Skip to content

Commit 137fac2

Browse files
committed
Editorial improvements, add vault.
1 parent 39d721e commit 137fac2

3 files changed

Lines changed: 66 additions & 24 deletions

File tree

src/assets/YAML/default/BuildAndDeployment/Deployment.yaml

Lines changed: 26 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -20,10 +20,10 @@ Build and Deployment:
2020
samm2:
2121
- TODO
2222
iso27001-2017:
23-
- 17.2.1
24-
- 12.1.1
25-
- 12.1.2
26-
- 12.1.4
23+
- 17.2.1 # Availability of information processing facilities
24+
- 12.1.1 # Documented operational procedures
25+
- 12.1.2 # Change management
26+
- 12.1.4 # Separation of development,testing and operational environments
2727
- 12.5.1
2828
- 14.2.9
2929
isImplemented: false
@@ -50,9 +50,13 @@ Build and Deployment:
5050
evidence: ""
5151
comments: ""
5252
Defined deployment process:
53-
risk: Deployments without a defined process are error prone thus allowing old
54-
or untested artifact to be deployed.
55-
measure: A defined deployment process ensures that .
53+
risk: >-
54+
Deployment of insecure or malfunctioning artifacts.
55+
measure: >-
56+
Defining a deployment process ensures that there are
57+
established criteria in terms of functionalities,
58+
security, compliance, and performance,
59+
and that the artifacts meet them.
5660
difficultyOfImplementation:
5761
knowledge: 2
5862
time: 2
@@ -74,21 +78,23 @@ Build and Deployment:
7478
evidence: ""
7579
comments: ""
7680
Environment depending configuration parameters (secrets):
77-
risk: '- Parameters are often used to set credentials, for example by starting
78-
containers or applications; these parameters can often be seen by any one
79-
listing running processes on the target system.'
80-
measure: |
81-
Configuration parameters are set for each environment not in the source code.
82-
By using encryption, it is harder to read credentials,
83-
e.g. from the file system.
84-
Also, the usage of a credential management system can help protect credentials.
81+
risk: >-
82+
Unauthorized access to secrets stored in source code
83+
or in artifacts (e.g. container images)
84+
through process listing (e.g. ps -ef).
85+
measure: >-
86+
Set configuration parameters via environment variables
87+
stored using specific platform functionalities
88+
or secrets management systems
89+
(e.g. Kubernetes secrets or Hashicorp Vault).
8590
difficultyOfImplementation:
8691
knowledge: 2
8792
time: 2
8893
resources: 1
8994
usefulness: 4
9095
level: 2
91-
implementation: []
96+
implementation:
97+
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/hasicorp-vault
9298
references:
9399
samm2:
94100
- I-SD-1-B
@@ -102,8 +108,10 @@ Build and Deployment:
102108
risk: '- Parameters are often used to set credentials, for example by starting
103109
containers or applications; these parameters can often be seen by any one
104110
listing running processes on the target system.'
105-
measure: By using encryption, it is harder to read credentials , e.g. from the
106-
file system. Also, the usage of a credential management system can help protect
111+
measure: >-
112+
Encryption ensures confidentiality of credentials
113+
e.g. from unauthorized access on the file system.
114+
Also, the usage of a credential management system can help protect
107115
credentials.
108116
difficultyOfImplementation:
109117
knowledge: 2

src/assets/YAML/default/Implementation/DevelopmentAndSourceControl.yaml

Lines changed: 31 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,9 @@
22
Implementation:
33
Development and Source Control:
44
Local development linting & style checks performed:
5-
risk: Creating and developing code that contains code smells and quality issues.
6-
measure: "Integration of quality and linting plugins with interactive development
7-
environment (IDEs)."
5+
risk: Insecure or unmaintenable code base.
6+
measure: >-
7+
Integrate static code analysis tools in IDEs.
88
difficultyOfImplementation:
99
knowledge: 1
1010
time: 1
@@ -95,4 +95,32 @@ Implementation:
9595
isImplemented: false
9696
evidence: ""
9797
comments: ""
98+
MFA to SCM:
99+
risk: Unauthorized access to source code.
100+
measure: >-
101+
Enforce Multi-Factor authentication to source code management platforms.
102+
These policies can be implemented at repository level or organization level,
103+
depending on the source code management system.
104+
difficultyOfImplementation:
105+
knowledge: 2
106+
time: 1
107+
resources: 2
108+
usefulness: 4
109+
level: 1
110+
implementation:
111+
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/yubikey
112+
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/totp
113+
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/smartcard
114+
references:
115+
samm2:
116+
- O-EM-1-A
117+
iso27001-2017:
118+
- 5.17 # Authentication information
119+
- 6.1.2 # Segregation of duties.
120+
- 14.2.1 # Secure development policies.
121+
d3f:
122+
- Multi-factorAuthentication
123+
isImplemented: false
124+
evidence: ""
125+
comments: ""
98126
...

src/assets/YAML/default/implementations.yaml

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -447,7 +447,7 @@ implementations:
447447
url: https://github.com/OWASP/Amass
448448
k8spurger:
449449
name: K8sPurger
450-
tags: [vulnerability, scanner, dast, infrastrcture]
450+
tags: [vulnerability, scanner, dast, infrastructure]
451451
url: https://github.com/yogeshkk/K8sPurger
452452
description: |
453453
Hunt Unused Resources In Kubernetes.
@@ -631,7 +631,13 @@ implementations:
631631
secureCodeBox is a kubernetes based, modularized toolchain for continuous security scans of your software project. Its goal is to orchestrate and easily automate a bunch of security-testing tools out of the box.
632632
K8sPurger:
633633
name: K8sPurger
634-
tags: [vulnerability, scanner, dast, infrastrcture]
634+
tags: [vulnerability, scanner, dast, infrastructure]
635635
url: https://github.com/yogeshkk/K8sPurger
636636
description: |
637-
Hunt Unused Resources In Kubernetes.
637+
Hunt Unused Resources In Kubernetes.
638+
hashicorp-vault:
639+
name: Hashicorp Vault
640+
tags: [authentication, authorization, secrets, infrastructure]
641+
url: https://github.com/hashicorp/vault
642+
description: |
643+
A tool for secrets management, encryption as a service, and privileged access management

0 commit comments

Comments
 (0)