Skip to content

Commit c299830

Browse files
authored
🤖 fmt
1 parent cbd3326 commit c299830

2 files changed

Lines changed: 7 additions & 43 deletions

File tree

‎CHANGELOG.md‎

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,10 @@
1+
# [1.9.0](https://github.com/devsecopsmaturitymodel/DevSecOps-MaturityModel-data/compare/v1.8.2...v1.9.0) (2023-11-15)
2+
3+
4+
### Features
5+
6+
* Remove WAF ([cbd3326](https://github.com/devsecopsmaturitymodel/DevSecOps-MaturityModel-data/commit/cbd3326fa4d1c783e953669f5ddcdfead618f38f))
7+
18
## [1.8.2](https://github.com/devsecopsmaturitymodel/DevSecOps-MaturityModel-data/compare/v1.8.1...v1.8.2) (2023-11-11)
29

310

‎src/assets/YAML/generated/generated.yaml‎

Lines changed: 0 additions & 43 deletions
Original file line numberDiff line numberDiff line change
@@ -3637,49 +3637,6 @@ Implementation:
36373637
Default: false
36383638
B: false
36393639
C: false
3640-
Usage of a Web Application Firewall:
3641-
uuid: 3e6253ab-89e5-4dea-aca0-3e770b78d39e
3642-
risk: Using an insecure application might lead to a compromised application.
3643-
This might lead to total data theft or data modification.
3644-
measure: |
3645-
The usage of an API Gateway / Web Application Firewall might mitigate it. There are debates on how useful a WAF is for APIs.
3646-
difficultyOfImplementation:
3647-
knowledge: 4
3648-
time: 4
3649-
resources: 4
3650-
usefulness: 2
3651-
level: 5
3652-
implementation:
3653-
- uuid: 6150533e-58ca-4b52-a9b2-6226545d9ea0
3654-
name: Top 5 API Security Myths That Are Crushing Your Business
3655-
tags:
3656-
- documentation
3657-
- waf
3658-
url: https://thehackernews.com/2022/11/top-5-api-security-myths-that-are.html
3659-
description: |
3660-
There are several myths and misconceptions about API security. These myths about securing APIs are crushing your business
3661-
references:
3662-
samm2:
3663-
- D-SR-3-A
3664-
iso27001-2017:
3665-
- Hardening is not explicitly covered by ISO 27001 - too specific
3666-
- 13.1.3
3667-
iso27001-2022:
3668-
- Hardening is not explicitly covered by ISO 27001 - too specific
3669-
- 8.22
3670-
openCRE:
3671-
- https://www.opencre.org/rest/v1/standard/DevSecOps+Maturity+Model+(DSOMM)/Application
3672-
Hardening/3e6253ab-89e5-4dea-aca0-3e770b78d39e
3673-
isImplemented: false
3674-
comments: ""
3675-
dependsOn:
3676-
- App. Hardening Level 2
3677-
tags:
3678-
- none
3679-
teamsImplemented:
3680-
Default: false
3681-
B: false
3682-
C: false
36833640
Development and Source Control:
36843641
.gitignore:
36853642
uuid: 363a3eea-baf9-4010-88ca-bb8186a2989d

0 commit comments

Comments
 (0)