154+
level: 5
155155
dependsOn:
156156
- Creation of simple abuse stories
157157
implementation:
@@ -233,8 +233,8 @@ Culture and Organization:
233233
knowledge: 1
234234
time: 1
235235
resources: 1
236-
usefulness: 4
237-
level: 1
236+
usefulness: 3
237+
level: 2
238238
implementation: []
239239
references:
240240
samm2: []

src/assets/YAML/default/CultureAndOrganization/EducationAndGuidance.yaml

Lines changed: 23 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -24,11 +24,30 @@ Culture and Organization:
2424
isImplemented: false
2525
evidence: ""
2626
comments: ""
27+
Security Coaching:
28+
risk: Even if security practices are understood, it doesn't mean that they get implemented.
29+
measure: By coaching teams, teams are getting a better understanding and adoptiing security practices.
30+
difficultyOfImplementation:
31+
knowledge: 4
32+
time: 3
33+
resources: 1 # e.g. system resources
34+
usefulness: 3
35+
implementation:
36+
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/sammancoaching
37+
level: 3
38+
references:
39+
samm2:
40+
- G-EG-3-B
41+
iso27001-2017:
42+
- 7.1.1
43+
isImplemented: false
44+
evidence: ""
45+
comments: ""
2746
Aligning security in teams:
2847
risk: The concept of Security Champions might suggest that only he/she is responsible
2948
for security. However, everyone in the project team should be responsible
3049
for security.
31-
measure: By aligning security SME with project teams, a higher security standard
50+
measure: By aligning security Subject Matter Experts with project teams, a higher security standard
3251
can be achieved.
3352
difficultyOfImplementation:
3453
knowledge: 4
@@ -80,7 +99,7 @@ Culture and Organization:
8099
time: 2
81100
resources: 1
82101
usefulness: 3
83-
level: 3
102+
level: 5
84103
implementation: []
85104
references:
86105
samm2:
@@ -303,7 +322,7 @@ Culture and Organization:
303322
time: 2
304323
resources: 1
305324
usefulness: 3
306-
level: 1
325+
level: 2
307326
implementation:
308327
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/cwe25
309328
credits: |
@@ -382,7 +401,7 @@ Culture and Organization:
382401
time: 3
383402
resources: 1
384403
usefulness: 3
385-
level: 2
404+
level: 3
386405
credits: |
387406
AppSecure-nrw [Security Belts](https://github.com/AppSecure-nrw/security-belts/)
388407
implementation:

src/assets/YAML/default/CultureAndOrganization/Process.yaml

Lines changed: 1 addition & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -65,27 +65,5 @@ Culture and Organization:
6565
isImplemented: false
6666
evidence: ""
6767
comments: ""
68-
Prevention of unauthorized installation:
69-
risk: Unapproved components are used.
70-
measure: Components must be whitelisted. Regular scans on the docker infrastructure
71-
(e.g. cluster) need to be performed, to verify that only standardized base
72-
images are used.
73-
difficultyOfImplementation:
74-
knowledge: 2
75-
time: 1
76-
resources: 1
77-
usefulness: 3
78-
level: 3
79-
implementation:
80-
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/example-all-docker
81-
comment: By preventing teams from trying out new components, innovation might
82-
be hampered
83-
references:
84-
samm2: []
85-
iso27001-2017:
86-
- 12.5.1
87-
- 12.6.1
88-
isImplemented: false
89-
evidence: ""
90-
comments: ""
68+
9169
...

0 commit comments

Comments
 (0)