Skip to content

Commit fe6e618

Browse files
authored
Merge pull request #79 from ioggstream/ioggstream-76
Fix: #76. Reformat yaml files using update_schema.py
2 parents 5bf2cbe + 3ef194d commit fe6e618

19 files changed

+662
-355
lines changed

data-new/BuildAndDeployment/Sub-Dimensions.yaml

Lines changed: 110 additions & 84 deletions
Large diffs are not rendered by default.

data-new/CultureAndOrganization/Design.yaml

Lines changed: 22 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
1-
---
21
Design:
32
Conduction of advanced threat modeling:
4-
risk: Inadequate identification of business and technical risks.
3+
risk:
4+
- Inadequate identification of business and technical risks.
55
measure: Threat modeling is performed by using reviewing user stories and producing
66
security driven data flow diagrams.
77
difficultyOfImplementation:
@@ -29,9 +29,11 @@ Design:
2929
- may be part of risk assessment
3030
- 8.2.1
3131
- 14.2.1
32+
implementation: []
3233
Conduction of simple threat modeling on business level:
33-
risk: Business related threats are discovered too late in the development and
34-
deployment process.
34+
risk:
35+
- Business related threats are discovered too late in the development and deployment
36+
process.
3537
measure: Threat modeling of business functionality is performed during the product
3638
backlog creation to facilitate early detection of security defects.
3739
difficultyOfImplementation:
@@ -46,9 +48,11 @@ Design:
4648
- may be part of risk assessment
4749
- 8.2.1
4850
- 14.2.1
51+
implementation: []
4952
Conduction of simple threat modeling on technical level:
50-
risk: Technical related threats are discovered too late in the development and
51-
deployment process.
53+
risk:
54+
- Technical related threats are discovered too late in the development and deployment
55+
process.
5256
measure: Threat modeling of technical features is performed during the product
5357
sprint planning.
5458
difficultyOfImplementation:
@@ -101,7 +105,8 @@ Design:
101105
- 8.2.1
102106
- 14.2.1
103107
Creation of advanced abuse stories:
104-
risk: Simple user stories are not going deep enough. Relevant security considerations
108+
risk:
109+
- Simple user stories are not going deep enough. Relevant security considerations
105110
are performed. Security flaws are discovered too late in the development and
106111
deployment process
107112
measure: Advanced abuse stories are created as part of threat modeling activities.
@@ -120,12 +125,14 @@ Design:
120125
- 6.1.5
121126
- may be part of risk assessment
122127
- 8.1.2
123-
implementation: <a href='https://www.owasp.org/index.php/Agile_Software_Development:_Don%27t_Forget_EVIL_User_Stories'>Don't
128+
implementation:
129+
- <a href='https://www.owasp.org/index.php/Agile_Software_Development:_Don%27t_Forget_EVIL_User_Stories'>Don't
124130
Forget EVIL User Stories</a> and <a href='http://safecode.org/publication/SAFECode_Agile_Dev_Security0712.pdf'>Practical
125131
Security Stories and Security Tasks for Agile Development Environments</a>
126132
Creation of simple abuse stories:
127-
risk: User stories mostly don't consider security implications. Security flaws
128-
are discovered too late in the development and deployment process.
133+
risk:
134+
- User stories mostly don't consider security implications. Security flaws are
135+
discovered too late in the development and deployment process.
129136
measure: Abuse stories are created during the creation of user stories.
130137
difficultyOfImplementation:
131138
knowledge: 2
@@ -140,11 +147,13 @@ Design:
140147
- 6.1.5
141148
- may be part of risk assessment
142149
- 8.1.2
143-
implementation: <a href='https://www.owasp.org/index.php/Agile_Software_Development:_Don%27t_Forget_EVIL_User_Stories'>Don't
150+
implementation:
151+
- <a href='https://www.owasp.org/index.php/Agile_Software_Development:_Don%27t_Forget_EVIL_User_Stories'>Don't
144152
Forget EVIL User Stories</a> and <a href='http://safecode.org/publication/SAFECode_Agile_Dev_Security0712.pdf'>Practical
145153
Security Stories and Security Tasks for Agile Development Environments</a>
146154
Information security targets are communicated:
147-
risk: Employees don't known their organizations security targets. Therefore security
155+
risk:
156+
- Employees don't known their organizations security targets. Therefore security
148157
is not considered during development and administration as much as it should
149158
be.
150159
measure: Transparent and timely communication of the security targets by senior
@@ -159,4 +168,4 @@ Design:
159168
iso27001-2017:
160169
- 5.1.1
161170
- 7.2.1
162-
...
171+
implementation: []

data-new/CultureAndOrganization/EducationAndGuidance.yaml

Lines changed: 46 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
1-
---
21
Education and Guidance:
32
Ad-Hoc Security trainings for software developers:
4-
risk: Understanding security is hard and personnel needs to be trained on it.
5-
Otherwise, flaws like an SQL Injection might be introduced into the software
6-
which might get exploited.
3+
risk:
4+
- Understanding security is hard and personnel needs to be trained on it. Otherwise,
5+
flaws like an SQL Injection might be introduced into the software which might
6+
get exploited.
77
measure: Provide security awareness training for all personnel involved in software
88
development Ad-Hoc.
99
difficultyOfImplementation:
@@ -21,7 +21,8 @@ Education and Guidance:
2121
iso27001-2017:
2222
- 7.2.2
2323
Regular security training for all:
24-
risk: Understanding security is hard.
24+
risk:
25+
- Understanding security is hard.
2526
measure: Provide security awareness training for all personnel involved in software
2627
development on a regular basis like twice in a year for 1-3 days.
2728
difficultyOfImplementation:
@@ -39,7 +40,8 @@ Education and Guidance:
3940
Shop</a> on a "hacking Friday"
4041
- https://cheatsheetseries.owasp.org/
4142
Security consulting on request:
42-
risk: Not asking a security expert when questions regarding security appear might
43+
risk:
44+
- Not asking a security expert when questions regarding security appear might
4345
lead to flaws.
4446
measure: Security consulting to teams is given on request. The security consultants
4547
can be internal or external.
@@ -55,8 +57,10 @@ Education and Guidance:
5557
- 6.1.1
5658
- 6.1.4
5759
- 6.1.5
60+
implementation: []
5861
Regular security training of security champions:
59-
risk: Understanding security is hard, even for security champions.
62+
risk:
63+
- Understanding security is hard, even for security champions.
6064
measure: Regular security training of security champions.
6165
evidence: |
6266
- Process Documentation: TODO
@@ -71,8 +75,10 @@ Education and Guidance:
7175
iso27001-2017:
7276
- security champions are missing in ISO 27001
7377
- 7.2.2
78+
implementation: []
7479
Regular security training for everyone:
75-
risk: Understanding security is hard, for internal as well as external employees.
80+
risk:
81+
- Understanding security is hard, for internal as well as external employees.
7682
measure: Regular security training for everyone.
7783
difficultyOfImplementation:
7884
knowledge: 3
@@ -83,12 +89,14 @@ Education and Guidance:
8389
samm: EG2-B
8490
iso27001-2017:
8591
- 7.2.2
86-
implementation: Often, external employees are not invited for internal trainings.
87-
This activity focuses on providing security trainings to internal as well as
88-
external employees. It is conducted every two weeks for around one hour.
92+
implementation:
93+
- Often, external employees are not invited for internal trainings. This activity focuses
94+
on providing security trainings to internal as well as external employees. It
95+
is conducted every two weeks for around one hour.
8996
Each team has a security champion:
90-
risk: No one feels directly responsible for security and the security champion
91-
does not have enough time to allocate to each team.
97+
risk:
98+
- No one feels directly responsible for security and the security champion does
99+
not have enough time to allocate to each team.
92100
measure: Each team defines an individual to be responsible for security. These
93101
individuals are often referred to as 'security champions'
94102
difficultyOfImplementation:
@@ -102,10 +110,11 @@ Education and Guidance:
102110
- security champions are missing in ISO 27001 most likely
103111
- 7.2.1
104112
- 7.2.2
105-
implementation:
113+
implementation:
106114
- OWASP Security Champions Playbook: https://github.com/c0rdis/security-champions-playbook
107115
Security-Lessoned-Learned:
108-
risk: After an incident, a similar incident might reoccur.
116+
risk:
117+
- After an incident, a similar incident might reoccur.
109118
measure: Running a 'lessons learned' session after an incident helps drive continuous
110119
improvement. Regular meetings with security champions are a good place to share
111120
and discuss lessons learned.
@@ -118,9 +127,11 @@ Education and Guidance:
118127
samm: IM-3, ST-3, SR2-B
119128
iso27001-2017:
120129
- 16.1.6
130+
implementation: []
121131
Conduction of collaborative security checks with developers and system administrators:
122-
risk: Security checks by external companies do not increase the understanding
123-
of an application/system for internal employees.
132+
risk:
133+
- Security checks by external companies do not increase the understanding of an
134+
application/system for internal employees.
124135
measure: Periodically security reviews of source code (SCA), in which security
125136
SME, developers and operations are involved, are effective at increasing the
126137
robustness of software and the security knowledge of the teams involved.
@@ -136,8 +147,10 @@ Education and Guidance:
136147
- 7.2.2
137148
- 12.6.1
138149
- 12.7.1
150+
implementation: []
139151
Conduction of collaborative team security checks:
140-
risk: Development teams limited insight over security practices.
152+
risk:
153+
- Development teams limited insight over security practices.
141154
measure: Mutual security testing the security of other teams project enhances
142155
security awareness and knowledge.
143156
difficultyOfImplementation:
@@ -150,8 +163,10 @@ Education and Guidance:
150163
iso27001-2017:
151164
- Mutual security testing is not explicitly required in ISO 27001 may be
152165
- 7.2.2
166+
implementation: []
153167
Conduction of build-it, break-it, fix-it contests:
154-
risk: Understanding security is hard, even for security champions and the conduction
168+
risk:
169+
- Understanding security is hard, even for security champions and the conduction
155170
of security training often focuses on breaking a component instead of building
156171
a component secure.
157172
measure: The build-it, break-it, fix-it contest allows to train people with security
@@ -165,9 +180,11 @@ Education and Guidance:
165180
level: 3
166181
iso27001-2017:
167182
- 7.2.2
168-
implementation: https://builditbreakit.org/
183+
implementation:
184+
- https://builditbreakit.org/
169185
Conduction of war games:
170-
risk: Understanding incident response plans during an incident is hard and ineffective.
186+
risk:
187+
- Understanding incident response plans during an incident is hard and ineffective.
171188
measure: War Games like activities help train for incidents. Security SMEs create
172189
attack scenarios in a testing environment enabling the trainees to learn how
173190
to react in case of an incident.
@@ -180,10 +197,12 @@ Education and Guidance:
180197
iso27001-2017:
181198
- ware games are not explicitly required in ISO 27001 may be
182199
- 7.2.2
183-
- "16.1"
200+
- '16.1'
184201
- 16.1.5
202+
implementation: []
185203
Reward of good communication:
186-
risk: Employees are not getting excited about security.
204+
risk:
205+
- Employees are not getting excited about security.
187206
measure: Good communication and transparency encourages cross-organizational support.
188207
Gamification of security is also known to help, examples include T-Shirts, mugs,
189208
cups, giftcards and 'High-Fives'.
@@ -203,7 +222,8 @@ Education and Guidance:
203222
Project</a>
204223
- https://owaspsamm.org/presentations/OWASP_Top_10_Maturity_Categories_for_Security_Champions.pptx
205224
Aligning security in teams:
206-
risk: The concept of Security Champions might suggest that only he/she is responsible
225+
risk:
226+
- The concept of Security Champions might suggest that only he/she is responsible
207227
for security. However, everyone in the project team should be responsible for
208228
security.
209229
measure: By aligning security SME with project teams, a higher security standard
@@ -212,11 +232,10 @@ Education and Guidance:
212232
knowledge: 4
213233
time: 5
214234
resources: 1
215-
implementation: Security SME are involved in discussion for requirements analysis,
216-
software design and sprint planning to provide guidance and suggestions.
235+
implementation:
236+
- Security SME are involved in discussion for requirements analysis, software design and sprint planning to provide guidance and suggestions.
217237
usefulness: 5
218238
level: 4
219239
samm: EG2-B
220240
iso27001-2017:
221241
- 7.1.1
222-
...

data-new/CultureAndOrganization/Process.yaml

Lines changed: 14 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
1-
---
21
Process:
32
Definition of simple BCDR practices for critical components:
4-
risk: In case of an emergency, like a power outage, DR actions to perform are
5-
not clear. This leads to reaction and remediation delays.
3+
risk:
4+
- In case of an emergency, like a power outage, DR actions to perform are not
5+
clear. This leads to reaction and remediation delays.
66
measure: By understanding and documenting a business continuity and disaster recovery
77
(BCDR) plan, the overall availability of systems and applications is increased.
88
Success factors like responsibilities, Service Level Agreements, Recovery Point
@@ -16,9 +16,10 @@ Process:
1616
level: 1
1717
iso27001-2017:
1818
- 17.1.1
19+
implementation: []
1920
Definition of a change management process:
20-
risk: The impact of a change is not controlled because these are not recorded
21-
or documented.
21+
risk:
22+
- The impact of a change is not controlled because these are not recorded or documented.
2223
measure: Each change of a system is automatically recorded and adequately logged.
2324
difficultyOfImplementation:
2425
knowledge: 4
@@ -30,8 +31,10 @@ Process:
3031
- 14.2.2
3132
- 12.1.2
3233
- 12.4.1
34+
implementation: []
3335
Approval by reviewing any new version:
34-
risk: An individual might forget to implement security measures to protect source
36+
risk:
37+
- An individual might forget to implement security measures to protect source
3538
code or infrastructure components.
3639
measure: On each new version (e.g. Pull Request) of source code or infrastructure
3740
components a security peer review of the changes is performed (two eyes principle)
@@ -47,8 +50,10 @@ Process:
4750
- peer review - four eyes principle is not explicitly required by ISO 27001
4851
- 6.1.2
4952
- 14.2.1
53+
implementation: []
5054
Prevention of unauthorized installation:
51-
risk: Unapproved components are used.
55+
risk:
56+
- Unapproved components are used.
5257
measure: Components must be whitelisted. Regular scans on the docker infrastructure
5358
(e.g. cluster) need to be performed, to verify that only standardized base images
5459
are used.
@@ -61,8 +66,7 @@ Process:
6166
iso27001-2017:
6267
- 12.5.1
6368
- 12.6.1
64-
implementation: 'Example: All docker images used by teams need to be based on
65-
standard images.'
69+
implementation:
70+
- 'Example: All docker images used by teams need to be based on standard images.'
6671
comment: By preventing teams from trying out new components, innovation might
6772
be hampered
68-
...
Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,5 @@
1-
---
21
_meta:
3-
label: "Culture and Organization"
4-
icon: "Culture and Org.png"
2+
label: Culture and Organization
3+
icon: Culture and Org.png
54
description: |-
6-
A markdown description of this dimension.
5+
A markdown description of this dimension.

data-new/Implementation/ApplicationHardening.yaml

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
1-
---
21
Application Hardening:
32
Application Hardening Level 1:
4-
risk: Using an insecure application might lead to a compromised application. This
3+
risk:
4+
- Using an insecure application might lead to a compromised application. This
55
might lead to total data theft or data modification.
66
measure: |
77
Following frameworks like the
@@ -43,7 +43,8 @@ Application Hardening:
4343
- hardening is not explicitly covered by ISO 27001 - too specific
4444
- 13.1.3
4545
App. Hardening Level 2:
46-
risk: Using an insecure application might lead to a compromised application. This
46+
risk:
47+
- Using an insecure application might lead to a compromised application. This
4748
might lead to total data theft or data modification.
4849
measure: |
4950
Following frameworks like the
@@ -66,7 +67,8 @@ Application Hardening:
6667
- hardening is not explicitly covered by ISO 27001 - too specific
6768
- 13.1.3
6869
App. Hardening Level 3:
69-
risk: Using an insecure application might lead to a compromised application. This
70+
risk:
71+
- Using an insecure application might lead to a compromised application. This
7072
might lead to total data theft or data modification.
7173
measure: |
7274
Following frameworks like the
@@ -90,7 +92,8 @@ Application Hardening:
9092
- hardening is not explicitly covered by ISO 27001 - too specific
9193
- 13.1.3
9294
Full Coverage of App. Hardening Level 3:
93-
risk: Using an insecure application might lead to a compromised application. This
95+
risk:
96+
- Using an insecure application might lead to a compromised application. This
9497
might lead to total data theft or data modification.
9598
measure: |
9699
Following frameworks like the
@@ -113,4 +116,3 @@ Application Hardening:
113116
iso27001-2017:
114117
- hardening is not explicitly covered by ISO 27001 - too specific
115118
- 13.1.3
116-
...

0 commit comments

Comments
 (0)