-
Notifications
You must be signed in to change notification settings - Fork 13
Review of level 1 activities #46
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Changes from all commits
8cd0cf9
e525891
653ea74
9dd70c3
5eb5aad
65d1dcb
b20e671
066263c
75babf0
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -69,19 +69,21 @@ Build and Deployment: | |
| comments: "" | ||
| Defined deployment process: | ||
| uuid: 74938a3f-1269-49b9-9d0f-c43a79a1985a | ||
| description: | | ||
| A defined deployment process is a documented and automated set of steps for releasing software into production. It ensures that deployments are consistent, secure, and auditable, reducing the risk of errors and unauthorized changes. This process should include validation, approval, and rollback mechanisms. | ||
|
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. We can add an extra activity "Automated deployment"
Collaborator
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. As to make a greater distinction between well defined and automated. Might be good idea. Both being level 1, I take? In that case, we need text that better differentiate between the two, If we do split this activity, we need to make sure we update all of the dependencies, in that case. Check out https://dsomm.pages.dev/activity-description?uuid=74938a3f-1269-49b9-9d0f-c43a79a1985a for (Also note that they are now clickable, to move between dependent activities.) |
||
| risk: >- | ||
| Deployment of insecure or malfunctioning artifacts. | ||
| Deployment based human routines are error prone, and of insecure or malfunctioning artifacts. | ||
|
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. See comment above.
Collaborator
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. It might be good to differ between well defined, automated and a CI/CD pipeline. Control question:
Is
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. yes, readme is well definied. |
||
| measure: >- | ||
| Defining a deployment process ensures that there are | ||
| established criteria in terms of functionalities, | ||
| security, compliance, and performance, | ||
| and that the artifacts meet them. | ||
| level: 1 | ||
| difficultyOfImplementation: | ||
| knowledge: 2 | ||
| time: 2 | ||
| resources: 1 | ||
| usefulness: 4 | ||
| level: 1 | ||
| dependsOn: | ||
| - uuid:f6f7737f-25a9-4317-8de2-09bf59f29b5b # Def. Build Process | ||
| implementation: | ||
|
|
@@ -96,6 +98,11 @@ Build and Deployment: | |
| iso27001-2022: | ||
| - 5.37 | ||
| - 8.32 | ||
| assessment: | | ||
| - Deployment process is documented and available to relevant staff | ||
| - All deployment steps are automated | ||
| - Rollback procedures are defined and tested [Keep??? Delete???] | ||
|
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. That is not part of this activity I think. That is Rolling update on deployment |
||
| - Provide audit logs or evidence of deployments | ||
| isImplemented: false | ||
| evidence: "" | ||
| comments: "" | ||
|
|
@@ -211,19 +218,24 @@ Build and Deployment: | |
| - sbom | ||
| Inventory of production components: | ||
| uuid: 2a44b708-734f-4463-b0cb-86dc46344b2f | ||
| description: | | ||
| An inventory of production components is a complete, up-to-date list of all applications running in production. This enables effective vulnerability management, incident response, and compliance. Without it, organizations risk running unmaintained or unauthorized software. | ||
| risk: |- | ||
| An organization is unaware of components like applications in production. Not knowing existing applications in production leads to not assessing it. | ||
| measure: |- | ||
| A documented inventory of components in production exists (gathered manually or automatically). For example a manually created document with applications in production. | ||
| In a kubernetes cluster, namespaces can be automatically gathered and documented, e.g. in a JSON in a S3 bucket/git repository, dependency track. | ||
| assessment: | | ||
| - Inventory of all production applications with application name, owner, and date of last review | ||
| - Inventory is accessible to development, security and operations teams | ||
| dependsOn: | ||
| - Defined deployment process | ||
| level: 1 | ||
| difficultyOfImplementation: | ||
| knowledge: 1 | ||
| time: 1 | ||
| resources: 1 | ||
| usefulness: 4 | ||
| level: 1 | ||
| implementation: | ||
| - $ref: src/assets/YAML/default/implementations.yaml#/implementations/backstage | ||
| - $ref: src/assets/YAML/default/implementations.yaml#/implementations/dependencyTrack | ||
|
|
||
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -4,19 +4,22 @@ Culture and Organization: | |
| Education and Guidance: | ||
| Ad-Hoc Security trainings for software developers: | ||
| uuid: 12c90cc6-3d58-4d9b-82ff-d469d2a0c298 | ||
| risk: | ||
| Understanding security is hard and personnel needs to be trained on it. | ||
| Otherwise, flaws like an SQL Injection might be introduced into the software | ||
| which might get exploited. | ||
| measure: | ||
| Provide security awareness training for all personnel involved in software | ||
| development Ad-Hoc. | ||
| description: | | ||
| Ad-hoc security training provides basic awareness of software security risks and best practices to developers and other personnel involved in software development. These trainings are delivered as needed, without a fixed schedule, to address immediate knowledge gaps or respond to emerging threats. | ||
| risk: | | ||
| Without any security training, personnel may lack awareness of common software vulnerabilities (such as SQL Injection and vulnerable dependencies), increasing the risk of introducing exploitable flaws into applications. | ||
| measure: | | ||
| Provide security awareness training for all personnel involved in software development on an ad-hoc basis, ensuring that relevant topics are covered when new risks or needs are identified. | ||
| assessment: | | ||
| - Conduct security training for developers and relevant personnel | ||
| - Training materials are available | ||
| - Attendance records are available | ||
| level: 1 | ||
| difficultyOfImplementation: | ||
| knowledge: 2 | ||
| time: 1 | ||
| resources: 1 | ||
| usefulness: 3 | ||
| level: 1 | ||
| implementation: | ||
| - $ref: src/assets/YAML/default/implementations.yaml#/implementations/owasp-juice-shop | ||
| - $ref: src/assets/YAML/default/implementations.yaml#/implementations/owasp-cheatsheet-series | ||
|
|
@@ -407,18 +410,20 @@ Culture and Organization: | |
| comments: "" | ||
| Security consulting on request: | ||
| uuid: 0b28367b-75a0-4bae-a926-3725c1bf9bb0 | ||
| risk: | ||
| Not asking a security expert when questions regarding security appear | ||
| might lead to flaws. | ||
| measure: | ||
| Security consulting to teams is given on request. The security consultants | ||
| can be internal or external. | ||
| level: 1 | ||
| description: | | ||
| Security consulting on request allows teams to seek expert advice on security-related questions or challenges as they arise. This support can be provided by internal or external security consultants and helps address specific concerns during software development. | ||
| risk: | | ||
| If teams do not consult security experts when questions arise, security flaws may be introduced or remain undetected, increasing the risk of vulnerabilities in the software. | ||
| measure: | | ||
| Make security consulting available to teams on request, ensuring that expert advice is accessible when needed to address security concerns during development. | ||
| assessment: | | ||
| Records show that teams have access to security consulting services and have used them when needed. Documentation of consultations and resulting actions is available for review. | ||
|
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. For the assessment maybe:
You suggestion is a bit like "buy a consultant" which might not be needed (for sure it comes from my wording beforehand). |
||
| difficultyOfImplementation: | ||
| knowledge: 3 | ||
| time: 1 | ||
| resources: 1 | ||
| usefulness: 3 | ||
| level: 1 | ||
| implementation: | ||
| - $ref: src/assets/YAML/default/implementations.yaml#/implementations/owasp-cheatsheet-series | ||
| references: | ||
|
|
||
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -366,6 +366,8 @@ Implementation: | |
| uuid: 82e499d1-f463-4a4b-be90-68812a874af6 | ||
| risk: Attackers a gaining access to internal systems and application interfaces | ||
| measure: All internal systems are using simple authentication | ||
| assessment: | | ||
| - Demonstrate that every team member has appropriate access (least privilege). | ||
|
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. From my point of view, it is the opposite: |
||
| difficultyOfImplementation: | ||
| knowledge: 3 | ||
| time: 3 | ||
|
|
||
Uh oh!
There was an error while loading. Please reload this page.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I have added both Maven and Jenkins as implementation references