You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/assets/YAML/default/BuildAndDeployment/Build.yaml
+11-11Lines changed: 11 additions & 11 deletions
Original file line number
Diff line number
Diff line change
@@ -50,26 +50,26 @@ Build and Deployment:
50
50
- Artifact creation and storage
51
51
- Deployment preparation
52
52
53
-
A *defined build process* automates these steps to ensure consistency, reproducibility, and security. Automation reduces human error and enforces security controls. Use tools such as Jenkins, GitHub Actions, GitLab CI, or Maven to codify the process.
53
+
Basing the build process on human memory may lead to inconsistencies and security misconfigurations.
54
+
55
+
A *defined build process* can automate these steps to ensure consistency, avoiding accidental omissions or misconfigurations. Use tools such as Jenkins, GitHub Actions, GitLab CI, or Maven to codify the process.
56
+
57
+
A simplified, but still a *defined build process*, may be a checklist of the steps to be performed.
54
58
risk:
55
-
Performing builds without a defined and automated process is error-prone and increases the risk of security misconfigurations, unauthorized changes, and supply chain attacks.
59
+
Without a defined and automated build process the risk increase for accidental mistakes, forgetting test activities, and insecure misconfigurations.
56
60
measure:
57
-
A well-defined, automated, and auditable build process lowers the possibility of errors and unauthorized changes during the build process. It also enables traceability and rapid response to incidents.
61
+
Find a tool that suits your environment. Add your manual build steps, include steps for running tests, scanning and preparation for deployment.
62
+
assessment: |
63
+
- Show your build pipeline configuration (e.g., Jenkinsfile, GitHub Actions workflow) and an exemplary job (build + test + security scan).
58
64
level: 1
59
65
difficultyOfImplementation:
60
66
knowledge: 2
61
67
time: 3
62
68
resources: 2
63
69
usefulness: 4
64
-
assessment: |
65
-
- Show your build pipeline configuration (e.g., Jenkinsfile, GitHub Actions workflow) and an exemplary job (build + test + security scan).
66
-
- Demonstrate that every team member has appropriate access (least privilege).
67
-
- Show that failed jobs are investigated and fixed promptly.
68
-
- Provide audit logs or evidence of build runs and changes.
69
-
- Document how security controls are enforced in the build process.
Copy file name to clipboardExpand all lines: src/assets/YAML/default/BuildAndDeployment/Deployment.yaml
+7-11Lines changed: 7 additions & 11 deletions
Original file line number
Diff line number
Diff line change
@@ -100,10 +100,9 @@ Build and Deployment:
100
100
- 8.32
101
101
assessment: |
102
102
- Deployment process is documented and available to relevant staff
103
-
- All deployment steps are automated and version-controlled
104
-
- Approvals and access controls are enforced for production deployments
105
-
- Rollback procedures are defined and tested
106
-
- Deployment logs and evidence are retained for audit purposes
103
+
- All deployment steps are automated
104
+
- Rollback procedures are defined and tested [Keep??? Delete???]
105
+
- Provide audit logs or evidence of deployments
107
106
isImplemented: false
108
107
evidence: ""
109
108
comments: ""
@@ -220,12 +219,15 @@ Build and Deployment:
220
219
Inventory of production components:
221
220
uuid: 2a44b708-734f-4463-b0cb-86dc46344b2f
222
221
description: |
223
-
An inventory of production components is a complete, up-to-date list of all applications and services running in production. This enables effective vulnerability management, incident response, and compliance. Without it, organizations risk running unmaintained or unauthorized software.
222
+
An inventory of production components is a complete, up-to-date list of all applications running in production. This enables effective vulnerability management, incident response, and compliance. Without it, organizations risk running unmaintained or unauthorized software.
224
223
risk: |-
225
224
An organization is unaware of components like applications in production. Not knowing existing applications in production leads to not assessing it.
226
225
measure: |-
227
226
A documented inventory of components in production exists (gathered manually or automatically). For example a manually created document with applications in production.
228
227
In a kubernetes cluster, namespaces can be automatically gathered and documented, e.g. in a JSON in a S3 bucket/git repository, dependency track.
228
+
assessment: |
229
+
- Inventory of all production applications with application name, owner, and date of last review
230
+
- Inventory is accessible to development, security and operations teams
229
231
dependsOn:
230
232
- Defined deployment process
231
233
level: 1
@@ -247,12 +249,6 @@ Build and Deployment:
247
249
iso27001-2022:
248
250
- 5.9
249
251
- 5.12
250
-
assessment: |
251
-
- Inventory of all production components exists and is regularly updated
252
-
- Inventory includes key metadata (e.g., version, owner, deployment date)
253
-
- Inventory is accessible to security and operations teams
254
-
- There is a process for adding, updating, and removing components
Copy file name to clipboardExpand all lines: src/assets/YAML/default/BuildAndDeployment/PatchManagement.yaml
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -43,7 +43,7 @@ Build and Deployment:
43
43
description: |
44
44
Automated PRs for patches ensure that updates for outdated or vulnerable dependencies are created and proposed without manual intervention. Tools continuously monitor for new versions or security advisories and immediately generate pull requests to update affected components in code, container images, or infrastructure. This process ensures that available patches are quickly visible to developers and can be reviewed and merged with minimal delay, reducing the risk window for known vulnerabilities.
45
45
risk: |
46
-
Components with known (or unknown) vulnerabilities might persist for a long time and be exploited, even when a patch is available.
46
+
Components with known vulnerabilities might persist for a long time and be exploited, even when a patch is available.
47
47
measure: |
48
48
Fast patching of third-party components is needed. The DevOps way is to have an automated pull request for new components. This includes:
49
49
* Applications
@@ -53,7 +53,7 @@ Build and Deployment:
53
53
assessment: |
54
54
- Automated PR tooling is enabled for all relevant repositories.
55
55
- PRs are created automatically for outdated or vulnerable dependencies.
56
-
- PRs are reviewed and merged in a timely manner.
56
+
- PRs are reviewed and merged according to the defined patch policy.
57
57
- Evidence of automated PRs and patching activity is available.
Copy file name to clipboardExpand all lines: src/assets/YAML/default/CultureAndOrganization/EducationAndGuidance.yaml
-1Lines changed: 0 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,6 @@ Culture and Organization:
12
12
Provide security awareness training for all personnel involved in software development on an ad-hoc basis, ensuring that relevant topics are covered when new risks or needs are identified.
13
13
assessment: |
14
14
- Conduct security training for developers and relevant personnel
15
-
- Participants can identify common software security risks addressed in the training
Copy file name to clipboardExpand all lines: src/assets/YAML/default/CultureAndOrganization/Process.yaml
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -66,7 +66,7 @@ Culture and Organization:
66
66
measure: |
67
67
Develop, document, and communicate a BCDR plan for all critical components. The plan must define roles and responsibilities, Service Level Agreements (SLAs), Recovery Point Objectives (RPOs), Recovery Time Objectives (RTOs), and failover procedures. Ensure all relevant personnel are trained and the plan is reviewed and updated regularly.
68
68
assessment: |
69
-
- The organization has a documented BCDR plan covering all critical components.
69
+
- There is a documented BCDR plan covering all critical components of the application(s).
70
70
- The plan clearly defines responsibilities, SLAs, RPOs, RTOs, and failover steps.
71
71
- Relevant staff are aware of the plan, and evidence of regular review and testing is available.
0 commit comments