Skip to content

Commit d30f2ee

Browse files
authored
Merge pull request #226 from m3t3kh4n/master
Defined Decomissioning Process description & Kubernetes Admission URL
2 parents 91ac200 + 298e4c3 commit d30f2ee

File tree

3 files changed

+42
-0
lines changed

3 files changed

+42
-0
lines changed

src/assets/YAML/default/BuildAndDeployment/Deployment.yaml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -37,6 +37,11 @@ Build and Deployment:
3737
evidence: ""
3838
comments: ""
3939
Defined decommissioning process:
40+
description: |-
41+
The decommissioning process in the context of Docker and Kubernetes involves
42+
retiring Docker containers, images, and Kubernetes resources that are no longer
43+
needed or have been replaced. This process must be carefully executed to avoid
44+
impacting other services and applications.
4045
risk: >-
4146
Unused applications are not maintained and may contain vulnerabilities.
4247
Once exploited they can be used to attack other applications or

src/assets/YAML/default/BuildAndDeployment/PatchManagement.yaml

Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -59,6 +59,13 @@ Build and Deployment:
5959
evidence: ""
6060
comments: ""
6161
Nightly build of images (base images):
62+
description: |-
63+
A base image is a pre-built image that serves as a starting point for building
64+
new images or containers. These base images usually include an operating system,
65+
necessary dependencies, libraries, and other components that are required to run
66+
a specific application or service. Nightly builds of custom base images refer to
67+
an automated process that occurs daily or on a scheduled basis, usually during
68+
nighttime or off-peak hours, to create updated versions of custom base images.
6269
risk: Vulnerabilities in running containers stay for too long and might get
6370
exploited.
6471
measure: Custom base images are getting build at least nightly. In case the
@@ -82,6 +89,12 @@ Build and Deployment:
8289
evidence: ""
8390
comments: ""
8491
Reduction of the attack surface:
92+
description: |-
93+
Distroless images are minimal, stripped-down base images that contain only the
94+
essential components required to run your application. They do not include package
95+
managers, shells, or any other tools that are commonly found in standard Linux
96+
distributions. Using distroless images can help reduce the attack surface and
97+
overall size of your container images.
8598
risk: Components, dependencies, files or file access rights might have vulnerabilities,
8699
but the they are not needed.
87100
measure: Removal of unneeded components, dependencies, files or file access
@@ -95,6 +108,7 @@ Build and Deployment:
95108
implementation:
96109
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/distroless
97110
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/fedora-coreos
111+
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/distroless-usage
98112
references:
99113
samm2:
100114
- I-SB-2
@@ -107,6 +121,15 @@ Build and Deployment:
107121
evidence: ""
108122
comments: ""
109123
Usage of a maximum lifetime for images:
124+
description: |-
125+
The maximum lifetime for a Docker container refers to the duration a container
126+
should be allowed to run before it is considered outdated, stale, or insecure.
127+
There is not a fixed, universally applicable maximum lifetime for a Docker
128+
container, as it varies depending on the specific use case, application
129+
requirements, and security needs. As a best practice, it is essential to define
130+
a reasonable maximum lifetime for containers to ensure that you consistently
131+
deploy the most recent, patched, and secure versions of both your custom base
132+
images and third-party images.
110133
risk: Vulnerabilities in images of running containers stay for too long and
111134
might get exploited. Long running containers have potential memory leaks.
112135
A compromised container might get killed by restarting the container (e.g.
@@ -133,6 +156,15 @@ Build and Deployment:
133156
evidence: ""
134157
comments: ""
135158
Usage of a short maximum lifetime for images:
159+
description: |-
160+
The maximum lifetime for a Docker container refers to the duration a container
161+
should be allowed to run before it is considered outdated, stale, or insecure.
162+
There is not a fixed, universally applicable maximum lifetime for a Docker
163+
container, as it varies depending on the specific use case, application
164+
requirements, and security needs. As a best practice, it is essential to define
165+
a reasonable maximum lifetime for containers to ensure that you consistently
166+
deploy the most recent, patched, and secure versions of both your custom base
167+
images and third-party images.
136168
risk: Vulnerabilities in running containers stay for too long and might get
137169
exploited.
138170
measure: |

src/assets/YAML/default/implementations.yaml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -62,6 +62,7 @@ implementations:
6262
name: Kubernetes Admission Controller can whitelist registries and/or whitelist
6363
a signing key.
6464
tags: []
65+
url: https://medium.com/slalom-technology/build-a-kubernetes-dynamic-admission-controller-for-container-registry-whitelisting-b46fe020e22d
6566
dependabot:
6667
name: dependabot
6768
tags: []
@@ -92,6 +93,10 @@ implementations:
9293
name: Fedora CoreOS
9394
tags: []
9495
url: https://getfedora.org/coreos
96+
distroless-usage:
97+
name: Distroless or Alpine
98+
tags: []
99+
url: https://itnext.io/which-container-images-to-use-distroless-or-alpine-96e3dab43a22
95100
threat-modeling-play:
96101
name: Threat Modeling Playbook
97102
tags: [owasp, defender, threat-modeling, whiteboard]

0 commit comments

Comments
 (0)