Skip to content

Commit 4f8a6ff

Browse files
authored
Update Infrastructure.yml
corrected typo, changed formatting, added TOTP, changed sentences
1 parent aebe675 commit 4f8a6ff

1 file changed

Lines changed: 29 additions & 54 deletions

File tree

data/Infrastructure.yml

Lines changed: 29 additions & 54 deletions
Original file line numberDiff line numberDiff line change
@@ -1,23 +1,22 @@
11
---
22
Infrastructure Hardening:
33
The cluster is hardened:
4-
risk: Using default configurations for a cluster enviroment leads to potential risks.
5-
measure: Harden cluster enviroments according to best practices.
4+
risk: Using default configurations for a cluster environment leads to potential risks.
5+
measure: Harden cluster environments according to best practices.
66
difficultyOfImplementation:
77
knowledge: 4
88
time: 3
99
resources: 2
1010
usefulness: 4
1111
level: 2
12-
implementation:
12+
implementation:
1313
- <a href='https://www.cisecurity.org/cis-benchmarks/'>CIS Kubernetes Bench for Security</a>
1414
- <a href='https://www.cisecurity.org/cis-benchmarks/'>CIS Docker Bench for Security</a>
1515
- "For example for Containers: Deny running containers as root, deny using advanced privileges, deny mounting of the hole filesystem, ..."
1616
samm2: o-environment-management|A|1
1717
Applications are running in virtualized environments:
18-
risk: Through a vulnerability in one service on a server, the attacker gains access
19-
to other services.
20-
measure: Application are running in virtualized envirnoments
18+
risk: Through a vulnerability in one service on a server, the attacker gains access to other services running on the same server.
19+
measure: Applications are running in a dedicated and isolated virtualized environments.
2120
difficultyOfImplementation:
2221
knowledge: 3
2322
time: 3
@@ -26,8 +25,7 @@ Infrastructure Hardening:
2625
level: 2
2726
samm2: o-environment-management|A|1
2827
Checking the sources of used libraries:
29-
risk: Application and system libraries can have implementation flaws or deployment
30-
flaws.
28+
risk: Application and system libraries can have implementation flaws or deployment flaws.
3129
measure: Each libraries source is checked to have a trusted source.
3230
difficultyOfImplementation:
3331
knowledge: 3
@@ -37,11 +35,8 @@ Infrastructure Hardening:
3735
level: 2
3836
samm: SA1-A
3937
samm2: o-environment-management|A|1
40-
Segmentated networks for virtual environments:
41-
risk: Virtual environments in default settings are able to access other virtual
42-
environments on the network stack. By using virtual machines, it is often possible
43-
to connect to other virtual machines. By using docker, one bridge is used by
44-
default so that all containers on one host can communicate with each other.
38+
Segmented networks for virtual environments:
39+
risk: Virtual environments in default settings are able to access other virtual environments on the network stack. By using virtual machines, it is often possible to connect to other virtual machines. By using docker, one bridge is used by default so that all containers on one host can communicate with each other.
4540
measure: The communication between virtual environments is regulated.
4641
difficultyOfImplementation:
4742
knowledge: 3
@@ -50,17 +45,14 @@ Infrastructure Hardening:
5045
usefulness: 5
5146
level: 1
5247
dependsOn: []
53-
implementation:
48+
implementation:
5449
- istio
5550
- bridges
5651
- firewalls
5752
samm2: o-environment-management|A|1
5853
Infrastructure as Code:
59-
risk: No tracking of changes in systems might lead to errors in the configuration.
60-
In additions, it might lead to unauthorized changes. An examples is jenkins.
61-
measure: Systems are setup by code. A full enviorement can be provisioned. In
62-
addition, software like Jenkins 2 can be setup and configured in in code too.
63-
The code should be stored in a version control system.
54+
risk: No tracking of changes in systems might lead to errors in the configuration. In additions, it might lead to unauthorized changes. An examples is jenkins.
55+
measure: Systems are setup by code. A full environment can be provisioned. In addition, software like Jenkins 2 can be setup and configured in in code too. The code should be stored in a version control system.
6456
difficultyOfImplementation:
6557
knowledge: 3
6658
time: 5
@@ -97,8 +89,7 @@ Infrastructure Hardening:
9789
samm2: o-environment-management|A|1
9890
Microservice-Architecture:
9991
risk: Monolithic applications are hard to test.
100-
measure: A microservice-architecture helps to have small components, which are
101-
easy to test.
92+
measure: A microservice-architecture helps to have small components, which are more easy to test.
10293
difficultyOfImplementation:
10394
knowledge: 4
10495
time: 5
@@ -108,13 +99,8 @@ Infrastructure Hardening:
10899
samm: SA2
109100
samm2: o-environment-management|A|1
110101
Production near environments are used by developers:
111-
risk: In case an errors occurs in production, the developer need to be able to
112-
create a production near environment on a local development environment.
113-
measure: Usage of infrastructure as code helps to create a production near environment.
114-
The developer needs to be trained in order to setup a local develipment environment.
115-
In addition, it should be possible to create production like test data. Often
116-
peronal identifiable information is anonymised in order to comply with data
117-
protection laws.
102+
risk: In case an errors occurs in production, the developer need to be able to create a production near environment on a local development environment.
103+
measure: Usage of infrastructure as code helps to create a production near environment. The developer needs to be trained in order to setup a local development environment. In addition, it should be possible to create production like test data. Often personal identifiable information is anonymized in order to comply with data protection laws.
118104
difficultyOfImplementation:
119105
knowledge: 3
120106
time: 3
@@ -127,35 +113,32 @@ Infrastructure Hardening:
127113
samm: SA1
128114
samm2: o-environment-management|A|1
129115
Role based authentication and authorization:
130-
risk: Everyone is able to get unauthorized access to information on systems or
131-
to modify information unauthorized on systems.
132-
measure: The usage of a (role based) access control helps to restrict system access
133-
to authorized users.
116+
risk: Everyone is able to get unauthorized access to information on systems or to modify information unauthorized on systems.
117+
measure: The usage of a (role based) access control helps to restrict system access to authorized users.
134118
difficultyOfImplementation:
135119
knowledge: 2
136120
time: 3
137121
resources: 1
138122
usefulness: 3
139123
level: 3
140-
implementation: Verzeichnisdienst, Plugins
124+
implementation: Directory Service, Plugins
141125
dependsOn:
142126
- Defined deployment process
143127
- Defined build process
144128
samm2: o-environment-management|A|1
145129
2FA:
146-
risk: One factor authentication is simple to bruteforce
130+
risk: One factor authentication is more vulnerable to brute force attacks and is considered less secure.
147131
measure: Two factor authentication for all privileged accounts on systems and applications
148132
difficultyOfImplementation:
149133
knowledge: 3
150134
time: 2
151135
resources: 3
152136
usefulness: 4
153137
level: 3
154-
implementation: Smartcard, YubiKey, SMS
138+
implementation: Smartcard, YubiKey, SMS, TOTP
155139
samm2: TODO
156140
Simple access control for systems:
157-
risk: Attackers a gaining access to interal systems and application interfaces
158-
measure: All internal systems are using simple authentication
141+
risk: Attackers a gaining access to internal systems and application interfaces measure: All internal systems are using simple authentication
159142
difficultyOfImplementation:
160143
knowledge: 3
161144
time: 3
@@ -168,11 +151,8 @@ Infrastructure Hardening:
168151
samm: EH1-B
169152
samm2: o-environment-management|A|1
170153
Usage of a chaos monkey:
171-
risk: Due to manuel changes on a system, they are not replaceable anymore. In
172-
case of a crash it might happen that a planned redudant system is unavailable.
173-
In addation, it is hard to replay manual changes.
174-
measure: A randomized peridically shutdown of systems makes sure, that nobody
175-
will perform manuall changes to a system.
154+
risk: Due to manuel changes on a system, they are not replaceable anymore. In case of a crash it might happen that a planned redundant system is unavailable. In addition, it is hard to replay manual changes.
155+
measure: A randomized periodically shutdown of systems makes sure, that nobody will perform manual changes to a system.
176156
difficultyOfImplementation:
177157
knowledge: 3
178158
time: 5
@@ -182,9 +162,7 @@ Infrastructure Hardening:
182162
samm2: o-environment-management|A|1
183163
Usage of security by default for components:
184164
risk: Components (images, libraries, applications) are not hardened.
185-
measure: Hardening of components is important, specially for image on which other
186-
teams base on. Hardening should be performed on the operation system and on
187-
the services inside (e.g. Nginx or a Java-Application).
165+
measure: Hardening of components is important, specially for image on which other teams base on. Hardening should be performed on the operation system and on the services inside (e.g. Nginx or a Java-Application).
188166
difficultyOfImplementation:
189167
knowledge: 4
190168
time: 3
@@ -197,7 +175,7 @@ Infrastructure Hardening:
197175
- Defined build process
198176
samm2: o-environment-management|A|1
199177
Usage of test and production environments:
200-
risk: Security tests are not running reculary because test environments are missing
178+
risk: Security tests are not running regularly because test environments are missing
201179
measure: A production and a production like envirnoment is used
202180
difficultyOfImplementation:
203181
knowledge: 3
@@ -208,10 +186,9 @@ Infrastructure Hardening:
208186
dependsOn:
209187
- Defined deployment process
210188
samm2: o-environment-management|A|1
211-
Versioning:
189+
versioning:
212190
risk: Changes to production systems can not be undone.
213-
measure: Versioning of artifacts related to production environments. For example
214-
Jenkins configuration, docker images, system provisioning code.
191+
measure: versioning of artifacts related to production environments. For example Jenkins configuration, docker images, system provisioning code.
215192
difficultyOfImplementation:
216193
knowledge: 3
217194
time: 3
@@ -222,10 +199,8 @@ Infrastructure Hardening:
222199
- Defined deployment process
223200
samm2: o-environment-management|A|1
224201
Virtual environments are limited:
225-
risk: Denail of service (intenenally by an attacker or uninteninally by a bug)
226-
on one service effects other services
227-
measure: All virtual envirnoments are using resource limits on hard disks, memory
228-
and CPU
202+
risk: Denial of service (internally by an attacker or unintentionally by a bug) on one service effects other services
203+
measure: All virtual environments are using resource limits on hard disks, memory and CPU
229204
difficultyOfImplementation:
230205
knowledge: 2
231206
time: 2
@@ -235,4 +210,4 @@ Infrastructure Hardening:
235210
dependsOn:
236211
- Applications are running in virtualized environments
237212
samm2: o-environment-management|A|1
238-
...
213+
...

0 commit comments

Comments
 (0)