Skip to content

SCA Testing and Validation - Phase 2 #677

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
TomasTurina opened this issue Mar 19, 2025 · 0 comments
Closed

SCA Testing and Validation - Phase 2 #677

TomasTurina opened this issue Mar 19, 2025 · 0 comments
Assignees
Labels
level/epic Epic issue module/sca Security Compliance Assessment type/enhancement Enhancement issue

Comments

@TomasTurina
Copy link
Member

Description

This issue tracks the testing and validation of the Security Compliance Assessment (SCA) module developed in Phase 1. The objective of this phase is to ensure correctness, performance, and integration of the module within the new agent architecture. This includes unit testing, integration testing, and end-to-end validation across supported operating systems.

Functional Requirements

  • The module must be tested for correctness across all Tier 1 supported operating systems.
  • Integration tests must validate the module’s behavior within the agent framework.
  • Performance tests must be conducted to assess execution efficiency.
  • The module must correctly report compliance results to the Indexer.
  • The module must support graceful shutdown during an ongoing scan.
  • End-to-end (E2E) tests must validate:
    • Initial scan execution and correct inventory visualization.
    • Subsequent scan execution and correct change alerts visualization.

Non-Functional Requirements

  • The testing process must ensure that policy execution behavior remains consistent with 4.x.
  • Performance tests should evaluate the impact of scan scheduling and execution time.
  • Test results must be documented for future reference and improvements.

Implementation Restrictions

  • Testing must be conducted using real-case scenario policy files.
  • The validation process must ensure compliance with ECS schema mappings.
  • The testing environment must replicate real deployment conditions where feasible.

Plan

Implement Integration Tests

  • Perform manual integration tests to compare policy execution against 4.x.
  • Validate stateful and stateless message transmission correctness.
  • Test DBsync integration for state persistence and synchronization.

Conduct Performance Testing

  • Evaluate the execution time of policy scans under different configurations.
  • Test resource usage (CPU, memory) under various workloads.
  • Identify and address any performance bottlenecks.

Validate Graceful Shutdown Behavior

  • Execute scans and verify that shutdown is handled correctly.
  • Ensure no data corruption or inconsistency occurs during shutdown.

Conduct End-to-End (E2E) Testing

  • Develop an E2E test case to execute an initial scan and visualize the inventory in the dashboard.
  • Execute a subsequent scan and verify that change alerts are correctly displayed.
  • Document test results and identified issues.

Document Module Behavior

  • Record detailed documentation of all testing scenarios and results.
  • Provide clear guidelines for debugging and troubleshooting.
  • Outline potential areas for further improvement based on test outcomes.
@TomasTurina TomasTurina added level/epic Epic issue module/sca Security Compliance Assessment type/enhancement Enhancement issue labels Mar 19, 2025
@wazuhci wazuhci moved this to Backlog in XDR+SIEM/Release 6.0.0 Mar 19, 2025
@TomasTurina TomasTurina self-assigned this May 5, 2025
@wazuhci wazuhci moved this from Backlog to In progress in XDR+SIEM/Release 6.0.0 May 5, 2025
@wazuhci wazuhci moved this to In progress in XDR+SIEM/Release 6.0.0 May 12, 2025
@wazuhci wazuhci moved this from In progress to Done in XDR+SIEM/Release 6.0.0 May 14, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
level/epic Epic issue module/sca Security Compliance Assessment type/enhancement Enhancement issue
Projects
Status: Done
Development

No branches or pull requests

1 participant