Skip to content

Commit 275d411

Browse files
committed
Add further implementations.
1 parent 572a160 commit 275d411

3 files changed

Lines changed: 67 additions & 6 deletions

File tree

src/assets/YAML/default/TestAndVerification/DynamicDepthForApplications.yaml

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
Test and Verification:
33
Dynamic depth for applications:
44
Coverage analysis:
5-
risk: Parts of the service are not still covered.
5+
risk: Parts of the service are not still covered by tests.
66
measure: Check that there are no missing paths in the application with coverage-tools.
77
difficultyOfImplementation:
88
knowledge: 4
@@ -12,6 +12,7 @@ Test and Verification:
1212
level: 4
1313
implementation:
1414
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/owasp-code-pulse
15+
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/coveragepy
1516
references:
1617
samm2:
1718
- V-ST-2-A
@@ -58,6 +59,8 @@ Test and Verification:
5859
implementation:
5960
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/curl
6061
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/openapi
62+
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/owasp-zap
63+
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/schemathesis
6164
dependsOn:
6265
- Usage of different roles
6366
references:
@@ -185,7 +188,7 @@ Test and Verification:
185188
implementation:
186189
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/zest
187190
isImplemented: false
188-
evidence: ""
191+
evidence: "For REST APIs, multiple OAuth2 scopes are used."
189192
comments: ""
190193
Usage of multiple scanners:
191194
risk: Each vulnerability scanner has different opportunities. By using just

src/assets/YAML/default/TestAndVerification/StaticDepthForApplications.yaml

Lines changed: 37 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
Test and Verification:
33
Static depth for applications:
4-
Exclusion of source code duplicates:
4+
Exclusion of source code duplicates: &Exclusion-of-source-code-duplicates
55
risk: Duplicates in source code might influence the stability of the application.
66
measure: Automatic Detection and manual removal of duplicates in source code.
77
difficultyOfImplementation:
@@ -24,6 +24,11 @@ Test and Verification:
2424
isImplemented: false
2525
evidence: ""
2626
comments: ""
27+
Dead code elimination:
28+
<<: *Exclusion-of-source-code-duplicates
29+
risk: Dead code increases the attack surface (use of hard coded credentials and
30+
variables, sensitive information)
31+
measure: Collection of unused code and then manual removal of unused code.
2732
Local development security checks performed:
2833
risk: Creating and developing code contains code smells and quality issues.
2934
measure: |
@@ -38,6 +43,7 @@ Test and Verification:
3843
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/fortify-vscode-extension
3944
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/checkmarx-vscode-extension
4045
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/appscan-vscode-extension
46+
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/pre-commit
4147
references:
4248
samm2:
4349
- V-ST-A-1-1
@@ -47,6 +53,31 @@ Test and Verification:
4753
isImplemented: false
4854
evidence: ""
4955
comments: ""
56+
API design validation:
57+
risk: Creation of insecure or non-compliant API.
58+
measure: |
59+
Design contract-first APIs using an interface description language such as OpenAPI, AsyncAPI or SOAP
60+
and validate the specification using specific tools.
61+
Checks should be integrated in IDEs and CI/CD pipelines.
62+
difficultyOfImplementation:
63+
knowledge: 2
64+
time: 2
65+
resources: 2
66+
usefulness: 4
67+
level: 2
68+
implementation:
69+
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/stoplight-spectral
70+
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/api-oas-checker
71+
references:
72+
samm2:
73+
- V-ST-1-A
74+
iso27001-2017:
75+
- 8.25 # Secure development lifecycle
76+
- 8.27 # Secure system architecture and engineering principles
77+
- 8.28 # Secure coding
78+
isImplemented: false
79+
evidence: ""
80+
comments: ""
5081
Static analysis for all components/libraries:
5182
risk: Used components like libraries and legacy applications might have vulnerabilities
5283
measure: Usage of a static analysis for all used components.
@@ -155,9 +186,9 @@ Test and Verification:
155186
evidence: ""
156187
comments: ""
157188
Stylistic analysis:
158-
risk: False source code indenting might lead to vulnerabilities.
189+
risk: Unclear or obfuscated code might have unexpected behavior.
159190
measure: Analysis of compliance to style guides of the source code ensures that
160-
source code indenting rules are met.
191+
source code formatting rules are met (e.g. indentation, loops, ...).
161192
difficultyOfImplementation:
162193
knowledge: 1
163194
time: 1
@@ -168,6 +199,7 @@ Test and Verification:
168199
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/pmd
169200
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/stylecop
170201
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/sonarqube
202+
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/github-super-linter
171203
references:
172204
samm2:
173205
- V-ST-2-A
@@ -193,6 +225,7 @@ Test and Verification:
193225
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/retire-js
194226
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/npm-audit
195227
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/dependencyTrack
228+
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/github-dependabot
196229
references:
197230
samm2:
198231
- V-ST-2-A
@@ -218,6 +251,7 @@ Test and Verification:
218251
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/dependencyTrack
219252
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/retire-js
220253
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/npm-audit
254+
- $ref: src/assets/YAML/default/implementations.yaml#/implementations/github-dependabot
221255
references:
222256
samm2:
223257
- V-ST-2-A

src/assets/YAML/default/implementations.yaml

Lines changed: 25 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -654,4 +654,28 @@ implementations:
654654
url: https://github.com/italia/api-oas-checker
655655
description: |
656656
A tool to check OpenAPI specifications using a comprehensive ruleset based
657-
on API best practices.
657+
on API best practices.
658+
coveragepy:
659+
name: Coverage.py
660+
tags: [testing, coverage]
661+
url: https://github.com/nedbat/coveragepy
662+
description: |
663+
Code coverage measurement for Python
664+
github-dependabot:
665+
name: Dependabot
666+
tags: [dependency, dependency-management, scm]
667+
url: https://github.com/dependabot/dependabot-core
668+
description: |
669+
Dependabot creates pull requests to keep your dependencies secure and up-to-date.
670+
github-super-linter:
671+
name: Super-Linter
672+
tags: [linting, scm]
673+
url: https://github.com/github/super-linter
674+
description: |
675+
Lint code bases to catch common errors and enforce code style
676+
schemathesis:
677+
name: Schemathesis
678+
tags: [testing, api, documentation]
679+
url: https://github.com/schemathesis/schemathesis
680+
description: |
681+
Schemathesis is a tool for testing web applications and services by sending requests based on the Open API / Swagger schema.

0 commit comments

Comments
 (0)