Skip to content

Commit d30758b

Browse files
authored
Merge pull request #243 from Tamronimus/master
add uuid to json schema
2 parents d784535 + 3227c21 commit d30758b

25 files changed

+1960
-1413
lines changed

src/assets/YAML/default/BuildAndDeployment/Build.yaml

Lines changed: 70 additions & 54 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@
33
Build and Deployment:
44
Build:
55
Building and testing of artifacts in virtual environments:
6+
uuid: a340f46b-6360-4cb8-847b-a0d3483d09d3
67
description: |-
78
While building and testing artifacts, third party systems, application frameworks
89
and 3rd party libraries are used. These might be malicious as a result of
@@ -11,10 +12,12 @@ Build and Deployment:
1112
While building and testing artifacts, third party systems, application frameworks
1213
and 3rd party libraries are used. These might be malicious as a result of
1314
vulnerable libraries or because they are altered during the delivery phase.
14-
measure: Each step during within the build and testing phase is performed in
15+
measure:
16+
Each step during within the build and testing phase is performed in
1517
a separate virtual environments, which is destroyed afterward.
1618
meta:
17-
implementationGuide: Depending on your environment, usage of virtual machines
19+
implementationGuide:
20+
Depending on your environment, usage of virtual machines
1821
or container technology is a good way. After the build, the filesystem should
1922
not be used again in other builds.
2023
difficultyOfImplementation:
@@ -24,22 +27,25 @@ Build and Deployment:
2427
usefulness: 2
2528
level: 2
2629
implementation:
27-
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/ci-cd-tools
28-
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/container-technologi
30+
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/ci-cd-tools
31+
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/container-technologi
2932
references:
3033
samm2:
31-
- I-SB-2-A
34+
- I-SB-2-A
3235
iso27001-2017:
33-
- 14.2.6
36+
- 14.2.6
3437
iso27001-2022:
35-
- 8.31
38+
- 8.31
3639
isImplemented: false
3740
evidence: ""
3841
comments: ""
3942
Defined build process:
40-
risk: Performing builds without a defined process is error prone; for example,
43+
uuid: f6f7737f-25a9-4317-8de2-09bf59f29b5b
44+
risk:
45+
Performing builds without a defined process is error prone; for example,
4146
as a result of incorrect security related configuration.
42-
measure: A well defined build process lowers the possibility of errors during
47+
measure:
48+
A well defined build process lowers the possibility of errors during
4349
the build process.
4450
description: |
4551
Sample evidence as an attribute in the yaml: The build process is defined in [REPLACE-ME Pipeline](https://replace-me/jenkins/job)
@@ -58,30 +64,34 @@ Build and Deployment:
5864
5965
Credits: AppSecure-nrw [Security Belts](https://github.com/AppSecure-nrw/security-belts/)
6066
implementation:
61-
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/ci-cd-tools
62-
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/container-technologi
67+
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/ci-cd-tools
68+
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/container-technologi
6369
references:
6470
samm2:
65-
- I-SB-1-A
71+
- I-SB-1-A
6672
iso27001-2017:
67-
- 12.1.1
68-
- 14.2.2
73+
- 12.1.1
74+
- 14.2.2
6975
iso27001-2022:
70-
- 5.37
71-
- 8.32
76+
- 5.37
77+
- 8.32
7278
isImplemented: false
7379
evidence: ""
7480
comments: ""
7581
Pinning of artifacts:
76-
risk: Unauthorized manipulation of artifacts might be difficult to spot. For
82+
uuid: f3c4971e-9f4d-4e59-8ed0-f0bdb6262477
83+
risk:
84+
Unauthorized manipulation of artifacts might be difficult to spot. For
7785
example, this may result in using images with malicious code. Also, intended
7886
major changes, which are automatically used in an image used might break the
7987
functionality.
8088
measure: Pinning of artifacts ensure that changes are performed only when intended.
81-
comment: The usage of pinning requires a good processes for patching. Therefore,
89+
comment:
90+
The usage of pinning requires a good processes for patching. Therefore,
8291
choose this activity wisely.
8392
meta:
84-
implementationGuide: Pinning artifacts in Dockerfile refers to the practice of using specific,
93+
implementationGuide:
94+
Pinning artifacts in Dockerfile refers to the practice of using specific,
8595
immutable versions of base images and dependencies in your build process. Instead of using the
8696
latest tag for your base image, select a specific version or digest. For example, replace FROM node:latest,
8797
to FROM node@sha256:abcdef12.
@@ -92,35 +102,38 @@ Build and Deployment:
92102
usefulness: 3
93103
level: 2
94104
implementation:
95-
- Container technology automatically creates a hash for images, which can be
96-
used.
97-
- Immutable images are an other way, e.g. by using a registry, which doesn't
98-
allow overriding of images.
105+
- Container technology automatically creates a hash for images, which can be
106+
used.
107+
- Immutable images are an other way, e.g. by using a registry, which doesn't
108+
allow overriding of images.
99109
dependsOn:
100-
- Defined build process
110+
- Defined build process
101111
references:
102112
samm2:
103-
- I-SB-1-A
113+
- I-SB-1-A
104114
iso27001-2017:
105-
- 14.2.6
115+
- 14.2.6
106116
iso27001-2022:
107-
- 8.31
117+
- 8.31
108118
isImplemented: false
109119
evidence: ""
110120
comments: ""
111121
SBOM of components:
122+
uuid: 2858ac12-0179-40d9-9acf-1b839c030473
112123
description: |-
113-
SBOM (Software Bill of Materials) is a document that lists all components, libraries,
114-
and dependencies used in a software application or container image. Creating an SBOM
115-
during the build process can help ensure transparency, security, and license compliance
116-
for your application.
117-
risk: In case a vulnerability of severity high or critical exists, it needs
124+
SBOM (Software Bill of Materials) is a document that lists all components, libraries,
125+
and dependencies used in a software application or container image. Creating an SBOM
126+
during the build process can help ensure transparency, security, and license compliance
127+
for your application.
128+
risk:
129+
In case a vulnerability of severity high or critical exists, it needs
118130
to be known where an artifacts with that vulnerability is deployed with which
119131
dependencies.
120-
measure: Creation of an SBOM of components (e.g. application and container image
132+
measure:
133+
Creation of an SBOM of components (e.g. application and container image
121134
content) during build.
122135
dependsOn:
123-
- Defined build process
136+
- Defined build process
124137
difficultyOfImplementation:
125138
knowledge: 2
126139
time: 2
@@ -131,17 +144,19 @@ Build and Deployment:
131144
references:
132145
samm2: []
133146
iso27001-2017:
134-
- 8.1
135-
- 8.2
147+
- 8.1
148+
- 8.2
136149
iso27001-2022:
137-
- 5.9
138-
- 5.12
150+
- 5.9
151+
- 5.12
139152
isImplemented: false
140153
evidence: ""
141154
comments: ""
142155
Signing of artifacts:
156+
uuid: 5786959d-0c6f-46a6-8e1c-a32ff1a50222
143157
risk: &execution-maliciuous Execution or usage of malicious code or data e.g. via executables, libraries or container images.
144-
measure: Digitally signing artifacts for all steps during the build and especially
158+
measure:
159+
Digitally signing artifacts for all steps during the build and especially
145160
docker images, helps to ensure their integrity and authenticity.
146161
difficultyOfImplementation:
147162
knowledge: 2
@@ -150,24 +165,26 @@ Build and Deployment:
150165
usefulness: 4
151166
level: 5
152167
implementation:
153-
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/docker-content-trust
154-
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/in-toto
168+
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/docker-content-trust
169+
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/in-toto
155170
dependsOn:
156-
- Defined build process
157-
- Pinning of artifacts
171+
- Defined build process
172+
- Pinning of artifacts
158173
references:
159174
samm2:
160-
- I-SB-1-A
175+
- I-SB-1-A
161176
iso27001-2017:
162-
- 14.2.6
177+
- 14.2.6
163178
iso27001-2022:
164-
- 8.31
179+
- 8.31
165180
isImplemented: false
166181
evidence: ""
167182
comments: ""
168183
Signing of code:
184+
uuid: 9f107927-61e9-4574-85ad-3f2b4bca8665
169185
risk: *execution-maliciuous
170-
measure: Digitally signing commits helps to prevent unauthorized manipulation
186+
measure:
187+
Digitally signing commits helps to prevent unauthorized manipulation
171188
of source code.
172189
difficultyOfImplementation:
173190
knowledge: 2
@@ -176,18 +193,17 @@ Build and Deployment:
176193
usefulness: 3
177194
level: 3
178195
implementation:
179-
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/signing-of-commits
180-
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/signing-of-commits-protection
196+
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/signing-of-commits
197+
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/signing-of-commits-protection
181198
dependsOn:
182-
- Defined build process
199+
- Defined build process
183200
references:
184201
samm2:
185-
- I-SB-2-A
202+
- I-SB-2-A
186203
iso27001-2017:
187-
- 14.2.6
204+
- 14.2.6
188205
iso27001-2022:
189-
- 8.31
206+
- 8.31
190207
isImplemented: false
191208
evidence: ""
192209
comments: ""
193-
...

0 commit comments

Comments
 (0)