You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+10Lines changed: 10 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -8,3 +8,13 @@ docker run -ti -v $(pwd)/src/assets/YAML/:/var/www/html/src/assets/YAML wurstbro
8
8
# Afterwards, you can use the generated.yaml in a container
9
9
docker run -v $(pwd)/src/assets/YAML/generated/generated.yaml:/usr/share/nginx/html/assets/YAML/generated/generated.yaml -p 8080:8080 wurstbrot/dsomm
10
10
```
11
+
12
+
## Credits
13
+
14
+
* The dimension _Test and Verification_ is based on Christian Schneiders [Security DevOps Maturity Model (SDOMM)](https://www.christian-schneider.net/SecurityDevOpsMaturityModel.html). _Application tests_ and _Infrastructure tests_ are added by Timo Pagel. Also, the sub-dimension _Static depth_ has been evaluated by security experts at [OWASP Stammtisch Hamburg](https://www.owasp.org/index.php/OWASP_German_Chapter_Stammtisch_Initiative/Hamburg).
15
+
* The sub-dimension <i>Process</i> has been added after a discussion with [Francois Raynaud](https://www.linkedin.com/in/francoisraynaud/) that reactive activities are missing.
16
+
* Enhancement of my basic translation is performed by [Claud Camerino](https://github.com/clazba).
17
+
* Adding ISO 27001:2017 mapping, [Andre Baumeier](https://github.com/AndreBaumeier).
18
+
*[OWASP Project Integration Project Writeup](https://github.com/OWASP/www-project-integration-standards/blob/master/writeups/owasp_in_sdlc/index.md) for providing documentation on different DevSecOps practices which are copied&pasted/ (and adopted) (https://github.com/northdpole, https://github.com/ThunderSon)
19
+
* The requirements from [level 0](https://github.com/AppSecure-nrw/security-belts/blob/master/white/) are based on/copied from [AppSecure NRW](https://appsecure.nrw/)
20
+
* The sub dimension _Test KPI_, _Triage_, _Dynamic depth for app/infra_, _Static depth for app/infra_ and some other vulnerability management activities are based/inspired by [Vulnerability Managment Maturity Model - Cheat Sheet V1.6](TODO FRANCESCO LINK)
Copy file name to clipboardExpand all lines: src/assets/YAML/default/BuildAndDeployment/Build.yaml
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -158,7 +158,7 @@ Build and Deployment:
158
158
measure:
159
159
Digitally signing artifacts for all steps during the build and especially
160
160
docker images, helps to ensure their integrity and authenticity.
161
-
description: |-
161
+
description: |-
162
162
To perform a push to a GitHub repository, you must be authenticated. It's important to note that GitHub does not verify if the authenticated user's email address matches the one in the commit.
163
163
To clearly identify the author of a commit for reviewers, commit signing is recommended.
Copy file name to clipboardExpand all lines: src/assets/YAML/default/BuildAndDeployment/Deployment.yaml
+56-19Lines changed: 56 additions & 19 deletions
Original file line number
Diff line number
Diff line change
@@ -49,7 +49,8 @@ Build and Deployment:
49
49
Unused applications are not maintained and may contain vulnerabilities.
50
50
Once exploited they can be used to attack other applications or
51
51
to perform lateral movements within the organization.
52
-
measure: A clear decommissioning process ensures the removal of unused applications.
52
+
measure: |-
53
+
A clear decommissioning process ensures the removal of unused applications from the `Inventory of production components` and if implemented from `Inventory of production artifacts`.
53
54
difficultyOfImplementation:
54
55
knowledge: 1
55
56
time: 2
@@ -129,8 +130,8 @@ Build and Deployment:
129
130
d3f:
130
131
- ApplicationConfigurationHardening
131
132
isImplemented: false
132
-
evidence: ""
133
-
comments: ""
133
+
tags:
134
+
- secret
134
135
Handover of confidential parameters:
135
136
uuid: 94a96f79-8bd6-4904-97c0-994ff88f176a
136
137
risk:
@@ -169,19 +170,19 @@ Build and Deployment:
169
170
d3f:
170
171
- ApplicationConfigurationHardening
171
172
isImplemented: false
172
-
evidence: ""
173
-
comments: ""
174
-
Inventory of dependencies:
173
+
tags:
174
+
- secret
175
+
Inventory of production dependencies:
175
176
uuid: 13e9757e-58e2-4277-bc0f-eadc674891e6
176
177
risk:
177
-
In case a vulnerability of severity high or critical is known by the organization,
178
-
it needs to be known where an artifacts with that vulnerability is deployed
178
+
Delayed identification of components and their vulnerabilities in production.
179
+
In case a vulnerability is known by the organization, it needs to be known where an artifacts with that vulnerability is deployed
179
180
with which dependencies.
180
181
measure:
181
-
A documented inventory of dependencies used in images and containers
182
+
A documented inventory of dependencies used in artifacts like container images and containers
182
183
exists.
183
184
dependsOn:
184
-
- Defined deployment process
185
+
- uuid:83057028-0b77-4d2e-8135-40969768ae88 # Inventory of production artifacts
An organization is unaware of components like applications in production. Not knowing existing applications in production leads to not assessing it.
214
+
measure: |-
215
+
A documented inventory of components in production exists (gathered manually or automatically). For example a manually created document with applications in production.
216
+
In a kubernetes cluster, namespaces can be automatically gathered and documented, e.g. in a JSON in a S3 bucket/git repository, dependency track.
Even if automated dependencies PRs are merged, they might not be deployed. This results in vulnerabilities in running artifacts stay for too long and might get exploited.
253
+
measure: |
254
+
After merging of an automated dependency PR, automated deployment is needed,
0 commit comments