33Build and Deployment :
44 Build :
55 Building and testing of artifacts in virtual environments :
6+ uuid : a340f46b-6360-4cb8-847b-a0d3483d09d3
67 description : |-
78 While building and testing artifacts, third party systems, application frameworks
89 and 3rd party libraries are used. These might be malicious as a result of
@@ -11,10 +12,12 @@ Build and Deployment:
1112 While building and testing artifacts, third party systems, application frameworks
1213 and 3rd party libraries are used. These might be malicious as a result of
1314 vulnerable libraries or because they are altered during the delivery phase.
14- measure : Each step during within the build and testing phase is performed in
15+ measure :
16+ Each step during within the build and testing phase is performed in
1517 a separate virtual environments, which is destroyed afterward.
1618 meta :
17- implementationGuide : Depending on your environment, usage of virtual machines
19+ implementationGuide :
20+ Depending on your environment, usage of virtual machines
1821 or container technology is a good way. After the build, the filesystem should
1922 not be used again in other builds.
2023 difficultyOfImplementation :
@@ -24,22 +27,25 @@ Build and Deployment:
2427 usefulness : 2
2528 level : 2
2629 implementation :
27- - $ref : src/assets/YAML/default/implementations.yaml#/implementations/ci-cd-tools
28- - $ref : src/assets/YAML/default/implementations.yaml#/implementations/container-technologi
30+ - $ref : src/assets/YAML/default/implementations.yaml#/implementations/ci-cd-tools
31+ - $ref : src/assets/YAML/default/implementations.yaml#/implementations/container-technologi
2932 references :
3033 samm2 :
31- - I-SB-2-A
34+ - I-SB-2-A
3235 iso27001-2017 :
33- - 14.2.6
36+ - 14.2.6
3437 iso27001-2022 :
35- - 8.31
38+ - 8.31
3639 isImplemented : false
3740 evidence : " "
3841 comments : " "
3942 Defined build process :
40- risk : Performing builds without a defined process is error prone; for example,
43+ uuid : f6f7737f-25a9-4317-8de2-09bf59f29b5b
44+ risk :
45+ Performing builds without a defined process is error prone; for example,
4146 as a result of incorrect security related configuration.
42- measure : A well defined build process lowers the possibility of errors during
47+ measure :
48+ A well defined build process lowers the possibility of errors during
4349 the build process.
4450 description : |
4551 Sample evidence as an attribute in the yaml: The build process is defined in [REPLACE-ME Pipeline](https://replace-me/jenkins/job)
@@ -58,30 +64,34 @@ Build and Deployment:
5864
5965 Credits: AppSecure-nrw [Security Belts](https://github.com/AppSecure-nrw/security-belts/)
6066 implementation :
61- - $ref : src/assets/YAML/default/implementations.yaml#/implementations/ci-cd-tools
62- - $ref : src/assets/YAML/default/implementations.yaml#/implementations/container-technologi
67+ - $ref : src/assets/YAML/default/implementations.yaml#/implementations/ci-cd-tools
68+ - $ref : src/assets/YAML/default/implementations.yaml#/implementations/container-technologi
6369 references :
6470 samm2 :
65- - I-SB-1-A
71+ - I-SB-1-A
6672 iso27001-2017 :
67- - 12.1.1
68- - 14.2.2
73+ - 12.1.1
74+ - 14.2.2
6975 iso27001-2022 :
70- - 5.37
71- - 8.32
76+ - 5.37
77+ - 8.32
7278 isImplemented : false
7379 evidence : " "
7480 comments : " "
7581 Pinning of artifacts :
76- risk : Unauthorized manipulation of artifacts might be difficult to spot. For
82+ uuid : f3c4971e-9f4d-4e59-8ed0-f0bdb6262477
83+ risk :
84+ Unauthorized manipulation of artifacts might be difficult to spot. For
7785 example, this may result in using images with malicious code. Also, intended
7886 major changes, which are automatically used in an image used might break the
7987 functionality.
8088 measure : Pinning of artifacts ensure that changes are performed only when intended.
81- comment : The usage of pinning requires a good processes for patching. Therefore,
89+ comment :
90+ The usage of pinning requires a good processes for patching. Therefore,
8291 choose this activity wisely.
8392 meta :
84- implementationGuide : Pinning artifacts in Dockerfile refers to the practice of using specific,
93+ implementationGuide :
94+ Pinning artifacts in Dockerfile refers to the practice of using specific,
8595 immutable versions of base images and dependencies in your build process. Instead of using the
8696 latest tag for your base image, select a specific version or digest. For example, replace FROM node:latest,
8797 to FROM node@sha256:abcdef12.
@@ -92,35 +102,38 @@ Build and Deployment:
92102 usefulness : 3
93103 level : 2
94104 implementation :
95- - Container technology automatically creates a hash for images, which can be
96- used.
97- - Immutable images are an other way, e.g. by using a registry, which doesn't
98- allow overriding of images.
105+ - Container technology automatically creates a hash for images, which can be
106+ used.
107+ - Immutable images are an other way, e.g. by using a registry, which doesn't
108+ allow overriding of images.
99109 dependsOn :
100- - Defined build process
110+ - Defined build process
101111 references :
102112 samm2 :
103- - I-SB-1-A
113+ - I-SB-1-A
104114 iso27001-2017 :
105- - 14.2.6
115+ - 14.2.6
106116 iso27001-2022 :
107- - 8.31
117+ - 8.31
108118 isImplemented : false
109119 evidence : " "
110120 comments : " "
111121 SBOM of components :
122+ uuid : 2858ac12-0179-40d9-9acf-1b839c030473
112123 description : |-
113- SBOM (Software Bill of Materials) is a document that lists all components, libraries,
114- and dependencies used in a software application or container image. Creating an SBOM
115- during the build process can help ensure transparency, security, and license compliance
116- for your application.
117- risk : In case a vulnerability of severity high or critical exists, it needs
124+ SBOM (Software Bill of Materials) is a document that lists all components, libraries,
125+ and dependencies used in a software application or container image. Creating an SBOM
126+ during the build process can help ensure transparency, security, and license compliance
127+ for your application.
128+ risk :
129+ In case a vulnerability of severity high or critical exists, it needs
118130 to be known where an artifacts with that vulnerability is deployed with which
119131 dependencies.
120- measure : Creation of an SBOM of components (e.g. application and container image
132+ measure :
133+ Creation of an SBOM of components (e.g. application and container image
121134 content) during build.
122135 dependsOn :
123- - Defined build process
136+ - Defined build process
124137 difficultyOfImplementation :
125138 knowledge : 2
126139 time : 2
@@ -131,17 +144,19 @@ Build and Deployment:
131144 references :
132145 samm2 : []
133146 iso27001-2017 :
134- - 8.1
135- - 8.2
147+ - 8.1
148+ - 8.2
136149 iso27001-2022 :
137- - 5.9
138- - 5.12
150+ - 5.9
151+ - 5.12
139152 isImplemented : false
140153 evidence : " "
141154 comments : " "
142155 Signing of artifacts :
156+ uuid : 5786959d-0c6f-46a6-8e1c-a32ff1a50222
143157 risk : &execution-maliciuous Execution or usage of malicious code or data e.g. via executables, libraries or container images.
144- measure : Digitally signing artifacts for all steps during the build and especially
158+ measure :
159+ Digitally signing artifacts for all steps during the build and especially
145160 docker images, helps to ensure their integrity and authenticity.
146161 difficultyOfImplementation :
147162 knowledge : 2
@@ -150,24 +165,26 @@ Build and Deployment:
150165 usefulness : 4
151166 level : 5
152167 implementation :
153- - $ref : src/assets/YAML/default/implementations.yaml#/implementations/docker-content-trust
154- - $ref : src/assets/YAML/default/implementations.yaml#/implementations/in-toto
168+ - $ref : src/assets/YAML/default/implementations.yaml#/implementations/docker-content-trust
169+ - $ref : src/assets/YAML/default/implementations.yaml#/implementations/in-toto
155170 dependsOn :
156- - Defined build process
157- - Pinning of artifacts
171+ - Defined build process
172+ - Pinning of artifacts
158173 references :
159174 samm2 :
160- - I-SB-1-A
175+ - I-SB-1-A
161176 iso27001-2017 :
162- - 14.2.6
177+ - 14.2.6
163178 iso27001-2022 :
164- - 8.31
179+ - 8.31
165180 isImplemented : false
166181 evidence : " "
167182 comments : " "
168183 Signing of code :
184+ uuid : 9f107927-61e9-4574-85ad-3f2b4bca8665
169185 risk : *execution-maliciuous
170- measure : Digitally signing commits helps to prevent unauthorized manipulation
186+ measure :
187+ Digitally signing commits helps to prevent unauthorized manipulation
171188 of source code.
172189 difficultyOfImplementation :
173190 knowledge : 2
@@ -176,18 +193,17 @@ Build and Deployment:
176193 usefulness : 3
177194 level : 3
178195 implementation :
179- - $ref : src/assets/YAML/default/implementations.yaml#/implementations/signing-of-commits
180- - $ref : src/assets/YAML/default/implementations.yaml#/implementations/signing-of-commits-protection
196+ - $ref : src/assets/YAML/default/implementations.yaml#/implementations/signing-of-commits
197+ - $ref : src/assets/YAML/default/implementations.yaml#/implementations/signing-of-commits-protection
181198 dependsOn :
182- - Defined build process
199+ - Defined build process
183200 references :
184201 samm2 :
185- - I-SB-2-A
202+ - I-SB-2-A
186203 iso27001-2017 :
187- - 14.2.6
204+ - 14.2.6
188205 iso27001-2022 :
189- - 8.31
206+ - 8.31
190207 isImplemented : false
191208 evidence : " "
192209 comments : " "
193- ...
0 commit comments