You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: eng/README.md
+19-12Lines changed: 19 additions & 12 deletions
Original file line number
Diff line number
Diff line change
@@ -623,18 +623,17 @@ But it's not a free-for-all: there are technological standards and procedures th
623
623
624
624
We'll delve deeper into the cultural aspects of the DevOps methodology in the chapter "[Embracing failure](#embracing-failure)".
625
625
626
-
## Qualification, Certification, and Approval
626
+
## Qualification, Certification, and Accreditation
627
627
628
-
There are three ways to manage risk when making a technical choice concerning the security features of a technology. In France, ANSSI defines the following terms in this way:
628
+
Governments are hungry for new innovative technologies. However, they need to strike a balance between the risks they may entail and the benefits they may get. This is why they create frameworks to manage this risk.
629
629
630
-
- Qualification: It is the recommendation by the French state for proven and approved cybersecurity products or services[^QualificationANSSI]. It attests to their compliance with regulatory, technical, and security requirements promoted by ANSSI, providing a guarantee of product robustness. It allows the product to access regulated markets.
631
-
- Certification: It is an attestation of a product's robustness, based on a compliance analysis and penetration tests performed by a third-party evaluator[^PASSI] under the authority of ANSSI[^CertificationANSSI]. It allows access to regulated markets and ensures a level of trust for users wishing to adopt it. The process takes between 2 months (first level security certification) and 18 months (common criteria certification).
630
+
France's cybersecurity agency[^ANSSI] defines three ways to assess risk of using a technology : qualification[^QualificationANSSI], certification[^CertificationANSSI] and accreditation. Most western countries adopt similar processes and signed an agreement making the trade of secure IT solutions between members easier : the [_Common Criteria Recognition Arrangement_ (CCRA)](https://www.commoncriteriaportal.org/ccra/index.cfm)[^CCRA].
632
631
633
-
Certification/qualification concerns a product. Approval concerns the deployment of this product in an environment (an information system). While certification is not a legal requirement, approval can be, depending on your IT security rules or the law (e.g., if you are an OIV[^OIV]). It represents the acceptance of risk versus the benefits the installation brings. In this sense, it can be validated by an IT security authority regardless of a product's certification/qualification.
632
+
As a declarative approach to managing security risks, traditional approval processes are not well-suited for continuous deployment practices. They freeze risk for a specific moment or architecture. Yet, threats emerge daily: a vulnerability in a library, for example, could be detected a day after approval is granted. Even though the approval is temporary and a periodic assessment might be required, the vulnerability might persist during this time, leading to a risk of exploitation.
634
633
635
-
Qualifications, certifications, and approvals are currently not well-suited to continuous deployment practices, as they freeze risk at a specific moment. Yet, threats emerge daily: a vulnerability in a library, for example, could be detected a day after approval is granted. Even though the approval is temporary, the vulnerability might persist during this time, with a risk of exploitation. It remains to be detected, and for someone who has undergone the administrative ordeal of approval, to consider repeating the experience.
634
+
For Cloud service providers (CSPs), the United States established the _Federal Risk and Authorization Management Program_ ([FedRAMP](https://www.fedramp.gov/))[^fedrampsimilars]. It adds a new layer of security compared to tradtional approaches by enforcing a [demanding continuous monitoring](https://www.fedramp.gov/assets/resources/documents/CSP_Continuous_Monitoring_Strategy_Guide.pdf) process.
636
635
637
-
Securing an information system is better if one assumes that a security flaw might emerge or be deployed at any moment, but that implemented procedures can quickly respond to this threat. For this, it's recommended to adopt continuous integration techniques.
636
+
Assuming security flaws might emerge at any moment must be part of your cybersecurity posture. You must have actionable tools to quickly respond to threats and preserve your ATOs[^ATO]. To address this challenge, it's recommended to adopt continuous integration techniques.
638
637
639
638
## Continuous Integration and Security
640
639
@@ -875,7 +874,7 @@ This is exemplified by the _Iron Bank_[^IronBankPresentation] service set up by
875
874
876
875

877
876
878
-
In organizations dealing with highly sensitive data (i.e., data that can jeopardize a country's security or credibility if disclosed), the default policy is to authorize only the use of pre-approved libraries and images (_hardened images_). However, consider the impact of such a choice on development velocity. Ensure your security and SRE teams can keep up with the provision of libraries.
877
+
In organizations dealing with highly sensitive data (i.e., data that can jeopardize a country's security or credibility if disclosed), the default policy is to authorize only the use of pre-approved libraries and images (_hardened images_). However, consider the impact of such a choice on development velocity. Ensure your security and SRE teams can keep up with provisioning libraries.
879
878
880
879
Since it's nearly impossible to manually analyze each development library to ensure it's flawless, software factories can rely on file signatures. Trusted editors sign each of their libraries[^GitlabSigningProcess], so continuous integration pipelines or system administrators can verify it hasn't been altered during transfer. Each trusted editor issues a certificate that the SRE team can integrate into its continuous integration pipelines to ensure downloaded packages haven't been tampered with.
881
880
@@ -1093,6 +1092,8 @@ For example, if you can't set up a secure software forge yourself, you can use _
1093
1092
1094
1093
Joining a _bug bounty_ platform is common among large enterprises, both to analyze their websites or the open-source software they use[^BugBountyLinuxKnl]. A _bug bounty_ system rewards individuals for identifying vulnerabilities, aiming to detect and fix vulnerabilities before they're exploited by malicious hackers. Popular platforms in this area include _Hackerone_, _Bugcrowd_, _Synack_, and _Open Bug Bounty_.
1095
1094
1095
+
In a mature organization, you could even open an _Open Source Program Office_ (OSPO)[^OSPO], responsible for defining and implementing strategies around the use of and securing open-source technologies employed in your organization.
1096
+
1096
1097
Finally, major tech companies often release new software as open-source. These quickly become standards used by tens of thousands of developers worldwide. This facilitates the onboarding of engineers to their technologies without incurring training costs. These companies thus find themselves with candidates already proficient in their technologies.
1097
1098
1098
1099
Far from benefiting only these companies, this practice benefits the entire sector, which now has a pool of candidates familiar with the same tools and practices.
@@ -3417,11 +3418,9 @@ _Have at least 5 years of professional experience? We prioritize it and don't co
3417
3418
3418
3419
[^Longhorn]: Distributed _Cloud-native_ block storage for Kubernetes. _longhorn.io_.
[^QualificationANSSI]: Qualification: It is [the recommendation](https://cyber.gouv.fr/comprendre-la-qualification) by a State of a proven and approved cybersecurity product or service. It attests to their compliance with regulatory, technical, and security requirements promoted by a State's cyberdefense agency (e.g., ANSSI in France, CISA in the U.S.), providing a guarantee of the product's robustness. It enables the product to access regulated markets.
3423
3422
3424
-
[^PASSI]: The third-party evaluator must be a PASSI (Information Systems Security Audit Service Providers).
3423
+
[^CertificationANSSI]: It is [the attestation](https://cyber.gouv.fr/comprendre-la-certification) of a product's robustness, based on a compliance analysis and penetration tests conducted by a third-party evaluator under the authority of the State's cyberdefense agency. It allows access to regulated markets and ensures a certain level of trust. The process lasts between 6 and 24 months.
3425
3424
3426
3425
[^OIV]: OIV: [_Operators of Vital Importance_](https://www.ssi.gouv.fr/en/cybersecurity-in-france/ciip-in-france/faq/) in France or [_Critical Infrastructures_](https://www.cisa.gov/topics/critical-infrastructure-security-and-resilience) in the United-States [and Canada](https://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/srtg-crtcl-nfrstrctr/index-en.aspx). Operators are defined as "operator[s] whose unavailability could strongly threaten the economical or military potential, the security or the resilience of the Nation".
3427
3426
@@ -3592,3 +3591,11 @@ _Have at least 5 years of professional experience? We prioritize it and don't co
3592
3591
[^Persona]: A "persona" is a fictional and detailed representation of a target user, created to help development and project management teams understand the needs, experiences, behaviors, and interests of potential customers.
3593
3592
3594
3593
[^SunTzuArtOfWar]: Yann COUDERC. ["_Did Sun Tzu invented the nonconforming cases ?_ (FR)"](https://suntzufrance.fr/sun-tzu-a-t-il-invente-les-cas-non-conformes/). 2013.
3594
+
3595
+
[^CCRA]: Agreement for the mutual recognition of IT certifications between members. More at _commoncriteriaportal.org/ccra/index.cfm_
3596
+
3597
+
[^OSPO]: The definition and guide of the Open Source Program Office is available on GitHub. _github.com/todogroup/ospodefinition.org_.
3598
+
3599
+
[^fedrampsimilars]: Similar programs to FedRAMP can be found. For instance: [SecNumCloud](https://cyber.gouv.fr/secnumcloud-pour-les-fournisseurs-de-services-cloud) in France, [G-Cloud](https://www.gov.uk/guidance/g-cloud-suppliers-guide) in the UK, [GC-CSRMAP](https://www.canada.ca/en/government/system/digital-government/digital-government-innovations/cloud-services/cloud-security-risk-management-approach-procedures.html) in Canada, [C5](https://www.bsi.bund.de/EN/Themen/Unternehmen-und-Organisationen/Informationen-und-Empfehlungen/Empfehlungen-nach-Angriffszielen/Cloud-Computing/Kriterienkatalog-C5/C5_Einfuehrung/C5_Einfuehrung_node.html) in Germany or [ENS](https://administracionelectronica.gob.es/pae_Home/pae_Estrategias/pae_Seguridad_Inicio/pae_Esquema_Nacional_de_Seguridad.html) in Spain.
3600
+
3601
+
[^ATO]: ATO: Authority to Operate. Authorization granted through FedRAMP to provide government agences with Cloud services.
Copy file name to clipboardExpand all lines: fra/README.md
+7-3Lines changed: 7 additions & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -634,7 +634,7 @@ Il existe trois manières de gérer le risque lorsque l'on doit faire un choix t
634
634
635
635
La certification/qualification concerne un produit. L'homologation concerne le déploiement de ce produit dans un environnement (un système d'information). Alors que la certification n'est pas une obligation légale, l'homologation peut l'être selon que vos règles SSI ou la loi l'imposent (ex: si vous êtes un OIV[^OIV]). Elle représente l'acceptation du risque face aux bénéfices que l'installation apporte. En ce sens, elle peut être validée par une autorité SSI indépendamment de la certification/qualification d'un produit.
636
636
637
-
Les qualifications, certifications et homologations sont en l'état assez peu adaptées aux pratiques de déploiement continu, car elles figent le risque à l'instant T. Or les menaces s'imposent au jour le jour : une faille dans une librairie peut par exemple être détectée un jour après l'approbation d'une homologation. Bien que l'homologation soit temporaire, la faille va quand même persister pendant ce temps, au risque d'être exploitée. Faut-il encore qu'elle soit détectée et que la personne ayant subit l'aventure administrative que représente l'homologation ai envie de réitérer l'expérience.
637
+
Les qualifications, certifications et homologations sont en l'état assez peu adaptées aux pratiques de déploiement continu, car elles figent le risque à l'instant T. Or les menaces s'imposent au jour le jour : une faille dans une librairie peut par exemple être détectée un jour après l'approbation d'une homologation. Bien que l'homologation soit temporaire, la faille va quand même persister pendant ce temps, au risque d'être exploitée. Faut-il encore qu'elle soit détectée et que la personne ayant subit l'aventure administrative que représente l'homologation ait envie de réitérer l'expérience.
638
638
639
639
La sécurisation d'un système d'information est meilleure si l'on part du principe qu'une faille de sécurité risque à tout moment de survenir ou d'être déployée, mais que les procédés mis en place permettent de réagir rapidement à cette menace pour l'inhiber. Pour ce faire, il est recommandé de mettre en place des techniques d'intégration continue.
640
640
@@ -1097,6 +1097,8 @@ Par exemple, si vous n'êtes pas en mesure d'installer par vous-même une forge
1097
1097
1098
1098
Adhérer à une plateforme de _bug bounty_ est une pratique commune chez les grandes entreprises. Ils le font à la fois pour analyser leurs sites web ou des logiciels libres qu'ils utilisent[^BugBountyLinuxKnl]. Un _bug bounty_ est un système visant à récompenser les individus trouvant des vulnérabilités. L'objectif est d'identifier et de corriger les vulnérabilités avant qu'elles ne puissent être exploitées par des hackers malveillants. Les plateformes les plus populaires dans ce domaine sont _Hackerone_, _Bugcrowd_, _Synack_ ou encore _Open Bug Bounty_.
1099
1099
1100
+
Dans une organisation assez mature, vous pourriez même ouvrir un _Open Source Program Office_[^OSPO] ou "Bureau de l'open-source", en charge de définir et de mettre en place les stratégies autour de l'utilisation et de la sécurisation des technologies open-source employées dans votre organisation.
1101
+
1100
1102
Enfin, les très grandes entreprises technologiques publient souvent de nouveaux logiciels en open-source. Ces logiciels deviennent rapidement des standards et sont utilisés par des dizaines de milliers de développeurs dans le monde. Cela permet d'acculturer facilement des ingénieurs à leurs propres technologies sans avoir à financer la démarche. Les entreprises se retrouvent ainsi avec des candidats maîtrisant déjà leurs propres technologies.
1101
1103
1102
1104
Loin de ne bénéficier qu'à ces seules entreprises, cette pratique avantage l'ensemble du secteur qui se retrouve avec une masse de candidats ayant connaissance des mêmes outils et des mêmes pratiques.
@@ -3437,9 +3439,9 @@ _Vous avez au moins 5 ans d'expérience professionnelle ? Nous la privilégions
3437
3439
3438
3440
[^Longhorn]: Stockage _Cloud-native_ distribué de type "block" pour Kubernetes. _longhorn.io_.
[^PASSI]: L'évaluateur tiers doit être un PASSI (Prestataires d'Audit de la Sécurité des Systèmes d'Information).
3445
3447
@@ -3610,3 +3612,5 @@ _Vous avez au moins 5 ans d'expérience professionnelle ? Nous la privilégions
3610
3612
[^SunTzuArtOfWar]: Yann COUDERC. ["_Sun Tzu a-t-il inventé les cas non conformes ?_"](https://suntzufrance.fr/sun-tzu-a-t-il-invente-les-cas-non-conformes/). 2013.
3611
3613
3612
3614
[^WarningDiplomaPublicSector]: Dans l'administration, en 2023, le niveau de diplôme définit encore aujourd'hui la catégorie, le grade et le niveau de rémunération.
3615
+
3616
+
[^OSPO]: Le guide de création d'un _Open Source Program Office_ est disponible sur GitHub. _github.com/todogroup/ospodefinition.org_.
0 commit comments