Skip to content

Commit d775803

Browse files
committed
further fixes
1 parent a5945f3 commit d775803

File tree

2 files changed

+64
-35
lines changed

2 files changed

+64
-35
lines changed

data-new/Implementation/InfrastructureHardening.yaml

Lines changed: 60 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -12,11 +12,16 @@ Infrastructure Hardening:
1212
usefulness: 4
1313
level: 2
1414
implementation:
15-
- <a href='https://www.cisecurity.org/cis-benchmarks/'>CIS Kubernetes Bench for
16-
Security</a>
17-
- <a href='https://www.cisecurity.org/cis-benchmarks/'>CIS Docker Bench for Security</a>
18-
- 'For example for Containers: Deny running containers as root, deny using advanced
19-
privileges, deny mounting of the hole filesystem, ...'
15+
- name: CIS Kubernetes Bench for Security
16+
tags: []
17+
url: https://www.cisecurity.org/cis-benchmarks/
18+
- name: CIS Docker Bench for Security
19+
tags: []
20+
url: https://www.cisecurity.org/cis-benchmarks/
21+
- name: For example for Cont
22+
tags: []
23+
description: 'For example for Containers: Deny running containers as root, deny
24+
using advanced privileges, deny mounting of the hole filesystem, ...'
2025
samm2: o-environment-management|A|1
2126
iso27001-2017:
2227
- system hardening is not explicitly covered by ISO 27001 - too specific
@@ -70,9 +75,12 @@ Infrastructure Hardening:
7075
level: 1
7176
dependsOn: []
7277
implementation:
73-
- istio
74-
- bridges
75-
- firewalls
78+
- name: istio
79+
tags: []
80+
- name: bridges
81+
tags: []
82+
- name: firewalls
83+
tags: []
7684
samm2: o-environment-management|A|1
7785
iso27001-2017:
7886
- virtual environments are not explicitly covered by ISO 27001 - too specific
@@ -90,8 +98,10 @@ Infrastructure Hardening:
9098
level: 2
9199
dependsOn: []
92100
implementation:
93-
- Open Policy Agent
94-
- firewalls
101+
- name: Open Policy Agent
102+
tags: []
103+
- name: firewalls
104+
tags: []
95105
samm2: o-environment-management|A|1
96106
iso27001-2017:
97107
- virtual environments are not explicitly covered by ISO 27001 - too specific
@@ -110,11 +120,16 @@ Infrastructure Hardening:
110120
usefulness: 4
111121
level: 3
112122
implementation:
113-
- GitOps
114-
- Ansible
115-
- Chef
116-
- Puppet
117-
- Jenkinsfile
123+
- name: GitOps
124+
tags: []
125+
- name: Ansible
126+
tags: []
127+
- name: Chef
128+
tags: []
129+
- name: Puppet
130+
tags: []
131+
- name: Jenkinsfile
132+
tags: []
118133
samm2: o-environment-management|A|1
119134
iso27001-2017:
120135
- not explicitly covered by ISO 27001 - too specific
@@ -133,8 +148,10 @@ Infrastructure Hardening:
133148
dependsOn:
134149
- Applications are running in virtualized environments
135150
implementation:
136-
- seccomp
137-
- strace
151+
- name: seccomp
152+
tags: []
153+
- name: strace
154+
tags: []
138155
samm2: o-environment-management|A|1
139156
iso27001-2017:
140157
- system hardening is not explicitly covered by ISO 27001 - too specific
@@ -153,7 +170,8 @@ Infrastructure Hardening:
153170
- Usage of <a href="https://semver.org/">Semantic Versioning</a> for components
154171
like project images
155172
implementation:
156-
- Remove direct access to infrastructure
173+
- name: Remove direct access to infrastructure
174+
tags: []
157175
samm2: o-environment-management|A|1
158176
iso27001-2017:
159177
- not explicitly covered by ISO 27001 - too specific
@@ -211,8 +229,10 @@ Infrastructure Hardening:
211229
usefulness: 3
212230
level: 3
213231
implementation:
214-
- Directory Service
215-
- Plugins
232+
- name: Directory Service
233+
tags: []
234+
- name: Plugins
235+
tags: []
216236
dependsOn:
217237
- Defined deployment process
218238
- Defined build process
@@ -232,10 +252,14 @@ Infrastructure Hardening:
232252
usefulness: 4
233253
level: 3
234254
implementation:
235-
- Smartcard
236-
- YubiKey
237-
- SMS
238-
- TOTP
255+
- name: Smartcard
256+
tags: []
257+
- name: YubiKey
258+
tags: []
259+
- name: SMS
260+
tags: []
261+
- name: TOTP
262+
tags: []
239263
samm2: TODO
240264
iso27001-2017:
241265
- not explicitly covered by ISO 27001 - too specific
@@ -255,8 +279,10 @@ Infrastructure Hardening:
255279
dependsOn:
256280
- Defined deployment process
257281
implementation:
258-
- HTTP-Basic Authentication
259-
- VPN
282+
- name: HTTP-Basic Authentication
283+
tags: []
284+
- name: VPN
285+
tags: []
260286
samm: EH1-B
261287
samm2: o-environment-management|A|1
262288
iso27001-2017:
@@ -292,10 +318,14 @@ Infrastructure Hardening:
292318
usefulness: 3
293319
level: 2
294320
implementation:
295-
- For applications: Check default encoding
296-
- managing secrets
297-
- crypto
298-
- authentication
321+
- name: 'For applications: Check default encoding'
322+
tags: []
323+
- name: managing secrets
324+
tags: []
325+
- name: crypto
326+
tags: []
327+
- name: authentication
328+
tags: []
299329
dependsOn:
300330
- Defined build process
301331
samm2: o-environment-management|A|1

data-new/TestAndVerification/Consolidation.yaml

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -62,13 +62,12 @@ Consolidation:
6262
- name: SAST
6363
tags: []
6464
description: 'At SAST (Static Application Security Testing): Server-side / client-side
65-
teams can easily be recorded.
66-
With microservice architecture individual microservices can be used usually Teams.'
65+
teams can easily be recorded. With microservice architecture individual microservices
66+
can be used usually Teams.'
6767
- name: DAST
6868
tags: []
69-
description: 'At DAST (Dynamic
70-
Application Security Testing): vulnerabilities are classified and can be assigned
71-
to server-side and client-side teams.'
69+
description: 'At DAST (Dynamic Application Security Testing): vulnerabilities
70+
are classified and can be assigned to server-side and client-side teams.'
7271
samm2: i-defect-management|B|2
7372
iso27001-2017:
7473
- not explicitly covered by ISO 27001 - too specific

0 commit comments

Comments
 (0)