|
| 1 | +# yaml-language-server: $schema=../../schemas/dsomm-schema-information-gathering.json |
| 2 | +--- |
| 3 | +Information Gathering: |
| 4 | + Test KPI: |
| 5 | + #Number of vulnerabilities - appsec - vuln management ? |
| 6 | + # Fix Rate? |
| 7 | + Number of vulnerabilities/severity: |
| 8 | + uuid: bc548cba-cb82-4f76-bd4b-325d9d256279 |
| 9 | + risk: |- |
| 10 | + Failing to convey the number of vulnerabilities by severity might undermine the effectiveness of product teams. This might lead to ignorance of findings. |
| 11 | + measure: |- |
| 12 | + Measurement and communication of vulnerabilities per severity for components like applications. At least quarterly. |
| 13 | + description: |- |
| 14 | + Communication can be performed in a simple way, e.g. text based during the build process. |
| 15 | + This activity depends on at least one security testing implementation. |
| 16 | + difficultyOfImplementation: |
| 17 | + knowledge: 2 |
| 18 | + time: 2 |
| 19 | + resources: 2 |
| 20 | + usefulness: 3 |
| 21 | + level: 2 |
| 22 | + dependsOn: [] |
| 23 | + implementation: [] |
| 24 | + references: |
| 25 | + samm2: |
| 26 | + - I-DM-3-B |
| 27 | + iso27001-2022: |
| 28 | + - 5.25 |
| 29 | + - 5.12 |
| 30 | + - 5.13 |
| 31 | + - 5.10 |
| 32 | + tags: |
| 33 | + - vulnerability-mgmt |
| 34 | + - metrics |
| 35 | + - vmm-measurement |
| 36 | + Patching mean time to resolution via PR: |
| 37 | + uuid: 86d490b9-d798-4a5b-a011-ab9688014c46 |
| 38 | + risk: |- |
| 39 | + Without measuring Mean Time to Resolution (MTTR) related to patching, it is challenging to identify delays in the patching process. Unaddressed vulnerabilities can be exploited by attackers, leading to potential security breaches and data loss. |
| 40 | + measure: |- |
| 41 | + Measurement and communication of patching Mean Time to Resolution (MTTR) in alignment with Service Level Agreements (SLAs), conducted at least on a quarterly basis. |
| 42 | + This includes the measurement of the existence of a properly configured automated pull request (PR) tool (e.g., Dependabot or Renovate) in a repository. |
| 43 | + In addition, the measurement of the time from opening an automated PR to merging it. |
| 44 | + |
| 45 | + Average time to patch is visualized per component/project/team. |
| 46 | + difficultyOfImplementation: |
| 47 | + knowledge: 1 |
| 48 | + time: 1 |
| 49 | + resources: 2 |
| 50 | + usefulness: 3 |
| 51 | + level: 2 |
| 52 | + dependsOn: |
| 53 | + - uuid:8ae0b92c-10e0-4602-ba22-7524d6aed488 #Automated PRs for patches |
| 54 | + implementation: [] |
| 55 | + references: |
| 56 | + samm2: |
| 57 | + - I-DM-3-B |
| 58 | + iso27001-2022: |
| 59 | + - 5.25 |
| 60 | + - 5.12 |
| 61 | + - 5.13 |
| 62 | + - 5.10 |
| 63 | + tags: |
| 64 | + - patching |
| 65 | + - metrics |
| 66 | + - vmm-measurements |
| 67 | + SLA per criticality: # is this the definition of SLAs or the measurement? |
| 68 | + uuid: 123e4567-e89b-12d3-a456-426614174000 |
| 69 | + risk: |- |
| 70 | + Not communicating how many applications are adhering to SLAs based on the criticality of vulnerabilities can lead to delayed remediation of |
| 71 | + critical security issues, increasing the risk of exploitation and potential damage to the organization. |
| 72 | + measure: |- |
| 73 | + Measurement and communication of how many of the vulnerabilities handling per severity for components like applications are aligned to SLAs. |
| 74 | + This is performed for the hole organization and doesn't need to be broken down (yet) on team/product/application. |
| 75 | + At least quarterly. |
| 76 | + difficultyOfImplementation: |
| 77 | + knowledge: 2 |
| 78 | + time: 2 |
| 79 | + resources: 2 |
| 80 | + usefulness: 3 |
| 81 | + level: 3 |
| 82 | + dependsOn: [] |
| 83 | + implementation: |
| 84 | + - $ref: src/assets/YAML/default/implementations.yaml#/implementations/owasp-defectdojo |
| 85 | + - $ref: src/assets/YAML/default/implementations.yaml#/implementations/purify |
| 86 | + - $ref: src/assets/YAML/default/implementations.yaml#/implementations/business-friendly-vulnerability-metrics |
| 87 | + - $ref: src/assets/YAML/default/implementations.yaml#/implementations/defectdojo-client |
| 88 | + references: |
| 89 | + samm2: |
| 90 | + - I-DM-3-B |
| 91 | + iso27001-2022: |
| 92 | + - 5.25 |
| 93 | + - 5.12 |
| 94 | + - 5.13 |
| 95 | + - 5.10 |
| 96 | + tags: |
| 97 | + - vulnerability-mgmt |
| 98 | + - metrics |
| 99 | + - vmm-measurements |
| 100 | + Patching mean time to resolution via production: |
| 101 | + uuid: 77ffc53e-9f3d-41f4-92d3-02f04f9b6b0f |
| 102 | + risk: |- |
| 103 | + Without measuring Mean Time to Resolution (MTTR) related to patching, it is challenging to identify delays in the patching process. Unaddressed vulnerabilities can be exploited by attackers, leading to potential security breaches and data loss. |
| 104 | + measure: |- |
| 105 | + Measurement and communication of the time from the availability of a patch to its deployment in production in alignment with Service Level Agreements (SLAs), conducted at least on a quarterly basis. |
| 106 | + Average time to patch is visualized per component/project/team. |
| 107 | + difficultyOfImplementation: |
| 108 | + knowledge: 1 |
| 109 | + time: 1 |
| 110 | + resources: 2 |
| 111 | + usefulness: 3 |
| 112 | + level: 4 |
| 113 | + dependsOn: |
| 114 | + - uuid:86d490b9-d798-4a5b-a011-ab9688014c46 # Patching mean time to resolution via PR |
| 115 | + - uuid:8ae0b92c-10e0-4602-ba22-7524d6aed488 # Automated PRs for patches |
| 116 | + implementation: [] |
| 117 | + references: |
| 118 | + samm2: |
| 119 | + - I-DM-3-B |
| 120 | + iso27001-2017: |
| 121 | + - 16.1.4 |
| 122 | + iso27001-2022: |
| 123 | + - 5.25 |
| 124 | + tags: |
| 125 | + - patching |
| 126 | + - metrics |
| 127 | + - vmm-measurements |
| 128 | + Generation of response statistics: |
| 129 | + uuid: c922981b-65ed-40f3-a947-96fee9a0125f |
| 130 | + risk: No or delayed reaction to findings leads to potential exploitation of findings. |
| 131 | + measure: Creation and response statistics (e.g. Mean Time to Resolution) of findings. This is also referred to as _Mean Time to Resolve_. |
| 132 | + difficultyOfImplementation: |
| 133 | + knowledge: 2 |
| 134 | + time: 2 |
| 135 | + resources: 1 |
| 136 | + usefulness: 3 |
| 137 | + dependsOn: |
| 138 | + - Usage of a vulnerability management system |
| 139 | + level: 3 |
| 140 | + implementation: |
| 141 | + - $ref: src/assets/YAML/default/implementations.yaml#/implementations/owasp-defectdojo |
| 142 | + - $ref: src/assets/YAML/default/implementations.yaml#/implementations/purify |
| 143 | + - $ref: src/assets/YAML/default/implementations.yaml#/implementations/business-friendly-vulnerability-metrics |
| 144 | + - $ref: src/assets/YAML/default/implementations.yaml#/implementations/defectdojo-client |
| 145 | + references: |
| 146 | + samm2: |
| 147 | + - I-DM-2-B |
| 148 | + iso27001-2017: |
| 149 | + - 16.1.4 |
| 150 | + - 8.2.3 |
| 151 | + iso27001-2022: |
| 152 | + - 5.25 |
| 153 | + - 5.10 |
| 154 | + tags: |
| 155 | + - vulnerability-mgmt |
| 156 | + - metrics |
| 157 | + - vmm-measurements |
| 158 | + comments: "The [DefectDojo-Client](https://github.com/SDA-SE/defectdojo-client/tree/master/statistic-client) generates statistics from OWASP DefectDojo and places the results in a [Github repository](https://github.com/pagel-pro/cluster-image-scanner-all-results)." |
| 159 | + Fix rate per repo/product: |
| 160 | + uuid: 123e4567-e89b-12d3-a456-426614174000 |
| 161 | + risk: |- |
| 162 | + Not communicating how many applications are adhering to SLAs based on the criticality of vulnerabilities can lead to delayed remediation of |
| 163 | + critical security issues, increasing the risk of exploitation and potential damage to the organization. |
| 164 | + measure: |- |
| 165 | + Measurement and communication of the number of vulnerabilities handled per severity level for components such as applications, ensuring alignment with SLAs. |
| 166 | + The rate should be broken down by team, product, application, repository, and/or service. This analysis should be conducted at least quarterly. |
| 167 | + difficultyOfImplementation: |
| 168 | + knowledge: 2 |
| 169 | + time: 2 |
| 170 | + resources: 2 |
| 171 | + usefulness: 3 |
| 172 | + level: 3 |
| 173 | + dependsOn: |
| 174 | + - uuid:123e4567-e89b-12d3-a456-426614174000 |
| 175 | + implementation: |
| 176 | + - $ref: src/assets/YAML/default/implementations.yaml#/implementations/owasp-defectdojo |
| 177 | + - $ref: src/assets/YAML/default/implementations.yaml#/implementations/purify |
| 178 | + - $ref: src/assets/YAML/default/implementations.yaml#/implementations/business-friendly-vulnerability-metrics |
| 179 | + - $ref: src/assets/YAML/default/implementations.yaml#/implementations/defectdojo-client |
| 180 | + references: |
| 181 | + samm2: |
| 182 | + - I-DM-3-B |
| 183 | + iso27001-2022: |
| 184 | + - 5.25 |
| 185 | + - 5.12 |
| 186 | + - 5.13 |
| 187 | + - 5.10 |
| 188 | + tags: |
| 189 | + - vulnerability-mgmt |
| 190 | + - metrics |
| 191 | + - vmm-measurements |
| 192 | + |
0 commit comments