@@ -20,10 +20,10 @@ Build and Deployment:
2020 samm2 :
2121 - TODO
2222 iso27001-2017 :
23- - 17.2.1
24- - 12.1.1
25- - 12.1.2
26- - 12.1.4
23+ - 17.2.1 # Availability of information processing facilities
24+ - 12.1.1 # Documented operational procedures
25+ - 12.1.2 # Change management
26+ - 12.1.4 # Separation of development,testing and operational environments
2727 - 12.5.1
2828 - 14.2.9
2929 isImplemented : false
@@ -50,9 +50,13 @@ Build and Deployment:
5050 evidence : " "
5151 comments : " "
5252 Defined deployment process :
53- risk : Deployments without a defined process are error prone thus allowing old
54- or untested artifact to be deployed.
55- measure : A defined deployment process ensures that .
53+ risk : >-
54+ Deployment of insecure or malfunctioning artifacts.
55+ measure : >-
56+ Defining a deployment process ensures that there are
57+ established criteria in terms of functionalities,
58+ security, compliance, and performance,
59+ and that the artifacts meet them.
5660 difficultyOfImplementation :
5761 knowledge : 2
5862 time : 2
@@ -74,21 +78,23 @@ Build and Deployment:
7478 evidence : " "
7579 comments : " "
7680 Environment depending configuration parameters (secrets) :
77- risk : ' - Parameters are often used to set credentials, for example by starting
78- containers or applications; these parameters can often be seen by any one
79- listing running processes on the target system.'
80- measure : |
81- Configuration parameters are set for each environment not in the source code.
82- By using encryption, it is harder to read credentials,
83- e.g. from the file system.
84- Also, the usage of a credential management system can help protect credentials.
81+ risk : >-
82+ Unauthorized access to secrets stored in source code
83+ or in artifacts (e.g. container images)
84+ through process listing (e.g. ps -ef).
85+ measure : >-
86+ Set configuration parameters via environment variables
87+ stored using specific platform functionalities
88+ or secrets management systems
89+ (e.g. Kubernetes secrets or Hashicorp Vault).
8590 difficultyOfImplementation :
8691 knowledge : 2
8792 time : 2
8893 resources : 1
8994 usefulness : 4
9095 level : 2
91- implementation : []
96+ implementation :
97+ - $ref : src/assets/YAML/default/implementations.yaml#/implementations/hasicorp-vault
9298 references :
9399 samm2 :
94100 - I-SD-1-B
@@ -102,8 +108,10 @@ Build and Deployment:
102108 risk : ' - Parameters are often used to set credentials, for example by starting
103109 containers or applications; these parameters can often be seen by any one
104110 listing running processes on the target system.'
105- measure : By using encryption, it is harder to read credentials , e.g. from the
106- file system. Also, the usage of a credential management system can help protect
111+ measure : >-
112+ Encryption ensures confidentiality of credentials
113+ e.g. from unauthorized access on the file system.
114+ Also, the usage of a credential management system can help protect
107115 credentials.
108116 difficultyOfImplementation :
109117 knowledge : 2
0 commit comments