Skip to content

Commit 04ebe78

Browse files
authored
Merge pull request #6 from louwersj/master
Changed data
2 parents e73c05b + 622dcc9 commit 04ebe78

5 files changed

Lines changed: 174 additions & 316 deletions

File tree

data/BuildandDeployment.yml

Lines changed: 22 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
Build:
3-
Building and testing of artefacts in virtual environments:
4-
risk: While building and testing artefacts, third party systems, application frameworks
3+
Building and testing of artifacts in virtual environments:
4+
risk: While building and testing artifacts, third party systems, application frameworks
55
and 3rd party libraries are used. These might be malicious as a result of vulnerable
66
libraries or because they are altered during the delivery phase.
77
measure: Each step during within the build and testing phase is performed in a separate virtual
@@ -16,7 +16,7 @@ Build:
1616
samm2: i-secure-build|A|2
1717
Defined build process:
1818
risk: Performing builds without a defined process is error prone.
19-
For example, as a result of incorect security related configuration.
19+
For example, as a result of incorrect security related configuration.
2020
measure: A well defined build process lowers the possibility of errors during the build
2121
process.
2222
difficultyOfImplementation:
@@ -28,7 +28,7 @@ Build:
2828
implementation: "Jenkins, Docker"
2929
samm2: i-secure-build|A|1
3030
Regular tests:
31-
risk: After pushing source code to the version control system, any elay in receiving feedback on defects makes them harder for the developer to remediate.
31+
risk: After pushing source code to the version control system, any delay in receiving feedback on defects makes them harder for the developer to remediate.
3232
measure: On each push and/or at given intervals automatic security tests are performed.
3333
difficultyOfImplementation:
3434
knowledge: 1
@@ -47,22 +47,22 @@ Build:
4747
resources: 2
4848
usefulness: 3
4949
level: 3
50-
implementation:
50+
implementation:
5151
dependsOn:
5252
- Defined build process
5353
samm: OA3-B
5454
samm2: i-secure-build|A|2
55-
Signing of artefacts:
56-
risk: Unauthorized manipulation of artefacts might be difficult to spot. For example, this may result in
55+
Signing of artifacts:
56+
risk: Unauthorized manipulation of artifacts might be difficult to spot. For example, this may result in
5757
images with malicious code in the Docker registry.
58-
measure: Digitally signing artefacts for all steps during the build and specally docker images, helps to ensure their integrity.
58+
measure: Digitally signing artifacts for all steps during the build and especially docker images, helps to ensure their integrity.
5959
difficultyOfImplementation:
6060
knowledge: 2
6161
time: 2
6262
resources: 2
6363
usefulness: 4
6464
level: 3
65-
implementation:
65+
implementation:
6666
- <a href="https://docs.docker.com/notary/getting_started/">Docker Content Trust</a>
6767
- <a href="https://in-toto.github.io/">in-toto</a>
6868
dependsOn:
@@ -80,15 +80,15 @@ Deployment:
8080
resources: 1
8181
usefulness: 4
8282
level: 2
83-
implementation: A complete database dabackup might be performed*. For large and complex
83+
implementation: A complete database backup might be performed*. For large and complex
8484
environments, a Point in Time Recovery for databases should be implemented.
8585
dependsOn:
8686
- Defined deployment process
8787
samm: OE2-A
8888
samm2: TODO
8989
Blue/Green Deployment:
90-
risk: A new artefact version can have unknown defects.
91-
measure: By having multiple production environments, a deployment can be performent
90+
risk: A new artifacts version can have unknown defects.
91+
measure: By having multiple production environments, a deployment can be performant
9292
on the first environment to spot possible defects before it is deployment in the production environment(s)
9393
difficultyOfImplementation:
9494
knowledge: 1
@@ -102,7 +102,7 @@ Deployment:
102102
- Smoke Test
103103
samm2: TODO
104104
Defined deployment process:
105-
risk: Deployments without a defined process are error prone thus allowing old or untested artefact to be deployed.
105+
risk: Deployments without a defined process are error prone thus allowing old or untested artifact to be deployed.
106106
measure: A defined deployment process significantly lowers the likelihood of errors during the deployment phase.
107107
difficultyOfImplementation:
108108
knowledge: 2
@@ -158,11 +158,11 @@ Deployment:
158158
dependsOn:
159159
- Defined deployment process
160160
samm2: i-secure-deployment|A|1
161-
Same artefact for environments:
162-
risk: Building of an artefact for different environments means that an untested
163-
artefact might reach the production environment.
164-
measure: Building an artefact once and deploying it to different environments means
165-
that only tested artefacts are allowed to reach the production environment
161+
Same artifact for environments:
162+
risk: Building of an artifact for different environments means that an untested
163+
artifact might reach the production environment.
164+
measure: Building an artifact once and deploying it to different environments means
165+
that only tested artifacts are allowed to reach the production environment
166166
difficultyOfImplementation:
167167
knowledge: 2
168168
time: 2
@@ -178,7 +178,7 @@ Deployment:
178178
risk: By using environment dependent configuration, some parameters will not be
179179
tested correctly. i.e. <pre>if
180180
(host == 'production') {} else {}</pre>
181-
measure: Usage of environment independend configration parameter, called feature
181+
measure: Usage of environment independent configuration parameter, called feature
182182
toggles, helps to enhance the test coverage. Only what has been tested, goes to production.
183183
difficultyOfImplementation:
184184
knowledge: 2
@@ -188,14 +188,14 @@ Deployment:
188188
level: 3
189189
implementation: Docker
190190
dependsOn:
191-
- Same artefact for environments
191+
- Same artifact for environments
192192
samm: EG1-B
193193
samm2: TODO
194194
Usage of trusted images:
195195
risk: Developers or operations might start random images in the production cluster which have malicous code or known vulnerabilities.
196-
Measure: Whitelist signed artificats/images or whitelist a trusted (internal) registry.
196+
Measure: Whitelist signed artifacts/images or whitelist a trusted (internal) registry.
197197
implementation: Kubernetes Admission Controller can whitelist registries and/or whitelist a signing key.
198-
dependsOn: Signing of artefacts
198+
dependsOn: Signing of artifacts
199199
difficultyOfImplementation:
200200
knowledge: 1
201201
time: 1

0 commit comments

Comments
 (0)