You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: data/Infrastructure.yml
+29-54Lines changed: 29 additions & 54 deletions
Original file line number
Diff line number
Diff line change
@@ -1,23 +1,22 @@
1
1
---
2
2
Infrastructure Hardening:
3
3
The cluster is hardened:
4
-
risk: Using default configurations for a cluster enviroment leads to potential risks.
5
-
measure: Harden cluster enviroments according to best practices.
4
+
risk: Using default configurations for a cluster environment leads to potential risks.
5
+
measure: Harden cluster environments according to best practices.
6
6
difficultyOfImplementation:
7
7
knowledge: 4
8
8
time: 3
9
9
resources: 2
10
10
usefulness: 4
11
11
level: 2
12
-
implementation:
12
+
implementation:
13
13
- <a href='https://www.cisecurity.org/cis-benchmarks/'>CIS Kubernetes Bench for Security</a>
14
14
- <a href='https://www.cisecurity.org/cis-benchmarks/'>CIS Docker Bench for Security</a>
15
15
- "For example for Containers: Deny running containers as root, deny using advanced privileges, deny mounting of the hole filesystem, ..."
16
16
samm2: o-environment-management|A|1
17
17
Applications are running in virtualized environments:
18
-
risk: Through a vulnerability in one service on a server, the attacker gains access
19
-
to other services.
20
-
measure: Application are running in virtualized envirnoments
18
+
risk: Through a vulnerability in one service on a server, the attacker gains access to other services running on the same server.
19
+
measure: Applications are running in a dedicated and isolated virtualized environments.
21
20
difficultyOfImplementation:
22
21
knowledge: 3
23
22
time: 3
@@ -26,8 +25,7 @@ Infrastructure Hardening:
26
25
level: 2
27
26
samm2: o-environment-management|A|1
28
27
Checking the sources of used libraries:
29
-
risk: Application and system libraries can have implementation flaws or deployment
30
-
flaws.
28
+
risk: Application and system libraries can have implementation flaws or deployment flaws.
31
29
measure: Each libraries source is checked to have a trusted source.
32
30
difficultyOfImplementation:
33
31
knowledge: 3
@@ -37,11 +35,8 @@ Infrastructure Hardening:
37
35
level: 2
38
36
samm: SA1-A
39
37
samm2: o-environment-management|A|1
40
-
Segmentated networks for virtual environments:
41
-
risk: Virtual environments in default settings are able to access other virtual
42
-
environments on the network stack. By using virtual machines, it is often possible
43
-
to connect to other virtual machines. By using docker, one bridge is used by
44
-
default so that all containers on one host can communicate with each other.
38
+
Segmented networks for virtual environments:
39
+
risk: Virtual environments in default settings are able to access other virtual environments on the network stack. By using virtual machines, it is often possible to connect to other virtual machines. By using docker, one bridge is used by default so that all containers on one host can communicate with each other.
45
40
measure: The communication between virtual environments is regulated.
46
41
difficultyOfImplementation:
47
42
knowledge: 3
@@ -50,17 +45,14 @@ Infrastructure Hardening:
50
45
usefulness: 5
51
46
level: 1
52
47
dependsOn: []
53
-
implementation:
48
+
implementation:
54
49
- istio
55
50
- bridges
56
51
- firewalls
57
52
samm2: o-environment-management|A|1
58
53
Infrastructure as Code:
59
-
risk: No tracking of changes in systems might lead to errors in the configuration.
60
-
In additions, it might lead to unauthorized changes. An examples is jenkins.
61
-
measure: Systems are setup by code. A full enviorement can be provisioned. In
62
-
addition, software like Jenkins 2 can be setup and configured in in code too.
63
-
The code should be stored in a version control system.
54
+
risk: No tracking of changes in systems might lead to errors in the configuration. In additions, it might lead to unauthorized changes. An examples is jenkins.
55
+
measure: Systems are setup by code. A full environment can be provisioned. In addition, software like Jenkins 2 can be setup and configured in in code too. The code should be stored in a version control system.
64
56
difficultyOfImplementation:
65
57
knowledge: 3
66
58
time: 5
@@ -97,8 +89,7 @@ Infrastructure Hardening:
97
89
samm2: o-environment-management|A|1
98
90
Microservice-Architecture:
99
91
risk: Monolithic applications are hard to test.
100
-
measure: A microservice-architecture helps to have small components, which are
101
-
easy to test.
92
+
measure: A microservice-architecture helps to have small components, which are more easy to test.
102
93
difficultyOfImplementation:
103
94
knowledge: 4
104
95
time: 5
@@ -108,13 +99,8 @@ Infrastructure Hardening:
108
99
samm: SA2
109
100
samm2: o-environment-management|A|1
110
101
Production near environments are used by developers:
111
-
risk: In case an errors occurs in production, the developer need to be able to
112
-
create a production near environment on a local development environment.
113
-
measure: Usage of infrastructure as code helps to create a production near environment.
114
-
The developer needs to be trained in order to setup a local develipment environment.
115
-
In addition, it should be possible to create production like test data. Often
116
-
peronal identifiable information is anonymised in order to comply with data
117
-
protection laws.
102
+
risk: In case an errors occurs in production, the developer need to be able to create a production near environment on a local development environment.
103
+
measure: Usage of infrastructure as code helps to create a production near environment. The developer needs to be trained in order to setup a local development environment. In addition, it should be possible to create production like test data. Often personal identifiable information is anonymized in order to comply with data protection laws.
118
104
difficultyOfImplementation:
119
105
knowledge: 3
120
106
time: 3
@@ -127,35 +113,32 @@ Infrastructure Hardening:
127
113
samm: SA1
128
114
samm2: o-environment-management|A|1
129
115
Role based authentication and authorization:
130
-
risk: Everyone is able to get unauthorized access to information on systems or
131
-
to modify information unauthorized on systems.
132
-
measure: The usage of a (role based) access control helps to restrict system access
133
-
to authorized users.
116
+
risk: Everyone is able to get unauthorized access to information on systems or to modify information unauthorized on systems.
117
+
measure: The usage of a (role based) access control helps to restrict system access to authorized users.
134
118
difficultyOfImplementation:
135
119
knowledge: 2
136
120
time: 3
137
121
resources: 1
138
122
usefulness: 3
139
123
level: 3
140
-
implementation: Verzeichnisdienst, Plugins
124
+
implementation: Directory Service, Plugins
141
125
dependsOn:
142
126
- Defined deployment process
143
127
- Defined build process
144
128
samm2: o-environment-management|A|1
145
129
2FA:
146
-
risk: One factor authentication is simple to bruteforce
130
+
risk: One factor authentication is more vulnerable to brute force attacks and is considered less secure.
147
131
measure: Two factor authentication for all privileged accounts on systems and applications
148
132
difficultyOfImplementation:
149
133
knowledge: 3
150
134
time: 2
151
135
resources: 3
152
136
usefulness: 4
153
137
level: 3
154
-
implementation: Smartcard, YubiKey, SMS
138
+
implementation: Smartcard, YubiKey, SMS, TOTP
155
139
samm2: TODO
156
140
Simple access control for systems:
157
-
risk: Attackers a gaining access to interal systems and application interfaces
158
-
measure: All internal systems are using simple authentication
141
+
risk: Attackers a gaining access to internal systems and application interfaces measure: All internal systems are using simple authentication
159
142
difficultyOfImplementation:
160
143
knowledge: 3
161
144
time: 3
@@ -168,11 +151,8 @@ Infrastructure Hardening:
168
151
samm: EH1-B
169
152
samm2: o-environment-management|A|1
170
153
Usage of a chaos monkey:
171
-
risk: Due to manuel changes on a system, they are not replaceable anymore. In
172
-
case of a crash it might happen that a planned redudant system is unavailable.
173
-
In addation, it is hard to replay manual changes.
174
-
measure: A randomized peridically shutdown of systems makes sure, that nobody
175
-
will perform manuall changes to a system.
154
+
risk: Due to manuel changes on a system, they are not replaceable anymore. In case of a crash it might happen that a planned redundant system is unavailable. In addition, it is hard to replay manual changes.
155
+
measure: A randomized periodically shutdown of systems makes sure, that nobody will perform manual changes to a system.
176
156
difficultyOfImplementation:
177
157
knowledge: 3
178
158
time: 5
@@ -182,9 +162,7 @@ Infrastructure Hardening:
182
162
samm2: o-environment-management|A|1
183
163
Usage of security by default for components:
184
164
risk: Components (images, libraries, applications) are not hardened.
185
-
measure: Hardening of components is important, specially for image on which other
186
-
teams base on. Hardening should be performed on the operation system and on
187
-
the services inside (e.g. Nginx or a Java-Application).
165
+
measure: Hardening of components is important, specially for image on which other teams base on. Hardening should be performed on the operation system and on the services inside (e.g. Nginx or a Java-Application).
188
166
difficultyOfImplementation:
189
167
knowledge: 4
190
168
time: 3
@@ -197,7 +175,7 @@ Infrastructure Hardening:
197
175
- Defined build process
198
176
samm2: o-environment-management|A|1
199
177
Usage of test and production environments:
200
-
risk: Security tests are not running reculary because test environments are missing
178
+
risk: Security tests are not running regularly because test environments are missing
201
179
measure: A production and a production like envirnoment is used
202
180
difficultyOfImplementation:
203
181
knowledge: 3
@@ -208,10 +186,9 @@ Infrastructure Hardening:
208
186
dependsOn:
209
187
- Defined deployment process
210
188
samm2: o-environment-management|A|1
211
-
Versioning:
189
+
versioning:
212
190
risk: Changes to production systems can not be undone.
213
-
measure: Versioning of artifacts related to production environments. For example
214
-
Jenkins configuration, docker images, system provisioning code.
191
+
measure: versioning of artifacts related to production environments. For example Jenkins configuration, docker images, system provisioning code.
215
192
difficultyOfImplementation:
216
193
knowledge: 3
217
194
time: 3
@@ -222,10 +199,8 @@ Infrastructure Hardening:
222
199
- Defined deployment process
223
200
samm2: o-environment-management|A|1
224
201
Virtual environments are limited:
225
-
risk: Denail of service (intenenally by an attacker or uninteninally by a bug)
226
-
on one service effects other services
227
-
measure: All virtual envirnoments are using resource limits on hard disks, memory
228
-
and CPU
202
+
risk: Denial of service (internally by an attacker or unintentionally by a bug) on one service effects other services
203
+
measure: All virtual environments are using resource limits on hard disks, memory and CPU
229
204
difficultyOfImplementation:
230
205
knowledge: 2
231
206
time: 2
@@ -235,4 +210,4 @@ Infrastructure Hardening:
235
210
dependsOn:
236
211
- Applications are running in virtualized environments
0 commit comments