You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/assets/YAML/default/Implementation/InfrastructureHardening.yaml
+27-12Lines changed: 27 additions & 12 deletions
Original file line number
Diff line number
Diff line change
@@ -675,7 +675,7 @@ Implementation:
675
675
- 8.14
676
676
isImplemented: false
677
677
evidence: ""
678
-
comments: ""
678
+
comments: ""
679
679
WAF baseline:
680
680
uuid: f0e01814-3b88-4bd0-a3a9-f91db001d20b
681
681
risk:
@@ -690,6 +690,8 @@ Implementation:
690
690
- Gradually switch to a proactive blocking stance as confidence in the accuracy of the rules increases
691
691
692
692
It's crucial to monitor and update the WAF configuration to adapt to evolving threats and minimize the potential for both false positives and false negatives.
693
+
694
+
There are debates on how useful a WAF is for APIs.
693
695
difficultyOfImplementation:
694
696
knowledge: 3
695
697
time: 4
@@ -701,11 +703,14 @@ Implementation:
701
703
dependsOn:
702
704
- Contextualized encoding
703
705
implementation: []
704
-
references:
705
706
samm2:
706
-
- TODO: Identify and implement SAMM security practices relevant to WAF configuration.
707
+
- D-SR-3-A
708
+
iso27001-2017:
709
+
- Hardening is not explicitly covered by ISO 27001 - too specific
710
+
- 13.1.3
707
711
iso27001-2022:
708
-
- TODO: Integrate WAF deployment with ISO 27001 controls for system hardening.
712
+
- Hardening is not explicitly covered by ISO 27001 - too specific
713
+
- 8.22
709
714
comments:
710
715
WAF medium:
711
716
uuid: f0e01814-3b88-4bd0-a3a9-f91db001d20b
@@ -716,12 +721,14 @@ Implementation:
716
721
description: |
717
722
A medium-level WAF configuration builds upon the baseline to offer a more nuanced and responsive defense mechanism against a wider array of threats.
718
723
719
-
Steps:
724
+
Sample steps:
720
725
- Implement an enhanced set of WAF rules based on baseline data
721
726
- Continuous monitoring and fine-tuning of the WAF configuration
722
727
- Develop a strategic incident response plan utilizing WAF insights
723
728
724
729
The medium configuration requires diligent management and continuous improvement to address new vulnerabilities while maintaining the integrity of application access.
730
+
731
+
There are debates on how useful a WAF is for APIs.
725
732
difficultyOfImplementation:
726
733
knowledge: 4
727
734
time: 5
@@ -733,11 +740,14 @@ Implementation:
733
740
dependsOn:
734
741
- WAF baseline
735
742
implementation: []
736
-
references:
737
743
samm2:
738
-
- TODO: Establish advanced SAMM security practices for WAF management.
744
+
- D-SR-3-A
745
+
iso27001-2017:
746
+
- Hardening is not explicitly covered by ISO 27001 - too specific
747
+
- 13.1.3
739
748
iso27001-2022:
740
-
- TODO: Ensure WAF processes are integrated into the overall security management in accordance with ISO 27001 standards.
749
+
- Hardening is not explicitly covered by ISO 27001 - too specific
750
+
- 8.22
741
751
comments:
742
752
743
753
WAF Advanced:
@@ -749,7 +759,7 @@ Implementation:
749
759
description: |
750
760
This advanced configuration goes beyond typical WAF implementations by enforcing strict input format checks and parameter validation to prevent any unauthorized or malformed data from compromising the application.
751
761
752
-
Steps:
762
+
Sample Steps:
753
763
- Implement strict data type and format validation rules to ensure only correctly formatted data is processed.
754
764
- Establish a denylist for all parameters that are not explicitly required, blocking them by default.
755
765
- Develop and continuously refine custom rulesets based on the application's traffic patterns, user behavior, and known vulnerabilities.
Embracing an advanced WAF setup requires a proactive approach, with continuous improvement and updating of security measures to ensure all inputs are scrutinized and validated, thus maintaining a resilient security posture against sophisticated attacks.
772
+
773
+
There are debates on how useful a WAF is for APIs.
762
774
difficultyOfImplementation:
763
775
knowledge: 5
764
776
time: 5
@@ -770,11 +782,14 @@ Implementation:
770
782
dependsOn:
771
783
- WAF medium
772
784
implementation: []
773
-
references:
774
785
samm2:
775
-
- TODO: Develop an advanced threat management framework that includes rigorous input validation strategies.
786
+
- D-SR-3-A
787
+
iso27001-2017:
788
+
- Hardening is not explicitly covered by ISO 27001 - too specific
789
+
- 13.1.3
776
790
iso27001-2022:
777
-
- TODO: Incorporate advanced WAF input validation processes into the organization's ISMS.
791
+
- Hardening is not explicitly covered by ISO 27001 - too specific
0 commit comments